Streamline Your Workforce During a Pandemic

  • Buy Link or Shortcode: {j2store}515|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Lead
  • Parent Category Link: /lead

Reduced infection rates in compromised areas are providing hope that these difficult times will pass. However, organizations are facing harsh realities in real time. With significant reductions in revenue, employers are facing pressure to quickly implement cost-cutting strategies, resulting in mass layoffs of valuable employees.

Our Advice

Critical Insight

Employees are an organization’s greatest asset. When faced with cost-cutting pressures, look for redeployment opportunities that use talent as a resource to get through hard times before resorting to difficult layoff decisions.

Impact and Result

Make the most of your workforce in this unprecedented situation by following McLean & Company’s process to initiate redeployment efforts and reduce costs. If all else fails, follow our guidance on planning for layoffs and considerations when doing so.

Streamline Your Workforce During a Pandemic Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Meet with leadership

Set a strategy with senior leadership, brainstorm underused and understaffed employee segments and departments, then determine an approach to redeployments and layoffs.

  • Streamline Your Workforce During a Pandemic Storyboard
  • Redeployment and Layoff Strategy Workbook

2. Plan individual and department redeployment

Collect key information, prepare and redeploy, and roll up information across the organization.

  • Short-Term Survival Segment Evaluation Tool
  • Skills Inventory for Redeployment Tool
  • Redeployment Action and Communication Plan
  • Crisis Communication Guide for HR
  • Crisis Communication Guide for Leaders
  • Leadership Crisis Communication Guide Template
  • 3i's of Engaging Management – Manager Guide
  • Feedback and Coaching Guide for Managers
  • Redeployment Communication Roll-up Template

3. Plan individual and department layoffs

Plan for layoffs, execute on the layoff plan, and communicate to employees.

  • Employee Departure Checklist Tool
  • 10 Communication Best Practices in the Face of Crisis
  • Termination Logistics Tool
  • Termination Costing Tool
  • COVID-19: Employee-Facing Frequently Asked Questions Template
  • COVID-19: Employee-Facing Frequently Asked Questions
  • Standard Internal Communications Plan

4. Monitor and manage departmental effectiveness

Monitor departmental performance, review organizational performance, and determine next steps.

  • HR Metrics Library
  • Standard HR Scorecard
[infographic]

Adopt Design Thinking in Your Organization

  • Buy Link or Shortcode: {j2store}327|cart{/j2store}
  • member rating overall impact: 9.6/10 Overall Impact
  • member rating average dollars saved: $23,245 Average $ Saved
  • member rating average days saved: 13 Average Days Saved
  • Parent Category Name: Innovation
  • Parent Category Link: /innovation
  • End users often have a disjointed experience while interacting with your organization in using its products and services.
  • You have been asked by your senior leadership to start a new or revive an existing design or innovation function within your organization. However, your organization has dismissed design thinking as the latest “management fad” and does not buy into the depth and rigor that design thinking brings.
  • The design or innovation function lives on the fringes of your organization due to its apathy towards design thinking or tumultuous internal politics.
  • You, as a CIO, want to improve the user satisfaction with the IT services your team provides to both internal and external users.

Our Advice

Critical Insight

  • A user’s perspective while interacting with the products and services is very different from the organization’s internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.
  • Top management must have a design thinker – the guardian angel of the balance between exploration (i.e. discovering new business models) and exploitation (i.e. leveraging existing business models).
  • Your approach to adopt design thinking must consider your organization’s specific goals and culture. There’s no one-size-fits-all approach.

Impact and Result

  • User satisfaction, with the end-to-end journeys orchestrated by your organization, will significantly increase.
  • Design-centric organizations enjoy disproportionate financial rewards.

Adopt Design Thinking in Your Organization Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should adopt design thinking in your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. What is design thinking?

The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.

  • Adopt Design Thinking in Your Organization – Phase 1: What Is Design Thinking?
  • Victor Scheinman's Experiment for Design

2. How does an organization benefit from design thinking?

This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.

  • Adopt Design Thinking in Your Organization – Phase 2: How Does an Organization Benefit From Design Thinking?
  • Trends Matrix (Sample)

3. How do you build a design organization?

The focus of this phase is to:

  • Measure the design-centricity of your organization and subsequently, identify the areas for improvement.
  • Define an approach for a design program that suites your organization’s specific goals and culture.
    • Adopt Design Thinking in Your Organization – Phase 3: How Do You Build a Design Organization?
    • Report on How Design-Centric Is Your Organization (Sample)
    • Approach for the Design Program (Sample)
    • Interview With David Dunne on Design Thinking
    • Interview With David Dunne on Design Thinking (mp3)
    [infographic]

    Workshop: Adopt Design Thinking in Your Organization

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 What Is Design Thinking?

    The Purpose

    The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.

    Key Benefits Achieved

    An intimate understanding of the design thinking

    An assessment of design-centricity of your organization and identification of areas for improvement

    Activities

    1.1 Discuss case studies on how designers think and work

    1.2 Define design thinking

    1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?

    1.4 Earmark areas for improvement to raise the design-centricity of your organization

    Outputs

    Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.

    2 How Does an Organization Benefit From Design Thinking?

    The Purpose

    In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.

    Key Benefits Achieved

    An in-depth understanding of the relevance of design in strategy formulation and service design

    An understanding of the trends that impact your organization

    A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those

    Activities

    2.1 Discuss relevance of design in strategy through case studies

    2.2 Articulate trends that impact your organization

    2.3 Discuss service design through case studies

    2.4 Identify critical customer journeys and baseline customers’ satisfaction with those

    2.5 Run a simulation of design in practice

    Outputs

    Trends that impact your organization.

    Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.

    3 How to Build a Design Organization

    The Purpose

    The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.

    Key Benefits Achieved

    An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.

    Activities

    3.1 Identify objectives and key measures for your design thinking program

    3.2 Structure your program after reviewing five main archetypes of a design program

    3.3 Balance between incremental and disruptive innovation

    3.4 Review best practices of a design organization

    Outputs

    An approach for your design thinking program: objectives and key measures; structure of the program, etc.

    Human Resources Management

    • Buy Link or Shortcode: {j2store}31|cart{/j2store}
    • Related Products: {j2store}31|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $13,367
    • member rating average days saved: 7
    • Parent Category Name: people and Resources
    • Parent Category Link: /people-and-resources
    Talent is the differentiator; availability is not.

    Integrate IT Risk Into Enterprise Risk

    • Buy Link or Shortcode: {j2store}195|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,599 Average $ Saved
    • member rating average days saved: 2 Average Days Saved
    • Parent Category Name: IT Governance, Risk & Compliance
    • Parent Category Link: /it-governance-risk-and-compliance
    • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
    • IT is expected to own risks over which they have no authority or oversight.
    • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

    Our Advice

    Critical Insight

    • Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize the organization’s ability to respond to risk.

    Impact and Result

    • Understand gaps in the organization’s current approach to risk management practices.
    • Establish a standardized approach for how IT risks impact the enterprise as a whole.
    • Drive a risk-aware organization toward innovation and consider alternative options for how to move forward.
    • Integrate IT risks into the foundational risk practice.

    Integrate IT Risk Into Enterprise Risk Research & Tools

    Integrated Risk Management Capstone – A framework for how IT risks can be integrated into your organization’s enterprise risk management program to enable strategic risk-informed decisions.

    This is a capstone blueprint highlighting the benefits of an integrated risk management program that uses risk information and data to inform strategic decision making. Throughout this research you will gain insight into the five core elements of integrating risk through assessing, governing, defining the program, defining the process, and implementing.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Integrate IT Risk Into Enterprise Risk Capstone
    • Integrated Risk Maturity Assessment
    • Risk Register Tool

    Infographic

    Further reading

    Integrate IT Risk Into Enterprise Risk

    Don’t fear IT risks, integrate them.

    EXECUTIVE BRIEF

    Analyst Perspective

    Having siloed risks is risky business for any enterprise.

    Photo of Valence Howden, Principal Research Director, CIO Practice.
    Valence Howden
    Principal Research Director, CIO Practice
    Photo of Petar Hristov Research Director, Security, Privacy, Risk & Compliance.
    Petar Hristov
    Research Director, Security, Privacy, Risk & Compliance
    Photo of Ian Mulholland Research Director, Security, Risk & Compliance.
    Ian Mulholland
    Research Director, Security, Risk & Compliance
    Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
    Brittany Lutes
    Senior Research Analyst, CIO Practice
    Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice
    Ibrahim Abdel-Kader
    Research Analyst, CIO Practice

    Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.

    In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.

    When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.

    And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.

    Executive Summary

    Your Challenge

    Most organizations fail to integrate IT risks into enterprise risks:

    • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
    • IT is expected to own risks over which they have no authority or oversight.
    • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

    Common Obstacles

    IT leaders have to overcome these obstacles when it comes to integrating risk:

    • Making business leaders aware of, involved in, and able to respond to all enterprise risks.
    • A lack of data or information being used to support a holistic risk management process.
    • A low level of enterprise risk maturity.
    • A lack of risk management capabilities.

    Info-Tech’s Approach

    By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:

    • Understanding gaps in the organization’s current approach to risk management practices.
    • Establishing a standardized approach for how IT risks impact the enterprise as a whole.
    • Driving a risk-aware organization toward innovation and considering alternative options for how to move forward.
    • Helping integrate IT risks into the foundational risk practice.

    Info-Tech Insight

    Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.

    What is integrated risk management?

    • Integrated risk management is the process of ensuring all forms of risk information, including information and technology, are considered and included in the enterprise’s risk management strategy.
    • It removes the siloed approach to classifying risks related to specific departments or areas of the organization, recognizing that each of those risks is a threat to the overarching enterprise.
    • Aggregating the different threats or uncertainty that might exist within an organization allows for informed decisions to be made that align to strategic goals and continue to drive value back to the business.
    • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

    Enterprise Risk Management (ERM)

    • IT
    • Security
    • Digital
    • Vendor/Third Party
    • Other

    Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.

    IT risk is enterprise risk

    Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

    Your challenge

    Embedding IT risks into the enterprise risk management program is challenging because:

    • Most organizations classify risks based on the departments or areas of the business where the uncertainty is likely to happen.
    • Unnecessary expectations are placed on the IT department to own risks over which they have no authority or oversight.
    • Risks are often only identified when conducting due diligence for a project or ensuring compliance with regulations and standards.

    Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.

    35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)

    12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)

    Common obstacles

    These barriers make integrating IT risks difficult to address for many organizations:

    • IT risks are not seen as enterprise risks.
    • The organization’s culture toward risk is not defined.
    • The organization’s appetite and threshold for risk are not defined.
    • Each area of the organization has a different method of identifying, assessing, and responding to risk events.
    • Access to reliable and informative data to support risk management is difficult to obtain.
    • Leadership does not see the business value of integrating risk into a single management program.
    • The organization’s attitudes and behaviors toward risk contradict the desired and defined risk culture.
    • Skills, training, and resources to support risk management are lacking, let alone those to support integrated risk management.

    Integrating risks has its challenges

    62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)

    20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)

    Integrate Risk and Use It to Your Advantage

    Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

    Risk management is more than checking an audit box or demonstrating project due diligence.

    Risk Drivers
    • Audit & compliance
    • Preserve value & avoid loss
    • Previous risk impact driver
    • Major transformation
    • Strategic opportunities
    Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
    1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
    2. Determine Authority with Governance
    Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
    IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

    Governance and related decision making is optimized with integrated and aligned risk data.

    List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in Enterprise Risk Management.

    ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

    The program plan is meant to consider all the major risk types in a unified approach.

    The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

    Integrated Risk Mapping — Downside Risk Focus

    A diagram titled 'Risk and Controls' beginning with 'Possible Sources' and a list of sources, 'Control Activities' to prevent, the 'RISK EVENT', 'Recovery Activities' to recover, and 'Possible Repercussions' with a list of ramifications.

    Integrated Risk Mapping — Downside and Upside Risk

    Third-Party Risk Example

    Example of a third-party risk mapped onto the diagram on the previous slide, but with potential upsides mapped out as well. The central risk event is 'Vendor exposes private customer data'. Possible Sources of the downside are 'External Attack' with likelihood prevention method 'Define security standard requirements for vendor assessment' and 'Exfiltration of data through fourth-party staff' with likelihood prevention method 'Ensure data is properly classified'. Possible Sources of the upside are 'Application rationalization' with likelihood optimization method 'Reduce number of applications in environment' and 'Review vendor assessment practices' with likelihood optimization method 'Improve vendor onboarding'. Possible Repercussions on the downside are 'Organization unable to operate in jurisdiction' with impact minimization method 'Engage in-house risk mitigation responses' and 'Fines levied against organization' with impact minimization method 'Report incident to any regulators'. Possible Repercussions on the upside are 'Easier vendor integration and management' with impact utilization method 'Improved vendor onboarding practices' and 'Able to bid on contracts with these requirements' with impact utilization method 'Vendors must provide attestations (e.g. SOC or CMMC)'.

    Insight Summary

    Overarching insight

    Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.

    Govern risk strategically

    Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.

    Assess risk maturity

    Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.

    Manage risk

    It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.

    Implement risk management

    Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.

    Tactical insight

    Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.

    Integrated risk benefits

    IT Benefits

    • IT executives have a responsibility but not accountability when it comes to risk. Ensure the right business stakeholders have awareness and ability to make informed risk decisions.
    • Controls and responses to risks that are within the “IT” realm will be funded and provided with sufficient support from the business.
    • The business respects and values the role of IT in supporting the enterprise risk program, elevating its role into business partner.

    Business Benefits

    • Business executives and boards can make informed responses to the various forms of risk, including those often categorized as “IT risks.”
    • The compounding severity of risks can be formally assessed and ideally quantified to provide insight into how risks’ ramifications can change based on scenarios.
    • Risk-informed decisions can be used to optimize the business and drive it toward adopting innovation as a response to risk events.
    • Get your organization insured against cybersecurity threats at the lowest premiums possible.

    Measure the value of integrating risk

    • Reduce Operating Costs

      • Organizations can reduce their risk operating costs by 20 to 30% by adopting enterprise-wide digital risk initiatives (McKinsey & Company).
    • Increase Cybersecurity Threat Preparedness

      • Increase the organization’s preparedness for cybersecurity threats. 79% of organizations that were impacted by email threats in 2020 were not prepared for the hit (Diligent)
    • Increase Risk Management’s Impact to Drive Strategic Value

      • Currently, only 3% of organizations are extensively using risk management to drive their unique competitive advantage, compared to 35% of companies who do not use it at all (AICPA & NC State Poole College of Management).
    • Reduce Lost Productivity for the Enterprise

      • Among small businesses, 76% are still not considering purchasing cyberinsurance in 2021, despite the fact that ransomware attacks alone cost Canadian businesses $5.1 billion in productivity in 2020 (Insurance Bureau of Canada, 2021).

    “31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)

    Make integrated risk management sustainable

    58%

    Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture)

    70%

    Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk)

    54%

    Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte)

    63%

    Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management)

    Successful adoption of integrated risk management is often associated with these key elements.

    Assessment

    Assess your organization’s method of addressing risk management to determine if integrated risk is possible

    Assessing the organization’s risk maturity

    Mature or not, integrated risk management should be a consideration for all organizations

    The first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information.

    In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information.

    A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go.

    Pie chart titled 'Organizational Risk Management Maturity Assessment Results' showing just under half 'Progressing', a third 'Established', a seventh 'Emerging', and a very small portion 'Leading or Aspirational'.

    Integrated Risk Maturity Categories

    Semi-circle with colored points indicating four categories.

    1

    Context & Strategic Direction Understand the organization’s main objectives and how risk can support or enhance those objectives.

    2

    Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

    3

    Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

    4

    Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

    Maturity should inform your approach to risk management

    The outcome of the risk maturity assessment should inform how risk management is approached within the organization.

    A row of waves starting light and small and becoming taller and darker in steps. The levels are 'Non-existent', 'Basic', 'Partially Integrated', 'Mostly Integrated', 'Fully Integrated', and 'Optimized'.

    For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.

    However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.

    Integrated Risk Maturity Assessment

    The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).

    Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

    Integrated Risk Maturity Assessment

    A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization

    Sample of the Integrated Risk Maturity Assessment deliverable.

    Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.

    Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Build Your Security Operations Program From the Ground Up

      • Buy Link or Shortcode: {j2store}263|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $56,299 Average $ Saved
      • member rating average days saved: 43 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Analysts cannot monitor and track events coming from multiple tools because they have no visibility into the threat environment.
      • Incident management takes away time from problem management because processes are ad hoc and the continuous monitoring, collection, and analysis of massive volumes of security event data is responsive rather than tactical.
      • Organizations are struggling to defend against and prevent threats while juggling business, compliance, and consumer obligations.

      Our Advice

      Critical Insight

      • Security operations is no longer a center but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      • Raw data without correlation is a waste of time, money, and effort. A SIEM on its own will not provide this contextualization and needs configuration. Prevention, detection, analysis, and response processes must contextualize threat data and supplement one another – true value will only be realized once all four functions operate as a unified process.
      • If you are not communicating, then you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Impact and Result

      • A centralized security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes that address the increasing sophistication of cyberthreats while guiding continuous improvement.
      • This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

      Build Your Security Operations Program From the Ground Up Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a security operations program, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish your foundation

      Determine how to establish the foundation of your security operations.

      • Build Your Security Operations Program From the Ground Up – Phase 1: Establish Your Foundation
      • Information Security Pressure Analysis Tool

      2. Assess your current state

      Assess the maturity of your prevention, detection, analysis, and response processes.

      • Build Your Security Operations Program From the Ground Up – Phase 2: Assess Your Current State
      • Security Operations Roadmap Tool

      3. Design your target state

      Design a target state and improve your governance and policy solutions.

      • Build Your Security Operations Program From the Ground Up – Phase 3: Design Your Target State
      • Security Operations Policy

      4. Develop an implementation roadmap

      Make your case to the board and develop a roadmap for your prioritized security initiatives.

      • Build Your Security Operations Program From the Ground Up – Phase 4: Develop an Implementation Roadmap
      • In-House vs. Outsourcing Decision-Making Tool
      • Security Operations MSSP RFP Template
      • Security Operations Project Charter Template
      • Security Operations RACI Tool
      • Security Operations Metrics Summary Document
      [infographic]

      Workshop: Build Your Security Operations Program From the Ground Up

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Your Foundation

      The Purpose

      Identify security obligations and the security operations program’s pressure posture.

      Assess current people, process, and technology capabilities.

      Determine foundational controls and complete system and asset inventory.

      Key Benefits Achieved

      Identified the foundational elements needed for planning before a security operations program can be built

      Activities

      1.1 Define your security obligations and assess your security pressure posture.

      1.2 Determine current knowledge and skill gaps.

      1.3 Shine a spotlight on services worth monitoring.

      1.4 Assess and document your information system environment.

      Outputs

      Customized security pressure posture

      Current knowledge and skills gaps

      Log register of essential services

      Asset management inventory

      2 Assess Current Security Operations Processes

      The Purpose

      Identify the maturity level of existing security operations program processes.

      Key Benefits Achieved

      Current maturity assessment of security operations processes

      Activities

      2.1 Assess the current maturity level of the existing security operations program processes.

      Outputs

      Current maturity assessment

      3 Design a Target State

      The Purpose

      Design your optimized target state.

      Improve your security operations processes with governance and policy solutions.

      Identify and prioritize gap initiatives.

      Key Benefits Achieved

      A comprehensive list of initiatives to reach ideal target state

      Optimized security operations with repeatable and standardized policies

      Activities

      3.1 Complete standardized policy templates.

      3.2 Map out your ideal target state.

      3.3 Identify gap initiatives.

      Outputs

      Security operations policies

      Gap analysis between current and target states

      List of prioritized initiatives

      4 Develop an Implementation Roadmap

      The Purpose

      Formalize project strategy with a project charter.

      Determine your sourcing strategy for in-house or outsourced security operations processes.

      Assign responsibilities and complete an implementation roadmap.

      Key Benefits Achieved

      An overarching and documented strategy and vision for your security operations

      A thorough rationale for in-house or outsourced security operations processes

      Assigned and documented responsibilities for key projects

      Activities

      4.1 Complete a security operations project charter.

      4.2 Determine in-house vs. outsourcing rationale.

      4.3 Identify dependencies of your initiatives and prioritize initiatives in phases of implementation.

      4.4 Complete a security operations roadmap.

      Outputs

      Security operations project charter

      In-house vs. outsourcing rationale

      Initiatives organized according to phases of development

      Planned and achievable security operations roadmap

      Incident Management for Small Enterprise

      • Buy Link or Shortcode: {j2store}482|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $6,531 Average $ Saved
      • member rating average days saved: 3 Average Days Saved
      • Parent Category Name: Incident & Problem Management
      • Parent Category Link: /incident-and-problem-management
      • Technical debt and disparate systems are big constraints for most small enterprise (SE) organizations. What may have worked years ago is no longer fit for purpose or the business is growing faster than the current tools in place can handle.
      • Super specialization of knowledge is also a common factor in smaller teams caused by complex architectures. While helpful, if that knowledge isn’t documented it can walk out the door with the resource and the rest of the team is left scrambling.
      • Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.
      • Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

      Our Advice

      Critical Insight

      • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving incident management maturity. Identify the challenges in your incident lifecycle and draw on best-practice frameworks pragmatically to build a structured response to those challenges.
      • Track, analyze, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns you can be susceptible to recurring incidents that increase in damage over time. Make the case for problem management, and successfully reduce the volume of unplanned work by scheduling it into regular IT activity.
      • Recurring incidents will happen; use runbooks for a consistent response each time. Save your organization response time and confusion by developing your own specific incident use cases. Incident response should follow a standard process, but each incident will have its own escalation process or call tree that identifies key participants.

      Impact and Result

      • Effective and efficient management of incidents involves a formal process of identifying, classifying, categorizing, responding, resolving, and closing of each incident. The key for smaller organizations, where technology or resources is a constraint, is to make the best practices usable for your unique environment.
      • Develop a plan that aligns with your organizational needs, and adapt best practices into light, sustainable processes, with the goal to improve time to resolve, cost to serve, and ultimately, end-user satisfaction.
      • Successful implementation of incident management will elevate the maturity of the service desk to a controlled state, preparing you for becoming proactive with problem management.

      Incident Management for Small Enterprise Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement incident management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and log incidents

      This phase will provide an overview of the incident lifecycle and an activity on how to classify the various types of incidents in your environment.

      • Service Desk Standard Operating Procedure
      • Incident Management Workflow Library (Visio)
      • Incident Management Workflow Library (PDF)

      2. Prioritize and define SLAs

      This phase will help you develop a categorization scheme for incident handling that ensures success and keeps it simple. It will also help you identify the most important runbooks necessary to create first.

      • Service Desk Ticket Categorization Schemes
      • IT Incident Runbook Prioritization Tool
      • IT Incident Management Runbook Blank Template

      3. Respond, recover, and close incidents

      This phase will help you identify how to use a knowledgebase to resolve incidents quicker. Identify what needs to be answered during a post-incident review and identify the criteria needed to invoke problem management.

      • Knowledgebase Article Template
      • Root-Cause Analysis Template
      • Post-Incident Review Questions Tracking Tool
      [infographic]

      Workshop: Incident Management for Small Enterprise

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current State

      The Purpose

      Assess the current state of the incident management lifecycle within the organization.

      Key Benefits Achieved

      Understand the incident lifecycle and how to classify them in your environment.

      Identify the roles and responsibilities of the incident response team.

      Document the incident workflows to identify areas of opportunities.

      Activities

      1.1 Outline your incident lifecycle challenges.

      1.2 Identify and classify incidents.

      1.3 Identify roles and responsibilities for incident handling.

      1.4 Design normal and critical incident workflows for target state.

      Outputs

      List of incident challenges for each phase of the incident lifecycle

      Incident classification scheme mapped to resolution team

      RACI chart

      Incident Workflow Library

      2 Define the Target State

      The Purpose

      Design or improve upon current incident and ticket categorization schemes, priority, and impact.

      Key Benefits Achieved

      List of the most important runbooks necessary to create first and a usable template to go forward with

      Activities

      2.1 Improve incident categorization scheme.

      2.2 Prioritize and define SLAs.

      2.3 Understand the purpose of runbooks and prioritize development.

      2.4 Develop a runbook template.

      Outputs

      Revised ticket categorization scheme

      Prioritization matrix based on impact and urgency

      IT Incident Runbook Prioritization Tool

      Top priority incident runbook

      3 Bridge the Gap

      The Purpose

      Respond, recover, and close incidents with root-cause analysis, knowledgebase, and incident runbooks.

      Key Benefits Achieved

      This module will help you to identify how to use a knowledgebase to resolve quicker.

      Identify what needs to be answered during a post-incident review.

      Identify criteria to invoke problem management.

      Activities

      3.1 Build a targeted knowledgebase.

      3.2 Build a post-incident review process.

      3.3 Identify metrics to track success.

      3.4 Build an incident matching process.

      Outputs

      Working knowledgebase template

      Root-cause analysis template and post-incident review checklist

      List of metrics

      Develop criteria for problem management

      Take Control of Infrastructure and Operations Metrics

      • Buy Link or Shortcode: {j2store}460|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $7,199 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Measuring the business value provided by IT is very challenging.
      • You have a number of metrics, but they may not be truly meaningful, contextual, or actionable.
      • You know you need more than a single metric to tell the whole story. You also suspect that metrics from different systems combined will tell an even fuller story.
      • You are being asked to provide information from different levels of management, for different audiences, conveying different information.

      Our Advice

      Critical Insight

      • Many organizations collect metrics to validate they are keeping the lights on. But the Infrastructure and Operations managers who are benefitting the most are taking steps to ensure they are getting the right metrics to help them make decisions, manage costs, and plan for change.
      • Complaints about metrics are often rooted in managers wading through too many individual metrics, wrong metrics, or data that they simply can’t trust.
      • Info-Tech surveyed and interviewed a number of Infrastructure managers, CIOs, and IT leaders to understand how they are leveraging metrics. Successful organizations are using metrics for everything from capacity planning to solving customer service issues to troubleshooting system failures.

      Impact and Result

      • Manage metrics so they don’t become time wasters and instead provide real value.
      • Identify the types of metrics you need to focus on.
      • Build a metrics process to ensure you are collecting the right metrics and getting data you can use to save time and make better decisions.

      Take Control of Infrastructure and Operations Metrics Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement a metrics program in your Infrastructure and Operations practice, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gap analysis

      This phase will help you identify challenges that you want to avoid by implementing a metrics program, discover the main IT goals, and determine your core metrics.

      • Take Control of Infrastructure and Operations Metrics – Phase 1: Gap Analysis
      • Infra & Ops Metrics Executive Presentation

      2. Build strategy

      This phase will help you make an actionable plan to implement your metrics program, define roles and responsibilities, and communicate your metrics project across your organization and with the business division.

      • Take Control of Infrastructure and Operations Metrics – Phase 2: Build Strategy
      • Infra & Ops Metrics Definition Template
      • Infra & Ops Metrics Tracking and Reporting Tool
      • Infra & Ops Metrics Program Roles & Responsibilities Guide
      • Weekly Metrics Review With Your Staff
      • Quarterly Metrics Review With the CIO
      [infographic]

      Create a Right-Sized Disaster Recovery Plan

      • Buy Link or Shortcode: {j2store}410|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $83,037 Average $ Saved
      • member rating average days saved: 32 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a disaster recovery plan (DRP).
      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Our Advice

      Critical Insight

      • At its core, disaster recovery (DR) is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      • Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      • Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      Impact and Result

      • Define appropriate objectives for service downtime and data loss based on business impact.
      • Document an incident response plan that captures all of the steps from event detection to data center recovery.
      • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Create a Right-Sized Disaster Recovery Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Disaster Recovery Plan (DRP) Research – A step-by-step document that helps streamline your DR planning process and build a plan that's concise, usable, and maintainable.

      Any time a major IT outage occurs, it increases executive awareness and internal pressure to create an IT DRP. This blueprint will help you develop an actionable DRP by following our four-phase methodology to define scope, current status, and dependencies; conduct a business impact analysis; identify and address gaps in the recovery workflow; and complete, extend, and maintain your DRP.

      • Create a Right-Sized Disaster Recovery Plan – Phases 1-4

      2. DRP Case Studies – Examples to help you understand the governance and incident response components of a DRP and to show that your DRP project does not need to be as onerous as imagined.

      These examples include a client who leveraged the DRP blueprint to create practical, concise, and easy-to-maintain DRP governance and incident response plans and a case study based on a hospital providing a wide range of healthcare services.

      • Case Study: Practical, Right-Sized DRP
      • Case Study: Practical, Right-Sized DRP – Healthcare Example

      3. DRP Maturity Scorecard – An assessment tool to evaluate the current state of your DRP.

      Use this tool to measure your current DRP maturity and identify gaps to address. It includes a comprehensive list of requirements for your DRP program, including core and industry requirements.

      • DRP Maturity Scorecard

      4. DRP Project Charter Template – A template to communicate important details on the project purpose, scope, and parameters.

      The project charter template includes details on the project overview (description, background, drivers, and objectives); governance and management (project stakeholders/roles, budget, and dependencies); and risks, assumptions, and constraints (known and potential risks and mitigation strategy).

      • DRP Project Charter Template

      5. DRP Business Impact Analysis Tool – An evaluation tool to estimate the impact of downtime to determine appropriate, acceptable recovery time objectives (RTOs) and recovery point objectives (RPOs) and to review gaps between objectives and actuals.

      This tool enables you to identify critical applications/systems; identify dependencies; define objective scoring criteria to evaluate the impact of application/system downtime; determine the impact of downtime and establish criticality tiers; set recovery objectives (RTO/RPO) based on the impact of downtime; record recovery actuals (RTA/RPA) and identify any gaps between objectives and actuals; and identify dependencies that regularly fail (and have a significant impact when they fail) to prioritize efforts to improve resiliency.

      • DRP Business Impact Analysis Tool
      • Legacy DRP Business Impact Analysis Tool

      6. DRP BIA Scoring Context Example – A tool to record assumptions you made in the DRP Business Impact Analysis Tool to explain the results and drive business engagement and feedback.

      Use this tool to specifically record assumptions made about who and what are impacted by system downtime and record assumptions made about impact severity.

      • DRP BIA Scoring Context Example

      7. DRP Recovery Workflow Template – A flowchart template to provide an at-a-glance view of the recovery workflow.

      This simple format is ideal during crisis situations, easier to maintain, and often quicker to create. Use this template to document the Notify - Assess - Declare disaster workflow, document current and planned future state recovery workflows, including gaps and risks, and review an example recovery workflow.

      • DRP Recovery Workflow Template (PDF)
      • DRP Recovery Workflow Template (Visio)

      8. DRP Roadmap Tool – A visual roadmapping tool that will help you plan, communicate, and track progress for your DRP initiatives.

      Improving DR capabilities is a marathon, not a sprint. You likely can't fund and resource all the measures for risk mitigation at once. Instead, use this tool to create a roadmap for actions, tasks, projects, and initiatives to complete in the short, medium, and long term. Prioritize high-benefit, low-cost mitigations.

      • DRP Roadmap Tool

      9. DRP Recap and Results Template – A template to summarize and present key findings from your DR planning exercises and documents.

      Use this template to present your results from the DRP Maturity Scorecard, BCP-DRP Fitness Assessment, DRP Business Impact Analysis Tool, tabletop planning exercises, DRP Recovery Workflow Template, and DRP Roadmap Tool.

      • DRP Recap and Results Template

      10. DRP Workbook – A comprehensive tool that enables you to organize information to support DR planning.

      Leverage this tool to document information regarding DRP resources (list the documents/information sources that support DR planning and where they are located) and DR teams and contacts (list the DR teams, SMEs critical to DR, and key contacts, including business continuity management team leads that would be involved in declaring a disaster and coordinating response at an organizational level).

      • DRP Workbook

      11. Appendix

      The following tools and templates are also included as part of this blueprint to use as needed to supplement the core steps above:

      • DRP Incident Response Management Tool
      • DRP Vendor Evaluation Questionnaire
      • DRP Vendor Evaluation Tool
      • Severity Definitions and Escalation Rules Template
      • BCP-DRP Fitness Assessment
      [infographic]

      Workshop: Create a Right-Sized Disaster Recovery Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Parameters for Your DRP

      The Purpose

      Identify key applications and dependencies based on business needs.

      Key Benefits Achieved

      Understand the entire IT “footprint” that needs to be recovered for key applications. 

      Activities

      1.1 Assess current DR maturity.

      1.2 Determine critical business operations.

      1.3 Identify key applications and dependencies.

      Outputs

      Current challenges identified through a DRP Maturity Scorecard.

      Key applications and dependencies documented in the Business Impact Analysis (BIA) Tool.

      2 Determine the Desired Recovery Timeline

      The Purpose

      Quantify application criticality based on business impact.

      Key Benefits Achieved

      Appropriate recovery time and recovery point objectives defined (RTOs/RPOs).

      Activities

      2.1 Define an objective scoring scale to indicate different levels of impact.

      2.2 Estimate the impact of downtime.

      2.3 Determine desired RTO/RPO targets for applications based on business impact.

      Outputs

      Business impact analysis scoring criteria defined.

      Application criticality validated.

      RTOs/RPOs defined for applications and dependencies.

      3 Determine the Current Recovery Timeline and DR Gaps

      The Purpose

      Determine your baseline DR capabilities (your current state).

      Key Benefits Achieved

      Gaps between current and desired DR capability are quantified.

      Activities

      3.1 Conduct a tabletop exercise to determine current recovery procedures.

      3.2 Identify gaps between current and desired capabilities.

      3.3 Estimate likelihood and impact of failure of individual dependencies.

      Outputs

      Current achievable recovery timeline defined (i.e. the current state).

      RTO/RPO gaps identified.

      Critical single points of failure identified.

      4 Create a Project Roadmap to Close DR Gaps

      The Purpose

      Identify and prioritize projects to close DR gaps.

      Key Benefits Achieved

      DRP project roadmap defined that will reduce downtime and data loss to acceptable levels.

      Activities

      4.1 Determine what projects are required to close the gap between current and desired DR capability.

      4.2 Prioritize projects based on cost, effort, and impact on RTO/RPO reduction.

      4.3 Validate that the suggested projects will achieve the desired DR capability.

      Outputs

      Potential DR projects identified.

      DRP project roadmap defined.

      Desired-state incident response plan defined, and project roadmap validated.

      5 Establish a Framework for Documenting Your DRP, and Summarize Next Steps

      The Purpose

      Outline how to create concise, usable DRP documentation.

      Summarize workshop results. 

      Key Benefits Achieved

      A realistic and practical approach to documenting your DRP.

      Next steps documented. 

      Activities

      5.1 Outline a strategy for using flowcharts and checklists to create concise, usable documentation.

      5.2 Review Info-Tech’s DRP templates for creating system recovery procedures and a DRP summary document.

      5.3 Summarize the workshop results, including current potential downtime and action items to close gaps.

      Outputs

      Current-state and desired-state incident response plan flowcharts.

      Templates to create more detailed documentation where necessary.

      Executive communication deck that outlines current DR gaps, how to close those gaps, and recommended next steps.

      Further reading

      Create a Right-Sized Disaster Recovery Plan

      Close the gap between your DR capabilities and service continuity requirements.

      ANALYST PERSPECTIVE

      An effective disaster recovery plan (DRP) is not just an insurance policy.

      "An effective DRP addresses common outages such as hardware and software failures, as well as regional events, to provide day-to-day service continuity. It’s not just insurance you might never cash in. Customers are also demanding evidence of an effective DRP, so organizations without a DRP risk business impact not only from extended outages but also from lost sales. If you are fortunate enough to have executive buy-in, whether it’s due to customer pressure or concern over potential downtime, you still have the challenge of limited time to dedicate to disaster recovery (DR) planning. Organizations need a practical but structured approach that enables IT leaders to create a DRP without it becoming their full-time job."

      Frank Trovato,

      Research Director, Infrastructure

      Info-Tech Research Group

      Is this research for you?

      This Research Is Designed For:

      • Senior IT management responsible for executing DR.
      • Organizations seeking to formalize, optimize, or validate an existing DRP.
      • Business continuity management (BCM) professionals leading DRP development.

      This Research Will Help You:

      • Create a DRP that is aligned with business requirements.
      • Prioritize technology enhancements based on DR requirements and risk-impact analysis.
      • Identify and address process and technology gaps that impact DR capabilities and day-to-day service continuity.

      This Research Will Also Assist:

      • Executives who want to understand the time and resource commitment required for DRP.
      • Members of BCM and crisis management teams who need to understand the key elements of an IT DRP.

      This Research Will Help Them:

      • Scope the time and effort required to develop a DRP.
      • Align business continuity, DR, and crisis management plans.

      Executive summary

      Situation

      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a DRP.
      • Industry standards and government regulations are driving external pressure to develop business continuity and IT DR plans.
      • Customers are asking suppliers and partners to provide evidence that they have a workable DRP before agreeing to do business.

      Complication

      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors, but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Resolution

      • Create an effective DRP by following a structured process to discover current capabilities and define business requirements for continuity:
        • Define appropriate objectives for service downtime and data loss based on business impact.
        • Document an incident response plan that captures all of the steps from event detection to data center recovery.
        • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Info-Tech Insight

      1. At its core, DR is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      2. Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      3. Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      An effective DRP is critical to reducing the cost of downtime

      If you don’t have an effective DRP when failure occurs, expect to face extended downtime and exponentially rising costs due to confusion and lack of documented processes.

      Image displayed is a graph that shows that delay in recovery causes exponential revenue loss.

      Potential Lost Revenue

      The impact of downtime tends to increase exponentially as systems remain unavailable (graph at left). A current, tested DRP will significantly improve your ability to execute systems recovery, minimizing downtime and business impact. Without a DRP, IT is gambling on its ability to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks or months – and substantial business impact.

      Adapted from: Philip Jan Rothstein, 2007

      Cost of Downtime for the Fortune 1000

      Cost of unplanned apps downtime per year: $1.25B to $2.5B.

      Cost of critical apps failure per hour: $500,000 to $1M.

      Cost of infrastructure failure per hour: $100,000.

      35% reported to have recovered within 12 hours.

      17% of infrastructure failures took more than 24 hours to recover.

      13% of application failures took more than 24 hours to recover.

      Source: Stephen Elliot, 2015

      Info-Tech Insight

      The cost of downtime is rising across the board, and not just for organizations that traditionally depend on IT (e.g. e-commerce). Downtime cost increase since 2010:

      Hospitality: 129% increase

      Transportation: 108% increase

      Media organizations: 104% increase

      An effective DRP also sets clear recovery objectives that align with system criticality to optimize spend

      The image displays a disaster recovery plan example, where different tiers are in place to support recovery in relation to time.

      Take a practical approach that creates a more concise and actionable DRP

      DR planning is not your full-time job, so it can’t be a resource- and time-intensive process.

      The Traditional Approach Info-Tech’s Approach

      Start with extensive risk and probability analysis.

      Challenge: You can’t predict every event that can occur, and this delays work on your actual recovery procedures.

      Focus on how to recover regardless of the incident.

      We know failure will happen. Focus on improving your ability to failover to a DR environment so you are protected regardless of what causes primary site failure.

      Build a plan for major events such as natural disasters.

      Challenge: Major destructive events only account for 12% of incidents while software/hardware issues account for 45%. The vast majority of incidents are isolated local events.

      An effective DRP improves day-to-day service continuity, and is not just for major events.

      Leverage DR planning to address both common (e.g. power/network outage or hardware failure) as well as major events. It must be documentation you can use, not shelfware.

      Create a DRP manual that provides step-by-step instructions that anyone could follow.

      Challenge: The result is lengthy, dense manuals that are difficult to maintain and hard to use in a crisis. The usability of DR documents has a direct impact on DR success.

      Create concise documentation written for technical experts.

      Use flowcharts, checklists, and diagrams. They are more usable in a crisis and easier to maintain. You aren’t going to ask a business user to recover your SQL Server databases, so you can afford to be concise.

      DR must be integrated with day-to-day incident management to ensure service continuity

      When a tornado takes out your data center, it’s an obvious DR scenario and the escalation towards declaring a disaster is straightforward.

      The challenge is to be just as decisive in less-obvious (and more common) DR scenarios such as a critical system hardware/software failure, and knowing when to move from incident management to DR. Don’t get stuck troubleshooting for days when you could have failed over in hours.

      Bridge the gap with clearly-defined escalation rules and criteria for when to treat an incident as a disaster.

      Image displays two graphs. The graph on the left measures the extent that service management processes account for disasters by the success meeting RTO and RPO. The graph on the right is a double bar graph that shows DRP being integrated and not integrated in the following categories: Incident Classifications, Severity Definitions, Incident Models, Escalation Procedures. These are measured based on the success meeting RTO and RPO.

      Source: Info-Tech Research Group; N=92

      Myth busted: The DRP is separate from day-to-day ops and incident management.

      The most common threats to service continuity are hardware and software failures, network outages, and power outages

      The image displayed is a bar graph that shows the common threats to service continuity. There are two areas of interest that have labels. The first is: 45% of service interruptions that went beyond maximum downtime guidelines set by the business were caused by software and hardware issues. The second label is: Only 12% of incidents were caused by major destructive events.

      Source: Info-Tech Research Group; N=87

      Info-Tech Insight

      Does this mean I don’t need to worry about natural disasters? No. It means DR planning needs to focus on overall service continuity, not just major disasters. If you ignore the more common but less dramatic causes of service interruptions, you are diminishing the business value of a DRP.

      Myth busted: DRPs are just for destructive events – fires, floods, and natural disasters.

      DR isn’t about identifying risks; it’s about ensuring service continuity

      The traditional approach to DR starts with an in-depth exercise to identify risks to IT service continuity and the probability that those risks will occur.

      Here’s why starting with a risk register is ineffective:

      • Odds are, you won’t think of every incident that might occur. If you think of twenty risks, it’ll be the twenty-first that gets you. If you try to guard against that twenty-first risk, you can quickly get into cartoonish scenarios and much more costly solutions.
      • The ability to failover to another site mitigates the risk of most (if not all) incidents (fire, flood, hardware failure, tornado, etc.). A risk and probability analysis doesn’t change the need for a plan that includes a failover procedure.

      Where risk is incorporated in this methodology:

      • Use known risks to further refine your strategy (e.g. if you are prone to hurricanes, plan for greater geographic separation between sites; ensure you have backups, in addition to replication, to mitigate the risk of ransomware).
      • Identify risks to your ability to execute DR (e.g. lack of cross-training, backups that are not tested) and take steps to mitigate those risks.

      Myth busted: A risk register is the critical first step to creating an effective DR plan.

      You can’t outsource accountability and you can’t assume your vendor’s DR capabilities meet your needs

      Outsourcing infrastructure services – to a cloud provider, co-location provider, or managed service provider (MSP) – can improve your DR and service continuity capabilities. For example, a large public cloud provider will generally have:

      • Redundant telecoms service providers, network infrastructure, power feeds, and standby power.
      • Round-the-clock infrastructure and security monitoring.
      • Multiple data centers in a given region, and options to replicate data and services across regions.

      Still, failure is inevitable – it’s been demonstrated multiple times1 through high-profile outages. When you surrender direct control of the systems themselves, it’s your responsibility to ensure the vendor can meet your DR requirements, including:

      • A DR site and acceptable recovery times for systems at that site.
      • An acceptable replication/backup schedule.

      Sources: Kyle York, 2016; Shaun Nichols, 2017; Stephen Burke, 2017

      Myth busted: I outsource infrastructure services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Choose flowcharts over process guides, checklists over procedures, and diagrams over descriptions

      IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      In reality, you write a DR plan for knowledgeable technical staff, which allows you to summarize key details your staff already know. Concise, visual documentation is:

      • Quicker to create.
      • Easier to use.
      • Simpler to maintain.

      "Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."

      – Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management

      A graph is displayed. It shows a line graph where the DR success is higher by using flowcharts, checklists, and diagrams.

      Source: Info-Tech Research Group; N=95

      *DR Success is based on stated ability to meet recovery time objectives (RTOs) and recovery point objectives (RPOs), and reported confidence in ability to consistently meet targets.

      Myth busted: A DRP must include every detail so anyone can execute recovery.

      A DRP is part of an overall business continuity plan

      A DRP is the set of procedures and supporting documentation that enables an organization to restore its core IT services (i.e. applications and infrastructure) as part of an overall business continuity plan (BCP), as described below. Use the templates, tools, and activities in this blueprint to create your DRP.

      Overall BCP
      IT DRP BCP for Each Business Unit Crisis Management Plan
      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. This includes:
      • Identifying critical applications and dependencies.
      • Defining an appropriate (desired) recovery timeline based on a business impact analysis (BIA).
      • Creating a step-by-step incident response plan.
      A set of plans to resume business processes for each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. A set of processes to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. This includes emergency response plans, crisis communication plans, and the steps to invoke BC/DR plans when applicable. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a structured approach to develop a crisis management process.

      Note: For DRP, we focus on business-facing IT services (as opposed to the underlying infrastructure), and then identify required infrastructure as dependencies (e.g. servers, databases, network).

      Take a practical but structured approach to creating a concise and effective DRP

      Image displayed shows the structure of this blueprint. It shows the structure of phases 1-4 and the related tools and templates for each phase.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Info-Tech advisory services deliver measurable value

      Info-Tech members save an average of $22,983 and 22 days by working with an Info-Tech analyst on DRP (based on client response data from Info-Tech Research Group’s Measured Value Survey, following analyst advisory on this blueprint).

      Why do members report value from analyst engagement?

      1. Expert advice on your specific situation to overcome obstacles and speed bumps.
      2. Structured project and guidance to stay on track.
      3. Project deliverables review to ensure the process is applied properly.

      Guided implementation overview

      Your trusted advisor is just a call away.

      Define DRP scope (Call 1)

      Scope requirements, objectives, and your specific challenges. Identify applications/ systems to focus on first.

      Define current status and system dependencies (Calls 2-3)

      Assess current DRP maturity. Identify system dependencies.

      Conduct a BIA (Calls 4-6)

      Create an impact scoring scale and conduct a BIA. Identify RTO and RPO for each system.

      Recovery workflow (Calls 7-8)

      Create a recovery workflow based on tabletop planning. Identify gaps in recovery capabilities.

      Projects and action items (Calls 9-10)

      Identify and prioritize improvements. Summarize results and plan next steps.

      Your guided implementations will pair you with an advisor from our analyst team for the duration of your DRP project.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Image displays the workshop overview for this blueprint. It is a workshop that runs for 4 days and covers various activities and produces many deliverables.

      End-user complaints distract from serious IT-based risks to business continuity

      Case Study

      Industry: Manufacturing
      Source: Info-Tech Research Group Client Engagement

      A global manufacturer with annual sales over $1B worked with Info-Tech to improve DR capabilities.

      DRP BIA

      Conversations with the IT team and business units identified the following impact of downtime over 24 hours:

      • Email: Direct Cost: $100k; Goodwill Impact Score: 8.5/16
      • ERP: Direct Cost: $1.35mm; Goodwill Impact Score: 12.5/16

      Tabletop Testing and Recovery Capabilities

      Reviewing the organization’s current systems recovery workflow identified the following capabilities:

      • Email: RTO: minutes, RPO: minutes
      • ERP: RTO: 14 hours, RPO: 24 hours

      Findings

      Because of end-user complaints, IT had invested heavily in email resiliency though email downtime had a relatively minimal impact on the business. After working through the methodology, it was clear that the business needed to provide additional support for critical systems.

      Insights at each step:

      Identify DR Maturity and System Dependencies

      Conduct a BIA

      Outline Incident Response and Recovery Workflow With Tabletop Exercises

      Mitigate Gaps and Risks

      Create a Right-Sized Disaster Recovery Plan

      Phase 1

      Define DRP Scope, Current Status, and Dependencies

      Step 1.1: Set Scope, Kick-Off the DRP Project, and Create a Charter

      This step will walk you through the following activities:

      • Establish a team for DR planning.
      • Retrieve and review existing, relevant documentation.
      • Create a project charter.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team (Key IT SMEs)
      • IT Managers

      Results and Insights

      • Set scope for the first iteration of the DRP methodology.
      • Don’t try to complete your DR and BCPs all at once.
      • Don’t bite off too much at once.

      Kick-off your DRP project

      You’re ready to start your DR project.

      This could be an annual review – but more likely, this is the first time you’ve reviewed the DR plan in years.* Maybe a failed audit might have provided a mandate for DR planning, or a real disaster might have highlighted gaps in DR capabilities. First, set appropriate expectations for what the project is and isn’t, in terms of scope, outputs, and resource commitments. Very few organizations can afford to hire a full-time DR planner, so it’s likely this won’t be your full-time job. Set objectives and timelines accordingly.

      Gather a team

      • Often, DR efforts are led by the infrastructure and operations leader. This person can act as the DRP coordinator or may delegate this role.
      • Key infrastructure subject-matter experts (SMEs) are usually part of the team and involved through the project.

      Find and review existing documentation

      • An existing DRP may have information you can re-purpose rather than re-create.
      • High-level architecture diagrams and network diagrams can help set scope (and will become part of your DR kit).
      • Current business-centric continuity of operations plans (COOPs) or BCPs are important to understand.

      Set specific, realistic objectives

      • Create a project charter (see next slide) to record objectives, timelines, and assumptions.
      *Only 20% of respondents to an Info-Tech Research Group survey (N=165) had a complete DRP; only 38% of respondents with a complete or mostly complete DRP felt it would be effective in a crisis.

      List DRP drivers and challenges

      1(a) Drivers and roadblocks

      Estimated Time: 30 minutes

      Identify the drivers and challenges to completing a functional DRP plan with the core DR team.

      DRP Drivers

      • Past outages (be specific):
        • Hardware and software failures
        • External network and power outages
        • Building damage
        • Natural disaster(s)
      • Audit findings
      • Events in the news
      • Other?

      DRP Challenges

      • Lack of time
      • Insufficient DR budget
      • Lack of executive support
      • No internal DRP expertise
      • Challenges making the case for DRP
      • Other?

      Write down insights from the meeting on flip-chart paper or a whiteboard and use the findings to inform your DRP project (e.g. challenges to address).

      Clarify expectations with a project charter

      1(b) DRP Project Charter Template

      DRP Project Charter Template components:

      Define project parameters, roles, and objectives, and clarify expectations with the executive team. Specific subsections are listed below and described in more detail in the remainder of this phase.

      • Project Overview: Includes objectives, deliverables, and scope. Leverage relevant notes from the “Project Drivers” brainstorming exercise (e.g. past outages and near misses which help make the case).
      • Governance and Management: Includes roles, responsibilities, and resource requirements.
      • Project Risks, Assumptions, and Constraints: Includes risks and mitigation strategies, as well as any assumptions and constraints.
      • Project Sign-Off: Includes IT and executive sign-off (if required).

      Note: Identify the initial team roles and responsibilities first so they can assist in defining the project charter.

      The image is a screenshot of the first page of the DRP Project Charter Template.

      Step 1.2: Assess Current State DRP Maturity

      This step will walk you through the following activities:

      • Complete Info-Tech’s DRP Maturity Scorecard.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs

      Results and Insights

      • Identify the current state of the organization’s DRP and continuity management. Set a baseline for improvement.
      • Discover where improvement is most needed to create an effective plan.

      Only 38% of IT departments believe their DRPs would be effective in a real crisis

      Even organizations with documented DRPs struggle to make them actionable.

      • Even when a DRP does become a priority (e.g. due to regulatory or customer drivers), the challenge is knowing where to start and having a methodical step-by-step process for doing the work. With no guide to plan and resource the project, it becomes work that you complete piecemeal when you aren’t working on other projects, or at night after the kids go to bed.
      • Far too many organizations create a document to satisfy auditors rather than creating a usable plan. People in this group often just want a fill-in-the-blanks template. What they will typically find is a template for the traditional 300-page manual that goes in a binder that sits on a shelf, is difficult to maintain, and is not effective in a crisis.
      Two bar graphs are displayed. The graph on the left shows that only 20% of survey respondents indicate they have a complete DRP. The graph on the right shows that 38% of those who have a mostly completed or full DRP actually feel it would be effective in a crisis.

      Use the DRP Maturity Scorecard to assess the current state of your DRP and identify areas to improve

      1(c) DRP Maturity Scorecard

      Info-Tech’s DRP Maturity Scorecard evaluates completion status and process maturity for a comprehensive yet practical assessment across three aspects of an effective DRP program – Defining Requirements, Implementation, and Maintenance.

      Image has three boxes. One is labelled Completion status, another below it is labelled Process Maturity. There is an addition sign in between them. With an arrow leading from both boxes is another box that is labelled DRP Maturity Assessment

      Completion Status: Reflects the progress made with each component of your DRP Program.

      Process Maturity: Reflects the consistency and quality of the steps executed to achieve your completion status.

      DRP Maturity Assessment: Each component (e.g. BIA) of your DRP Program is evaluated based on completion status and process maturity to provide an accurate holistic assessment. For example, if your BIA completion status is 4 out of 5, but process maturity is a 2, then requirements were not derived from a consistent defined process. The risk is inconsistent application prioritization and misalignment with actual business requirements.

      Step 1.3: Identify Applications, Systems, and Dependencies

      This step will walk you through the following activities:

      • Identify systems, applications, and services, and the business units that use them.
      • Document applications, systems, and their dependencies in the DRP Business Impact Analysis Tool.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Identify core services and the applications that depend on them.
      • Add applications and dependencies to the DRP Business Impact Analysis Tool.

      Select 5-10 services to get started on the DRP methodology

      1(d) High-level prioritization

      Estimated Time: 30 minutes

      Working through the planning process the first time can be challenging. If losing momentum is a concern, limit the BIA to a few critical systems to start.

      Run this exercise if you need a structured exercise to decide where to focus first and identify the business users you should ask for input on the impact of system downtime.

      1. On a whiteboard or flip-chart paper, list business units in a column on the left. List key applications/systems in a row at the top. Draw a grid.
      2. At a high level, review how applications are used by each unit. Take notes to keep track of any assumptions you make.
        • Add a ✓ if members of the unit use the application or system.
        • Add an ✱ if members of the unit are heavy users of the application or system and/or use it for time sensitive tasks.
        • Leave the box blank if the app isn’t used by this unit.
      3. Use the chart to prioritize systems to include in the BIA (e.g. systems marked with an *) but also include a few less-critical systems to illustrate DRP requirements for a range of systems.

      Image is an example of what one could complete from step 1(d). There is a table shown. In the column on the left lists sales, marketing, R&D, and Finance. In the top row, there is listed: dialer, ERP. CRM, Internet, analytics, intranet

      Application Notes
      CRM
      • Supports time-critical sales and billing processes.
      Dialer
      • Used for driving the sales-call queue, integration with CRM.

      Draw a high-level sketch of your environment

      1(e) Sketch your environment

      Estimated Time: 1-2 hours

      A high-level topology or architectural diagram is an effective way to identify dependencies, application ownership, outsourced services, hardware redundancies, and more.

      Note:

      • Network diagrams or high-level architecture diagrams help to identify dependencies and redundancies. Even a rough sketch is a useful reference tool for participants, and will be valuable documentation in the final DR plan.
      • Keep the drawings tidy. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
      • Collaborate with relevant SMEs to identify dependencies. Keep the drawing high-level.
      • Illustrate connections between applications or components with lines. Use color coding to illustrate where applications are hosted (e.g. in-house, at a co-lo, in a cloud or MSP environment).
      Example of a high-level topology or architectural diagram

      Document systems and dependencies

      Collaborate with system SMEs to identify dependencies for each application or system. Document the dependencies in the DRP Business Impact Analysis Tool (see image below)

      • When listing applications, focus on business-facing systems or services that business users will recognize and use terminology they’ll understand.
      • Group infrastructure components that support all other services as a single core infrastructure service to simplify dependency mapping (e.g. core router, virtual hosts, ID management, and DNS).
      • In general, each data center will have its own core infrastructure components. List each data center separately – especially if different services are hosted at each data center.
      • Be specific when documenting dependencies. Use existing asset tracking tables, discovery tools, asset management records, or configuration management tools to identify specific server names.
      • Core infrastructure dependencies, such as the network infrastructure, power supply, and centralized storage, will be a common set of dependencies for most applications, so group these into a separate category called “Core Infrastructure” to minimize repetition in your DR planning.
      • Document production components in the BIA tool. Capture in-production, redundant components performing the same work on a single dependency line. List standby systems in the notes.

      Info-Tech Best Practice

      In general, visual documentation is easier to use in a crisis and easier to maintain over time. Use Info-Tech’s research to help build your own visual SOPs.

      Document systems and dependencies

      1(f) DRP Business Impact Analysis Tool – Record systems and dependencies

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool.

      Stories from the field: Info-Tech clients find value in Phase 1 in the following ways

      An organization uncovers a key dependency that needed to be treated as a Tier 1 system

      Reviewing the entire ecosystem for applications identified key dependencies that were previously considered non-critical. For example, a system used to facilitate secure data transfers was identified as a key dependency for payroll and other critical business processes, and elevated to Tier 1.

      A picture’s worth a thousand words (and 1600 servers)

      Drawing a simple architectural diagram was an invaluable tool to identify key dependencies and critical systems, and to understand how systems and dependencies were interconnected. The drawing was an aha moment for IT and business stakeholders trying to make sense of their 1600-server environment.

      Make the case for DRP

      A member of the S&P 500 used Info-Tech’s DRP Maturity Scorecard to provide a reliable objective assessment and make the case for improvements to the board of directors.

      State government agency initiates a DRP project to complement an existing COOP

      Info-Tech's DRP Project Charter enabled the CIO to clarify their DRP project scope and where it fit into their overall COOP. The project charter example provided much of the standard copy – objectives, scope, project roles, methodology, etc. – required to outline the project.

      Phase 1: Insights and accomplishments

      Image has two screenshots from Info-Tech's Phase 1 tools and templates.

      Created a charter and identified current maturity

      Image has two screenshots. One is from Info-Tech's DRP Business Impact Analysis Tool and the other is from the example in step 1(d).

      Identified systems and dependencies for the BIA

      Summary of Accomplishments:

      • Created a DRP project charter.
      • Completed the DRP Maturity Scorecard and identified current DRP maturity.
      • Prioritized applications/systems for a first pass through DR planning.
      • Identified dependencies for each application and system.

      Up Next: Conduct a BIA to establish recovery requirements

      Create a Right-Sized Disaster Recovery Plan

      Phase 2

      Conduct a BIA to Determine Acceptable RTOs and RPOs

      Step 2.1: Define an Objective Impact Scoring Scale

      This step will walk you through the following activities:

      • Create a scoring scale to measure the business impact of application and system downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Use a scoring scale tied to multiple categories of real business impact to develop a more objective assessment of application and system criticality.

      Align capabilities to appropriate and acceptable RTOs and RPOs with a BIA

      Too many organizations avoid a BIA because they perceive it as onerous or unneeded. A well-managed BIA is straightforward and the benefits are tangible.

      A BIA enables you to identify appropriate spend levels, maintain executive support, and prioritize DR planning for a more successful outcome. Info-Tech has found that a BIA has a measurable impact on the organization’s ability to set appropriate objectives and investment goals.

      Two bar graphs are depicted. The one on the left shows 93% BIA impact on appropriate RTOs. The graph on the right shows that with BIA, there is 86% on BIA impact on appropriate spending.

      Info-Tech Insight

      Business input is important, but don’t let a lack of it delay a draft BIA. Complete a draft based on your knowledge of the business. Create a draft within IT, and use it to get input from business leaders. It’s easier to edit estimates than to start from scratch; even weak estimates are far better than a blank sheet.

      Pick impact categories that are relevant to your business to develop a holistic view of business impact

      Direct Cost Impact Categories

      • Revenue: permanently lost revenue.
        • Example: one third of daily sales are lost due to a website failure.
      • Productivity: lost productivity.
        • Example: finance staff can’t work without the accounting system.
      • Operating costs: additional operating costs.
        • Example: temporary staff are needed to re-key data.
      • Financial penalties: fines/penalties that could be incurred due to downtime.
        • Example: failure to meet contractual service-level agreements (SLAs) for uptime results in financial penalties.

      Goodwill, Compliance, and Health and Safety Categories

      • Stakeholder goodwill: lost customer, staff, or business partner goodwill due to harm, frustration, etc.
        • Example: customers can’t access needed services because the website is down.
        • Example: a payroll system outage delays paychecks for all staff.
        • Example: suppliers are paid late because the purchasing system is down.
      • Compliance, health, and safety:
        • Example: financial system downtime results in a missed tax filing.
        • Example: network downtime disconnects security cameras.

      Info-Tech Insight

      You don’t have to include every impact category in your BIA. Include categories that could affect your business. Defer or exclude other categories. For example, the bulk of revenue for governmental organizations comes from taxes, which won’t be permanently lost if IT systems fail.

      Modify scoring criteria to help you measure the impact of downtime

      The scoring scales define different types of business impact (e.g. costs, lost goodwill) using a common four-point scale and 24-hour timeframe to simplify BIA exercises and documentation.

      Use the suggestions below as a guide as you modify scoring criteria in the DRP Business Impact Analysis Tool:

      • All the direct cost categories (revenue, productivity, operating costs, financial penalties) require the user to define only a maximum value; the tool will populate the rest of the criteria for that category. Use the suggestions below to find the maximum scores for each of the direct cost categories:
        • Revenue: Divide total revenue for the previous year by 365 to estimate daily revenue. Assume this is the most revenue you could lose in a day, and use this number as the top score.
        • Loss of Productivity: Divide fully-loaded labor costs for the organization by 365 to estimate daily productivity costs. Use this as a proxy measure for the work lost if all business stopped for one day.
        • Increased Operating Costs: Isolate this to known additional costs that result from a disruption (e.g. costs for overtime or temporary staff). Estimate the maximum cost for the organization.
        • Financial Penalties: Isolate this to known financial penalties (e.g. due to failure to meet SLAs or compliance requirements). Use the estimated maximum penalty as the highest value on the scale.
      • Impact on Goodwill: Use an estimate of the percentage of all stakeholders impacted to assess goodwill impact.
      • Impact on Compliance; Impact on Health and Safety: The BIA tool contains default scoring criteria that account for the severity of the impact, the likelihood of occurrence, and in the case of compliance, whether a grace period is available. Use this scale as-is, or adapt this scale to suit your needs.

      Modify the default scoring scale in the DRP Business Impact Analysis Tool to reflect your organization

      2(a) DRP Business Impact Analysis Tool – Scoring criteria


      A screenshot of Info-Tech's DRP Business Impact Analysis Tool's scoring criteria

      Step 2.2: Estimate the Impact of Downtime

      This step will walk you through the following activities:

      • Identify the business impact of service/system/application downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team
      • IT Service SMEs
      • Business-Side Technology Owners (optional)

      Results and Insights

      • Apply the scoring scale to develop a more objective assessment of the business impact of downtime.
      • Create criticality tiers based on the business impact of downtime.

      Estimate the impact of downtime for each system and application

      2(b) Estimate the impact of systems downtime

      Estimated Time: 3 hours

      On tab 3 of the DRP Business Impact Analysis Tool indicate the costs of downtime, as described below:

      1. Have a copy of the “Scoring Criteria” tab available to use as a reference (e.g. printed or on a second display). In tab 3 use the drop-down menu to assign a score of 0 to 4 based on levels of impact defined in the “Scoring Criteria” tab.
      2. Work horizontally across all categories for a single system or application. This will familiarize you with your scoring scales for all impact categories, and allow you to modify the scoring scales if needed before you proceed much further.
      3. For example, if a core call center phone system was down:

      • Loss of Revenue would be the portion of sales revenue generated through the call center. This might score a 1 or 2 depending on the percent of sales that are processed by the call center.
      • The Impact on Customers might be a 2 or 3 depending on the extent that some customers might be using the call center to receive support or purchase new products or services.
      • The Legal/Regulatory Compliance and Health or Safety Risk might be a 0, as the call center has no impact in either area.
    • Next, work vertically across all applications or systems within a single impact category. This will allow you to compare scores within the category as you create them to ensure internal consistency.
    • Add impact scores to the DRP Business Impact Analysis Tool

      2(c) DRP Business Impact Analysis Tool

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Record business reasons and assumptions that drive BIA scores

      2(d) DRP BIA Scoring Context Example

      Info-Tech suggests that IT leadership and staff identify the impact of downtime first to create a version that you can then validate with relevant business owners. As you work through the BIA as a team, have a notetaker record assumptions you make to help you explain the results and drive business engagement and feedback.

      Some common assumptions:

      • You can’t schedule a disaster, so Info-Tech suggests you assume the worst possible timing for downtime. Base the impact of downtime on the worst day for a disaster (e.g. year-end close, payroll run).
      • Record assumptions made about who and what are impacted by system downtime.
      • Record assumptions made about impact severity.
      • If you deviate from the scoring scale, or if a particular impact doesn’t fit well into the defined scoring scale, document the exception.

      Screenshot of Info-Tech's DRP BIA Scoring Context Example

      Use Info-Tech’s DRP BIA Scoring Context Example as a note-taking template.

      Info-Tech Insight

      You can’t build a perfect scoring scale. It’s fine to make reasonable assumptions based on your judgment and knowledge of the business. Just write down your assumptions. If you don’t write them down, you’ll forget how you arrived at that conclusion.

      Assign a criticality rating based on total direct and indirect costs of downtime

      2(e) DRP Business Impact Analysis Tool – Assign criticality tiers

      Once you’ve finished estimating the impact of downtime, use the following rough guideline to create an initial sort of applications into Tiers 1, 2, and 3.

      1. In general, sort applications based on the Total Impact on Goodwill, Compliance, and Safety first.
        • An effective tactic for a quick sort: assign a Tier 1 rating where scores are 50% or more of the highest total score, Tier 2 where scores are between 25% and 50%, and Tier 3 where scores are below 25%. Some organizations will also include a Tier 0 for the highest-scoring systems.
        • Then review and validate these scores and assignments.
      2. Next, consider the Total Cost of Downtime.
        • The Total Cost is calculated by the tool based on the Scoring Criteria in tab 2 and the impact scores on tab 3.
        • Decide if the total cost impact justifies increasing the criticality rating (e.g. from Tier 2 to Tier 1 due to high cost impact).
      3. Review the assigned impact scores and tiers to check that they’re in alignment. If you need to make an exception, document why. Keep exceptions to a minimum.

      Example: Highest total score is 12

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Step 2.3: Determine Acceptable RTO/RPO Targets

      This step will walk you through the following activities:

      • Review the “Debate Space” approach to setting RTO and RPO (recovery targets).
      • Set preliminary RTOs and RPOs by criticality tier.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Align recovery targets with the business impact of downtime and data loss.

      Use the “Debate Space” approach to align RTOs and RPOs with the impact of downtime

      The business must validate acceptable and appropriate RTOs and RPOs, but IT can use the guidelines below to set an initial estimate.

      Right-size recovery.

      A shorter RTO typically requires higher investment. If a short period of downtime has minimal impact, setting a low RTO may not be justifiable. As downtime continues, impact begins to increase exponentially to a point where downtime is intolerable – an acceptable RTO must be shorter than this. Apply the same thinking to RPOs – how much data loss is unnoticeable? How much is intolerable?

      A diagram to show the debate space in relation to RTOs and RPOs

      The “Debate Space” is between minimal impact and maximum tolerance for downtime.

      Estimate appropriate, acceptable RTOs and RPOs for each tier

      2(f) Set recovery targets

      Estimated Time: 30 minutes

      RTO and RPO tiers simplify management by setting similar recovery goals for systems and applications with similar criticality.

      Use the “Debate Space” approach to set appropriate and acceptable targets.

      1. For RTO, establish a recovery time range that is appropriate based on impact.
        • Overall, the RTO tiers might be 0-4 hours for gold, 4-24 hours for silver, and 24-48 hours for bronze.
      2. RPOs reflect target data protection measures.
        • Identify the lowest RPO within a tier and make that the standard.
        • For example, RPO for gold data might be five minutes, silver might be four hours, and bronze might be one day.
        • Use this as a guideline. RPO doesn’t always align perfectly with RTO tiers.
      3. Review RTOs and RPOs and make sure they accurately reflect criticality.

      Info-Tech Insight

      In general, the more critical the system, the shorter the RPO. But that’s not always the case. For example, a service bus might be Tier 1, but if it doesn’t store any data, RPO might be longer than other Tier 1 systems. Some systems may have a different RPO than most other systems in that tier. As long as the targets are acceptable to the business and appropriate given the impact, that’s okay.

      Add recovery targets to the DRP Business Impact Analysis Tool

      2(g) DRP Business Impact Analysis Tool – Document recovery objectives

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Document recovery objectives

      Stories from the field: Info-Tech clients find value in Phase 2 in the following ways

      Most organizations discover something new about key applications, or the way stakeholders use them, when they work through the BIA and review the results with stakeholders. For example:

      Why complete a BIA? There could be a million reasons

      • A global manufacturer completed the DRP BIA exercise. When email went down, Service Desk phones lit up until it was resolved. That grief led to a high availability implementation for email. However, the BIA illustrated that ERP downtime was far more impactful.
      • ERP downtime would stop production lines, delay customer orders, and ultimately cost the business a million dollars a day.
      • The BIA results clearly showed that the ERP needed to be prioritized higher, and required business support for investment.

      Move from airing grievances to making informed decisions

      The DRP Business Impact Analysis Tool helped structure stakeholder consultations on DR requirements for a large university IT department. Past consultations had become an airing of grievances. Using objective impact scores helped stakeholders stay focused and make informed decisions around appropriate RTOs and RPOs.

      Phase 2: Insights and accomplishments

      Screenshots of the tools and templates from this phase.

      Estimated the business impact of downtime

      Screenshot of a tools from this phase

      Set recovery targets

      Summary of Accomplishments

      • Created a scoring scale tied to different categories of business impact.
      • Applied the scoring scale to estimate the business impact of system downtime.
      • Identified appropriate, acceptable RTOs and RPOs.

      Up Next:Conduct a tabletop planning exercise to establish current recovery capabilities

      Create a Right-Sized Disaster Recovery Plan

      Phase 3

      Identify and Address Gaps in the Recovery Workflow

      Step 3.1: Determine Current Recovery Workflow

      This step will walk you through the following activities:

      • Run a tabletop exercise.
      • Outline the steps for the initial response (notification, assessment, disaster declaration) and systems recovery (i.e. document your recovery workflow).
      • Identify any gaps and risks in your initial response and systems recovery.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs (for systems in scope)
      • Application SMEs (for systems in scope)

      Results and Insights

      • Use a repeatable practical exercise to outline and document the steps you would use to recover systems in the event of a disaster, as well as identify gaps and risks to address.
      • This is also a knowledge-sharing opportunity for your team, and a practical means to get their insights, suggestions, and recovery knowledge down on paper.

      Tabletop planning: an effective way to test and document your recovery workflow

      In a tabletop planning exercise, the DRP team walks through a disaster scenario to map out what should happen at each stage, and effectively defines a high-level incident response plan (i.e. recovery workflow).

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      A bar graph is displayed that shows that tabletop planning has the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      *Note: Relative importance indicates the contribution an individual testing methodology, conducted at least annually, had on predicting success meeting recovery objectives, when controlling for all other types of tests in a regression model. The relative-importance values have been standardized to sum to 100%.

      Success was based on the following items:

      • RTOs are consistently met.
      • IT has confidence in the ongoing ability to meet RTOs.
      • RPOs are consistently met.
      • IT has confidence in the ongoing ability to meet RPOs.

      Why is tabletop planning so effective?

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more frequently than other testing methodologies.
      • It easily translates into the backbone of your recovery documentation, as it allows you to review all aspects of your recovery plan.

      Focus first on IT DR

      Your DRP is IT contingency planning. It is not crisis management or BCP.

      The goal is to define a plan to restore applications and systems following a disruption. For your first tabletop exercise, Info-Tech recommends you use a non-life-threatening scenario that requires at least a temporary relocation of your data center (i.e. failing over to a DR site/environment). Assume a gas leak or burst water pipe renders the data center inaccessible. Power is shut off and IT must failover systems to another location. Once you create the master procedure, review the plan to ensure it addresses other scenarios.

      Info-Tech Insight

      When systems fail, you are faced with two high-level options: failover or recover in place. If you document the plan to failover systems to another location, you’ll have documented the core of your DR procedures. This differs from traditional scenario planning where you define separate plans for different what-if scenarios. The goal is one plan that can be adapted to different scenarios, which reduces the effort to build and maintain your DRP.

      Conduct a tabletop planning exercise to outline DR procedures in your current environment

      3(a) Tabletop planning

      Estimated Time: 2-3 hours

      For each high-level recovery step, do the following:

      1. On white cue cards:
        • Record the step.
        • Indicate the task owner (if required for clarity).
        • Note time required to complete the step. After the exercise, use this to build a running recovery time where 00:00 is when the incident occurred.
      2. On yellow cue cards, document gaps in people, process, and technology requirements to complete the step.
      3. On red cue cards, indicate risks (e.g. no backup person for a key staff member).
      An example is shown on what can be done during step 3(a). Three cue cards are showing in white, yellow, and red.

      Do:

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't:

      • Get weighed down by tools.
      • Document the details right away – stick to the high-level plan for the first exercise.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.

      Flowchart the current-state incident response plan (i.e. document the recovery workflow)

      3(b) DRP Recovery Workflow Template and Case Study: Practical, Right-Sized DRP

      Why use flowcharts?

      • Flowcharts provide an at-a-glance view, ideal for disaster scenarios where pressure is high and quick upward communication is necessary.
      • For experienced staff, a high-level reminder of key steps is sufficient.

      Use the completed tabletop planning exercise results to build this workflow.

      "We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director, IT Operations, Healthcare Industry

      Source: Info-Tech Research Group Interview

      Screenshot of Info-Tech's DRP Recovery Workflow Template

      For a formatted template you can use to capture your plan, see Info-Tech’s DRP Recovery Workflow Template.

      For a completed example of tabletop planning results, review Info-Tech’s Case Study: Practical, Right-Sized DRP.

      Identify RPA

      What’s my RPA? Consider the following case:

      • Once a week, a full backup is taken of the complete ERP system and is transferred over the WAN to a secondary site 250 miles away, where it is stored on disk.
      • Overnight, an incremental backup is taken of the day’s changes, and is transferred to the same secondary site, and also stored on disk.
      • During office hours, the SAN takes a snapshot of changes which are kept on local storage (information on the accounting system usually only changes during office hours).
      • So what’s the RPA? One hour (snapshots), one day (incrementals), or one week (full backups)?

      When identifying RPA, remember the following:

      You are planning for a disaster scenario, where on-site systems may be inaccessible and any copies of data taken during the disaster may fail, be corrupt, or never make it out of the data center (e.g. if the network fails before the backup file ships). In the scenario above, it seems likely that off-site incremental backups could be restored, leading to a 24-hour RPA. However, if there were serious concerns about the reliability of the daily incrementals, the RPA could arguably be based on the weekly full backups.

      Info-Tech Best Practice

      The RPA is a commitment to the maximum data you would lose in a DR scenario with current capabilities (people, process, and technology). Pick a number you can likely achieve. List any situations where you couldn’t meet this RPA, and identify those for a risk tolerance discussion. In the example above, complete loss of the primary SAN would also mean losing the snapshots, so the last good copy of the data could be up to 24-hours old.

      Add recovery actuals (RTA/RPA) to your copy of the BIA

      3(c) DRP Business Impact Analysis Tool– Recovery actuals

      On the “Impact Analysis” tab in the DRP Business Impact Analysis Tool, enter the estimated maximum downtime and data loss in the RTA and RPA columns.

      1. Estimate the RTA based on the required time for complete recovery. Review your recovery workflow to identify this timeline. For example, if the notification, assessment, and declaration process takes two hours, and systems recovery requires most of a day, the estimated RTA could be 24 hours.
      2. Estimate the RPA based on the longest interval between copies of the data being shipped offsite. For example, if data on a particular system is backed up offsite once per day, and the onsite system was destroyed just before that backup began, the entire day’s data could be lost and estimated RPA could be 24 hours. Note: Enter 9999 to indicate that data is unrecoverable.

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Recovery actuals

      Info-Tech Best Practice

      It’s okay to round numbers to the nearest shift, day, or week for simplicity (e.g. 24 hours rather than 22.5 hours, or 8 hours rather than 7.25 hours).

      Test the recovery workflow against additional scenarios

      3(d) Workflow review

      Estimated Time: 1 hour

      Review your recovery workflow with a different scenario in mind.

      • Work from and update the soft copy of your recovery workflow.
      • Would any steps be different if the scenario changes? If yes, capture the different flow with a decision diamond. Identify any new gaps or risks you encounter with red and yellow cards. Use as few decision diamonds as possible.

      Screenshot of testing the workflow against the additional scenarios

      Info-Tech Best Practice

      As you start to consider scenarios where injuries or loss of life are a possibility, remember that health and safety risks are the top priority in a crisis. If there’s a fire in the data center, evacuating the building is the first priority, even if that means foregoing a graceful shut down. For more details on emergency response and crisis management, see Implement Crisis Management Best Practices.

      Consider additional IT disaster scenarios

      3(e) Thought experiment – Review additional scenarios

      Walk through your recovery workflow in the context of additional, different scenarios to ensure there are no gaps. Collaborate with your DR team to identify changes that might be required, and incorporate these changes in the plan.

      Scenario Type Considerations
      Isolated hardware/software failure
      • Failover to the DR site may not be necessary (or only for affected systems).
      Power outage or network outage
      • Do you have standby power? Do you have network redundancy?
      Local hazard (e.g. chemical leak, police incident)
      • Systems might be accessible remotely, but hands-on maintenance will be required eventually.
      • An alternate site is required for service continuity.
      Equipment/building damage (e.g. fire, roof collapse)
      • Staff injuries or loss of life are a possibility.
      • Equipment may need repair or replacement (vendor involvement).
      • An alternate site is required for service continuity.
      Regional natural disasters
      • Staff injuries or loss of life are a possibility.
      • Utilities may be affected (power, running water, etc.).
      • Expect staff to take care of their families first before work.
      • A geographically distant alternate site may be required for service continuity.

      Step 3.2: Identify and Prioritize Projects to Close Gaps

      This step will walk you through the following activities:

      • Analyze the gaps that were identified from the maturity scorecard, tabletop planning exercise, and the RTO/RPO gaps analysis.
      • Brainstorm solutions to close gaps and mitigate risks.
      • Determine a course of action to close these gaps. Prioritize each project. Create a project implementation timeline.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs

      Results and Insights

      • Prioritized list of projects and action items that can improve DR capabilities.
      • Often low-cost, low-effort quick wins are identified to mitigate at least some gaps/risks. Higher-cost, higher-effort projects can be part of a longer-term IT strategy. Improving service continuity is an ongoing commitment.

      Brainstorm solutions to address gaps and risk

      3(f) Solutioning

      Estimated Time: 1.5 hours

      1. Review each of the risk and gap cards from the tabletop exercise.
      2. As a group, brainstorm ideas to address gaps, mitigate risks, and improve resiliency. Write the list of ideas on a whiteboard or flip-chart paper. The solutions can range from quick-wins and action items to major capital investments.
      3. Try to avoid debates about feasibility at this point – that should happen later. The goal is to get all ideas on the board.

      An example of how to complete Activity 3(f). Three cue cards showing various steps are attached by arrows to steps on a whiteboard.

      Info-Tech Best Practice

      It’s about finding ways to solve the problem, not about solving the problem. When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution; other ideas can expand on and improve that first idea.

      Select an optimal DR deployment model from a world of choice

      There are many options for a DR deployment. What makes sense for you?

      • Sifting through the options for a DR site can be overwhelming. Simplify by eliminating deployment models that aren’t a good fit for your requirements or organization using Info-Tech’s research.
      • Someone will ask you about DR in the cloud. Cut to the chase and evaluate cloud for fit with your organization’s current capabilities and requirements. Read about the 10 Secrets for Successful DR in the Cloud.
      • Selecting and deploying a DR site is an exercise in risk mitigation. IT’s role is to advise the business on options to address the risk of not having a DR site, including cost and effort estimates. The business must then decide how to manage risk. Build total cost of ownership (TCO) estimates and evaluate possible challenges and risks for each option.

      Is it practical to invest in greater geo-redundancy that meets RTOs and RPOs during a widespread event?

      Info-Tech suggests you consider events that impact both sites, and your risk tolerance for that impact. Outline the impact of downtime at a high level if both the primary and secondary site were affected. Research how often events severe enough to have impacted both your primary and secondary sites have occurred in the past. What’s the business tolerance for this type of event?

      A common strategy: have a primary and DR site that are close enough to support low RPO/RTO, but far enough away to mitigate the impact of known regional events. Back up data to a remote third location as protection against a catastrophic event.

      Info-Tech Insight

      Approach site selection as a project. Leverage Select an Optimal Disaster Recovery Deployment Model to structure your own site-selection project.

      Set up the DRP Roadmap Tool

      3(g) DRP Roadmap Tool – Set up tool

      Use the DRP Roadmap Tool to create a high-level roadmap to plan and communicate DR action items and initiatives. Determine the data you’ll use to define roadmap items.

      Screenshot of Info-Tech's DRP Roadmap Tool

      Plan next steps by estimating timeline, effort, priority, and more

      3(h) DRP Roadmap Tool – Describe roadmap items

      A screenshot of Info-Tech's DRP Roadmap Tool to show how to describe roadmap items

      Review and communicate the DRP Roadmap Tool

      3(i) DRP Roadmap Tool – View roadmap chart

      A screenshot of Info-Tech's DRP Roadmap Tool's Roadmap tab

      Step 3.3: Review the Future State Recovery Process

      This step will walk you through the following activities:

      • Update the recovery workflow to outline your future recovery procedure.
      • Summarize findings from DR exercises and present the results to the project sponsor and other interested executives.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs (Future State Recovery Flow)
      • DR Project Sponsor

      Results and Insights

      • Summarize results from DR planning exercises to make the case for needed DR investment.

      Outline your future state recovery flow

      3(j) Update the recovery workflow to outline response and recovery in the future

      Estimated Time: 30 minutes

      Outline your expected future state recovery flow to demonstrate improvements once projects and action items have been completed.

      1. Create a copy of your DRP recovery workflow in a new tab in Visio.
      2. Delete gap and risk cards that are addressed by proposed projects. Consolidate or eliminate steps that would be simplified or streamlined in the future if projects are implemented.
      3. Create a short-, medium-, and long-term review of changes to illustrate improvements over time to the project roadmap.
      4. Update this workflow as you implement and improve DR capabilities.

      Screenshot of the recovery workflow

      Validate recovery targets and communicate actual recovery capabilities

      3(k) Validate findings, present recommendations, secure budget

      Estimated Time: time required will vary

      1. Interview managers or process owners to validate RTO, RPO, and business impact scores.Use your assessment of “heavy users” of particular applications (picture at right) to remind you which business users you should include in the interview process.
      2. Present an overview of your findings to the management team.Use Info-Tech’s DRP Recap and Results Template to summarize your findings.
      3. Take projects into the budget process.With the management team aware of the rationale for investment in DRP, build the business case and secure budget where needed.

      Present DRP findings and make the case for needed investment

      3(I) DRP Recap and Results Template

      Create a communication deck to recap key findings for stakeholders.

      • Write a clear problem statement. Identify why you did this project (what problem you’re solving).
      • Clearly state key findings, insights, and recommendations.
      • Leverage the completed tools and templates to populate the deck. Callouts throughout the template presentation will direct you to take and populate screenshots throughout the document.
      • Use the presentation to communicate key findings to, and gather feedback from, business unit managers, executives, and IT staff.
      Screenshots of Info-Tech's DRP Recap and Results Template

      Stories from the field: Info-Tech clients find value in Phase 3 in the following ways

      Tabletop planning is an effective way to discover gaps in recovery capabilities. Identify issues in the tabletop exercise so you can manage them before disaster strikes. For example:

      Back up a second…

      A client started to back up application data offsite. To minimize data transfer and storage costs, the systems themselves weren’t backed up. Working through the restore process at the DR site, the DBA realized 30 years of COBOL and SQR code – critical business functionality – wasn’t backed up offsite.

      Net… work?

      A 500-employee professional services firm realized its internet connection could be a significant roadblock to recovery. Without internet, no one at head office could access critical cloud systems. The tabletop exercise identified this recovery bottleneck and helped prioritize the fix on the roadmap.

      Someone call a doctor!

      Hospitals rely on their phone systems for system downtime procedures. A tabletop exercise with a hospital client highlighted that if the data center were damaged, the phone system would likely be damaged as well. Identifying this provided more urgency to the ongoing VOIP migration.

      The test of time

      A small municipality relied on a local MSP to perform systems restore, but realized it had never tested the restore procedure to identify RTA. Contacting the MSP to review capabilities became a roadmap item to address this risk.

      Phase 3: Insights and accomplishments

      Screenshot of Info-Tech's DRP recovery workflow template

      Outlined the DRP response and risks to recovery

      Screenshots of activities completed related to brainstorming risk mitigation measures.

      Brainstormed risk mitigation measures

      Summary of Accomplishments

      • Planned and documented your DR incident response and systems recovery workflow.
      • Identified gaps and risks to recovery and incident management.
      • Brainstormed and identified projects and action items to mitigate risks and close gaps.

      Up Next: Leverage the core deliverables to complete, extend, and maintain your DRP

      Create a Right-Sized Disaster Recovery Plan

      Phase 4

      Complete, Extend, and Maintain Your DRP

      Phase 4: Complete, Extend, and Maintain Your DRP

      This phase will walk you through the following activities:

      • Identify progress made on your DRP by reassessing your DRP maturity.
      • Prioritize the highest value major initiatives to complete, extend, and maintain your DRP.

      This phase involves the following participants:

      • DRP Coordinator
      • Executive Sponsor

      Results and Insights

      • Communicate the value of your DRP by demonstrating progress against items in the DRP Maturity Scorecard.
      • Identify and prioritize future major initiatives to support the DRP, and the larger BCP.

      Celebrate accomplishments, plan for the future

      Congratulations! You’ve completed the core DRP deliverables and made the case for investment in DR capabilities. Take a moment to celebrate your accomplishments.

      This milestone is an opportunity to look back and look forward.

      • Look back: measure your progress since you started to build your DRP. Revisit the assessments completed in phase 1, and assess the change in your overall DRP maturity.
      • Look forward: prioritize future initiatives to complete, extend, and maintain your DRP. Prioritize initiatives that are the highest impact for the least requirement of effort and resources.

      We have completed the core DRP methodology for key systems:

      • BIA, recovery objectives, high-level recovery workflow, and recovery actuals.
      • Identify key tasks to meet recovery objectives.

      What could we do next?

      • Repeat the core methodology for additional systems.
      • Identify a DR site to meet recovery requirements, and review vendor DR capabilities.
      • Create a summary DRP document including requirements, capabilities, and change procedures.
      • Create a test plan and detailed recovery documentation.
      • Coordinate the creation of BCPs.
      • Integrate DR in other key operational processes.

      Revisit the DRP Maturity Scorecard to measure progress and identify remaining areas to improve

      4(a) DRP Maturity Scorecard – Reassess your DRP program maturity

      1. Find the copy of the DRP Maturity Scorecard you completed previously. Save a second copy of the completed scorecard in the same folder.
      2. Update scoring where you have improved your DRP documentation or capabilities.
      3. Review the new scores on tab 3. Compare the new scores to the original scores.

      Screenshot of DRP Maturity Assessment Results

      Info-Tech Best Practice

      Use the completed, updated DRP Maturity Scorecard to demonstrate the value of your continuity program, and to help you decide where to focus next.

      Prioritize major initiatives to complete, extend, and maintain the DRP

      4(b) Prioritize major initiatives

      Estimated Time: 2 hours

      Prioritize major initiatives that mitigate significant risk with the least cost and effort.

      1. Use the scoring criteria below to evaluate risk, effort, and cost for potential initiatives. Modify the criteria if required for your organization. Write this out on a whiteboard or flip-chart paper.
      2. Assign a score from 1 to 3. Multiply the scores for each initiative together for an aggregate score. In general, prioritize initiatives with higher scores.
      Score A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative?
      3: High Critical impact on +50% of stakeholders, or major impact to compliance posture, or significant health/safety risk. One sprint, can be completed by a few individuals with minor supervision. Within the IT discretionary budget.
      2: Medium Impacts <50% of stakeholders, or minor impact on compliance, or degradation to health or safety controls. One quarter, and/or some increased effort required, some risk to completion. Requires budget approval from finance.
      1: Low Impacts limited to <25% of stakeholders, no impact on compliance posture or health/safety. One year, and/or major vendor or organizational challenges. Requires budget approval from the board of directors.

      Info-Tech Best Practice

      You can use a similar scoring exercise to prioritize and schedule high-benefit, low-effort, low-cost items identified in the roadmap in phase 3.

      Example: Prioritize major initiatives

      4(b) Prioritize major initiatives continued

      Write out the table on a whiteboard (record the results in a spreadsheet for reference). In the case below, IT might decide to work on repeating the core methodology first as they create the active testing plans, and tackle process changes later.

      Initiative A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative? Aggregate score (A x B x C)
      Repeat the core methodology for all systems 2 – will impact some stakeholders, no compliance or safety impact. 2 – will require about 3 months, no significant complications. 3 – No cost. 12
      Add DR to project mgmt. and change mgmt. 1 – Mitigates some recovery risks over the long term. 1 – Requires extensive consultation and process review. 3 – No cost. 3
      Active failover testing on plan 2 – Mitigates some risks; documentation and cross training is already in place. 2 – Requires 3-4 months of occasional effort to prepare for test. 2 – May need to purchase some equipment before testing. 8

      Info-Tech Best Practice

      Find a pace that allows you to keep momentum going, but also leaves enough time to act on the initial findings, projects, and action items identified in the DRP Roadmap Tool. Include these initiatives in the Roadmap tool to visualize how identified initiatives fit with other tasks identified to improve your recovery capabilities.

      Repeat the core DR methodology for additional systems and applications


      You have created a DR plan for your most critical systems. Now, add the rest:

      • Build on the work you’ve already done. Re-use the BIA scoring scale. Update your existing recovery workflows, rather than creating and formatting an entirely new document. A number of steps in the recovery will be shared with, or similar to, the recovery procedures for your Tier 1 systems.

      Risks and Challenges Mitigated

      • DR requirements and capabilities for less-critical systems have not been evaluated.
      • Gaps in the recovery process for less critical systems have not been evaluated or addressed.
      • DR capabilities for less critical systems may not meet business requirements.
      Sample Outputs
      Add Tier 2 & 3 systems to the BIA.
      Complete another tabletop exercise for Tier 2 & 3 systems recovery, and add the results to the recovery workflow.
      Identify projects to close additional gaps in the recovery process. Add projects to the project roadmap.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Extend your core DRP deliverables

      You’ve completed the core DRP deliverables. Continue to create DRP documentation to support recovery procedures and governance processes:

      • DR documentation efforts fail when organizations try to boil the ocean with an all-in-one plan aimed at auditors, business leaders, and IT. It’s long, hard to maintain, and ends up as shelfware.
      • Create documentation in layers to keep it manageable. Build supporting documentation over time to support your high-level recovery workflow.

      Risks and Challenges Mitigated

      • Key contact information, escalation, and disaster declaration responsibilities are not identified or formalized.
      • DRP requirements and capabilities aren’t centralized. Key DRP findings are in multiple documents, complicating governance and oversight by auditors, executives, and board members.
      • Detailed recovery procedures and peripheral information (e.g. network diagrams) are not documented.
      Sample Outputs
      Three to five detailed systems recovery flowcharts/checklists.
      Documented team roles, succession plans, and contact information.
      Notification, assessment, and disaster declaration plan.
      DRP summary.
      Layer 1, 2 & 3 network diagrams.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Select an optimal DR deployment model and deployment site

      Your DR site has been identified as inadequate:

      • Begin with the end in mind. Commit to mastering the selected model and leverage your vendor relationship for effective DR.
      • Cut to the chase and evaluate the feasibility of cloud first. Gauge your organization’s current capabilities for DR in the cloud before becoming infatuated with the idea.
      • A mixed model gives you the best of both worlds. Diversify your strategy by identifying fit for purpose and balancing the work required to maintain various models.

      Risks and Challenges Mitigated

      • Without an identified DR site, you’ll be scrambling when a disaster hits to find and contract for a location to restore IT services.
      • Without systems and application data backed up offsite, you stand to lose critical business data and logic if all copies of the data at your primary site were lost.
      Sample Outputs
      Application assessment for cloud DR.
      TCO tool for different environments.
      Solution decision and executive presentation.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Select the Optimal Disaster Recovery Deployment Model, to help you make sense of a world of choice for your DR site.

      Extend DRP findings to business process resiliency with a BCP pilot

      Integrate your findings from DRP into the overall BCP:

      • As an IT leader you have the skillset and organizational knowledge to lead a BCP project, but ultimately business leaders need to own the BCP – they know their processes and requirements to resume business operations better than anyone else.
      • The traditional approach to BCP is a massive project that most organizations can’t execute without hiring a consultant. To execute BCP in-house, carve up the task into manageable pieces.

      Risks and Challenges Mitigated

      • No formal plan exists to recover from a disruption to critical business processes.
      • Business requirements for IT systems recovery may change following a comprehensive review of business continuity requirements.
      • Outside of core systems recovery, IT could be involved in relocating staff, imaging and issuing new end-user equipment, etc. Identifying these requirements is part of BCP.
      Sample Outputs
      Business process-focused BIA for one business unit.
      Recovery workflows for one business unit.
      Provisioning list for one business unit.
      BCP project roadmap.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Develop a Business Continuity Plan, to develop and deploy a repeatable BCP methodology.

      Test the plan to validate capabilities and cross-train staff on recovery procedures

      You don’t have a program to regularly test the DR plan:

      • Most DR tests are focused solely on the technology and not the DR management process – which is where most plans fail.
      • Be proactive – establish an annual test cycle and identify and coordinate resources well in advance.
      • Update DRP documentation with findings from the plan, and track the changes you make over time.

      Risks and Challenges Mitigated

      • Gaps likely still exist in the plan that are hard to find without some form of testing.
      • Customers and auditors may ask for some form of DR testing.
      • Staff may not be familiar with DR documentation or how they can use it.
      • No formal cycle to validate and update the DRP.
      Sample Outputs
      DR testing readiness assessment.
      Testing handbooks.
      Test plan summary template.
      DR test issue log and analysis tool.

      Info-Tech Best Practice

      Uncover deficiencies in your recovery procedures by using Info-Tech’s blueprint Reduce Costly Downtime Through DR Testing.

      “Operationalize” DRP management

      Inject DR planning in key operational processes to support plan maintenance:

      • Major changes, or multiple routine changes, can materially alter DR capabilities and requirements. It’s not feasible to update the DR plan after every routine change, so leverage criticality tiers in the BIA to focus your change management efforts. Critical systems require more rigorous change procedures.
      • Likewise, you can build criticality tiers into more focused project management and performance measurement processes.
      • Schedule regular tasks in your ticketing system to verify capabilities and cross-train staff on key recovery procedures (e.g. backup and restore).

      Risks and Challenges Mitigated

      • DRP is not updated “as needed” – as requirements and capabilities change due to business and technology changes.
      • The DRP is disconnected from day-to-day operations.
      Sample Outputs
      Reviewed and updated change, project, and performance management processes.
      Reviewed and updated internal SLAs.
      Reviewed and updated data protection and backup procedures.

      Review infrastructure service provider DR capabilities

      Insert DR planning in key operational processes to support plan maintenance:

      • Reviewing vendor DR capabilities is a core IT vendor management competency.
      • As your DR requirements change year-to-year, ensure your vendors’ service commitments still meet your DR requirements.
      • Identify changes in the vendor’s service offerings and DR capabilities, e.g. higher costs for additional DR support, new offerings to reduce potential downtime, or conversely, a degradation in DR capabilities.

      Risks and Challenges Mitigated

      • Vendor capabilities haven’t been measured against business requirements.
      • No internal capability exists currently to assess vendor ability to meet promised SLAs.
      • No internal capability exists to track vendor performance on recoverability.
      Sample Outputs
      A customized vendor DRP questionnaire.
      Reviewed vendor SLAs.
      Choose to keep or change service levels or vendor offerings based on findings.

      Phase 4: Insights and accomplishments

      Screenshot of DRP Maturity Assessment Results

      Identified progress against targets

      Screenshot of prioritized further initiatives.

      Prioritized further initiatives

      Screenshot of DRP Planning Roadmap

      Added initiatives to the roadmap

      Summary of Accomplishments

      • Developed a list of high-priority initiatives that can support the extension and maintenance of the DR plan over the long term.
      • Reviewed and update maturity assessments to establish progress and communicate the value of the DR program.

      Summary of accomplishment

      Knowledge Gained

      • Conduct a BIA to determine appropriate targets for RTOs and RPOs.
      • Identify DR projects required to close RTO/RPO gaps and mitigate risks.
      • Use tabletop planning to create and validate an incident response plan.

      Processes Optimized

      • Your DRP process was optimized, from BIA to documenting an incident response plan.
      • Your vendor evaluation process was optimized to identify and assess a vendor’s ability to meet your DR requirements, and to repeat this evaluation on an annual basis.

      Deliverables Completed

      • DRP Maturity Scorecard
      • DRP Business Impact Analysis Tool
      • DRP Roadmap Tool
      • Incident response plan and systems recovery workflow
      • Executive presentation

      Info-Tech’s insights bust the most obstinate myths of DRP

      Myth #1: DRPs need to focus on major events such as natural disasters and other highly destructive incidents such as fire and flood.

      Reality: The most common threats to service continuity are hardware and software failures, network outages, and power outages.

      Myth #2: Effective DRPs start with identifying and evaluating potential risks.

      Reality: DR isn’t about identifying risks; it’s about ensuring service continuity.

      Myth #3: DRPs are separate from day-to-day operations and incident management.

      Reality: DR must be integrated with service management to ensure service continuity.

      Myth #4: I use a co-lo or cloud services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Reality: You can’t outsource accountability. You can’t just assume your vendor’s DR capabilities will meet your needs.

      Myth #5: A DRP must include every detail so anyone can execute the recovery.

      Reality: IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      Supplement the core documentation with these tools and templates

      • An Excel workbook workbook to track key roles on DR, business continuity, and emergency response teams. Can also track DR documentation location and any hardware purchases required for DR.
      • A questionnaire template and a response tracking tool to structure your investigation of vendor DR capabilities.
      • Integrate escalation with your DR plan by defining incident severity and escalation rules . Use this example as a template or integrate ideas into your own severity definitions and escalation rules in your incident management procedures.
      • A minute-by-minute time-tracking tool to capture progress in a DR or testing scenario. Monitor progress against objectives in real time as recovery tasks are started and completed.

      Next steps: Related Info-Tech research

      Select the Optimal Disaster Recovery Deployment Model Evaluate cloud, co-lo, and on-premises disaster recovery deployment models.

      Develop a Business Continuity Plan Streamline the traditional approach to make BCP development manageable and repeatable.

      Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.

      Document and Maintain Your Disaster Recovery Plan Put your DRP on a diet: keep it fit, trim, and ready for action.

      Reduce Costly Downtime Through DR Testing Improve your DR plan and your team’s ability to execute on it.

      Implement Crisis Management Best Practices An effective crisis response minimizes the impact of a crisis on reputation, profitability, and continuity.

      Research contributors and experts

      • Alan Byrum, Director of Business Continuity, Intellitech
      • Bernard Jones (MBCI, CBCP, CORP, ITILv3), Owner/Principal, B Jones BCP Consulting, LLC
      • Paul Beaudry, Assistant Vice-President, Technical Services, MIS, Richardson International Limited
      • Yogi Schulz, President, Corvelle Consulting

      Glossary

      • Business Continuity Management (BCM) Program: Ongoing management and governance process supported by top management and appropriately resourced to implement and maintain business continuity management. (Source: ISO 22301:2012)
      • Business Continuity Plan (BCP): Documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following disruption. The BCP is not necessarily one document, but a collection of procedures and information.
      • Crisis: A situation with a high level of uncertainty that disrupts the core activities and/or credibility of an organization and requires urgent action. (Source: ISO 22300)
      • Crisis Management Team (CMT): A group of individuals responsible for developing and implementing a comprehensive plan for responding to a disruptive incident. The team consists of a core group of decision makers trained in incident management and prepared to respond to any situation.
      • Disaster Recovery Planning (DRP): The activities associated with the continuing availability and restoration of the IT infrastructure.
      • Incident: An event that has the capacity to lead to loss of, or a disruption to, an organization’s operations, services, or functions – which, if not managed, can escalate into an emergency, crisis, or disaster.
      • BCI Editor’s Note: In most countries “incident” and “crisis” are used interchangeably, but in the UK the term “crisis” has been generally reserved for dealing with wide-area incidents involving Emergency Services. The BCI prefers the use of “incident” for normal BCM purposes. (Source: The Business Continuity Institute)

      • Incident Management Plan: A clearly defined and documented plan of action for use at the time of an incident, typically covering the key personnel, resources, services, and actions needed to implement the incident management process.
      • IT Disaster: A service interruption requiring IT to rebuild a service, restore from backups, or activate redundancy at the backup site.
      • Recovery Point: Time elapsed between the last good copy of the data being taken and failure/corruption on the production environment; think of this as data loss.
      • Recovery Point Actual (RPA): The currently achievable recovery point after a disaster event, given existing people, processes, and technology. This reflects expected maximum data loss that could actually occur in a disaster scenario.
      • Recovery Point Objective (RPO): The target recovery point after a disaster event, usually calculated in hours, on a given system, application, or service. Think of this as acceptable and appropriate data loss. RPO should be based on a business impact analysis (BIA) to identify an acceptable and appropriate recovery target.
      • Recovery Time: Time required to restore a system, application, or service to a functional state; think of this as downtime.
      • Recovery Time Actual (RTA): The currently achievable recovery time after a disaster event, given existing people, processes, and technology. This reflects expected maximum downtime that could actually occur in a disaster scenario.
      • Recovery Time Objective (RTO): The target recovery time after a disaster event for a given system, application, or service. RTO should be based on a business impact analysis (BIA) to identify acceptable and appropriate downtime.

      Bibliography

      BCMpedia. “Recovery Objectives: RTO, RPO, and MTPD.” BCMpedia, n.d. Web.

      Burke, Stephen. “Public Cloud Pitfalls: Microsoft Azure Storage Cluster Loses Power, Puts Spotlight On Private, Hybrid Cloud Advantages.” CRN, 16 Mar. 2017. Web.

      Elliot, Stephen. “DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified.” IDC, 2015. Web.

      FEMA. Planning & Templates. FEMA, 2015. Web.

      FINRA. “Business Continuity Plans and Emergency Contact Information.” FINRA, 2015. Web.

      FINRA. “FINRA, the SEC and CFTC Issue Joint Advisory on Business Continuity Planning.” FINRA, 2013. Web.

      Gosling, Mel, and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 2009. Web.

      Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, n.d. Web.

      Homeland Security. Federal Information Security Management Act (FISMA). Homeland Security, 2015. Web.

      Nichols, Shaun. “AWS's S3 Outage Was So Bad Amazon Couldn't Get Into Its Own Dashboard to Warn the World.” The Register, 1 Mar. 2017. Web.

      Potter, Patrick. “BCM Regulatory Alphabet Soup.” RSA Archer Organization, 2012. Web.

      Rothstein, Philip Jan. “Disaster Recovery Testing: Exercising Your Contingency Plan.” Rothstein Associates Inc., 2007. Web.

      The Business Continuity Institute. “The Good Practice Guidelines.” The Business Continuity Institute, 2013. Web.

      The Disaster Recovery Journal. “Disaster Resource Guide.” The Disaster Recovery Journal, 2015. Web.

      The Disaster Recovery Journal. “DR Rules & Regulations.” The Disaster Recovery Journal, 2015. Web.

      The Federal Financial Institution Examination Council (FFIEC). Business Continuity Planning. IT Examination Handbook InfoBase, 2015. Web.

      York, Kyle. “Read Dyn’s Statement on the 10/21/2016 DNS DDoS Attack.” Oracle, 22 Oct. 2016. Web.

      Business Value

      • Buy Link or Shortcode: {j2store}7|cart{/j2store}
      • Related Products: {j2store}7|crosssells{/j2store}
      • Up-Sell: {j2store}7|upsells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management
      Maximize your ROI on IT through benefits realization

      Build a Strategic IT Workforce Plan

      • Buy Link or Shortcode: {j2store}390|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $180,171 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design
      • Talent has become a competitive differentiator. To 46% of business leaders, workforce planning is a top priority – yet only 13% do it effectively.
      • CIOs aren’t sure what they need to give the organization a competitive edge or how current staffing line-ups fall short.

      Our Advice

      Critical Insight

      • A well defined strategic workforce plan (SWP) isn’t just a nice-to-have, it’s a must-have.
      • Integrate as much data as possible into your workforce plan to best prepare you for the future. Without knowledge of your future initiatives, you are filling hypothetical holes.
      • To be successful, you need to understand your strategic initiatives, workforce landscape, and external and internal trends.

      Impact and Result

      The workforce planning process does not need to be onerous, especially with help from Info-Tech’s solid planning tools. With the right people involved and enough time invested, developing an SWP will be easier than first thought and time well spent. Leverage Info-Tech’s client-tested 5-step process to build a strategic workforce plan:

      1. Build a project charter
      2. Assess workforce competency needs
      3. Identify impact of internal and external trends
      4. Identify the impact of strategic initiatives on roles
      5. Build and monitor the workforce plan

      Build a Strategic IT Workforce Plan Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a strategic workforce plan for IT, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Initiate the project

      Assess the value of a strategic workforce plan and the IT department’s fit for developing one, and then structure the workforce planning project.

      • Build a Strategic Workforce Plan – Phase 1: Initiate the Project
      • IT Strategic Workforce Planning Project Charter Template
      • IT Strategic Workforce Planning Project Plan Template

      2. Analyze workforce needs

      Gather and analyze workforce needs based on an understanding of the relevant internal and external trends, and then produce a prioritized plan of action.

      • Build a Strategic Workforce Plan – Phase 2: Analyze Workforce Needs
      • Workforce Planning Workbook

      3. Build the workforce plan

      Evaluate workforce priorities, plan specific projects to address them, and formalize and integrate strategic workforce planning into regular planning processes.

      • Build a Strategic Workforce Plan – Phase 3: Build and Monitor the SWP
      [infographic]

      Workshop: Build a Strategic IT Workforce Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Project Goals, Metrics, and Current State

      The Purpose

      Develop a shared understanding of the challenges your organization is facing with regards to talent and workforce planning.

      Key Benefits Achieved

      An informed understanding of whether or not you need to develop a strategic workforce plan for IT.

      Activities

      1.1 Identify goals, metrics, and opportunities

      1.2 Segment current roles

      1.3 Identify organizational culture

      1.4 Assign job competencies

      1.5 Assess current talent

      Outputs

      Identified goals, metrics, and opportunities

      Documented organizational culture

      Aligned competencies to roles

      Identified current talent competency levels

      2 Assess Workforce and Analyze Trends

      The Purpose

      Perform an in-depth analysis of how internal and external trends are impacting the workforce.

      Key Benefits Achieved

      An enhanced understanding of the current talent occupying the workforce.

      Activities

      2.1 Assess environmental trends

      2.2 Identify impact on workforce requirements

      2.3 Identify how trends are impacting critical roles

      2.4 Explore viable options

      Outputs

      Complete internal trends analysis

      Complete external trends analysis

      Identified internal and external trends on specific IT roles

      3 Perform Gap Analysis

      The Purpose

      Identify the changing competencies and workforce needs of the future IT organization, including shortages and surpluses.

      Key Benefits Achieved

      Determined impact of strategic initiatives on workforce needs.

      Identification of roles required in the future organization, including surpluses and shortages.

      Identified projects to fill workforce gaps.

      Activities

      3.1 Identify strategic initiatives

      3.2 Identify impact of strategic initiatives on roles

      3.3 Determine workforce estimates

      3.4 Determine projects to address gaps

      Outputs

      Identified workforce estimates for the future

      List of potential projects to address workforce gaps

      4 Prioritize and Plan

      The Purpose

      Prepare an action plan to address the critical gaps identified.

      Key Benefits Achieved

      A prioritized plan of action that will fill gaps and secure better workforce outcomes for the organization.

      Activities

      4.1 Determine and prioritize action items

      4.2 Determine a schedule for review of initiatives

      4.3 Integrate workforce planning into regular planning processes

      Outputs

      Prioritized list of projects

      Completed workforce plan

      Identified opportunities for integration

      Cost and Budget Management

      • Buy Link or Shortcode: {j2store}8|cart{/j2store}
      • Related Products: {j2store}8|crosssells{/j2store}
      • Up-Sell: {j2store}8|upsells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $2,000
      • member rating average days saved: 5
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management

      The challenge

      • IT is seen as a cost center in most organizations. Your IT spend is fuelled by negative sentiment instead of contributing to business value.

      • Budgetary approval is difficult, and in many cases, the starting point is lowering the cost-income ratio without looking at the benefits.
      • Provide the right amount of detail in your budgets to tell your investment and spending story. Align it with the business story. Too much detail only increases confusion, too little suspicion.

      Our advice

      Insight

      An effective IT budget complements the business story with how you will achieve the expected business targets.

      • Partner with the business to understand the strategic direction of the company and its future needs.
      • Know your costs and the value you will deliver.
      • Present your numbers and story clearly and credibly. Excellent delivery is part of good communication.
      • Guide your company by clearly explaining the implications of different choices they can make.

      Impact and results 

      • Get a head-start on your IT forecasting exercise by knowing the business strategy and what initiatives they will launch.
      • The coffee corner works! Pre-sell your ideas in quick chats.
      • Do not make innovation budgets bigger than they need to be. It undermines your credibility.
      • You must know your history to accurately forecast your IT operations cost and how it will evolve based on expected business changes.
      • Anticipate questions. IT discretionary proposals are often challenged. Think ahead of time about what areas your business partners will focus on and be ready with researched and credible responses.
      • When you have an optimized budget, tie further cost reductions to consequences in service delivery or deferred projects, or a changed operating model.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started

      Our concise executive brief shows you why you should develop a budget based on value delivery. We'll show you our methodology and the ways we can help you in completing this.

      Plan for budget success

      • Build an IT Budget That Demonstrates Value Delivery – Phase 1: Plan (ppt)
      • IT Budget Interview Guide (doc)

      Build your budget.

      • Build an IT Budget That Demonstrates Value Delivery – Phase 2: Build (ppt)
      • IT Cost Forecasting Tool (xls)

      Sell your budget

      • Build an IT Budget That Demonstrates Value Delivery – Phase 3: Sell (ppt)
      • IT Budget Presentation (ppt)

       

      Harness Configuration Management Superpowers

      • Buy Link or Shortcode: {j2store}303|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Configuration management databases (CMDB) are a lot of work to build and maintain. Starting down this process without the right tools, processes, and buy-in is a lot of work with very little reward.
      • If you decide to just build it and expect they will come, you may find it difficult to articulate the value, and you will be disappointed by the lack of visitors.
      • Relying on manual entry or automated data collection without governance may result in data you can’t trust, and if no one trusts the data, they won’t use it.

      Our Advice

      Critical Insight

      • The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Impact and Result

      • Define your use cases: Identify the use cases and prioritize those objectives into phases. Define what information will be needed to meet the use cases and how that information will be populated.
      • Understand and design the CMDB data model: Define services and undiscoverable configuration items (CI) and map them to the discoverable CIs.
      • Operationalize configuration record updates: Define data stewards and governance processes and integrate your configuration management practice with existing practices and lifecycles.

      Harness Configuration Management Superpowers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Harness Configuration Management Superpowers Deck – A step-by-step document that walks you through creating a configuration management program.

      Use this blueprint to create a configuration management program that provides immediate value.

      • Harness Configuration Management Superpowers – Phases 1-4

      2. Configuration Management Project Charter Template – A project charter template to help you build a concise document for communicating appropriate project details to stakeholders.

      Use this template to create a project charter to launch the configuration management project.

      • Configuration Management Project Charter

      3. Configuration Control Board Charter Template – A board charter template to help you define the roles and responsibilities of the configuration control board.

      Use this template to create your board charter for your configuration control board (CCB). Define roles and responsibilities and mandates for the CCB.

      • Configuration Control Board Charter

      4. Configuration Management Standard Operating Procedures (SOP) Template – An SOP template to describe processes and procedures for ongoing maintenance of the CMDB under the configuration management program.

      Use this template to create and communicate your SOP to ensure ongoing maintenance of the CMDB under the configuration management program.

      • Configuration Management Standard Operation Procedures

      5. Configuration Management Audit and Validation Checklist Template – A template to be used as a starting point to meet audit requirements under NIST and ITIL programs.

      Use this template to assess capability to pass audits, adding to the template as needed to meet internal auditors’ requirements.

      • Configuration Management Audit and Validation Checklist

      6. Configuration Management Policy Template – A template to be used for building out a policy for governance over the configuration management program.

      Use this template to build a policy for your configuration management program.

      • Configuration Management Policy

      7. Use Cases and Data Worksheet – A template to be used for validating data requirements as you work through use cases.

      Use this template to determine data requirements to meet use cases.

      • Use Cases and Data Worksheet

      8. Configuration Management Diagram Template Library – Examples of process workflows and data modeling.

      Use this library to view sample workflows and a data model for the configuration management program.

      • Configuration Management Diagram Template Library (Visio)
      • Configuration Management Diagram Template Library (PDF)

      9. Configuration Manager Job Description – Roles and responsibilities for the job of Configuration Manager.

      Use this template as a starting point to create a job posting, identifying daily activities, responsibilities, and required skills as you create or expand your configuration management program.

      • Configuration Manager

      Infographic

      Workshop: Harness Configuration Management Superpowers

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Configuration Management Strategy

      The Purpose

      Define the scope of your service configuration management project.

      Design the program to meet specific stakeholders needs

      Identify project and operational roles and responsibilities.

      Key Benefits Achieved

      Designed a sustainable approach to building a CMDB.

      Activities

      1.1 Introduction

      1.2 Define challenges and goals.

      1.3 Define and prioritize use cases.

      1.4 Identify data needs to meet these goals.

      1.5 Define roles and responsibilities.

      Outputs

      Data and reporting use cases based on stakeholder requirements

      Roles and responsibility matrix

      2 CMDB Data Structure

      The Purpose

      Build a data model around the desired use cases.

      Identify the data sources for populating the CMDB.

      Key Benefits Achieved

      Identified which CIs and relationships will be captured in the CMDB.

      Activities

      2.1 Define and prioritize your services.

      2.2 Evaluate CMDB default classifications.

      2.3 Test configuration items against existing categories.

      2.4 Build a data model diagram.

      Outputs

      List of CI types and relationships to be added to default settings

      CMDB data model diagram

      3 Processes

      The Purpose

      Key Benefits Achieved

      Built a right-sized approach to configuration record updates and data validation.

      Activities

      3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.

      3.2 Define practices for configuration baselines.

      3.3 Build a data validation and auditing plan.

      Outputs

      Documented processes and workflows

      Data validation and auditing plan

      4 Communications & Roadmap

      The Purpose

      Key Benefits Achieved

      Metrics program defined

      Communications designed

      Activities

      4.1 Define key metrics for configuration management.

      4.2 Define metrics for supporting services.

      4.3 Build configuration management policies.

      4.4 Create a communications plan.

      4.5 Build a roadmap

      Outputs

      Policy for configuration management

      Communications documents

      Roadmap for next steps

      Further reading

      Harness Configuration Management Superpowers

      Create a configuration management practice that will provide ongoing value to the organization.

      EXECUTIVE BRIEF

      Analyst Perspective

      A robust configuration management database (CMDB) can provide value to the business and superpowers to IT. It's time to invest smartly to reap the rewards.

      IT environments are becoming more and more complex, and balancing demands for stability and demands for faster change requires visibility to make the right decisions. IT needs to know their environment intimately. They need to understand dependencies and integrations and feel confident they are making decisions with the most current and accurate view.

      Solutions for managing operations rely on the CMDB to bring visibility to issues, calculate impact, and use predictive analytics to fix performance issues before they become major incidents. AIOps solutions need accurate data, but they can also help identify configuration drift and flag changes or anomalies that need investigation.

      The days of relying entirely on manual entry and updates are all but gone, as the functionality of a robust configuration management system requires daily updates to provide value. We used to rely on that one hero to make sure information was up to date, but with the volume of changes we see in most environments today, it's time to improve the process and provide superpowers to the entire IT department.

      This is a picture of Sandi Conrad

      Sandi Conrad, ITIL Managing Professional
      Principal Research Director, IT Infrastructure & Operations, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Build a configuration management database (CMDB): You need to implement a CMDB, populate it with records and relationships, and integrate it with discovery and management tools.
      • Identify the benefits of a CMDB: Too many CMDB projects fail because IT tries to collect everything. Base your data model on the desired use cases.
      • Define roles and responsibilities: Keeping data accurate and updated is difficult. Identify who will be responsible for helping

      Common Obstacles

      • Significant process maturity is required: Service configuration management (SCM) requires high maturity in change management, IT asset management, and service catalog practices.
      • Large investment: Building a CMDB takes a large amount of effort, process, and expertise.
      • Tough business case: Configuration management doesn't directly provide value to the business, but it requires a lot of investment from IT.

      Info-Tech's Approach

      • Define your scope and objectives: Identify the use cases for SCM and prioritize those objectives into phases.
      • Design the CMDB data model: Align with your existing configuration management system's data model.
      • Operationalize configuration record updates: Integrate your SCM practice with existing practices and lifecycles.

      Start small

      Scope creep is a serial killer of configuration management databases and service configuration management practices.

      Insight summary

      Many vendors are taking a CMDB-first approach to enable IT operations or sometimes asset management. It's important to ensure processes are in place immediately to ensure the data doesn't go stale as additional modules and features are activated.

      Define processes early to ensure success

      The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Identify use cases

      The initial use case will be the driving force behind the first assessment of return on investment (ROI). If ROI can be realized early, momentum will increase, and the team can build on the initial successes.

      If you don't see value in the first year, momentum diminishes and it's possible the project will never see value.

      Keep the initial scope small and focused

      Discovery can collect a lot of data quickly, and it's possible to be completely overwhelmed early in the process.

      Build expertise and troubleshoot issues with a smaller scope, then build out the process.

      Minimize customizations

      Most CMDBs have classes and attributes defined as defaults. Use of the defaults will enable easier implementation and faster time to value, especially where automations and integrations depend on standard terms for field mapping.

      Automate as much as possible

      In large, complex environments, the data can quickly become unmanageable. Use automation as much as possible for discovery, dependency mapping, validation, and alerts. Minimize the amount of manual work but ensure everyone is aware of where and how these manual updates need to happen to see continual value.

      Info-Tech's Harness Configuration Management Superpowers.

      Configuration management will improve functionality of all surrounding processes

      A well-functioning CMDB empowers almost all other IT management and governance practices.

      Service configuration management is about:

      • Building a system of record about IT services and the components that support those services.
      • Continuously reconciling and validating information to ensure data accuracy.
      • Ensuring the data lifecycle is defined and well understood and can pass data and process audits.
      • Accessing information in a variety of ways to effectively serve IT and the business.
      An image of Info-Tech's CMDB Configuration Management tree, breaking down aspects into the following six categories: Strategic Partner; Service Provider; Proactive; Stabilize; Core; and Foundational.

      Configuration management most closely impacts these practices

      Info-Tech Research Group sees a clear relationship.

      When an IT department reports they are highly effective at configuration management, they are much more likely to report they are highly effective at these management and governance processes:

      The following management and governance processes are listed: Quality Management; Asset Management; Performance Measurement; Knowledge Management; Release Management; Incident and Problem Management; Service Management; Change Management.

      The data is clear

      Service configuration management is about more than just doing change management more effectively.

      Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=684 organizations, 2019 to July 2022.

      Make the case to use configuration management to improve IT operations

      Consider the impact of access to data for informing innovations, optimization efforts, and risk assessments.

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      75%

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      42%

      of publicly reported outages were due to software or configuration issues. (1)

      58%

      of networking-related IT outages were due to configuration and change management failure.(1)

      It doesn't have to be that way!

      Enterprise-grade IT service management (ITSM) tools require a CMDB for the different modules to work together and to enable IT operations management (ITOM), providing greater visibility.

      Decisions about changes can be made with accurate data, not guesses.

      The CMDB can give the service desk fast access to helpful information about the impacted components, including a history of similar incidents and resolutions and the relationship between the impacted components and other systems and components.

      Turn your team into IT superheroes.

      CMDB data makes it easier for IT Ops groups to:

      • Avoid change collisions.
      • Eliminate poor changes due to lack of visibility into complex systems.
      • Identify problematic equipment.
      • Troubleshoot incidents.
      • Expand the services provided by tier 1 and through automation.

      Benefits of configuration management

      For IT

      • Configuration management will supercharge processes that have relied on inherent knowledge of the IT environment to make decisions.
      • IT will more quickly analyze and understand issues and will be positioned to improve and automate issue identification and resolution.
      • Increase confidence and reduce risks for decisions involving release and change management with access to accurate data, regardless of the complexity of the environment.
      • Reduce or eliminate unplanned work related to poor outcomes due to decisions made with incorrect or incomplete data.

      For the Business

      • Improve strategic planning for business initiatives involving IT solutions, which may include integrations, development, or security concerns.
      • More quickly deploy new solutions or updates due to visibility into complex environments.
      • Enable business outcomes with reliable and stable IT systems.
      • Reduce disruptions caused by planning without accurate data and improve resolution times for service interruptions.
      • Improve access to reporting for budgeting, showbacks, and chargebacks as well as performance metrics.

      Measure the value of this blueprint

      Fast-track your planning and increase the success of a configuration management program with this blueprint

      Workshop feedback
      8.1/10

      $174,000 savings

      30 average days saved

      Guided Implementation feedback

      8.7/10

      $31,496 average savings

      41 average days saved

      "The workshop was well run, with good facilitation, and gained participation from even the most difficult parts of the audience. The best part of the experience was that if I were to find myself in the same position in the future, I would repeat the workshop."

      – University of Exeter

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Prioritize services and use cases.

      Call #3: Identify data needed to meet goals.

      Call #4: Define roles and responsibilities.

      Call #5: Define and prioritize your services.

      Call #6: Evaluate and test CMDB default classifications.

      Call #7: Build a data model diagram.

      Call #8: Define processes for onboarding, offboarding, and maintaining data.

      Call #9: Discuss configuration baselines.

      Call #10: Build a data validation and audit plan.

      Call #11: Define key metrics.

      Call #12: Build a configuration management policy and communications plan.

      Call #13: Build a roadmap.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 9 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4

      Configuration Management Strategy

      CMDB Data Structure

      Process Design

      Communications & Roadmap

      Activities
      • Introduction
      • Define challenges and goals.
      • Define and prioritize use cases.
      • Identify data needed to meet goals.
      • Define roles and responsibilities.
      • Define and prioritize your services.
      • Evaluate CMDB default classifications.
      • Test configuration items against existing categories.
      • Build a data model diagram.
      • Define processes for onboarding, offboarding, and maintaining data in the CMDB.
      • Define practices for configuration baselines.
      • Build a data validation and auditing plan.
      • Define key metrics for configuration management.
      • Define metrics for supporting services.
      • Build configuration management policies.
      • Create a communications plan.
      • Build a roadmap.

      Deliverables

      • Roles and responsibility matrix
      • Data and reporting use cases based on stakeholder requirements
      • List of CI types and relationships to be added to default settings
      • CMDB data model diagram
      • Documented processes and workflows
      • Data validation and auditing plan
      • Policy for configuration management
      • Roadmap for next steps
      • Communications documents

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Configuration Management Project Charter

      Detail your approach to building an SCM practice and a CMDB.

      Screenshot from the Configuration Management Project Charter

      Use Cases and Data Worksheet

      Capture the action items related to your SCM implementation project.

      Screenshot from the Use Cases and Data Worksheet

      Configuration Manager Job Description

      Use our template for a job posting or internal job description.

      Screenshot from the Configuration Manager Job Description

      Configuration Management Diagram Template Library

      Use these diagrams to simplify building your SOP.

      Screenshot from the Configuration Management Diagram Template Library

      Configuration Management Policy

      Set expectations for configuration control.

      screenshot from the Configuration Management Policy

      Configuration Management Audit and Validation Checklist

      Use this framework to validate controls.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Configuration Control Board Charter

      Define the board's responsibilities and meeting protocols.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Key deliverable:

      Configuration Management Standard Operating Procedures Template

      Outlines SCM roles and responsibilities, the CMDB data model, when records are expected to change, and configuration baselines.

      Four Screenshots from the Configuration Management Standard Operating Procedures Template

      Phase 1

      Configuration Management Strategy

      Strategy Data Structure Processes Roadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Scope
      • Use Cases
      • Reports and Analytics

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • SCM project sponsor

      Harness Service Configuration Management Superpowers

      Establish clear definitions

      Ensure everyone is using the same terms.

      Term Definition
      Configuration Management

      The purpose of configuration management is to:

      • "Ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. This includes information on how CIs are configured and the relationships between them" (AXELOS).
      • "Provide sufficient information about service assets to enable the service to be effectively managed. Assess the impact of changes and deal with service incidents" (ISACA, 2018).
      Configuration Management System (CMS) A set of tools and databases used to manage, update, and present data about all configuration items and their relationships. A CMS may maintain multiple federated CMDBs and can include one or many discovery and dependency mapping tools.
      Configuration Management Database (CMDB) A repository of configuration records. It can be as simple as a spreadsheet or as complex as an integrated database populated through multiple autodiscovery tools.
      Configuration Record Detailed information about a configuration item.
      Configuration Item (CI)

      "Any component that needs to be managed in order to deliver an IT service" (AXELOS).

      These components can include everything from IT services and software to user devices, IT infrastructure components, and documents (e.g. maintenance agreements).
      Attributes Characteristics of a CI included in the configuration record. Common attributes include name, version, license expiry date, location, supplier, SLA, and owner.
      Relationships Information about the way CIs are linked. A CI can be part of another CI, connect to another CI, or use another CI. A CMDB is significantly more valuable when relationships are recorded. This information allows CMDB users to identify dependencies between components when investigating incidents, performing root-cause analysis, assessing the impact of changes before deployment, and much more.

      What is a configuration management database (CMDB)?

      The CMDB is a system of record of your services and includes a record for everything you need to track to effectively manage your IT services.

      Anything that is tracked in your CMDB is called a configuration item (CI). Examples of CIs include:

      • User-Facing Services
      • IT-Facing Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      Other systems of record can refer to CIs, such as:

      • Ticket database: Tickets can refer to which CI is impacted by an incident or provided as part of a service request.
      • Asset management database (AMDB): An IT asset is often also a CI. By associating asset records with CI records, you can leverage your IT asset data in your reporting.
      • Financial systems: If done well, the CMDB can supercharge your IT financial cost model.

      CMDBs can allow you to:

      • Query multiple databases simultaneously (so long as you have the CI name field in each database).
      • Build automated workflows and chatbots that interact with data across multiple databases.
      • More effectively identify the potential impact of changes and releases.

      Do not confuse asset with configuration

      Asset and configuration management look at the same world through different lenses

      • IT asset management (ITAM) tends to focus on each IT asset in its own right: assignment or ownership, lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations with other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they may use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.

      A comparison between Asset and Configuration Management Databases

      *Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.

      Start with ITIL 4 guiding principles to make your configuration management project valuable and realistic

      Focus on where CMDB data will provide value and ensure the cost of bringing that data in will be reasonable for its purpose. Your end goal should be not just to build a CMDB but to use a CMDB to manage workload and workflows and manage services appropriately.

      Focus on value

      Include only the relevant information required by stakeholders.

      Start where you are

      Use available sources of information. Avoid adding new sources and tools unless they are justified.

      Progress iteratively with feedback

      Regularly review information use and confirm its relevance, adjusting the CMDB scope if needed.

      Collaborate and promote visibility

      Explain and promote available sources of configuration information and the best ways to use them, then provide hints and tips for more efficient use.

      Think and work holistically

      Consider other sources of data for decision making. Do not try to put everything in the CMDB.

      Keep it simple and practical

      Provide relevant information in the most convenient way; avoid complex interfaces and reports.

      Optimize and automate

      Continually optimize resource-consuming practice activities. Automate CDMB verification, data collection, relationship discovery, and other activities.

      ITIL 4 guiding principles as described by AXELOS

      Step 1.1

      Identify use cases and desired benefits for service configuration management

      Activities

      1.1.1 Brainstorm data collection challenges

      1.1.2 Define goals and how you plan to meet them

      1.1.3 Brainstorm and prioritize use cases

      1.1.4 Identify the data needed to reach your goals

      1.1.5 Record required data sources

      This step will walk you through the following aspects of a configuration management system:

      • Scope
      • Use cases

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project sponsor
      • Project manager

      Identify potential obstacles in your organization to building and maintaining a CMDB

      Often, we see multiple unsuccessful attempts to build out a CMDB, with teams eventually losing faith and going back to spreadsheets. These are common obstacles:

      • Significant manual data collection, which is rarely current and fully accurate.
      • Multiple discovery solutions creating duplicate records, with no clear path to deduplicate records.
      • Manual dependency mapping that isn't accurate because it's not regularly assessed and updated.
      • Hybrid cloud and on-premises environment with discovery solutions only partially collecting as the right discovery and dependency mapping solutions aren't in place.
      • Dynamic environments (virtual, cloud, or containers) that may exist for a very short time, but no one knows how they should be managed.
      • Lack of expertise to maintain and update the CMDB or lack of an assigned owner for the CMDB. If no one owns the process and is assigned as a steward of data, it will not be maintained.
      • Database that was designed with other purposes in mind and is heavily customized, making it difficult to use and maintain.

      Understanding the challenges to accessing and maintaining quality data will help define the risks created through lack of quality data.

      This knowledge can drive buy-in to create a configuration management practice that benefits the organization.

      1.1.1 Brainstorm data collection challenges

      Involve stakeholders.
      Allot 45 minutes for this discussion.

      1. As a group, brainstorm the challenges you have with data:
      2. Accuracy and trustworthiness: What challenges do you have with getting accurate data on IT services and systems?
        1. Access: Where do you have challenges with getting data to people when they need it?
        2. Manually created data: Where are you relying on data that could be automatically collected?
        3. Data integration: Where do you have issues with integrating data from multiple sources?
        4. Impact: What is the result of these challenges?
      3. Group together these challenges into similar issues and identify what goals would help overcome them.
      4. Record these challenges in the Configuration Management Project Charter, section 1.2: Project Purpose.

      Download the Configuration Management Project Charter

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Info-Tech Maturity Ladder

      Identify your current and target state

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      Data collection and validation is fully automated

      Integrated with several IT processes

      Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      • Data collection and validation is fully automated
      • Integrated with several IT processes
      • Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      A tower is depicted, with arrows pointing to Current (orange) and Target(blue)

      Define goals for your CMDB to ensure alignment with all stakeholders

      • How are business or IT goals being hindered by not having the right data available?
      • If the business isn't currently asking for service-based reporting and accountability, start with IT goals. This will help to develop goals that will be most closely aligned to the IT teams' needs and may help incentivize the right behavior in data maintenance.
      • Configuration management succeeds by enabling its stakeholders to achieve their outcomes. Set goals for configuration management based on the most important outcomes expected from this project. Ask your stakeholders:
        1. What are the business' or IT's planned transformational initiatives?
        2. What are your highest priority goals?
        3. What should the priorities of the configuration management practice be?
      • The answers to these questions will shape your approach to configuration management. Direct input from your leadership and executives, or their delegates, will help ensure you're setting a solid foundation for your practice.
      • Identify which obstacles will need to be overcome to meet these goals.

      "[T]he CMDB System should be viewed as a 'system of relevance,' rather than a 'single source of truth.' The burdens of relevance are at once less onerous and far more meaningful in terms of action, analysis, and automation. While 'truth' implies something everlasting or at least stable, relevance suggests a far more dynamic universe."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al

      Identify stakeholders to discuss what they need from a CMDB; business and IT needs will likely differ

      Define your audience to determine who the CMDB will serve and invite them to these conversations. The CMDB can aid the business and IT and can be structured to provide dashboards and reports for both.

      Nondiscoverable configuration items will need to be created for both audiences to organize CIs in a way that makes sense for all uses.

      Integrations with other systems may be required to meet the needs of your audience. Note integrations for future planning.

      Business Services

      Within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      Technical Services

      Connect to IT Finance for:

      • Service-based consumption and costing
      • Financial awareness through showback
      • Financial recovery through chargeback
      • Support IT strategy through financial transparency
      • Cost optimization
      • Reporting for depreciation, location-related taxation, and capitalization (may also use asset management for these)

      Intersect with IT Processes to:

      • Reduce time to restore services through incident management
      • Improve stability through change management
      • Reduce outages through problem management
      • Optimize assets through IT asset management
      • Provide detailed reporting for audit/governance, risk, and compliance

      1.1.2 Define goals and how you plan to meet them

      Involve stakeholders.

      Allot 45 minutes for this discussion.

      As a group, identify current goals for building and using a CMDB.

      Why are we doing this?

      • How do you hope to use the data within the CMDB?
      • What processes will be improved through use of this data and what are the expected outcomes?

      How will we improve the process?

      • What processes will be put in place to ensure data integrity?
      • What tools will be put in place to improve the methods used to collect and maintain data?

      Record these goals in the Configuration Management Project Charter, section 1.3: Project Objectives.

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      It's easy to think that if you build it, they will come, but CMDBs rarely succeed without solid use cases

      Set expectations for your organization that defined and fulfilled use cases will factor into prioritization exercises, functional plans, and project milestones to achieve ROI for your efforts.

      A good use case:

      • Justifies resource allocation
      • Gains funding for the right tools
      • Builds stakeholder support
      • Drives interest and excitement
      • Gains support from anyone in a position to help build out and validate the data
      • Helps to define success

      In the book CMDB Systems, Making Change Work in the Age of Cloud and Agile, authors Drogseth, Sturm, and Twing describe the secrets of success:

      A documented evaluation of CMDB System vendors showed that while most "best case" ROI fell between 6 and 9 months for CMDB deployments, one instance delivered ROI for a significant CMDB investment in as little as 2 weeks!

      If there's a simple formula for quick time to value for a CMDB System, it's the following:

      Mature levels of process awareness
      + Strong executive level support
      + A ready and willing team with strongly supportive stakeholders
      + Clearly defined and ready phase one use case
      + Carefully selected, appropriate technologies

      All this = Powerful early-phase CMDB System results

      Define and prioritize use cases for how the CMDB will be used to drive value

      The CMDB can support several use cases and may require integration with various modules within the ITSM solution and integration with other systems.

      Document the use cases that will drive your CMDB to relevance, including the expected benefits for each use case.

      Identify the dependencies that will need to be implemented to be successful.

      Define "done" so that once data is entered, verified, and mapped, these use cases can be realized.

      "Our consulting experience suggests that more than 75% of all strategic initiatives (CMDB or not) fail to meet at least initial expectations across IT organizations. This is often due more to inflated expectations than categorical failure."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al.

      This image demonstrates how CMBD will be used to drive value.

      After identifying use cases, determine the scope of configuration items required to feed the use cases

      On-premises software and equipment will be critical to many use cases as the IT team and partners work on network and data-center equipment, enterprise software, and integrations through various means, including APIs and middleware. Real-time and near real-time data collection and validation will ensure IT can act with confidence.

      Cloud use can include software as a service (SaaS) solutions as well as infrastructure and platform as a service (IaaS and PaaS), and this may be more challenging for data collection. Tools must be capable of connecting to cloud environments and feeding the information back into the CMDB. Where on-premises and cloud applications show dependencies, you might need to validate data if multiple discovery and dependency mapping solutions are used to get a complete picture. Tagging will be crucial to making sense of the data as it comes into the CMDB.

      In-house developed software would be beneficial to have in the CMDB but may require more manual work to identify and classify once discovered. A combination of discovery and tagging may be beneficial to input and classification.

      Highly dynamic environments may require data collection through integration with a variety of solutions to manage and record continuous deployment models and verifications, or they may rely on tags and activity logs to record historical activity. Work with a partner who specializes in CI/CD to help architect this use case.

      Containers will require an assessment of the level of detail required. Determine if the container is a CI and if the content will be described as attributes. If there is value to your use case to map the contents of each container as separate CIs within the container CI, then you can map to that level of detail, but don't map to that depth unless the use case calls for it.

      Internet of Things (IoT) devices and applications will need to match a use case as well. IoT device asset data will be useful to track within an asset database but may have limited value to add to a CMDB. If there are connections between IoT applications and data warehouses, the dependencies should likely be mapped to ensure continued dataflow.

      Out of scope

      A single source of data is highly beneficial, but don't make it a catchall for items that are not easily stored in a CMDB.

      Source code should be stored in a definitive media library (DML). Code can be linked to the CMDB but is generally too big to store in a CMDB and will reduce performance for data retrieval.

      Knowledge articles and maintenance checklists are better suited to a knowledge base. They can also be linked to the CDMB if needed but this can get messy where many-to-many relationships between articles and CIs exist.

      Fleet (transportation) assets and fixed assets should be in fleet management systems and accounting systems, respectively. Storing these types of data in the CMDB doesn't provide value to the support process.

      1.1.3 Brainstorm and prioritize use cases

      Which IT practices will you supercharge?

      Focus on improving both operations and strategy.

      1. Brainstorm the list of relevant use cases. What do you want to do with the data from the CMDB? Consider:
        1. ITSM management and governance practices
        2. IT operations, vendor orchestration, and service integration and management (SIAM) to improve vendor interactions
        3. IT finance and business service reporting needs
      2. Identify which use cases are part of your two- to three-year plan, including the purpose for adding configuration data into that process. Prioritize one or two of these use cases to accomplish in your first year.
      3. Identify dependencies to manage as part of the solution and define a realistic timeline for implementing integrations, modules, or data sources.
      4. Document this table in the Configuration Management Project Charter, section 2.2: Use Cases.
      Audience Use Case Goal/Purpose Project/Solution Dependencies Proposed Timeline Priority
      • IT
      • Change Management

      Stabilize the process by seeing:

      Change conflict reporting

      Reports of CI changes without change records

      System availability

      RFC mapping requires discovered CIs

      RFC review requires criticality, technical and business owners

      Conflict reporting requires dependency mapping

      • Discovery and manual information entered by October
      • Dependency mapping implemented by December

      High

      Determine what additional data will be needed to achieve your use cases

      Regardless of which use cases you are planning to fulfill with the CMDB, it is critical to not add data and complexity with the plan of resolving every possible inquiry. Ensure the cost and effort of bringing in the data and maintaining it is justified. The complexity of the environment will impact the complexity of data sources and integrations for discovery and dependency mapping.

      Before bringing in new data, consider:

      • Is this information available in other maintained databases now?
      • Will this data be critical for decision making? If it is nice to have or optional, can it be automatically moved into the database and maintained using existing integrations?
      • Is there a cost to bringing the data into the CMDB and maintaining it? Is that cost reasonable for its purpose?
      • How frequently will this information be accessed, and can it be updated in an adequate cadence to meet these needs?
      • When does this information need to be available?

      Info-Tech Insight

      If data will be used only occasionally upon request, determine if it will be more efficient to maintain it or to retrieve it from the CMDB or another data source as needed.

      Remember, within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      1.1.4 Expand your use cases by identifying the data needed to reach your goals

      Involve stakeholders.

      Allot 60 minutes for this discussion.

      Review use cases and their goals.

      Identify what data will be required to meet those goals and determine whether it will be mandatory or optional/nice-to-have information.

      Identify sources of data for each type of data. Color code or sort.

      Italicize data points that can be automatically discovered.

      Gain consensus on what information will be manually entered.

      Record the data in the Use Cases and Data Worksheet.

      Download the Use Cases and Data Worksheet

      Input

      Output

      • None
      • List of data requirements
      MaterialsParticipants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Use Cases and Data Worksheet
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Use discovery and dependency mapping tools to automatically update the CMDB

      Avoid manual data entry whenever possible.

      Consider these features when looking at tools:

      • Application dependency mapping: Establishing and tracking the relationships and dependencies between system components, applications, and IT services. The ideal tool will be able to generate maps automatically.
      • Agentless and agent discovery: Scanning systems with both agent and agentless approaches. Agent-based scanning provides comprehensive information on applications used in individual endpoints, which is helpful in minimizing its IT footprint. However, agents require endpoint access. Agentless-based scanning provides a broader and holistic view of deployed applications without the need to install an agent on end devices, which can be good enough for inventory awareness.
      • Data export capability: Easy exporting of application inventory information to be used in reports and other tools.
      • Dashboards and chart visualization: Detailed list of the application inventory, including version number, number of users, licenses, deployment location, and other application details. These details will inform decision makers of each application's health and its candidacy for further rationalization activities.
      • Customizable scanning scripts: Tailor your application discovery approach by modifying the scripts used to scan your systems.
      • Integration with third-party tools: Easy integration with other systems with out-of-the-box plugins or customizable APIs.

      Determine which data collection methods will be used to populate the CMDB

      The effort-to-value ratio is an important factor in populating a CMDB. Manual efforts require a higher process focus, more intensive data validation, and a constant need to remind team members to act on every change.

      Real-Time Data AIOps continual scans Used for event and incident management
      Near Real-Time Data Discovery and dependency mapping run on a regular cycle Used for change and asset management
      Historical Data Activity log imports, manual data entry Used for IT finance, audit trail
      • Determine what amount of effort is appropriate for each data grouping and use case. As decisions are made to expand data within the CMDB, the effort-to-value ratio should always factor in. To be usable, data must be accurate, and every piece of data that needs to be manually entered runs the risk of becoming obsolete.
      • Identify which data sources will bring in each type of data. Where there is a possibility of duplicate records being created, one of the data sources will need to be identified as the primary.
      • If the decision is to manually enter configuration items early in the process, be aware that automation may create duplicates of the CIs that will need to be deduplicated at some point in the process to make the information more usable.
      • Typically, items are discovered, validated, then mapped, but there will be variations depending on the source.
      • Active Directory or LDAP may be used to bring users and technicians into the CMDB. Data may be imported from spreadsheets. Identify efforts where data cleanup may have to happen before transferring into the CMDB.
      • Identify how often manual imports will need to be conducted to make sure data is usable.

      Identify other nondiscoverable data that will need to be added to or accessed by the CMDB

      Foundational data, such as technicians, end users and approvers, roles, location, company, agency, department, building, or cost center, may be added to tables that are within or accessed by the CMDB. Work with your vendor to understand structure and where this information resides.

      • These records can be imported from CSV files manually, but this will require manual removal or edits as information changes.
      • Integration with the HRIS, Active Directory, or LDAP will enable automatic updates through synchronization or scheduled imports.
      • If synchronization is fully enabled, new data can be added and removed from the CMDB automatically.
      • Identify which nondiscoverable attributes will be needed, such as system criticality, support groups, groups it is managed by, location.
      • If partially automating the process, identify where manual updates will need to occur.
      • If fully automating the process, notifications will need to be set up when business owner or product or technical owner fields become empty to prompt defining a replacement within the CMDB.
      • Determine who will manage these updates.
      • Work with your CMDB implementation vendor to determine the best option for bringing this information in.

      1.1.5 Record required data sources

      Allot 15 minutes for this discussion.

      1. Where do you track the work involved in providing services? Typically, your ticket database tracks service requests and incidents. Additional data sources can include:
        • Enterprise resource planning tools for tracking purchase orders
        • Project management information system for tracking tasks
      2. What trusted data sources exist for the technology that supports these services? Examples include:
        • Management tools (e.g. Microsoft Endpoint Configuration Manager)
        • Architectural diagrams and network topology diagrams
        • IT asset management database
        • Spreadsheets
        • Other systems of record
      3. What other data sources can help you gather the data you identified in activity 1.1.4?
      4. Record the relevant data sources for each use case in the Configuration Management Standard Operating Procedures, section 6: Data Collection and Updates.

      Info-Tech Insight

      Improve the trustworthiness of your CMDB as a system of record by relying on data that is already trusted.

      Input

      Output

      • Use cases
      • List of data requirements
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT and business service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Step 1.2

      Define roles and responsibilities

      Activities

      1.2.1 Record the project team and stakeholders

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      This step will walk you through the following aspects of a configuration management system:

      • Roles and responsibilities

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Identify the roles you need in your SCM project

      Determine which roles will need to be involved in the initial project and how to source these roles.

      Leadership Roles
      Oversee the SCM implementation

      1. Configuration Manager – The practice owner for SCM. This is a long-term role.
      2. Configuration Control Board (CCB) Chair – An optional role that oversees proposed alterations to configuration plans. If a CCB is implemented, this is a long-term role.
      3. Project Sponsor or Program Sponsor – Provides the necessary resources for building the CMDB and SCM practices.
      4. Architecture Roles
        Plan the program to build strong foundation
        1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
        2. Requirements Analyst – Gathers and manages the requirements for CM.
        3. Process Engineer – Defines, documents, and implements the entire process.

      Architecture Roles
      Plan the program to build strong foundation

      1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
      2. Requirements Analyst – Gathers and manages the requirements for CM.
      3. Process Engineer – Defines, documents, and implements the entire process.

      Engineer Roles
      Implement the system

      1. Logical Database Analyst (DBA) Designs the structure to hold the configuration management data and oversees implementation.
      2. Communications and Trainer – Communicates the goals and functions of CM and teaches impacted users the how and why of the process and tools.

      Administrative Roles
      Permanent roles involving long-term ownership

      1. Technical Owner – The system administrator responsible for their system's uptime. These roles usually own the data quality for their system.
      2. Configuration Management Integrator – Oversees regular transfer of data into the CMDB.
      3. Configuration Management Tool Support – Selects, installs, and maintains the CM tool.
      4. Impact Manager – Analyzes configuration data to ensure relationships between CIs are accurate; conducts impact analysis.

      1.2.1 Record the project team and stakeholders

      Allocate 25 minutes to this discussion.

      1. Record the project team.
        1. Identify the project manager who will lead this project.
        2. Identify key personnel that will need to be involved in design of the configuration management system and processes.
        3. Identify where vendors/outsourcers may be required to assist with technical aspects.
        4. Document the project team in the Configuration Management Project Charter, section 1.1: Project Team.
      1. Record a list of stakeholders.
        1. Identify stakeholders internal and external to IT.
        2. Build the stakeholder profile. For each stakeholder, identify their role, interest in the project, and influence on project success. You can score these criteria high/medium/low or score them out of ten.
        3. If managed service providers will need to be part of the equation, determine who will be the liaison and how they will provide or access data.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Management Project Charter
      • List of project stakeholders and participants
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Even with full automation, this cannot be a "set it and forget it" project if it is to be successful long-term

      Create a team to manage the process and data updates and to ensure data is always usable.

      • Services may be added and removed.
      • Technology will change as technical debt is reduced.
      • Vendors may change as contract needs develop.
      • Additional use cases may be introduced by IT and the business as approaches to management evolve.
      • AIOps can reduce the level of effort and improve visibility as configuration items change from the baseline and notifications are automated.
      • Changes can be checked against requests for changes through automated reconciliations, but changes will still need to be investigated where they do not meet expectations.
      • Manual data changes will need to be made regularly and verified.

      "We found that everyone wanted information from the CMDB, but no one wanted to pay to maintain it. People pointed to the configuration management team and said, 'It's their responsibility.'

      Configuration managers, however, cannot own the data because they have no way of knowing if the data is accurate. They can own the processes related to checking accuracy, but not the data itself."
      – Tim Mason, founding director at TRM Associates
      (Excerpt from Viewpoint: Focus on CMDB Leadership)

      Include these roles in your CMDB practice to ensure continued success and continual improvement

      These roles can make up the configuration control board (CCB) to make decisions on major changes to services, data models, processes, or policies. A CCB will be necessary in complex environments.

      Configuration Manager

      This role is focused on ensuring everyone works together to build the CMDB and keep it up to date. The configuration manager is responsible to:

      • Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement.
      • Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings.
      • Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions.
      • Audit data quality to ensure it is valid, is current, and meets defined standards.
      • Evaluate and recommend tools to support processes, data collection, and integrations.
      • Ensure configuration management processes interface with all other service and business management functions to meet use cases.
      • Report on configuration management performance and take appropriate action on process adherence and quality issues.

      Configuration Librarian

      This role is most important where manual data entry is prevalent and where many nonstandard configurations are in place. The librarian role is often held by the tool administrator. The librarian focuses specifically on data within the CMDB, including:

      • Manual updates to configuration data.
      • CMDB data verification on a regular schedule.
      • Processing ad hoc requests for data.

      Product/Service/Technical Owners

      The product or technical owner will validate information is correctly updating and reflects the existing data requirements as new systems are provisioned or as existing systems change.

      Interfacing Practice Owners

      All practice owners, such as change manager, incident manager, or problem manager, must work with the configuration team to ensure data is usable for each of the use cases they are responsible for.

      Download the Configuration Manager job description

      Assign configuration management responsibilities and accountabilities

      Align authority and accountability.

      • A RACI exercise will help you discuss and document accountability and responsibility for critical configuration management activities.
      • When responsibility and accountability are not well documented, it's often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your configuration management procedures.

      Responsible: The person who actually gets the job done.
      Different roles may be responsible for different aspects of the activity relevant to their role.

      Accountable: The one role accountable for the activity (in terms of completion, quality, cost, etc.)
      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      Consulted: Those who need the opportunity to provide meaningful input at certain points in the activity; typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you'll add to a process.

      Informed: Those who receive information regarding the task but do not need to provide feedback.
      Information might relate to process execution, changes, or quality.

      Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Determine what roles will be in place in your organization and who will fulfill them, and create your RACI chart to reflect what makes sense for your organization. Additional roles may be involved where there is complexity.

      R = responsible, A = accountable, C = consulted, I = informed CCB Configuration Manager Configuration Librarian Technical Owner(s) Interfacing Practice Owners Tool Administrator
      Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement. A R
      Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings. A R
      Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions. A R
      Audit data quality to ensure it is valid, is current, and meets defined standards. A,R
      Evaluate and recommend tools to support processes, data collection, and integrations. A,R
      Ensure configuration management processes interface with all other service and business management functions to meet use cases. A
      Report on configuration management performance and take appropriate action on process adherence and quality issues. A
      Make manual updates to configuration data. A
      Conduct CMDB data verification on a regular schedule. A
      Process ad hoc requests for data. A
      Enter new systems into the CMDB. A R
      Update CMDB as systems change. A R
      Identify new use cases for CMDB data. R A
      Validate data meets the needs for use cases and quality. R A
      Design reports to meet use cases. R
      Ensure integrations are configured as designed and are functional. R

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Allot 60 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 4.1: Responsibility Matrix. In the RACI chart, review the top row of roles. Smaller organizations may not need a configuration control board, in which case the configuration manager may have more authority.
      2. Modify or expand the process tasks in the left column as needed.
      3. For each role, identify what that person is responsible for, accountable for, consulted on, or informed of. Fill out each column.
      4. Document in the SOP. Schedule a time to share the results with organization leads.
      5. Distribute the chart among all teams in your organization.
      6. Describe additional roles as needed in the documentation.
      7. Add accountabilities and responsibilities for the CCB into the Configuration Control Board Charter.
      8. If appropriate, add auxiliary roles to the Configuration Management Standard Operating Procedures, section 4.2: Configuration Management Auxiliary Role Definitions.

      Notes:

      1. Assign one Accountable for each task.
      2. Have one or more Responsible for each task.
      3. Avoid generic responsibilities such as "team meetings."
      4. Keep your RACI definitions in your documents for quick reference.

      Refer back to the RACI chart when building out the communications plan to ensure accountable and responsible team members are on board and consulted and informed people are aware of all changes.

      Input

      Output

      • Task assignments
      • RACI chart with roles and responsibilities
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures, RACI chart
      • Configuration Control Board Charter, Responsibilities section
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 2

      Configuration Management Data Model

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Data Model
      • Customer-Facing and Supporting Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • CM project manager

      Step 2.1

      Build a framework for CIs and relationships

      Activities

      Document services:

      2.1.1 Define and prioritize your services

      2.1.2 Test configuration items against existing categories

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      This step will walk you through the following aspects of a configuration management system:

      • Data model
      • Configuration items
      • Relationships

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • Project manager

      Making sense of data daily will be key to maintaining it, starting with services

      As CIs are discovered and mapped, they will automatically map to each other based on integrations, APIs, queries, and transactions. However, CIs also need to be mapped to a conceptional model or service to present the service and its many layers in an easily consumable way.

      These services will need to be manually created or imported into the CMDB and manually connected to the application services. Services can be mapped to technical or business services or both.

      If business services reporting has been requested, talk to the business to develop a list of services that will be required. Use terms the business will be expecting and identify which applications and instances will be mapped to those services.

      If IT is using the CMDB to support service usage and reporting, develop the list of IT services and identify which applications and instances will be mapped to those services.

      This image show the relationship between Discoverable and Nondiscoverable CIs. The discoverable CIs are coloured in purple, and the nondiscoverables are blue.

      Work with your stakeholders to ensure catalog items make sense to them

      There isn't a definitive right or wrong way to define catalog items. For example, the business and IT could both reference application servers, but only IT may need to see technical services broken down by specific locations or device types.

      Refer back to your goals and use cases to think through how best to meet those objectives and determine how to categorize your services.

      Define the services that will be the top-level, nondiscoverable services, which will group together the CIs that make up the complete service. Identify which application(s) will connect into the technical service.

      When you are ready to start discovery, this list of services will be connected to the discovered data to organize it in a way that makes sense for how your stakeholders need to see the data.

      While working toward meeting the goals of the first few use cases, you will want to keep the structure simple. Once processes are in place and data is regularly validated, complexities of different service types and names can be integrated into the data.

      This image show the relationship between Discoverable and Nondiscoverable CIs. Both Discoverable and nondiscoverable CIs are blue.

      Application Service(blue); Technical Service(Purple); IT Shared Services(Orange); Billable Services(green); Service Portfolio(red)

      Define the service types to manage within the CMDB to logically group CIs

      Determine which method of service groupings will best serve your audience for your prioritized use cases. This will help to name your service categories. Service types can be added as the CMDB evolves and as the audience changes.

      Application Service

      Technical Service

      IT Shared Services

      Billable Services

      Service Portfolio

      A set of interconnected applications and hosts configured to offer a service to the organization.

      Example: Financial application service, which may include email, web server, application server, databases, and middleware.

      A logical grouping of CIs based on common criteria.

      Example: Toronto web services, which may include several servers, web applications, and databases.

      A logical grouping of IT and business services shared and used across the organization.

      Example: VoIP/phone services or networking or security services.

      A group of services that will be billed out to departments or customers and would require logical groupings to enable invoicing.

      A group of business and technical service offerings with specific performance reporting levels. This may include multiple service levels for different customer audiences for the same service.

      2.1.1 Define and prioritize your services

      Prioritize your starting point. If multiple audiences need to be accommodated, work with one group at a time.

      Timing: will vary depending on number of services, and starting point

      1. Create your list of services, referencing an existing service catalog, business continuity or disaster recovery plan, list of applications, or brainstorming sessions. Use the terminology that makes the most sense for the audience and their reporting requirements.
      2. If this list is already in place, assess for relevance and reduce the list to only those services that will be managed through the CMDB.
      3. Determine what data will be relevant for each service based on the exercises done in 1.1.4 and 1.1.5. For example, if priority was a required attribute for use case data, ensure each service lists the priority of that service.
      4. For each of these, identify the supporting services. These items can come from your technical service catalog or list of systems and software.
      5. Document this table in the Use Cases and Data Worksheet, tab 3: Service Catalog.

      Service Record Example

      Service: Email
      Supporting Services: M365, Authentication Services

      Service Attributes

      Availability: 24/7 (99.999%)
      Priority: Critical
      Users: All
      Used for: Collaboration
      Billable: Departmental
      Support: Unified Support Model, Account # 123456789

      The CMDB will be organized by services and will enable data analysis through multiple categorization schemes

      To extract maximum service management benefit from a CMDB, the highest level of CI type should be a service, as demonstrated below. While it is easier to start at the system or single-asset level, taking the service mapping approach will provide you with a useful and dynamic view of your IT environment as it relates to the services you offer, instead of a static inventory of components.

      Level 1: Services

      • Business Service Offering: A business service is an IT service that supports a business process, or a service that is delivered to business customers. Business service offerings typically are bound by service-level agreements.
      • IT Service Offering: An IT service supports the customer's business processes and is made up of people, processes, and technology. IT service offerings typically are bound by service-level agreements.

      Level 2: Infrastructure CIs

      • IT Component Set: An IT service offering consists of one of more sets of IT components. An IT component set allows you to group or bundle IT components with other components or groupings.
      • IT Component: An IT system is composed of one or more supporting components. Many components are shared between multiple IT systems.

      Level 3: Supporting CIs

      • IT Subcomponent: Any IT asset that is uniquely identifiable and a component of an IT system.
      • IT components can have subcomponents, and those components can have subcomponents, etc.

      Two charts, showing Enterprise Architect Model and Configuration Service Model. Each box represents a different CI.

      Assess your CMDB's standard category offerings against your environment, with a plan to minimize customization

      Standard categorization schemes will allow for easier integration with multiple tools and reporting and improve results if using machine learning to automate categorization. If the CMDB chosen includes structured categories, use that as your starting point and focus only on gaps that are not addressed for CIs unique to your environment.

      There is an important distinction between a class and a type. This concept is foundational for your configuration data model, so it is important that you understand it.

      • Types are general groupings, and the things within a type will have similarities. For attributes that you want to collect on a type, all children classes and CIs will have those attribute fields.
      • Classes are a more specific grouping within a type. All objects within a class will have specific similarities. You can also use subclasses to further differentiate between CIs.
      • Individual CIs are individual instances of a class or subclass. All objects in a class will have the same attribute fields and behave the same, although the values of their attributes will likely differ.
      • Attributes may be discovered or nondiscoverable and manually added to CIs. The attributes are properties of the CI such as serial number, version, memory, processor speed, or asset tag.

      Use inheritance structures to simplify your configuration data model.

      An example CM Data Model is depicted.

      Assess the list of classes of configuration items against your requirements

      Types are general groupings, and the things within a type will have similarities. Each type will have its own table within the CMDB. Classes within a type are a more specific grouping of configuration items and may include subclasses.

      Review your vendor's CMDB documentation. Find the list of CI types or classes. Most CMDBs will have a default set of classes, like this standard list. If you need to build your own, use the table below as a starting point. Define anything required for unique classes. Create a list and consult with your installation partner.

      Sample list of classes organized by type

      Types Services Network Hardware Storage Compute App Environment Documents
      Classes
      • Application Service
      • Technical Service
      • IT Shared Service
      • Billable Service
      • Service Portfolio
      • Switch
      • Router
      • Firewall
      • Modem
      • SD-WAN
      • Load Balancer
      • UPS
      • Computer
      • Laptop
      • Server
      • Tablet
      • Database
      • Network-Attached Storage
      • Storage Array Network
      • Blob
      • Operating System
      • Hypervisor
      • Virtual Server
      • Virtual Desktop
      • Appliance
      • Virtual Application
      • Enterprise Application
      • Line of Business Application Software
      • Development
      • Test
      • Production
      • Contract
      • Business Impact Analysis
      • Requirements

      Review relationships to determine which ones will be most appropriate to map your dependencies

      Your CMDB should include multiple relationship types. Determine which ones will be most effective for your environment and ensure everyone is trained on how to use them. As CIs are mapped, verify they are correct and only manually map what is incorrect or not mapping through automation.

      Manually mapping CMDB relationships may be time consuming and prone to error, but where manual mapping needs to take place, ensure the team has a common view of the dependency types available and what is important to map.

      Use automated mapping whenever possible to improve accuracy, provide functional visualizations, and enable dynamic updates as the environment changes.

      Where a dependency maps to external providers, determine where it makes sense to discover and map externally provided CIs.

      • Only connect where there is value in mapping to vendor-owned systems.
      • Only connect where data and connections can be trusted and verified.

      Most common dependency mapping types

      A list of the most common dependency mapping types.

      2.1.2 Test configuration items against existing categories

      Time to complete: 1-2 hours

      1. Select a service to test.
      2. Identify the various components that make up the service, focusing on configuration items, not attributes
      3. Categorize configuration items against types and classes in the default settings of the CMDB.
      4. Using the default relationships within the CMDB, identify the relationships between the configuration items.
      5. Identify types, classes, and relationships that do not fit within the default settings. Determine if there are common terms for these items or determine most appropriate name.
      6. Validate these exceptions with the publisher.
      7. Document exceptions in the Configuration Management Standard Operating Procedures, Appendix 2: Types and Classes of Configuration Items
      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of categories to add to the CMDB solution.
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      A charter will set the tone for meetings, ensure purpose is defined and meeting cadence is set for regular reviews.

      1. Open the Configuration Control Board Charter. Review the document and modify as appropriate for your CCB. This will include:
        • Purpose and mandate of the committee – Reference objectives from the project charter.
        • Team composition – Determine the right mix of team members. A team of six to ten people can provide a good balance between having a variety of opinions and getting work done.
        • Voting option – Determine the right quorum to approve changes.
        • Responsibilities – List responsibilities, starting with RACI chart items.
        • Authority – Define the control board's span of control.
        • Governing laws and regulations – List any regulatory requirements that will need to be met to satisfy your auditors.
        • Meeting preparation – Set expectations to ensure meetings are productive.
      2. Distribute the charter to CCB members.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Control Board Charter
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Assess the default list of statuses for each state

      Align this list with your CMDB

      Minimize the number of customizations that will make it difficult to update the platform.

      1. Review the default status list within the tool.
      2. Identify which statuses will be most used. Write a definition for each status.
      3. Update this list as you update process documentation in Step 3.1. After initial implementation, this list should only be modified through change enablement.
      4. Record this list of statuses in the Configuration Management Standard Operating Procedures, Appendix 4: Statuses
      State Status Description
      Preparation Ordered Waiting delivery from the vendor
      In Planning Being created
      Received Vendor has delivered the item, but it is not ready for deployment
      Production In Stock Available to be deployed
      In Use Deployed
      On Loan Deployed to a user on a temporary basis
      For Removal Planning to be phased out but still deployed to an end user
      Offline In Transit Moving to a new location
      Under Maintenance Temporarily offline while a patch or change is applied
      Removed Decommissioned Item has been retired and is no longer in production
      Disposed Item has been destroyed and we are no longer in possession of it
      Lost Item has been lost
      Stolen Item has been stolen

      Step 2.2

      Document statuses, attributes, and data sources

      Activities

      2.2.1 Follow the packet and map out the in-scope services and data centers

      2.2.2 Build data model diagrams

      2.2.3 Determine access rights for your data

      This step will walk you through the following aspects of a configuration management system:

      • Statuses
      • Attributes for each class of CI

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Outcomes of this step

      • Framework for approaching CI statuses
      • Attributes for each class of CI
      • Data sources for those attributes

      Service mapping approaches

      As you start thinking about dependency mapping, it's important to understand the different methods and how they work, as well as your CMDB's capabilities. These approaches may be all in the same tool, or the tool may only have the top-down options.

      Top down, most common

      Pattern-based

      Most common option, which includes indicators of connections such as code, access rights, scripting, host discovery, and APIs.

      Start with pattern-based, then turn on traffic-based for more detail. This combination will provide the most accuracy.

      Traffic-based

      Map against traffic patterns involving connection rules to get more granular than pattern-based.

      Traffic-based can add a lot of overhead with extraneous data, so you may not want to run it continuously.

      Tag-based

      Primarily used for cloud, containers, and virtual machines and will attach the cloud licenses to their dependent services and any related CIs.

      Tags work well with cloud but will not have the same hierarchical view as on-premises dependency mapping.

      Machine learning

      Machine learning will look for patterns in the traffic-based connections, match CIs to categories and help organize the data.

      Machine learning (ML) may not be in every solution, but if you have it, use it. ML will provide many suggestions to make the life of the data manager easier.

      Model hierarchy

      Automated data mapping will be helpful, but it won't be foolproof. It's critical to understand the data model to validate and map nondiscoverable CIs correctly.

      The framework consists of the business, enterprise, application, and implementation layers.

      The business layer encodes real-world business concepts via the conceptual model.

      The enterprise layer defines all enterprise data assets' details and their relationships.

      The application layer defines the data structures as used by a specific application.

      The implementation layer defines the data models and artifacts for use by software tools.

      An example of Model Hierarchy is depicted.

      Learn how to create data models with Info-Tech's blueprint Create and Manage Enterprise Data Models

      2.2.1 Follow the packet and map out the in-scope services and data centers

      Reference your network topology and architecture diagrams.

      Allot 1 hour for this activity.

      1. Start with a single service that is well understood and documented.
      2. Identify the technical components (hardware and applications) that make up the service.
      3. Determine if there is a need to further break down services into logical service groupings. For example, the email service to the right is broken down into authentication and mail flow.
      4. If you don't have a network diagram to follow, create a simple one to identify workflows within the service and components the service uses.
      5. Record the apps and underlying components in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      This information will be used for CM project planning and validating the contents of the CMDB.

      an example of a Customer-facing service is shown, for Email sample topology.

      Download the Configuration Management Diagram Template Library to see an example.

      Build your configuration data model

      Rely on out-of-the-box functionality where possible and keep a narrow focus in the early implementation stages.

      1. If you have an enterprise architecture, then your configuration management data model should align with it.
      2. Keep a narrow focus in the early implementation stages. Don't fill up your CMDB until you are ready to validate and fix the data.
      3. Rely on out-of-the-box (OOTB) functionality where possible. If your configuration management database (CMDB) and platform do not have a data model OOTB, then rely on a publicly available data model.
      4. Map your business or IT service offering to the first few layers.

      Once this is built out in the system, you can let the automated dependency mapping take over, but you will still need to validate the accuracy of the automated mapping and investigate anything that is incorrect.

      Sample Configuration Data Model

      Every box represents a CI, and every line represents a relationship

      A sample configuration Data model is shown.

      Example: Data model and CMDB visualization

      Once the data model is entered into the CMDB, it will provide a more dynamic and complex view, including CIs shared with other services.

      An example of a Data Model Exercise

      CMDB View

      An example of a CMDB View of the Data Model Exercise

      2.2.2 Build data model diagrams

      Visualize the expected CI classes and relationships.

      Allot 45 minutes.

      1. Identify the different data model views you need. Use multiple diagrams to keep the information simple to read and understand. Common diagrams include:
        1. Network level: Outline expected CI classes and relationships at the network level.
        2. Application level: Outline the expected components and relationships that make up an application.
        3. Services level: Outline how business capability CIs and service CIs relate to each other and to other types of CIs.
      1. Use boxes to represent CI classes.
      2. Use lines to represent relationships. Include details such as:
        1. Relationship name: Write this name on the arrow.
        2. Direction: Have an arrow point to each child.

      Review samples in Configuration Management Diagram Template Library.
      Record these diagrams in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of additions of categories to add to the CMDB solution.
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Download the Configuration Management Diagram Template Library to see examples.

      Determine governance for data security, access, and validation

      Align CMDB access to the organization's access control policy to maintain authorized and secure access for legitimate staff performing their role.

      Data User Type Access Role
      Data consumers
      • View-only access
      • Will need to view and use the data but will not need to make modifications to it
      • Service desk
      • Change manager
      • Major incident manager
      • Finance
      CMDB owner
      • Read/write access with the ability to update and validate data as needed
      • Configuration manager
      Domain owner
      • Read/write access for specific domains
      • Data owner within their domain, which includes validating that data is in the database and that it is correctly categorized.
      • Enterprise architect
      • Application owner
      Data provider
      • Read/write access for specific domains
      • Ensures automated data has been added and adds nondiscoverable assets and attributes as needed
      • Server operations
      • Database management
      • Network teams
      CMDB administrator
      • View-only access for data
      • Will need to have access for modifying the structure of the product, including adding fields, as determined by the CCB
      • ITSM tool administrator

      2.2.3 Determine access rights for your data

      Allot 30 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 5: Access Rights.
      2. Review the various roles from an access perspective.
        1. Who needs read-only access?
        2. Who needs read/write access?
        3. Should there be restrictions on who can delete data?
      1. Fill in the chart and communicate this to your CMDB installation vendor or your CMDB administrator.
      Input

      Output

      • Task assignments
      • Access rights and roles
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 3

      Configuration Record Updates

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • ITSM Practices and Workflows
      • Discovery and Dependency Mapping Tools
      • Auditing and Data Validation Practices

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • IT audit

      Harness Service Configuration Management Superpowers

      Step 3.1

      Keep CIs and relationships up to date through lifecycle process integrations

      Activities

      3.1.1 Define processes to bring new services into the CMDB

      3.1.2 Determine when each type of CI will be created in the CMDB

      3.1.3 Identify when each type of CI will be retired in the CMDB

      3.1.4 Record when and how attributes will change

      3.1.5 Institute configuration control and configuration baselines

      This step will walk you through the following aspects of a configuration management system:

      1. ITSM Practices and Workflows
      2. Discovery and Dependency Mapping Tools

      This phase involves the following participants:

      1. IT service owners
      2. Enterprise architects
      3. Practice owners and managers
      4. SCM practice manager
      5. Project manager

      Outcomes of this step

      • List of action items for updating interfacing practices and processes
      • Identification of where configuration records will be manually updated

      Incorporate CMDB updates into IT operations

      Determine which processes will prompt changes to the CMDB data

      Onboard new services - Offboard Redundant Services. Onboard new CIs - Offboard Redundant CIs; Maintain CIs - Update Attributes.

      Change enablement

      Identify which process are involved in each stage of data input, maintenance, and removal to build out a process for each scenario.

      Project management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Deployment management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Service management

      Formalize the process for adding new services to the CMDB

      As new services and products are introduced into the environment, you can improve your ability to correctly cost the service, design integrations, and ensure all operational capabilities are in place, such as data backup and business continuity plans.
      In addition, attributes such as service-level agreements (SLAs), availability requirements, and product, technical, and business owners should be documented as soon as those new systems are made live.

      • Introduce the technical team and CCB to the product early to ensure the service record is created before deployment and to quickly map the services once they are moved into the production environment.
      • Engage with project managers or business analysts to define the process to include security and technical reviews early.
      • Engage with the security and technical reviewers to start documenting the service as soon as it is approved.
      • Determine which practices will be involved in the creation and approval of new services and formalize the process to streamline entry of the new service, onboarding corresponding CIs and mapping dependencies.

      an example of the review and approval process for new service or products is shown.

      3.1.1 Define processes to bring new services into the CMDB

      Start with the most frequent intake methods, and if needed, use this opportunity to streamline the process.

      1. Discuss the methods for new services to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of services in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete the Configuration Management Standard Operating Procedures, section 8.1: Introduce New Service and Data Model.

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Identify scenarios where CIs are added and removed in the configuration management database

      New CIs may be introduced with new services or may be introduced and removed as part of asset refreshes or through service restoration in incident management. Updates may be done by your own services team or a managed services provider.
      Determine the various ways the CIs may be changed and test with various CI types.
      Review attributes such as SLAs, availability requirements, and product, technical, and business owners to determine if changes are required.

      • Identify what will be updated automatically or manually. Automation could include discovery and dependency mapping or synchronization with AMDB or AIOps tools.
      • Engage with relevant program managers to define and validate processes.
      • Identify control points and review audit requirements.

      An example of New or refresh CI from Procurement.

      Info-Tech Insight

      Data deemed no longer current may be archived or deleted. Retained data may be used for tracing lifecycle changes when troubleshooting or meeting audit obligations. Determine what types of CIs and use cases require archived data to meet data retention policies. If none do, deletion of old data may be appropriate.

      3.1.2 Identify when each type of CI will be created in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for new CIs to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete Configuration Management Standard Operating Procedures, section 8.2: Introduce New Configuration Items to the CMDB

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Retirement processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      3.1.3 Identify when each type of CI will be retired in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for CIs to be removed from the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the retirement of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Discuss data retention. How long will retired information need to be archived? What are the potential scenarios where legacy information may be needed for analysis?
      7. Complete the Configuration Management Standard Operating Procedures, section 8.4: Retire and Archive Configuration Records.

      Possible retirement scenarios:

      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Determine appropriate actions for detecting new or changed CIs through discovery

      Automated detection will provide the most efficient way of recording planned changes to CIs as well as detected unplanned changes. Check with the tool to determine what reports or notifications are available for the configuration management process and define what actions will be appropriate.

      As new CIs are detected, identify the process by which they should have been introduced into configuration management and compare against those records. If your CMDB can automatically check for documentation, this may be easier. Weekly reporting will allow you to catch changes quickly, and alerts on critical CIs could enable faster remediation, if the tool allows for alerting. AIOps could identify, notify of, and process many changes in a highly dynamic environment.

      Type of Change

      Impacted Process

      Validation

      Findings

      Actions

      Configuration change to networking equipment or software

      Change management

      Check for request for change

      No RFC

      Add to CAB agenda, notify technical owner

      Configuration change to end-user device or software

      Asset management

      Check for service ticket

      No ticket

      Escalate to asset agenda, notify service manager

      New assets coming into service

      Security incident and event management

      Check for SIEM integration

      No SIEM integration

      Notify security operations team to investigate

      The configuration manager may not have authority to act but can inform the process owners of unauthorized changes for further action. Once the notifications are forwarded to the appropriate process owner, the configuration manager will note the escalation and follow up on data corrections as deemed appropriate by the associated process owner.

      3.1.4 Record when and how attributes will change

      These lists will help with configuration control plans and your implementation roadmap.

      1. List each attribute that will change in that CI type's life.
      2. Write all the times that each attribute will change. Identify:
        1. The name of the workflow, service request, process, or practice that modifies the attribute.
        2. Whether the update is made automatically or manually.
        3. The role or tool that updates the CMDB.
      1. Update the relevant process or procedure documentation. Explicitly identify when the configuration records are updated.

      Document these tables in Configuration Management Standard Operation Procedures, Section 8.7: Practices That Modify CIs.

      Network Equipment
      Attributes

      Practices That Modify This Attribute

      Status
      • Infra Deployment (updated manually by Network Engineering)
      • Change Enablement (updated manually by CAB or Network Engineering)
      Assigned User
      • IT Employee Offboarding or Role Change (updated manually by Network Engineering)
      Version
      • Patch Deployment (updated automatically by SolarWinds)
      End-User Computers
      Attributes
      Practices That Modify This Attribute
      Status
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Assigned User
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Version
      • Patch Deployment (updated automatically by ConfigMgr)

      Institute configuration control and configuration baselines where appropriate

      A baseline enables an assessment of one or more systems against the desired state and is useful for troubleshooting incidents or problems and validating changes and security settings.

      Baselines may be used by enterprise architects and system engineers for planning purposes, by developers to test their solution against production copies, by technicians to assess configuration drift that may be causing performance issues, and by change managers to assess and verify the configuration meets the target design.

      Configuration baselines are a snapshot of configuration records, displaying attributes and first-level relationships of the CIs. Standard configurations may be integral to the success of automated workflows, deployments, upgrades, and integrations, as well as prevention of security events. Comparing current CIs against their baselines will identify configuration drift, which could cause a variety of incidents. Configuration baselines are updated through change management processes.
      Configuration baselines can be used for a variety of use cases:

      • Version control – Management of software and hardware versions, https://dj5l3kginpy6f.cloudfront.net/blueprints/harness-configuration-management-superpowers-phases-1-4/builds, and releases.
      • Access control – Management of access to facilities, storage areas, and the CMS.
      • Deployment control – Take a baseline of CIs before performing a release so you can use this to check against actual deployment.
      • Identify accidental changes Everyone makes mistakes. If someone installs software on the wrong server or accidentally drops a table in a database, the CMS can alert IT of the unauthorized change (if the CI is included in configuration control).

      Info-Tech Insight

      Determine the appropriate method for evaluating and approving changes to baselines. Delegating this to the CCB every time may reduce agility, depending on volume. Discuss in CCB meetings.

      A decision tree for deploying requested changes.

      3.1.5 Institute configuration control and configuration baselines where appropriate

      Only baseline CIs and relationships that you want to control through change enablement.

      1. Determine criteria for capturing configuration baselines, including CI type, event, or processes.
      2. Identify who will use baselines and how they will use the data. Identify their needs.
      3. Identify CIs that will be out of scope and not have baselines created.
      4. Document requirements in the SOP.
      5. Ensure appropriate team members have training on how to create and capture baselines in the CMDB.
      6. Document in the Configuration Management Standard Operating Procedures, section 8.5: Establish and Maintain Configuration Baselines.
      Process Criteria Systems
      Change Enablement & Deployment All high-risk changes must have the baseline captured with version number to revert to stable version in the event of an unsuccessful change
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Security Identify when configuration drift may impact risk mitigation strategies
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Step 3.2

      Validate data within the CMDB

      Activities

      3.2.1 Build an audit plan and checklist

      This step will walk you through the following aspects of a configuration management system:

      • Data validation and audit

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager
      • IT audit

      Outcomes of this step

      • Updates to processes for data validation
      • Plan for auditing and validating the data in the CMDB

      Audit and validate the CMDB

      Review the performance of the supporting technologies and processes to validate the accuracy of the CMDB.

      A screenshot of the CM Audit Plan.

      CM Audit Plan

      • CM policies
      • CM processes and procedures
      • Interfacing processes
      • Content within the CMDB

      "If the data in your CMDB isn't accurate, then it's worthless. If it's wrong or inaccurate, it's going to drive the wrong decisions. It's going to make IT worse, not better."
      – Valence Howden, Research Director, Info-Tech Research Group

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      Build auditing and validation of processes whenever possible

      When technicians and analysts are working on a system, they should check to make sure the data about that system is correct. When they're working in the CMDB, they should check that the data they're working with is correct.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Identify where processes break down and data is incorrect

      Once process stops working, data becomes less accurate and people find workarounds to solve their own data needs.

      Data within the CMDB often becomes incorrect or incomplete where human work breaks down

      • Investigate processes that are performed manually, including data entry.
      • Investigate if the process executors are performing these processes uniformly.
      • Determine if there are opportunities to automate or provide additional training.
      • Select a sample of the corresponding data in the CMS. Verify if the data is correct.

      Non-CCB personnel may not be completing processes fully or consistently

      • Identify where data in the CMS needs to be updated.
      • Identify whether the process practitioners are uniformly updating the CMS.
      • Discuss options for improving the process and driving consistency for data that will benefit the whole organization.

      Ensure that the data entered in the CMDB is correct

      • Confirm that there is no data duplication. Data duplication is very common when there are multiple discovery tools in your environment. Confirm that you have set up your tools properly to avoid duplication.
      • Build a process to respond to baseline divergence when people make changes without following change processes and when updates alter settings.
      • Audit the system for accuracy and completeness.

      3.2.1 Build an audit plan and checklist

      Use the audit to identify areas where processes are breaking down.

      Audits present you with the ability to address these pain points before they have greater negative impact.

      1. Identify which regulatory requirements and/or auditing bodies will be relevant to audit processes or findings.
      2. Determine frequency of practice audits and how they relate to internal audits or external audits.
      3. Determine audit scope, including requirements for data spot checks.
      4. Determine who will be responsible for conducting audits and validate this is consistent with the RACI chart.
      5. Record audit procedures in the Configuration Management Standard Operating Procedures section 8.6: Verify and Review the Quality of Information Through Auditing.
      6. Review the Configuration Management Audit and Validation Checklist and modify to suit your needs.

      Download the Configuration Management Audit and Validation Checklist

      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Phase 4

      Service Configuration Roadmap

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspect of a configuration management system:
      Roadmap
      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Harness Service Configuration Management Superpowers

      Step 4.1

      Define measures of success

      Activities

      4.1.1 Identify key metrics to define configuration management success
      4.1.2 Brainstorm and record desired reports, dashboards, and analytics
      4.1.3 Build a configuration management policy

      This phase will walk you through the following aspects of a configuration management system:

      • Metrics
      • Policy

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      The value of metrics can be found in IT efficiency increases

      When determining metrics for configuration management, be sure to separate metrics needed to gauge configuration management success and those that will use data from the CMDB to provide metrics on the success of other practices.

      • Metrics provide accurate indicators for IT and business decisions.
      • Metrics help you identify IT efficiencies and problems and solve issues before they become more serious.
      • Active metrics tracking makes root cause analysis of issues much easier.
      • Proper application of metrics helps IT services identification and prioritization.
      • Operational risks can be prevented by identifying and implementing metrics.
      • Metrics analysis increases the confidence of the executive team and ensures that IT is working well.

      A funnel is shown. The output is IT Performance. The inputs are: Service Desk Metrics; Incident Metrics; Asset Mgmt. Metrics; Release Mgmt. Metrics; Change Mgmt. Metrics; Infra. Metrics

      4.1.1 Identify key metrics to define configuration management success

      Determine what metrics are specifically related to the practice and how and when metrics will be accessed.

      Success factors

      Key metrics

      Source

      Product and service configuration data is relevant

      • Stakeholder satisfaction with data access, accuracy, and usability
      • Stakeholder satisfaction with service configuration management interface, procedures, and reports

      Stakeholder discussions

      • Number of bad decisions made due to incorrect or insufficient data
      • Impact of bad decisions made due to incorrect or insufficient data

      Process owner discussions

      • Number and impact of data identified as incorrect
      • % of CMDB data verified over the period

      CMDB

      Cost and effort are continually optimized

      • Effort devoted to service configuration management
      • Cost of tools directly related to the process

      Resource management or scheduling

      ERP

      Progress reporting

      • Communication execution
      • Process
      • Communications and feedback

      Communications team and stakeholder discussions

      Data – How many products are in the CMDB and are fully and accurately discovered and mapped?

      CMDB

      Ability to meet milestones on time and with appropriate quality

      Project team

      Document metrics in the Configuration Management Standard Operating Procedures, section 7: Success Metrics

      Use performance metrics to identify areas to improve service management processes using CMDB data

      Metrics can indicate a problem with service management processes but cannot provide a clear path to a solution on their own.

      • The biggest challenge is defining and measuring the process and people side of the equation.
      • Expected performance may also need to be compared to actual performance in planning, budgeting, and improvements.
      • The analysis will need to include critical success factors (CSFs), data collection procedures, office routines, engineering practices, and flow diagrams including workflows and key relationships.
      • External benchmarking may also prove useful in identifying how similar organizations are managing aspects of their infrastructure, processing transactions/requests, or staffing. If using external benchmarking for actual process comparisons, clearly defining your internal processes first will make the data collection process smoother and more informative.

      Info-Tech Insight

      Using a service framework such as ITIL, COBIT, or ISO 20000 may make this job easier, and subscribing to benchmarking partners will provide some of the external data needed for comparison.

      4.1.2 Brainstorm and record desired reports, dashboards, and analytics with related practices

      The project team will use this list as a starting point

      Allot 45 minutes for this discussion.

      1. Create a table for each service or business capability.
        1. Have one column for each way of consuming data: reports, dashboards, and ad hoc analytics.
        2. Have one row for each stakeholder group that will consume the information.
      2. Use the challenges and use cases to brainstorm reports, dashboards, and ad hoc analytic capabilities that each stakeholder group will find useful.
      3. Record these results in your Configuration Management Standard Operating Procedures, section 7: Aligned Processes' Desired Analytical Capabilities.
      Stakeholder Groups Reports Dashboards
      Change Management
      • CI changes executed without an RFC
      • RFCs grouped by service
      • Potential collisions in upcoming changes
      Security
      • Configuration changes that no longer match the baseline
      • New configuration items discovered
      Finance
      • Service-based costs
      • Service consumption by department

      Download the blueprint Take Control of Infrastructure and Operations Metrics to create a complete metrics program.

      Create a configuration management policy and communicate it

      Policies are important documents to provide definitive guidelines and clarity around data collection and use, process adherence, and controls.

      • A configuration management policy will apply to IT as the audience, and participants in the program will largely be technical.
      • Business users will benefit from a great configuration management program but will not participate directly.
      • The policy will include objectives and scope, use of data, security and integrity of data, data models and criteria, and baseline configurations.
      • Several governing regulations and practices may intersect with configuration management, such as ITIL, COBIT, and NIST frameworks, as well as change enablement, quality management, asset management, and more.
      • As the policy is written, review processes to ensure policies and processes are aligned. The policy should enable processes, and it may require modifications if it hinders the collection, security, or use of data required to meet proposed use cases.
      • Once the policy is written and approved, ensure all stakeholders understand the importance, context, and repercussions of the policy.

      The approvals process is about appropriate oversight of the drafted policies. For example:

      • Do the policies satisfy compliance and regulatory requirements?
      • Do the policies work with the corporate culture?
      • Do the policies address the underlying need?

      If the draft is approved:

      • Set the effective date and a review date.
      • Begin communication, training, and implementation.

      Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.

      Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.

      Employees must be informed on where to get help or ask questions and who to request policy exceptions from.

      If the draft is rejected:

      • Acquire feedback and make revisions.
      • Resubmit for approval.

      4.1.3 Build a configuration management policy

      This policy provides the foundation for configuration control.

      Use this template as a starting point.

      The Configuration Management Policy provides the foundation for a configuration control board and the use of configuration baselines.
      Instructions:

      1. Review and modify the policy statements. Ensure that the policy statements reflect your organization and the expectations you wish to set.
      2. If you don't have a CCB: The specified responsibilities can usually be assigned to either the configuration manager or the governing body for change enablement.
      3. Determine if you should apply this policy beyond SCM. As written, this policy may provide a good starting point for practices such as:
        • Secure baseline configuration management
        • Software configuration management

      Two screenshots from the Configuration Management Policy template

      Download the Configuration Management Policy template

      Step 4.2

      Build communications and a roadmap

      Activities

      4.2.1 Build a communications plan
      4.2.2 Identify milestones

      This phase will walk you through the following aspects of a configuration management system:

      • Communications plan
      • Roadmap

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Outcomes of this step

      • Documented expectations around configuration control
      • Roadmap and action items for the SCM project

      Do not discount the benefits of a great communications plan as part of change management

      Many configuration management projects have failed due to lack of organizational commitment and inadequate communications.

      • Start at the top to ensure stakeholder buy-in by verifying alignment and use cases. Without a committed project sponsor who believes in the value of configuration management, it will be difficult to draw the IT team into the vision.
      • Clearly articulate the vision, strategy, and goals to all stakeholders. Ensure the team understands why these changes are happening, why they are happening now, and what outcomes you hope to achieve.
      • Gain support from technical teams by clearly expressing organizational and departmental benefits – they need to know "what's in it for me."
      • Clearly communicate new responsibilities and obligations and put a feedback process in place to hear concerns, mitigate risk, and act on opportunities for improvement. Be prepared to answer questions as this practice is rolled out.
      • Be consistent in your messaging. Mixed messages can easily derail progress.
      • Communicate to the business how these efforts will benefit the organization.
      • Share documents built in this blueprint or workshop with your technical teams to ensure they have a clear picture of the entire configuration management practice.
      • Share your measures and view of success and communicate wins throughout building the practice.

      30%

      When people are truly invested in change, it is 30% more likely to stick.
      McKinsey

      82%

      of CEOs identify organizational change management as a priority.
      D&B Consulting

      6X

      Initiatives with excellent change management are six times more likely to meet objectives than those with poor change management.
      Prosci

      For a more detailed program, see Drive Technology Adoption

      Formulate a communications plan to ensure all stakeholders and impacted staff will be aware of the plan

      Communication is key to success in process adoption and in identifying potential risks and issues with integration with other processes. Engage as often as needed to get the information you need for the project and for adoption.

      Identify Messages

      Distinct information that needs to be sent at various times. Think about:

      • Who will be impacted and how.
      • What the goals are for the project/new process.
      • What the audience needs to know about the new process and how they will interface with each business unit.
      • How people can request configuration data.

      Identify Audiences

      Any person or group who will be the target of the communication. This may include:

      • Project sponsors and stakeholders.
      • IT staff who will be involved in the project.
      • IT staff who will be impacted by the project (i.e. who will benefit from it or have obligations to fulfill because of it).
      • Business sponsors and product owners.

      Document and Track

      Document messaging, medium, and responsibility, working with the communications team to refine messages before executing.

      • Identify where people can send questions and feedback to ensure they have the information they need to make or accept the changes.
      • Document Q&A and share in a central location.

      Determine Timing

      Successful communications plans consider timing of various messages:

      • Advanced high-level notice of improvements for those who need to see action.
      • Advanced detailed notice for those who will be impacted by workload.
      • Advanced notice for who will be impacted (i.e. who will benefit from it or have obligations to fulfill because of it) once the project is ready to be transitioned to daily life.

      Determine Delivery

      Work with your communications team, if you have one, to determine the best medium, such as:

      • Meeting announcement for stakeholders and IT.
      • Newsletter for those less impacted.
      • Intranet announcements: "coming soon!"
      • Demonstrations with vendors or project team.

      4.2.1 Build a communications plan

      The communications team will use this list as a starting point.

      Allot 45 minutes for this discussion.

      Identify stakeholders.

      1. Identify everyone who will be affected by the project and by configuration management.

      Craft key messages tailored to each stakeholder group.

      1. Identify the key messages that must be communicated to each group.

      Finalize the communication plan.

      1. Determine the most appropriate timing for communications with each group to maximize receptivity.
      2. Identify any communication challenges you anticipate and incorporate steps to address them into your communication plan.
      3. Identify multiple methods for getting the messages out (e.g. newsletters, emails, meetings).
      1. Identify how feedback will be collected (i.e. through interviews or surveys) to measure whether the changes were communicated well.
      Audience Message Medium Timing Feedback Mechanism
      Configuration Management Team Communicate all key processes, procedures, policies, roles, and responsibilities In-person meetings and email communications Weekly meetings Informal feedback during weekly meetings
      Input

      Output

      • Discussion
      • Rough draft of messaging for communications team
      MaterialsParticipants
      • Project plan
      • Configuration manager
      • Project sponsor
      • IT director
      • Communications team

      Build a realistic, high-level roadmap including milestones

      Break the work into manageable pieces

      1. Plan to have multiple phases with short-, medium-, and long-term goals/timeframes. Building a CMDB is not easy and should be broken into manageable sections.
      2. Set reasonable milestones. For each phase, document goals to define "done" and ensure they're reasonable for the resources you have available. If working with a vendor, include them in your discussions of what's realistic.
      3. Treat the first phase as a pilot. Focus on items you understand well:
        1. Well-understood user-facing and IT services
        2. High-maturity management and governance practices
        3. Trusted data sources
      4. Capture high-value, high-criticality services early. Depending on the complexity of your systems, you may need to split this phase into multiple phases.

      Document this table in the Configuration Management Project Charter, section 3.0: Milestones

      Timeline/Owner Milestone/Deliverable Details
      First four weeks Milestone: Plan defined and validated with ITSM installation vendor Define processes for intake, maintenance, and retirement.
      Rebecca Roberts Process documentation written, approved, and ready to communicate Review CI categories

      4.2.2 Identify milestones

      Build out a high-level view to inform the project plan

      Open the Configuration Management Project Charter, section 3: Milestones.
      Instructions:

      1. Identify high-level milestones for the implementation of the configuration management program. This may include tool evaluation and implementation, assignment of roles, etc.
      2. Add details to fill out the milestone, keeping to a reasonable level of detail. This may inform vendor discussion or further development of the project plan.
      3. Add target dates to the milestones. Validate they are realistic with the team.
      4. Add notes to the assumptions and constraints section.
      5. Identify risks to the plan.

      Two Screenshots from the Configuration Management Project Charter

      Download the Configuration Management Project Charter

      Workshop Participants

      R = Recommended
      O = Optional

      Participants Day 1 Day 2 Day 3 Day 4
      Configuration Management Strategy CMDB Data Structure Processes Communications & Roadmap
      Morning Afternoon Morning Afternoon Morning Afternoon Morning Afternoon
      Head of IT R O
      Project Sponsor R R O O O O O O
      Infrastructure, Enterprise Apps Leaders R R O O O O O O
      Service Manager R R O O O O O O
      Configuration Manager R R R R R R R R
      Project Manager R R R R R R R R
      Representatives From Network, Compute, Storage, Desktop R R R R R R R R
      Enterprise Architecture R R R R O O O O
      Owner of Change Management/Change Control/Change Enablement R R R R R R R R
      Owner of In-Scope Apps, Use Cases R R R R R R R R
      Asset Manager R R R R R R R R

      Related Info-Tech Research

      Research Contributors and Experts

      Thank you to everyone who contributed to this publication

      Brett Johnson, Senior Consultant, VMware

      Yev Khovrenkov, Senior Consultant, Solvera Solutions

      Larry Marks, Reviewer, ISACA New Jersey

      Darin Ohde, Director of Service Delivery, GreatAmerica Financial Services

      Jim Slick, President/CEO, Slick Cyber Systems

      Emily Walker, Sr. Digital Solution Consultant, ServiceNow

      Valence Howden, Principal Research Director, Info-Tech Research Group

      Allison Kinnaird, Practice Lead, IT Operations, Info-Tech Research Group

      Robert Dang, Principal Research Advisor, Security, Info-Tech Research Group

      Monica Braun, Research Director, IT Finance, Info-Tech Research Group

      Jennifer Perrier, Principal Research Director, IT Finance, Info-Tech Research Group

      Plus 13 anonymous contributors

      Bibliography

      An Introduction to Change Management, Prosci, Nov. 2019.
      BAI10 Manage Configuration Audit Program. ISACA, 2014.
      Bizo, Daniel, et al, "Uptime Institute Global Data Center Survey 2021." Uptime Institute, 1 Sept. 2021.
      Brown, Deborah. "Change Management: Some Statistics." D&B Consulting Inc. May 15, 2014. Accessed June 14, 2016.
      Cabinet Office. ITIL Service Transition. The Stationery Office, 2011.
      "COBIT 2019: Management and Governance Objectives. ISACA, 2018.
      "Configuration Management Assessment." CMStat, n.d. Accessed 5 Oct. 2022.
      "Configuration Management Database Foundation." DMTF, 2018. Accessed 1 Feb. 2021.
      Configuration Management Using COBIT 5. ISACA, 2013.
      "Configuring Service Manager." Product Documentation, Ivanti, 2021. Accessed 9 Feb. 2021.
      "Challenges of Implementing configuration management." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 1." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 2." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 3." CMStat, n.d. Accessed 5 Oct. 2022.
      "CSDM: The Recipe for Success." Data Content Manager, Qualdatrix Ltd. 2022. Web.
      Drogseth, Dennis, et al., 2015, CMDB Systems: Making Change Work in the Age of Cloud and Agile. Morgan Kaufman.
      Ewenstein, B, et al. "Changing Change Management." McKinsey & Company, 1 July 2015. Web.
      Farrell, Karen. "VIEWPOINT: Focus on CMDB Leadership." BMC Software, 1 May 2006. Web.
      "How to Eliminate the No. 1 Cause of Network Downtime." SolarWinds, 4 April 2014. Accessed 9 Feb. 2021.
      "ISO 10007:2017: Quality Management -- Guidelines for Configuration Management." International Organization for Standardization, 2019.
      "IT Operations Management." Product Documentation, ServiceNow, version Quebec, 2021. Accessed 9 Feb. 2021.
      Johnson, Elsbeth. "How to Communicate Clearly During Organizational Change." Harvard Business Review, 13 June 2017. Web.
      Kloeckner, K. et al. Transforming the IT Services Lifecycle with AI Technologies. Springer, 2018.
      Klosterboer, L. Implementing ITIL Configuration Management. IBM Press, 2008.
      Norfolk, D., and S. Lacy. Configuration Management: Expert Guidance for IT Service Managers and Practitioners. BCS Learning & Development Limited, revised ed., Jan. 2014.
      Painarkar, Mandaar. "Overview of the Common Data Model." BMC Documentation, 2015. Accessed 1 Feb. 2021.
      Powers, Larry, and Ketil Been. "The Value of Organizational Change Management." Boxley Group, 2014. Accessed June 14, 2016.
      "Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives." PMI, March 2014. Accessed June 14, 2016.
      "Service Configuration Management, ITIL 4 Practice Guide." AXELOS Global Best Practice, 2020
      "The Guide to Managing Configuration Drift." UpGuard, 2017.

      Don’t Allow Software Licensing to Derail Your M&A

      • Buy Link or Shortcode: {j2store}135|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Assuming that all parties are compliant in their licensing is a risky proposition. Most organizations are deficient in some manner of licensing. Know where those gaps are before finalizing M&A activity and have a plan in place to mitigate them right away.
      • Vendors will target companies that have undergone recent M&A activity with an audit. Vendors know that the many moving parts of M&A activity often result in license shortfall, and they may look to capitalize during the transition with audit revenue.
      • New organizational structure can offer new licensing opportunities. Take advantage of the increased volume discounting, negotiation leverage, and consolidation opportunities afforded by a merger or acquisition.

      Our Advice

      Critical Insight

      • To mitigate risks and create accurate cost estimates, create a contingency fund to compensate for unavailability of information.
      • Gathering and analyzing information is an iterative process that is ongoing throughout due diligence. Update your assumptions, risks, and budget as you obtain new information.
      • Communication with the M&A team and business process owners should be constant throughout due diligence. IT integration does not exist in isolation.

      Impact and Result

      • CIOs must be part of the conversation during the exploration/due diligence phase before the deal is closed to examine licensing compliance and software costs that could have a direct result on the valuation of the new organization.
      • Both organizations must conduct thorough due diligence (such as internal SAM audits), analyze the information, and define critical assumptions to create a strategy for the resultant IT enterprise.
      • The IT team is involved in integration, synergy realization, and cost considerations that the business often does not consider or take into account with respect to IT. License transfer, assignability, use, and geographic rights all come into play and can be overlooked.

      Don’t Allow Software Licensing to Derail Your M&A Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you shouldn’t allow software licensing to derail your M&A deal, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the M&A process with respect to software licensing

      Grasp the key pain points of software licensing and the effects it has on an M&A. Review the benefits of early IT involvement and identify IT’s capabilities.

      • Don’t Allow Software Licensing to Derail Your M&A – Phase 1: M&A Overview
      • M&A Software Asset Maturity Assessment

      2. Perform due diligence

      Understand the various steps and process when conducting due diligence. Request information and assess risks, make assumptions, and budget costs.

      • Don’t Allow Software Licensing to Derail Your M&A – Phase 2: Due Diligence
      • License Inventory
      • IT Due Diligence Report
      • M&A Software Asset RACI Template

      3. Prepare for integration

      Take a deeper dive into the application portfolios and vendor contracts of both organizations. Review integration strategies and design the end-state of the resultant organization.

      • Don’t Allow Software Licensing to Derail Your M&A – Phase 3: Pre-Integration Planning
      • Effective Licensing Position Tool
      • IT Integration Roadmap Tool

      4. Execute on the integration plan

      Review initiatives being undertaken to ensure successful integration execution. Discuss long-term goals and how to communicate with vendors to avoid licensing audits.

      • Don’t Allow Software Licensing to Derail Your M&A – Phase 4: Integration Execution
      [infographic]

      Workshop: Don’t Allow Software Licensing to Derail Your M&A

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 M&A Overview

      The Purpose

      Identify the goals and objectives the business has for the M&A.

      Understand cultural and organizational structure challenges and red flags.

      Identify SAM/licensing challenges and red flags.

      Conduct maturity assessment.

      Clarify stakeholder responsibilities.

      Build and structure the M&A team.

      Key Benefits Achieved

      The capabilities required to successfully examine software assets and licensing during the M&A transaction.

      M&A business goals and objectives identified.

      IT M&A team selected.

      Severity of SAM challenges and red flags examined.

      Activities

      1.1 Document pain points from previous experience.

      1.2 Identify IT opportunities during M&A.

      Outputs

      M&A Software Asset Maturity Assessment

      2 Due Diligence

      The Purpose

      Take a structured due diligence approach that properly evaluates the current state of the organization.

      Review M&A license inventory and use top five vendors as example sets.

      Identify data capture and reporting methods/tools.

      Scheduling challenges.

      Scope level of effort and priority list.

      Common M&A pressures (internal/external).

      Key Benefits Achieved

      A clear understanding of the steps that are involved in the due diligence process.

      Recognition of the various areas from which information will need to be collected.

      Licensing pitfalls and compliance risks to be examined.

      Knowledge of terms and conditions that will limit ability in pre-integration planning.

      Activities

      2.1 Identify IT capabilities for an M&A.

      2.2 Create your due diligence team and assign accountability.

      2.3 Use Info-Tech’s IT Due Diligence Report Template to track key elements.

      2.4 Document assumptions to back up cost estimates and risk.

      Outputs

      M&A Software Asset RACI Template

      IT Due Diligence Report

      3 Pre-Integration Planning

      The Purpose

      Review and map legal operating entity structure for the resultant organization.

      Examine impact on licensing scenarios for top five vendors.

      Identify alternative paths and solutions.

      Complete license impact for top five vendors.

      Brainstorm action plan to mitigate negative impacts.

      Discuss and explore the scalable process for second level agreements.

      Key Benefits Achieved

      Identification of the ideal post-M&A application portfolio and licensing structures.

      Recognition of the key considerations when determining the appropriate combination of IT integration strategies.

      Design of vendor contracts for the resultant enterprise.

      Recognition of how to create an IT integration budget.

      Activities

      3.1 Work with the senior management team to review how the new organization will operate.

      3.2 Document the strategic goals and objectives of IT’s integration program.

      3.3 Interview business leaders to understand how they envision their business units.

      3.4 Perform internal SAM audit.

      3.5 Create a library of all IT processes in the target organization as well as your own.

      3.6 Examine staff using two dimensions: competency and capacity.

      3.7 Design the end-state.

      3.8 Communicate your detailed pre-integration roadmap with senior leadership and obtain sign-off.

      Outputs

      IT Integration Roadmap Tool

      Effective License Position

      4 Manage Post-M&A Activities

      The Purpose

      Finalize path forward for top five vendors based on M&A license impact.

      Disclose findings and financial impact estimate to management.

      Determine methods for second level agreements to be managed.

      Provide listing of specific recommendations for top five list.

      Key Benefits Achieved

      Initiatives generated and executed upon to achieve the technology end-state of each IT domain.

      Vendor audits avoided.

      Contracts amended and vendors spoken to.

      Communication with management on achievable synergies and quick wins.

      Activities

      4.1 Identify initiatives necessary to realize the application end-state.

      4.2 Identify initiatives necessary to realize the end-state of IT processes.

      4.3 Identify initiatives necessary to realize the end-state of IT staffing.

      4.4 Prioritize initiatives based on ease of implementation and overall business impact.

      4.5 Manage vendor relations.

      Outputs

      IT Integration Roadmap Tool

      CIO Priorities 2022

      • Buy Link or Shortcode: {j2store}328|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $31,499 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Understand how to respond to trends affecting your organization.
      • Determine your priorities based on current state and relevant internal factors.
      • Assign the right amount of resources to accomplish your vision.
      • Consider what new challenges outside of your control will demand a response.

      Our Advice

      Critical Insight

      A priority is created when external factors hold strong synergy with internal goals and an organization responds by committing resources to either avert risk or seize opportunity. These are the priorities identified in the report:

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Impact and Result

      Update your strategic roadmap to include priorities that are critical and relevant for your organization based on a balance of external and internal factors.

      CIO Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. CIO Priorities 2022 – A report on the key priorities for competing in the digital economy.

      Discover Info-Tech’s five priorities for CIOs in 2022.

      • CIO Priorities Report for 2022

      2. Listen to the podcast series

      Hear directly from our contributing experts as they discuss their case studies with Brian Jackson.

      • Frictionless hybrid working: How the Harvard Business School did it
      • Close call with ransomware: A CIO recounts a near security nightmare
      • How a financial services company dodged "The Great Resignation"
      • How Allianz took a blockchain platform from pilot to 1 million transactions
      • CVS Health chairman David Dorman on healthcare's hybrid future

      Infographic

      Further reading

      CIO Priorities 2022

      A jumble of business-related words. Info-Tech’s 2022 Tech Trends survey asked CIOs for their top three priorities. Cluster analysis of their open-ended responses shows four key themes:
      1. Business process improvements
      2. Digital transformation or modernization
      3. Security
      4. Supporting revenue growth or recovery

      Info-Tech’s annual CIO priorities are formed from proprietary primary data and consultation with our internal experts with CIO stature

      2022 Tech Trends Survey CIO Demographic N=123

      Info-Tech’s Tech Trends 2022 survey was conducted between August and September 2021 and collected a total of 475 responses from IT decision makers, 123 of which were at the C-level. Fourteen countries and 16 industries are represented in the survey.

      2022 IT Talent Trends Survey CIO Demographic N=44

      Info-Tech’s IT Talent Trends 2022 survey was conducted between September and October 2021 and collected a total of 245 responses from IT decision makers, 44 of which were at the C-level. A broad range of countries from around the world are represented in the survey.

      Internal CIO Panels’ 125 Years Of Combined C-Level IT Experience

      Panels of former CIOs at Info-Tech focused on interpreting tech trends data and relating it to client experiences. Panels were conducted between November 2021 and January 2022.

      CEO-CIO Alignment Survey Benchmark Completed By 107 Different Organizations

      Info-Tech’s CEO-CIO Alignment program helps CIOs align with their supervisors by asking the right questions to ensure that IT stays on the right path. It determines how IT can best support the business’ top priorities and address the gaps in your strategy. In 2021, the benchmark was formed by 107 different organizations.

      Build IT alignment

      IT Management & Governance Diagnostic Benchmark Completed By 320 Different Organizations

      Info-Tech’s Management and Governance Diagnostic helps IT departments assess their strengths and weaknesses, prioritize their processes and build an improvement roadmap, and establish clear ownership of IT processes. In 2021, the benchmark was formed by data from 320 different organizations.

      Assess your IT processes

      The CIO priorities are informed by Info-Tech’s trends research reports and surveys

      Priority: “The fact or condition of being regarded or treated as more important than others.” (Lexico/Oxford)

      Trend: “A general direction in which something is developing or changing.” (Lexico/Oxford)

      A sequence of processes beginning with 'Sensing', 'Hypothesis', 'Validation', and ending with 'Trends, 'Priorities'. Under Sensing is Technology Research, Interviews & Insights, Gathering, and PESTLE. Under Hypothesis is Near-Future Probabilities, Identify Patterns, Identify Uncertainties, and Identify Human Benefits. Under Validation is Test Hypothesis, Case Studies, and Data-Driven Insights. Under Trends is Technology, Talent, and Industry. Under Priorities is CIO, Applications, Infrastructure, and Security.

      Visit Info-Tech’s Trends & Priorities Research Center

      Image called 'Defining the CIO Priorities for 2022'. Image shows 4 columns, Implications, Resource Investment, Amplifiers, and Actions and Outcomes, with 2 dotted lines, labeled External Context and Internal Context, running through all 4 columns and leading to bottom-right label called CIO Priorities Formed

      The Five Priorities

      Priorities to compete in the digital economy

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Reduce friction in the hybrid operating model

      Priority 01 | APO07 Human Resources Management

      Deliver solutions that create equity between remote workers and office workers and make collaboration a joy.

      Hybrid work is here to stay

      CIOs must deal with new pain points related to friction of collaboration

      In 2020, CIOs adapted to the pandemic’s disruption to offices by investing in capabilities to enable remote work. With restrictions on gathering in offices, even digital laggards had to shift to an all-remote work model for non-essential workers.

      Most popular technologies already invested in to facilitate better collaboration

      • 24% Web Conferencing
      • 23% Instant Messaging
      • 20% Document Collaboration

      In 2022, the focus shifts to solving problems created by the new hybrid operating model where some employees are in the office and some are working remotely. Without the ease of collaborating in a central hub, technology can play a role in reducing friction in several areas:

      • Foster more connections between employees. Remote workers are less likely to collaborate with people outside of their department and less likely to spontaneously collaborate with their peers. CIOs should provide a digital employee experience that fosters collaboration habits and keeps workers engaged.
      • Prevent employee attrition. With more workers reevaluating their careers and leaving their jobs, CIOs can help employees feel connected to the overall purpose of the organization. Finding a way to maintain culture in the new context will require new solutions. While conference room technology can be a bane to IT departments, making hybrid meetings effortless to facilitate will be more important.
      • Provide new standards for mediated collaboration. Meeting isn’t as easy as simply gathering around the same table anymore. CIOs need to provide structure around how hybrid meetings are conducted to create equity between all participants. Business continuity processes must also consider potential outages for collaboration services so employees can continue the work despite a major outage.

      Three in four organizations have a “hybrid” approach to work. (Tech Trends 2022 Survey)

      In most organizations, a hybrid model is being implemented. Only 14.9% of organizations are planning for almost everyone to return to the office, and only 9.9% for almost everyone to work remotely.

      Elizabeth Clark

      CIO, Harvard Business School

      "I want to create experiences that are sticky. That keep people coming back and engaging with their colleagues."

      Photo of Elizabeth Clark, CIO, Harvard Business School.

      Listen to the Tech Insights podcast:
      Frictionless hybrid working: How the Harvard Business School did it

      Internal interpretation: Harvard Business School

      • March 2020
        The pandemic disrupts in-class education at Harvard Business School. Their case study method of instruction that depends on in-person, high-quality student engagement is at risk. While students and faculty completed the winter semester remotely, the Dean and administration make the goal to restore the integrity of the classroom experience with equity for both remote and in-person students.
      • May 2020
        A cross-functional task force of about 100 people work intensively, conducting seven formal experiments, 80 smaller tests, and hundreds of polling data points, and a technology and facilities solution is designed: two 4K video cameras capturing both the faculty and the in-class students, new ceiling mics, three 85-inch TV screens, and students joining the videoconference from their laptops. A custom Zoom room, combining three separate rooms, integrated all the elements in one place and integrated with the lecture capture system and learning management system.
      • October 2020
        Sixteen classrooms are renovated to install the new solution. Students return to the classroom but in lower numbers due to limits on in-room capacity, but students rotate between the in-person and remote experience.
      • September 2021
        Renovations for the hybrid solution are complete in 26 classrooms and HBS has determined this will be its standard model for the classroom. The case method of teaching is kept alive and faculty and students are thrilled with the results.
      • November 2021
        HBS is adapting its solution for the classroom to its conference rooms and has built out eight different rooms for a hybrid experience. The 4K cameras and TV screens capture all participants in high fidelity as well as the blackboard.

      Photo of a renovated classroom with Zoom participants integrated with the in-person students.
      The renovated classrooms integrate all students, whether they are participating remotely or in person. (Image courtesy of Harvard Business School.)

      Implications: Organization, Process, Technology

      External

      • Organization – About half of IT practitioners in the Tech Trends 2022 survey feel that IT leaders, infrastructure and operations teams, and security teams were “very busy” in 2021. Capacity to adapt to hybrid work could be constrained by these factors.
      • Process – Organizations that want employees to benefit from being back in the office will have to rethink how workers can get more value out of in-person meetings that also require videoconference participation with remote workers.
      • Technology – Fifty-four percent of surveyed IT practitioners say the pandemic raised IT spending compared to the projections they made in 2020. Much of that investment went into adapting to a remote work environment.

      Internal

      • Organization – HBS added 30 people to its IT staff on term appointments to develop and implement its hybrid classroom solutions. Hires included instructional designers, support technicians, coordinators, and project managers.
      • Process – Only 25 students out of the full capacity of 95 could be in the classroom due to COVID-19 regulations. On-campus students rotated through the classroom seats. An app was created to post last-minute seat availability to keep the class full.
      • Technology – A Zoom room was created that combines three rooms to provide the full classroom experience: a view of the instructor, a clear view of each student that enlarges when they are speaking, and a view of the blackboard.

      Resources Applied

      Appetite for Technology

      CIOs and their direct supervisors both ranked internal collaboration tools as being a “critical need to adopt” in 2021, according to Info-Tech’s CEO-CIO Alignment Benchmark Report.

      Intent to Invest

      Ninety-seven percent of IT practitioners plan to invest in technology to facilitate better collaboration between employees in the office and outside the office by the end of 2022, according to Info-Tech’s 2022 Tech Trends survey.

      “We got so many nice compliments, which you don’t get in IT all the time. You get all the complaints, but it’s a rare case when people are enthusiastic about something that was delivered.” (Elizabeth Clark, CIO, Harvard Business School)

      Harvard Business School

      • IT staff were reassigned from other projects to prioritize building a hybrid classroom solution. A cloud migration and other portfolio projects were put on pause.
      • The annual capital A/V investment was doubled. The amount of spend on conference rooms was tripled.
      • Employees were hired to the media services team at a time when other areas of the organization were frozen.

      Outcomes at Harvard Business School

      The new normal at Harvard Business School

      New normal: HBS has found its new default operating model for the classroom and is extending its solution to its operating environment.

      Improved CX: The high-quality experience for students has helped avoid attrition despite the challenges of the pandemic.

      Engaged employees: The IT team is also engaged and feels connected to the mission of the school.

      Photo of a custom Zoom room bringing together multiple view of the classroom as well as all remote students.
      A custom Zoom room brings together multiple different views of the classroom into one single experience for remote students. (Image courtesy of Harvard Business School.)

      From Priorities to Action

      Make hybrid collaboration a joy

      Align with your organization’s goals for collaboration and customer interaction, with the target of high satisfaction for both customers and employees. Invest in capital projects to improve the fidelity of conference rooms, develop and test a new way of working, and increase IT capacity to alleviate pressure points.

      Foster both asynchronous and synchronous collaboration approaches to avoid calendars filling up with videoconference meetings to get things done and to accommodate workers contributing from across different time zones.

      “We’ll always have hybrid now. It’s opened people’s eyes and now we’re thinking about the future state. What new markets could we explore?” (Elizabeth Clark, CIO, Harvard Business School)

      Take the next step

      Run Better Meetings
      Hybrid, virtual, or in person – set meeting best practices that support your desired meeting norms.

      Prepare People Leaders for the Hybrid Work Environment
      Set hybrid work up for success by providing people leaders with the tools they need to lead within the new model.

      Hoteling and Hot-Desking: A Primer
      What you need to know regarding facilities, IT infrastructure, maintenance, security, and vendor solutions for desk hoteling and hot-desking.

      “Human Resources Management” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the Human Resources Management gap between importance and effectiveness. The difference is marked as Delta 2.3.

      Improve your ransomware readiness

      Priority 02 | APO13 Security Strategy

      Mitigate the damage of successful ransomware intrusions and make recovery as painless as possible.

      The ransomware crisis threatens every organization

      Prevention alone won’t be enough against the forces behind ransomware.

      Cybersecurity is always top of mind for CIOs but tends to be deprioritized due to other demands related to digital transformation or due to cost pressures. That’s the case when we examine our data for this report.

      Cybersecurity ranked as the fourth-most important priority by CIOs in Info-Tech’s 2022 Tech Trends survey, behind business process improvement, digital transformation, and modernization. Popular ways to prepare for a successful attack include creating offline backups, purchasing insurance, and deploying new solutions to eradicate ransomware.

      CIOs and their direct supervisors ranked “Manage IT-Related Security” as the third-most important top IT priority on Info-Tech’s CEO-CIO Alignment Benchmark for 2021, in support of business goals to manage risk, comply with external regulation, and ensure service continuity.

      Most popular ways for organizations to prepare for the event of a successful ransomware attack:

      • 25% Created offline backups
      • 18% Purchased cyberinsurance
      • 19% New tech to eradicate ransomware

      Whatever priority an organization places on cybersecurity, when ransomware strikes, it quickly becomes a red alert scenario that disrupts normal operations and requires all hands on deck to respond. Sophisticated attacks executed at wide scale demonstrate that security can be bypassed without creating an alert. After that’s accomplished, the perpetrators build their leverage by exfiltrating data and encrypting critical systems.

      CIOs can plan to mitigate ransomware attacks in several constructive ways:

      • Business impact analysis. Determine the costs of an outage for specific periods and the system and data recovery points in time.
      • Engage a partner for 24/7 monitoring. Gain real-time awareness of your critical systems.
      • Review your identity access management (IAM) policies. Use of multi-factor authentication and limiting access to only the roles that need it reduces ransomware risk.

      50% of all organizations spent time and money specifically to prevent ransomware in the past year. (Info-Tech Tech Trends 2022 Survey)

      John Doe

      CIO, mid-sized manufacturing firm in the US

      "I want to create experiences that are sticky. That keep people coming back and engaging with their colleagues."

      Blank photo.

      Listen to the Tech Insights podcast:
      Close call with ransomware: a CIO recounts a near security nightmare

      Internal interpretation: US-based, mid-sized manufacturing firm

      • May 1, 2021
        A mid-sized manufacturing firm (“The Firm”) CIO gets a call from his head of security about odd things happening on the network. A call is made to Microsoft for support. Later that night, the report is that an unwanted crypto-mining application is the culprit. But a couple of hours later, that assessment is proven wrong when it’s realized that hundreds of systems are staged for a ransomware attack. All the attacker has to do is push the button.
      • May 2, 2021
        The Firm disconnects all its global sites to cut off new pathways for the malware to infect. All normal operations cease for 24 hours. It launches its cybersecurity insurance process. The CIO engages a new security vendor, CrowdStrike, to help respond. Employees begin working from home if they can so they can make use of their own internet service. The Firm has cut off its public internet connectivity and is severed from cloud services such as Azure storage and collaboration software.
      • May 4, 2021
        The hackers behind the attack are revealed by security forensics experts. A state-sponsored agency in Russia set up the ransomware and left it ready to execute. It sold the staged attack to a cybercriminal group, Doppel Spider. According to CrowdStrike, the group uses malware to run “big game hunting operations” and targets 18 different countries including the US and multiple industries, including manufacturing.
      • May 10, 2021
        The Firm has totally recovered from the ransomware incident and avoided any serious breach or paying a ransom. The CIO worked more hours than at any other point in his career, logging an estimated 130 hours over the two weeks.
      • November 2021
        The Firm never previously considered itself a ransomware target but has now reevaluated that stance. It has hired a service provider to run a security operations center on a 24/7 basis. It's implemented a more sophisticated detection and response model and implemented multi-factor authentication. It’s doubled its security spend in 2021 and will invest more in 2022.

      “Now we take the approach that if someone does get in, we're going to find them out.” (John Doe, CIO, “The Firm”)

      Implications: Organization, Process, Technology

      External

      • Organization – Organizations must consider how their employees play a role in preventing ransomware and plan for training to recognize phishing and other common traps. They must make plans for employees to continue their work if systems are disrupted by ransomware.
      • Process – Backup processes across multiple systems should be harmonized to have both recent and common points to recover from. Work with the understanding IT will have to take systems offline if ransomware is discovered and there is no time to ask for permission.
      • Technology – Organizations can benefit from security services provided by a forensics-focused vendor. Putting cybersecurity insurance in place not only provides financial protection but also guidance in what to do and which vendors to work with to prevent and recover from ransomware.

      Internal

      • Organization – The Firm was prepared with a business continuity plan to allow many of its employees to work remotely, which was necessary because the office network was incapacitated for ten days during recovery.
      • Process – Executives didn’t seek to assign blame for the security incident but took it as a signal there were some new costs involved to stay in business. It initiated new outsource relationships and hired one more full-time employee to shore up security resources.
      • Technology – New ransomware eradication software was deployed to 2,000 computers. Scripted processes automated much of the work, but in some cases full system rebuilds were required. Backup systems were disconnected from the network as soon as the malware was discovered.

      Resources Applied

      Consider the Alternative

      Organizations should consider how much a ransomware attack on critical systems would cost them if they were down for a minimum of 24-48 hours. Plan to invest an amount at least equal to the costs of that downtime.

      Ask for ID

      Implementing across-the-board multi-factor authentication reduces chances of infection and is cheap, with enterprise solutions ranging from $2 to $5 per user on average. Be strict and deny access when connections don’t authenticate.

      “You'll never stop everything from getting into the network. You can still focus on stopping the bad actors, but then if they do make it in, make sure they don't get far.” (John Doe, CIO, “The Firm”)

      “The Firm” (Mid-Sized Manufacturer)

      • During the crisis, The Firm paused all activities and focused solely on isolating and eliminating the ransomware threat.
      • New outsourcing relationship with a vendor provides a 24/7 Security Operations Center.
      • One more full-time employee on the security team.
      • Doubled investment in security in 2021 and will spend more in 2022.

      Outcomes at “The Firm” (Mid-Sized Manufacturer)

      The new cost of doing business

      Real-time security: While The Firm is still investing in prevention-based security, it is also developing its real-time detection and response capabilities. When ransomware makes it through the cracks, it wants to know as soon as possible and stop it.

      Leadership commitment: The C-suite is taking the experience as a wake-up call that more investment is required in today’s threat landscape. The Firm rates security more highly as an overall organizational goal, not just something for IT to worry about.

      Stock photo of someone using their phone while sitting at a computer, implying multi-factor authentication.
      The Firm now uses multi-factor authentication as part of its employee sign-on process. For employees, authenticating is commonly achieved by using a mobile app that receives a secret code from the issuer.

      From Priorities to Action

      Cybersecurity is everyone’s responsibility

      In Info-Tech’s CEO-CIO Alignment Benchmark for 2021, the business goal of “Manage Risk” was the single biggest point of disagreement between CIOs and their direct supervisors. CIOs rank it as the second-most important business goal, while CEOs rank it as sixth-most important.

      Organizations should align on managing risk as a top priority given the severity of the ransomware threat. The threat actors and nature of the attacks are such that top leadership must prepare for when ransomware hits. This includes halting operations quickly to contain damage, engaging third-party security forensics experts, and coordinating with government regulators.

      Cybersecurity strategies may be challenged to be effective without creating some friction for users. Organizations should look beyond multi-layer prevention strategies and lean toward quick detection and response, spending evenly across prevention, detection, and response solutions.

      Take the next step

      Create a Ransomware Incident Response Plan
      Don’t be the next headline. Determine your current readiness, response plan, and projects to close gaps.

      Simplify Identity and Access Management
      Select and implement IAM and produce vendor RFPs that will contain the capabilities you need, including multi-factor authentication.

      Cybersecurity Series Featuring Sandy Silk
      More from Info-Tech’s Senior Workshop Director Sandy Silk in this video series created while she was still at Harvard University.

      Gap between CIOs and CEOs in points allocated to “Manage risk” as a top business goal

      A bar chart illustrating the gap between CIOs and CEOs in points allocated to 'Manage risk' as a top business goal. The difference is marked as Delta 1.5.

      Support an employee-centric retention strategy

      Priority 03 | ITRG02 Leadership, Culture & Values

      Avoid being a victim of “The Great Resignation” by putting employees at the center of an experience that will engage them with clear career path development, purposeful work, and transparent feedback.

      Defining an employee-first culture that improves retention

      The Great resignation isn’t good for firms

      In 2021, many workers decided to leave their jobs. Working contexts were disrupted by the pandemic and that saw non-essential workers sent home to work, while essential workers were asked to continue to come into work despite the risks of COVID-19. These disruptions may have contributed to many workers reevaluating their professional goals and weighing their values differently. At the same time, 2021 saw a surging economy and many new job opportunities to create a talent-hungry market. Many workers could have been motivated to take a new opportunity to increase their salary or receive other benefits such as more flexibility.

      Annual turnover rate for all us employees on the rise

      • 20% – Jan.-Aug. 2020, Dipped from 22% in 2019
      • 25% Jan.-Aug. 2021, New record high
      • Data from Visier Inc.

      When you can’t pay them, develop them

      IT may be less affected than other departments by this trend. Info-Tech’s 2022 IT Talent Trends Report shows that on average, estimated turnover rate in IT is lower than the rest of the organization. Almost half of respondents estimated their organization’s voluntary turnover rate was 10% or higher. Only 30% of respondents estimate that IT’s voluntary turnover rate is in the same range. However, CIOs working in industries with the highest turnover rates will have to work to keep their workers engaged and satisfied, as IT skills are easily transferred to other industries.

      49% ranked “enabling learning & development within IT” as high priority, more than any other single challenge. (IT Talent Trends 2022 Survey, N=227)

      A bar chart of 'Industries with highest turnover rates (%)' with 'Leisure and Hospitality' at 6.4%, 'Trade, Transportation & Utilities' at 3.6%, 'Professional and Business' at 3.3%, and 'Other Services' at 3.1%. U.S. Bureau of Labor Statistics, 2022.

      Jeff Previte

      Executive Vice-President of IT, CrossCountry Mortgage

      “We have to get to know the individual at a personal level … Not just talking about the business, but getting to know the person."

      Photo of Jeff Previte, Executive Vice-President of IT, CrossCountry Mortgage.

      Listen to the Tech Insights podcast:
      How a financial services company dodged ‘The Great Resignation’

      Internal interpretation: CrossCountry Mortgage

      • May 2019
        Jeff Previte joins Cleveland, Ohio-based CrossCountry Mortgage in the CIO role. The company faces a challenge with employee turnover, particularly in IT. The firm is a sales-focused organization and saw its turnover rate reach as high as 60%. Yet Previte recognized that IT had some meaningful goals to achieve and would need to attract – and retain – some higher caliber talent. His first objective in his new role was to meet with IT employees and business leadership to set priorities.
      • July 2019
        Previte takes a “people-first” approach to leadership and meets his staff face-to-face to understand their personal situations. He sets to work on defining roles and responsibilities in the organization, spending about a fifth of his time on defining the strategy.
      • June 2020
        Previte assigned his leadership team to McLean & Company’s Design an Impactful Employee Development Program. From there, the team developed a Salesforce tool called the Career Development Workbook. “We had some very passionate developers and admins that wanted to build a home-grown tool,” he says. It turns McLean & Company’s process into a digital tool employees can use to reflect on their careers and explore their next steps. It helps facilitate development conversations with managers.
      • January 2021
        CrossCountry Mortgage changes its approach to career development activities. Going to external conferences and training courses is reduced to just 30% of that effort. The rest is by doing hands-on work at the company. Previte aligned with his executives and road-mapped IT projects annually. Based on employee’s interests, opportunities are found to carve out time from usual day-to-day activities to spend time on a project in a new area. When there’s a business need, someone internally can be ready to transition roles.
      • June 2021
        In the two years since joining the company, Previte has reduced the turnover rate to just 12%. The IT department has grown to more adequately meet the needs of the business and employees are engaged with more opportunities to develop their careers. Instead of focusing on compensation, Previte focused more on engaging employees with a developmentally dedicated environment and continuous hands-on learning.

      “It’s come down to a culture shift. Folks have an idea of where we’re headed as an organization, where we’re headed as an IT team, and how their role contributes to that.” (Jeff Previte, EVP of IT, CrossCountry Mortgage)

      Implications: Organization, Process, Technology

      External

      • Organization – A high priority is being placed on improving IT’s maturity through its talent. Enabling learning and development in IT, enabling departmental innovation, and recruiting are the top three highest priorities according to IT Talent Trends 2022 survey responses.
      • Process – Recruiting is more challenging for industries that operate primarily onsite, according to McLean & Company's 2022 HR Trends Report. They face more challenges attracting applications, more rejected offers, and more candidate ghosting compared to remote-capable industries.
      • Technology – Providing a great employee experience through digital tools is more important as many organizations see a mix of workers in the office and at home. These tools can help connect colleagues, foster professional development, and improve the candidate experience.

      Internal

      • Organization – CrossCountry Mortgage faced a situation where IT employees did not have clarity on their roles and responsibilities. In terms of salary, it wasn’t offering at the high end compared to other employers in Cleveland.
      • Process – To foster a culture of growth and development, CrossCountry Mortgage put in place a performance assessment system that encouraged reflection and goal setting, aided by collaboration with a manager.
      • Technology – The high turnover rate was limiting CrossCountry Mortgage from achieving the level of maturity it needed to support the company’s goals. It ingrained its new PA process with a custom build of a Salesforce tool.

      Resources Applied

      Show me the money

      Almost six in ten Talent Trends survey respondents identified salary and compensation as the reason that employees resigned in the past year. Organizations looking to engage employees must first pay a fair salary according to market and industry conditions.

      Build me up

      Professional development and opportunity for innovative work are the next two most common reasons for resignations. Organizations must ensure they create enough capacity to allow workers time to spend on development.

      “Building our own solution created an element of engagement. There was a sense of ownership that the team had in thinking through this.” (Jeff Previte, CrossCountry Mortgage)

      CrossCountry Mortgage

      • Executive time: CIO spends 10-20% of his time on activities related to designing the approach.
      • Leveraged memberships with Info-Tech Research Group and McLean & Company to define professional development process.
      • Internal IT develops automated workflow in Salesforce.
      • Hired additional IT staff to build out overall capacity and create time for development activities.

      Outcomes at CrossCountry Mortgage

      Engaged IT workforce

      The Great Maturation: IT staff turnover rate dropped to 10-12% and IT talent is developing on the job to improve the department’s overall skill level. More IT staff on hand and more engaged workers mean IT can deliver higher maturity level results.

      Alignment achieved: Connecting IT’s initiatives to the vision of the C-suite creates a clear purpose for IT in its initiatives. Staff understand what they need to achieve to progress their careers and can grow while they work.

      Photo of employees from CrossCountry Mortgage assisting with a distribution event.
      Employees from CrossCountry Mortgage headquarters assist with a drive-thru distribution event for the Cleveland Food Bank on Dec. 17, 2021. (Image courtesy of CrossCountry Mortgage.)

      From Priorities to Action

      Staff retention is a leadership priority

      The Great Resignation trend is bringing attention to employee engagement and staff retention. IT departments are busier than ever during the pandemic as they work overtime to keep up with a remote workforce and new security threats. At the same time, IT talent is among the most coveted on the market.

      CIOs need to develop a people-first approach to improve the employee experience. Beyond compensation, IT workers need clarity in terms of their career paths, a direct connection between their work and the goals of the organization, and time set aside for professional development.

      Info-Tech’s 2021 benchmark for “Leadership, Culture & Values” shows that most organizations rate this capability very highly (9) but see room to improve on their effectiveness (6.9).

      Take the next step

      IT Talent Trends 2022
      See how IT talent trends are shifting through the pandemic and understand how themes like The Great Resignation has impacted IT.

      McLean & Company’s Modernize Performance Management
      Customize the building blocks of performance management to best fit organizational needs to impact individual and organizational performance, productivity, and engagement.

      Redesign Your IT Organizational Structure
      Define future-state work units, roles, and responsibilities that will enable the IT organization to complete the work that needs to be done.

      “Leadership, Culture & Values” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'Leadership, Culture & Values' gap between importance and effectiveness. The difference is marked as Delta 2.1.

      Design an automation platform

      Priority 04 | APO04 Innovation

      Position yourself to buy or build a platform that will enable new automation opportunities through seamless integration.

      Build it or buy it, but platform integration can yield great benefits

      Necessity is the mother of innovation

      When it’s said that digital transformation accelerated during the pandemic, what’s really meant is that processes that were formerly done manually became automated through software. In responses to the Tech Trends survey, CIOs say digital transformation was more of a focus during the pandemic, and eight in ten CIOs also say they shifted more than 20% of their organization’s processes to digital during the pandemic. Automating tasks through software can be called digitalization.

      Most organizations became more digitalized during the pandemic. But how they pursued it depends on their IT maturity. For digital laggards, partnering with a technology services platform is the path of least resistance. For sophisticated innovators, they can consider building a platform to address the specific needs of their business process. Doing so requires the foundation of an existing “digital factory” or innovation arm where new technologies can be tested, proofs of concept developed, and external partnerships formed. Patience is key with these efforts, as not every investment will yield immediate returns and some will fail outright.

      Build it or buy it, platform participants integrate with their existing systems through application programming interfaces (APIs). Organizations should determine their platform strategies based on maturity, then look to integrate the business processes that will yield the most gains.

      What role should you play in the platform ecosystem?

      A table with levels on the maturity ladder laid out as a sprint. Column headers are maturity levels 'Struggle', 'Support', 'Optimize', 'Expand', and 'Transform', row headers are 'Maturity' and 'Role'. Roles are assigned to one or many levels. 'Improve' is solely under Struggle. 'Integrate' spans from Support to Transform. 'Buy' spans Support to Expand. 'Build' begins midway through Expand and all of Transform. 'Partner' spans from Optimize to halfway through Transform.

      68% of CIOs say digital transformation became much more of a focus for their organization during the pandemic (Info-Tech Tech Trends 2022 Survey)

      Bob Crozier

      Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE

      "Smart contracts are really just workflows between counterparties."

      Photo of Bob Crozier, Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE.

      Listen to the Tech Insights podcast:
      How Allianz took a blockchain platform from pilot to 1 million transactions

      Internal interpretation: Allianz Technology

      • 2015
        After smart contracts are demonstrated on the Ethereum blockchain, Allianz and other insurers recognize the business value. There is potential to use the capability to administer a complex, multi-party contract where the presence of the reinsurer in the risk transfer ecosystem is required. Manual contracts could be turned into code and automated. Allianz organized an early proof of concept around a theoretical pandemic excessive loss contract.
      • 2018
        Allianz Chief Architect Bob Crozier is leading the Global Blockchain Center of Competence for Allianz. They educate Allianz on the value of blockchain for business. They also partner with a joint venture between the Technology University of Munich and the state of Bavaria. A cohort of Masters students is looking for real business problems to solve with open-source distributed ledger technology. Allianz puts its problem statement in front of the group. A student team presents a proof of concept for an international motor insurance claims settlement and it comes in second place at a pitch day competition.
      • 2019
        Allianz brings the concept back in-house, and its business leaders return to the concept. Startup Luther Systems is engaged to build a minimum-viable product for the solution, with the goal being a pilot involving three or four subsidiaries in different countries. The Blockchain Center begins communicating with 25 Allianz subsidiaries that will eventually deploy the platform.
      • 2020
        Allianz is in build mode on its international motor insurance claims platform. It leverages its internal Dev/SecOps teams based in Munich and in India.
      • May 2021
        Allianz goes live with its new platform on May 17, decommissioning its old system and migrating all live claims data onto the new blockchain platform. It sees 400 concurrent users go live across Europe.
      • January 2022
        Allianz mines its one-millionth block to its ledger on Jan. 19, with each block representing a peer-to-peer transaction across its 25 subsidiaries in different countries. The platform has settled hundreds of millions of dollars.

      Stock photo of two people arguing over a car crash.

      Implications: Organization, Process, Technology

      External

      • Organization – To explore emerging technologies like blockchain, organizations need staff that are accountable for innovation and have leeway to develop proofs of concept. External partners are often required to bring in fresh ideas and move quickly towards an MVP.
      • Process – According to the Tech Trends 2022 survey, 84% of CIOs consider automation a high-value digital capability, and 77% say identity verification is a high-value capability. A blockchain platform using smart contracts can deliver those.
      • Technology – The Linux Foundation’s Hyperledger Fabric is an open-source blockchain technology that’s become popular in the financial industry for its method of forming consensus and its modular architecture. It’s been adopted by USAA, MasterCard, and PayPal. It also underpins the IBM Blockchain Platform and is supported by Azure Blockchain.

      Internal

      • Organization – Allianz is a holding company that owns Allianz Technology and 25 operating entities across Europe. It uses the technology arm to innovate on the business process and creates shared platforms that its entities can integrate with to automate across the value chain.
      • Process – Initial interest in smart contracts on blockchain were funneled into a student competition, where a proof of concept was developed. Allianz partnered with a startup to develop an MVP, then developed the platform while aligning with its business units ahead of launch.
      • Technology – Allianz built its blockchain platform on Hyperledger Fabric because it was a permissioned system, unlike other public permissionless blockchains such as Ethereum, and because its mining mechanism was much more energy efficient compared to other blockchains using Proof of Work consensus models.

      Resources Applied

      Time to innovate

      Exploring emerging technology for potential use cases is difficult for staff tasked with running day-to-day operations. Organizations serious about innovation create a separate team that can focus on “moonshot” projects and connect with external partners.

      Long-term ROI

      Automation of new business processes often requires a high upfront initial investment for a long-term efficiency gain. A proof of concept should demonstrate clear business value that can be repeated often and for a long period.

      “My next project has to deliver in the tens of millions of value in return. The bar is high and that’s what it should be for a business of our size.” (Bob Crozier, Allianz)

      Allianz

      • Several operating entities from different countries supplied subject matter expertise and helped with the testing process.
      • Allianz Technology team has eight staff members. It is augmented by Luther Systems and the team at industry group B3i.
      • Funding of less than $5 million to develop. Dev team continues to add improvements.
      • Operating requires just one full-time employee plus infrastructure costs, mostly for public cloud hosting.

      Outcomes at Allianz

      From insurer to platform provider

      Deliver your own SaaS: Allianz Technology built its blockchain-based claims settlement platform and its subsidiaries consume it as software as a service. The platform runs on a distributed architecture across Europe, with each node running the same version of the software. Operating entities can also integrate their own systems to the platform via APIs and further automate business processes such as billing.

      Ready to scale: After processing one million transactions, the international claims settlement platform is proven and ready to add more participants. Crozier sees auto repair shops and auto manufacturers as the next logical users.

      Stock photo of Blockchain.
      Allianz is a shareholder of the Blockchain Insurance Industry Initiative (B3i). It is providing a platform used by a group of insurance companies in the commercial and reinsurance space.

      When should we use blockchain? THREE key criteria:

      • Redundant processes
        Different entities follow the same process to achieve the desired outcome.
      • Audit trail
        Accountability in the decision making must be documented.
      • Reconciliation
        Parties need to be able to resolve disputes by tracing back to the truth.

      From Priorities to Action

      It’s a build vs. buy question for platforms

      Allianz was able to build a platform for its group of European subsidiaries because of its established digital factory and commitment to innovation. Allianz Technology is at the “innovate” level of IT maturity, allowing it to create a platform that subsidiaries can integrate with via APIs. For firms that are lower on the IT maturity scale, buying a platform solution is the better path to automation. These firms will be concerned with integrating their legacy systems to platforms that can reduce the friction of their operating environments and introduce modern new capabilities.

      From Info-Tech’s Build a Winning Business Process Automation Playbook

      An infographic comparing pros and cons of Build versus Buy. On the 'Build: High Delivery Capacity & Capability' side is 'Custom Development', 'Data Integration', 'AI/ML', 'Configuration', 'Native Workflow', and 'Low & No Code'. On the 'Buy: Low Delivery Capacity & Capability' side is 'Outsource Development', 'iPaaS', 'Chatbots', 'iBPMS & Rules Engines', 'RPA', and 'Point Solutions'.

      Take the next step

      Accelerate Your Automation Processes
      Integrate automation solutions and take the first steps to building an automation suite.

      Build Effective Enterprise Integration on the Back of Business Process
      From the backend to the frontlines – let enterprise integration help your business processes fly.

      Evolve Your Business Through Innovation
      Innovation teams are tasked with the responsibility of ensuring that their organizations are in the best position to succeed while the world is in a period of turmoil, chaos, and uncertainty.

      “Innovation” gap between importance and effectiveness Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'Innovation' gap between importance and effectiveness. The difference is marked as Delta 2.1.

      Prepare to report on new environmental, social, and governance (ESG) metrics

      Priority 05 | ITRG06 Business Intelligence and Reporting

      Be ready to either lead or support initiatives to meet the criteria of new ESG reporting mandates and work toward disclosure reporting solutions.

      Time to get serious about ESG

      What does CSR or ESG mean to a CIO?

      Humans are putting increasing pressure on the planet’s natural environment and creating catastrophic risks as a result. Efforts to mitigate these risks have been underway for the past 30 years, but in the decade ahead regulators are likely to impose more strict requirements that will be linked to the financial value of an organization. Various voluntary frameworks exist for reporting on environmental, social, and governance (ESG) or corporate social responsibility (CSR) metrics. But now there are efforts underway to unify and clarify those standards.

      The most advanced effort toward a global set of standards is in the environmental area. At the United Nations’ COP26 summit in Scotland last November, the International Sustainability Standards Board (ISSB) announced its headquarters (Frankfurt) and three other international office locations (Montreal, San Francisco, and London) and its roadmap for public consultations. It is working with an array of voluntary standards groups toward a consensus.

      In Info-Tech’s 2022 Tech Trends survey, two-thirds of CIOs say their organization is committed to reducing greenhouse gas emissions, yet only 40% say their organizational leadership is very concerned with reducing those emissions. CIOs will need to consider how to align organizational concern with internal commitments and new regulatory pressures. They may investigate new real-time reporting solutions that could serve as a competitive differentiator on ESG.

      Standards informing the ISSB’s global set of climate standards

      A row of logos of organizations that inform ISSB's global set of climate standards.

      67% of CIOs say their organization is committed to reducing greenhouse gases, with one-third saying that commitment is public. (Info-Tech Tech Trends 2022 Survey)

      40% of CIOs say their organizational leadership is very concerned with reducing greenhouse gas emissions.

      David W. Dorman

      Chairman of the board, CVS Health

      “ESG is a question of what you do in the microcosm of your company to make sure there is a clear, level playing field – that there is a color-blind, gender-blind meritocracy available – that you are aware that not in every case can you achieve that without really focusing on it. It’s not going to happen on its own. That’s why our commitments have real dollars behind them and real focus behind them because we want to be the very best at doing them.”

      Photo of David W. Dorman, Chairman of the Board, CVS Health.

      Listen to the Tech Insights podcast:
      CVS Health chairman David Dorman on healthcare's hybrid future

      Internal interpretation: CVS Health

      CVS Health established a new steering committee of senior leaders in 2020 to oversee ESG commitments. It designs its corporate social responsibility strategy, Transform Health 2030, by aligning company activities in four key areas: healthy people, healthy business, healthy planet, and healthy community. The strategy aligns with the United Nations’ Sustainable Development Goals. In alignment with these goals, CVS identifies material topics where the company has the most ability to make an impact. In 2020, its top three topics were:

      1. Access to quality health care
      2. Patient and customer safety
      3. Data protection and privacy
      Material Topic
      Access to quality health care
      Material Topic
      Patient and customer safety
      Material Topic
      Data protection and privacy
      Technology Initiative
      MinuteClinic’s Virtual Collaboration for Nurses

      CVS provided Apple iPads compliant with the Health Insurance Portability and Accountability Act (HIPAA) to clinics in a phased approach, providing training to more than 700 providers in 26 states by February 2021. Nurses could use the iPads to attend virtual morning huddles and access clinical education. Nurses could connect virtually with other healthcare experts to collaborate on delivering patient care in real-time. The project was able to scale across the country through a $50,000 American Nurses Credentialing Center Pathway Award. (Wolters Kluwer Health, Inc.)

      Technology Initiative
      MinuteClinic’s E-Clinic

      MinuteClinics launched this telehealth solution in response to the pandemic, rolling it out in three weeks. The solution complemented video visits delivered in partnership with the Teladoc platform. Visits cost $59 and are covered by Aetna insurance plans, a subsidiary of CVS Health. It hosted more than 20,000 E-Clinic visits through the end of 2020. CVS connected its HealthHUBs to the solution to increase capacity in place of walk-in appointments and managed patients via phone for medication adherence and care plans. CVS also helped behavioral health providers transition patients to virtual visits. (CVS Health)

      Technology Initiative
      Next Generation Authentication Platform

      CVS patented this solution to authenticate customers accessing digital channels. It makes use of the available biometrics data and contextual information to validate identity without the need for a password. CVS planned to extend the platform to voice channels as well, using voiceprint technology. The solution prevents unauthorized access to sensitive health data while providing seamless access for customers. (LinkedIn)

      Implications: Organization, Process, Technology

      External

      • Organization – Since the mid-2010s, younger investors have demonstrated reliance on ESG data when making investment decisions, resulting in the creation of voluntary standards that offered varied approaches. Organizations in ESG exchange-traded funds are outperforming the overall S&P 500 (S&P Global Market Intelligence).
      • Process – Organizations are issuing ESG reports today despite the absence of clear rules to follow for reporting results. With regulators expected to step in to establish more rigid guidelines, many organizations will need to revisit their approach to ESG reports.
      • Technology – Real-time reporting of ESG metrics will become a competitive advantage before 2030. Engineering a solution that can alert organizations to poor performance on ESG measures and allow them to respond could avert losing market value.

      Internal

      • Organization – CVS Health established an ESG Steering Committee in 2020 composed of senior leaders including its chief governance officers, chief sustainability officer, chief risk officer, and controller and SVP of investor relations. It is supported by the ESG Operating Committee.
      • Process – CVS conducts a materiality assessment in accordance with Global Reporting Initiative standards to determine the most significant ESG impacts it can make and what topics most influence the decisions of stakeholders. It engages with various stakeholder groups on CSR topics.
      • Technology – CVS technology initiatives during the pandemic focused on supporting patients and employees in collaborating on health care delivery using virtual solutions, providing rich digital experiences that are easily accessible while upholding high security and privacy standards.

      Resources Applied

      Lack of commitment

      While 83% of businesses state support for the Sustainable Development Goals outlined by the Global Reporting Initiative (GRI), only 40% make measurable commitments to their goals.

      Show your work

      The GRI recommends organizations not only align their activities with sustainable development goals but also demonstrate contributions to specific targets in reporting on the positive actions they carry out. (GRI, “State of Progress: Business Contributions to the SDGS.”)

      “We end up with a longstanding commitment to diversity because that’s what our customer base looks like.” (David Dorman, CVS Health)

      CVS Health

      • The MinuteClinic Virtual Collaboration solution was piloted in Houston, demonstrated success, and won additional $50,000 funding from the Pathway to Excellence Award to scale the program across the country (Wolters Kluwer Health, Inc.).
      • The Next-Gen Authentication solution is provided by the vendor HYPR. It is deployed to ten million users and looking to scale to 30 million more. Pricing for enterprises is quoted at $1 per user, but volume pricing would apply to CVS (HYPR).

      Outcomes at CVS Health

      Delivering on hybrid healthcare solutions

      iPads for collaboration: Healthcare practitioners in the MinuteClinic Virtual Collaboration initiative agreed that it improved the use of interprofessional teams, working well virtually with others, and improved access to professional resources (Wolters Kluwer Health, Inc.)

      Remote healthcare: Saw a 400% increase in MinuteClinic virtual visits in 2020 (CVS Health).

      Verified ID: The Next Generation Authentication platform allowed customers to register for a COVID-19 vaccination appointment. CVS has delivered more than 50 million vaccines (LinkedIn).

      Stock photo of a doctor with an iPad.
      CVS Health is making use of digital channels to connect its customers and health practitioners to a services platform that can supplement visits to a retail or clinic location to receive diagnostics and first-hand care.

      From Priorities to Action

      Become your organization’s ESG Expert

      The risks posed to organizations and wider society are becoming more severe, driving a transition from voluntary frameworks for ESG goals to a mandatory one that’s enforced by investors and governments. Organizations will be expected to tie their core activities to a defined set of ESG goals and maintain a balance sheet of their positive and negative impacts. CIOs should become experts in ESG disclosure requirements and recommend the steps needed to meet or exceed competitors’ efforts. If a leadership vacuum for ESG accountability exists, CIOs can either seek to support their peers that are likely to become accountable or take a leadership role in overseeing the area. CIOs should start working toward solutions that deliver real-time reporting on ESG goals to make reporting frictionless.

      “If you don’t have ESG oversight at the highest levels of the company, it won’t wind up getting the focus. That’s why we review it at the Board multiple times per year. We have an annual report, we compare how we did, what we intended to do, where did we fall short, where did we exceed, and where we can run for daylight to do more.” (David Dorman, CVS Health)

      Take the next step

      ESG Disclosures: How Will We Record Status Updates on the World We Are Creating?
      Prepare for the era of mandated environmental, social, and governance disclosures.

      Private Equity and Venture Capital Growing Impact of ESG Report
      Learn about how the growing impact of ESG affects both your organization and IT specifically, including challenges and opportunities, with expert assistance.

      “Business Intelligence and Reporting” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'BI and Reporting' gap between importance and effectiveness. The difference is marked as Delta 2.4.

      The Five Priorities

      Priorities to compete in the digital economy

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Contributing Experts

      Elizabeth Clark

      CIO, Harvard Business School
      Photo of Elizabeth Clark, CIO, Harvard Business School.

      Jeff Previte

      Executive Vice-President of IT, CrossCountry Mortgage
      Photo of Jeff Previte, Executive Vice-President of IT, CrossCountry Mortgage.

      Bob Crozier

      Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE
      Photo of Bob Crozier, Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE.

      David W. Dorman

      Chairman of the Board, CVS Health
      Photo of David W. Dorman, Chairman of the Board, CVS Health.

      Info-Tech’s internal CIO panel contributors

      • Bryan Tutor
      • John Kemp
      • Mike Schembri
      • Janice Clatterbuck
      • Sandy Silk
      • Sallie Wright
      • David Wallace
      • Ken McGee
      • Mike Tweedie
      • Cole Cioran
      • Kevin Tucker
      • Angelina Atkins
      • Yakov Kofner
      Photo of an internal CIO panel contributor. Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.
      Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.
      Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.

      Thank you for your support

      Logo for the Blockchain Research Institute.
      Blockchain Research Institute

      Bibliography – CIO Priorities 2022

      “2020 Corporate Social Responsibility Report.” CVS Health, 2020, p. 127. Web.

      “Adversary: Doppel Spider - Threat Actor.” Crowdstrike Adversary Universe, 2021. Accessed 29 Dec. 2021.

      “Aetna CVS Health Success Story.” HYPR, n.d. Accessed 6 Feb. 2022.

      Baig, Aamer. “The CIO agenda for the next 12 months: Six make-or-break priorities.” McKinsey Digital, 1 Nov. 2021. Web.

      Ball, Sarah, Kristene Diggins, Nairobi Martindale, Angela Patterson, Anne M. Pohnert, Jacinta Thomas, Tammy Todd, and Melissa Bates. “2020 ANCC Pathway Award® winner.” Wolters Kluwer Health, Inc., 2021. Accessed 6 Feb. 2022.

      “Canadian Universities Propose Designs for a Central Bank Digital Currency.” Bank of Canada, 11 Feb. 2021. Accessed 14 Dec. 2021.

      “Carbon Sequestration in Wetlands.” MN Board of Water and Soil Resources, n.d. Accessed 15 Nov. 2021.

      “CCM Honored as a NorthCoast 99 Award Winner.” CrossCountry Mortgage, 1 Dec. 2021. Web.

      Cheek, Catherine. “Four Things We Learned About the Resignation Wave–and What to Do Next.” Visier Inc. (blog), 5 Oct. 2021. Web.

      “Companies Using Hyperledger Fabric, Market Share, Customers and Competitors.” HG Insights, 2022. Accessed 25 Jan. 2022.

      “IFRS Foundation Announces International Sustainability Standards Board, Consolidation with CDSB and VRF, and Publication of Prototype Disclosure Requirements.” IFRS, 3 Nov. 2021. Web.

      “IT Priorities for 2022: A CIO Report.” Mindsight, 28 Oct. 2021. Web.

      “Job Openings and Labor Turnover Survey.” Databases, Tables & Calculators by Subject, U.S. Bureau of Labor Statistics, 2022. Accessed 9 Feb. 2022.

      Kumar, Rashmi, and Michael Krigsman. “CIO Planning and Investment Strategy 2022.” CXOTalk, 13 Sept. 2021. Web.

      Leonhardt, Megan. “The Great Resignation Is Hitting These Industries Hardest.” Fortune, 16 Nov. 2021. Accessed 7 Jan. 2022.

      “Most companies align with SDGs – but more to do on assessing progress.” Global Reporting Initiative (GRI), 17 Jan. 2022. Web.

      Navagamuwa, Roshan. “Beyond Passwords: Enhancing Data Protection and Consumer Experience.” LinkedIn, 15 Dec. 2020.

      Ojo, Oluwaseyi. “Achieving Digital Business Transformation Using COBIT 2019.” ISACA, 19 Aug. 2019. Web.

      “Priority.” Lexico.com, Oxford University Press, 2021. Web.

      Riebold, Jan, and Yannick Bartens. “Reinventing the Digital IT Operating Model for the ‘New Normal.’” Capgemini Worldwide, 3 Nov. 2020. Web.

      Samuels, Mark. “The CIO’s next priority: Using the tech budget for growth.” ZDNet, 1 Sept. 2021. Accessed 1 Nov. 2021.

      Sayer, Peter. “Exclusive Survey: CIOs Outline Tech Priorities for 2021-22.” CIO, 5 Oct. 2021. Web.

      Shacklett, Mary E. “Where IT Leaders Are Likely to Spend Budget in 2022.” InformationWeek, 10 Aug. 2021. Web.

      “Table 4. Quits Levels and Rates by Industry and Region, Seasonally Adjusted - 2021 M11 Results.” U.S. Bureau of Labor Statistics, Economic News Release, 1 Jan. 2022. Accessed 7 Jan. 2022.

      “Technology Priorities CIOs Must Address in 2022.” Gartner, 19 Oct. 2021. Accessed 1 Nov. 2021.

      Thomson, Joel. Technology, Talent, and the Future Workplace: Canadian CIO Outlook 2021. The Conference Board of Canada, 7 Dec. 2021. Web.

      “Trend.” Lexico.com, Oxford University Press, 2021. Web.

      Vellante, Dave. “CIOs signal hybrid work will power tech spending through 2022.” SiliconANGLE, 25 Sept. 2021. Web.

      Whieldon, Esther, and Robert Clark. “ESG funds beat out S&P 500 in 1st year of COVID-19; how 1 fund shot to the top.” S&P Global Market Intelligence, April 2021. Accessed Dec. 2021.

      Build an Application Rationalization Framework

      • Buy Link or Shortcode: {j2store}173|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $39,942 Average $ Saved
      • member rating average days saved: 23 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Almost two-thirds of organizations report that they have too many or far too many applications due to sprawl from poorly managed portfolios, and application managers are spending too much time supporting non-critical applications and not enough time on their most vital ones.
      • The necessary pieces of rationalization are rarely in one place. You need to assemble the resources to collect vital rationalization criteria.
      • There is a lack of standard practices to define the business value that the applications in a portfolio provide, and without value rationalization, decisions are misaligned to business needs.

      Our Advice

      Critical Insight

      There is no “one size fits all.” Applying a rigid approach to rationalization with inflexible inputs can delay or prevent you from realizing value. Play to your strengths and build a framework that aligns to your goals and limitations.

      Impact and Result

      • Define the roles, responsibilities, and outputs for application rationalization within your application portfolio management practice.
      • Build a tailored application rationalization framework (ARF) aligned with your motivations, goals, and limitations.
      • Apply the various application assessments to produce the information that your dispositions will be based on.
      • Initiate an application portfolio roadmap that will showcase your rationalization decisions to key stakeholders.

      Build an Application Rationalization Framework Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should rationalize your applications and why you need a framework that is specific to your goals and limitations, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Lay your foundations

      Define the motivations, goals, and scope of your rationalization effort. Build the action plan and engagement tactics to roll out the rationalization activities.

      • Build an Application Rationalization Framework – Phase 1: Lay Your Foundations
      • Application Rationalization Tool

      2. Plan your application rationalization framework

      Understand the core assessments performed in application rationalizations. Define your application rationalization framework and degree of rigor in applying these assessments based on your goals and limitations.

      • Build an Application Rationalization Framework – Phase 2: Plan Your Application Rationalization Framework

      3. Test and adapt your application rationalization framework

      Test your application rationalization framework using Info-Tech’s tool set on your first iteration. Perform a retrospective and adapt your framework based on that experience and outcomes.

      • Build an Application Rationalization Framework – Phase 3: Test and Adapt Your Application Rationalization Framework
      • Application TCO Calculator
      • Value Calculator

      4. Initiate your roadmap

      Review, determine, and prioritize your dispositions to ensure they align to your goals. Initiate an application portfolio roadmap to showcase your rationalization decisions to key stakeholders.

      • Build an Application Rationalization Framework – Phase 4: Initiate Your Roadmap
      • Disposition Prioritization Tool
      [infographic]

      Workshop: Build an Application Rationalization Framework

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Your Foundations

      The Purpose

      Define the goals, scope, roles, and responsibilities of your rationalization effort.

      Key Benefits Achieved

      Defined motivations, long and short-term goals, and metrics for your rationalization effort.

      Definition of application.

      Defined roles and responsibilities for your rationalization effort.

      Activities

      1.1 Define motivations and goals for rationalization.

      1.2 Define “application.”

      1.3 Identify team and responsivities.

      1.4 Adapt target dispositions.

      1.5 Initiate Application Rationalization Framework (ARF).

      Outputs

      Goals, motivations, and metrics for rationalizations

      Definition of “Application”

      Defined dispositions

      Defined core APM team and handoffs

      2 Assess Business Value

      The Purpose

      Review and adapt Info-Tech’s methodology and toolset.

      Assess business value of applications.

      Key Benefits Achieved

      Tailored application rationalization framework

      Defined business value drivers

      Business value scores for applications

      Activities

      2.1 Review Application Rationalization Tool.

      2.2 Review focused apps, capabilities, and areas of functionality overlap.

      2.3 Define business value drivers.

      2.4 Determine the value score of focused apps.

      Outputs

      Application Rationalization Tool

      List of functional overlaps

      Weighed business value drivers

      Value scores for focused application

      Value Calculator

      3 Gather Application Information

      The Purpose

      Continue to review and adapt Info-Tech’s methodology and toolset.

      Key Benefits Achieved

      Tailored application rationalization framework

      TCO values for applications

      Technical health review of applications

      Recommended dispositions for applications

      Activities

      3.1 Determine TCO for focused apps.

      3.2 Determine technical health of focused apps.

      3.3 Review APA.

      3.4 Review recommended dispositions.

      3.5 Perform retrospective of assessments and adapt ARF.

      Outputs

      TCO of focused applications

      TCO Calculator

      Technical health of focused apps

      Defined rationalization criteria

      Recommended disposition for focused apps

      4 Gather, Assess, and Select Dispositions

      The Purpose

      Review and perform high-level prioritization of dispositions.

      Build a roadmap for dispositions.

      Determine ongoing rationalization and application portfolio management activities.

      Key Benefits Achieved

      Application Portfolio Roadmap

      Prioritized Dispositions

      Activities

      4.1 Determine dispositions.

      4.2 Prioritize dispositions.

      4.3 Initiate portfolio roadmap.

      4.4 Build an action plan for next iterations and ongoing activities.

      4.5 Finalize ARF.

      Outputs

      Disposition Prioritization Tool

      Application portfolio roadmap

      Action plan for next iterations and ongoing activities

      Further reading

      Build an Application Rationalization Framework

      Manage your application portfolio to minimize risk and maximize value.

      Analyst Perspective

      "You're not rationalizing for the sake of IT, you’re rationalizing your apps to create better outcomes for the business and your customers. Consider what’s in it for delivery, operations, the business, and the customer." – Cole Cioran, Senior Director – Research, Application Delivery and Management

      Our understanding of the problem

      This Research Is Designed For:

      • Application portfolio managers, application portfolio management (APM) teams, or any application leaders who are tasked with making application portfolio decisions.
      • Application leaders looking to align their portfolios to the organization’s strategy.
      • Application leaders who need a process for rationalizing their applications.

      This Research Will Help You:

      • Measure the business value of your applications.
      • Rationalize your portfolio to determine the best disposition for each application.
      • Initiate a roadmap that will showcase the future of your applications.

      This Research Will Also Assist:

      • CIOs and other business leaders who need to understand the applications in their portfolio, the value they contribute to the business, and their strategic direction over a given timeline.
      • Steering committees and/or the PMO that needs to understand the process by which application dispositions are generated.

      This Research Will Help Them:

      • Build their reputation as an IT leader who drives the business forward.
      • Define the organization’s value statement in the context of IT and their applications.
      • Visualize the roadmap to the organization’s target application landscape.

      Executive Summary

      Situation

      • Almost two-thirds of organizations report that they have too many or far too many applications due to sprawl from poorly managed portfolios (Flexera, 2015).
      • Application managers are spending too much time supporting non-critical applications and not enough time on their most vital ones.
      • Application managers need their portfolios to be current and effective and evolve continuously to support the business or risk being marginalized.

      Complication

      • The necessary pieces of rationalization are rarely in one place. You need to assemble the resources to collect vital rationalization criteria.
      • There is a lack of standard practices to define the business value that the applications in a portfolio provide and, without value rationalization, decisions are misaligned to business needs.

      Resolution

      • Define the roles, responsibilities, and outputs for application rationalization within your application portfolio management (APM) and other related practices.
      • Build a tailored application rationalization framework (ARF) aligned with your motivations, goals, and limitations.
      • Apply the various application assessments to produce the information, which your dispositions will be based on, and adapt your ARF based on the experiences of your first iteration.
      • Review, determine, and prioritize your application dispositions to create a portfolio strategy aligned to your goals.
      • Initiate an application portfolio roadmap, which will showcase your rationalization decisions to key stakeholders.

      Info-Tech Insight

      There is no one size fits all.

      Applying a rigid approach with inflexible inputs can delay or prevent you from realizing value. Play to your strengths and build a framework that aligns to your goals and limitations.

      Business value must drive your decisions.

      Of the 11 vendor capabilities asked about by Info-Tech’s SoftwareReviews, “business value created” has the second highest relationship with overall software satisfaction.

      Take an iterative approach.

      Larger approaches take longer and are more likely to fail. Identify the applications that best address your strategic objectives, then: rationalize, learn, repeat.

      Info-Tech recommends a disciplined, step-by-step approach as outlined in our Application Portfolio Strategy Program

      Step 1 "No Knowledge": Define application capabilities and visualize lifecycle stages

      Application Discovery

      1. Build in Application Portfolio Management Principles.
      2. Conduct Application Alignment.
      3. Build Detailed Application Inventory

      Step 2 "No Strategy": Rationalize application portfolio and visualize strategic directions

      Application Rationalization

      1. Set Your Rationalization Framework
      2. Conduct Assessment & Assign Dispositions
      3. Create an Application Portfolio Roadmap

      Step 3 "No Plan": Build a product roadmap and visualize the detailed plan

      Detailed Disposition Planning

      1. Conduct an Impact Assessment
      2. Determine the Details of the Disposition
      3. Create Detailed Product Roadmaps

      This blueprint focuses on step 2 of Info-Tech's Application Portfolio Strategy Program. Our methodology assumes you have completed the following activities, which are outlined in Discover Your Applications.

      • Collected your full application inventory (including Shadow IT)
      • Aligned applications to business capabilities
      • Determined redundant applications
      • Identified appropriate subject matter experts (business and technical) for your applications

      Info-Tech's four-phase methodology

      Phase 1

      Lay Your Foundations

      • Define Motivations, Goals, and Scope
      • Iteration and Engagement Planning

      This phase is intended to establish the fundamentals in launching either a rationalization initiative or ongoing practice.

      Here we define goals, scope, and the involvement of various roles from both IT and the business.

      Phase 2

      Plan Your ARF

      • Establish Rationalization Inputs and Current Gaps

      This phase is intended to review a high-level approach to rationalization and determine which analyses are necessary and their appropriate level of depth.

      Here we produce an initial ARF and discuss any gaps in terms of the availability of necessary data points and additional collection methods that will need to be applied.

      Phase 3

      Test and Adapt Your ARF

      • Perform First Iteration Analysis
      • First Iteration Retrospective and Adaptation

      This phase is intended to put the ARF into action and adapt as necessary to ensure success in your organization.

      If appropriate, here we apply Info-Tech’s ARF and toolset and test it against a set of applications to determine how best to adapt these materials for your needs.

      Phase 4

      Initiate Your Roadmap

      • Prioritize and Roadmap Applications
      • Ongoing Rationalization and Roadmapping

      This phase is intended to capture results of rationalization and solidify your rationalization initiative or ongoing practice.

      Here we aim to inject your dispositions into an application portfolio roadmap and ensure ongoing governance of APM activities.

      There is an inconsistent understanding and ownership of the application portfolio

      What can I discover about my portfolio?

      Application portfolios are misunderstood.

      Portfolios are viewed as only supportive in nature. There is no strategy or process to evaluate application portfolios effectively. As a result, organizations build a roadmap with a lack of understanding of their portfolio.

      72% of organizations do not have an excellent understanding of the application portfolio (Capgemini).

      How can I improve my portfolio?

      Misalignment between Applications and Business Operations

      Applications fail to meet their intended function, resulting in duplication, a waste of resources, and a decrease in ROI. This makes it harder for IT to justify to the business the reasons to complete a roadmap.

      48% of organizations believe that there are more applications than the business requires (Capgemini).

      How can my portfolio help transform the business?

      IT's budget is to keep the lights on.

      The application portfolio is complex and pervasive and requires constant support from IT. This makes it increasingly difficult for IT to adopt or develop new strategies since its immediate goal will always be to fix what already exists. This causes large delays and breaks in the timeline to complete a roadmap.

      68% of IT directors have wasted time and money because they did not have better visibility of application roadmaps (ComputerWeekly).

      Roadmaps can be the solution, but stall when they lack the information needed for good decision making

      An application portfolio roadmap provides a visual representation of your application portfolio, is used to plan out the portfolio’s strategy over a given time frame, and assists management in key decisions. But…

      • You can’t change an app without knowing its backend.
      • You can't rationalize what you don't know.
      • You can’t confirm redundancies without knowing every app.
      • You can’t rationalize without the business perspective.

      A roadmap is meaningless if you haven’t done any analysis to understand the multiple perspectives on your applications.

      Application rationalization ensures roadmaps reflect what the business actually wants and needs

      Application rationalization is the practice of strategically identifying business applications across an organization to determine which applications should be kept, replaced, retired, or consolidated (TechTarget).

      Discover, Improve, and Transform Through Application Rationalization

      Your application rationalization effort increases the maturity of your roadmap efforts by increasing value to the business. Go beyond the discover phase – leverage application rationalization insights to reach the improve and transform phases.

      Strong Apps Are Key to Business Satisfaction

      79% of organizations with high application suite satisfaction believe that IT offers the organization a competitive edge over others in the industry. (Info-Tech Research Group, N=230)

      Info-Tech Insight

      Companies with an effective portfolio are twice as likely to report high-quality applications, four times as likely to report high proficiency in legacy apps management, and six times as likely to report strong business alignment.

      Rationalization comes at a justified cost

      Rationalization can reduce costs and drive innovation

      Projecting the ROI of application rationalization is difficult and dangerous when used as the only marker for success.

      However, rationalization, when done effectively, will help drop operational or maintenance costs of your applications as well as provide many more opportunities to add value to the business.

      A graph with Time on the X-axis and Cost on the Y axis. The graph compares cost before rationalization, where the cost of the existing portfolio is high, with cost after rationalization, where the cost of the existing portfolio is reduced. The graph demonstrates a decrease in overall portfolio spend after rationalization

      Organizations lack a strategic approach to application rationalization, leading to failure

      IT leaders strive to push the business forward but are stuck in a cycle of reaction where they manage short-term needs rather than strategic approaches.

      Why Is This the Case?

      Lack of Relevant Information

      Rationalization fails without appropriately detailed, accurate, and up-to-date information. You need to identify what information is available and assemble the teams to collect and analyze it.

      Failure to Align With Business Objectives

      Rationalization fails when you lack a clear list of strategic and collaborative priorities; priorities need to be both IT and non-IT related to align with the business objectives and provide value.

      IT Leaders Fails to Justify Projects

      Adhering to a rigid rationalization process can be complex and costly. Play to your strengths and build an ARF based on your goals and limitations.

      Info-Tech Insight

      Misaligned portfolio roadmaps are known to lead teams and projects into failure!
      Building an up-to-date portfolio roadmap that aligns business objectives to IT objectives will increase approval and help the business see the long-term value of roadmapping.

      Don’t start in the middle; ensure you have the basics down

      Application portfolio strategy practice maturity stages

      1. Discover Your Applications
      2. Improve
      3. Transform
      A graph with Rigor of APM Practice on the X-axis and Value to the Business on the Y-axis. The content of the graph is split into the 3 maturity stages, Discover, Improve, and Transform. With each step, the Value to the Business and Rigor of APM Practice increase.

      Disambiguate your systems and clarify your scope

      Define the items that make up your portfolio.

      Broad or unclear definitions of “application” can complicate the scope of rationalization. Take the time to define an application and come to a common understanding of the systems which will be the focus of your rationalization effort.

      Bundling systems under common banner or taking a product view of your applications and components can be an effective way to ensure you include your full collection of systems, without having to perform too many individual assessments.

      Scope

      Single... Capability enabled by... Whole...
      Digital Product + Service Digital Platform Platform Portfolio Customer Facing
      Product (one or more apps) Product Family Product Portfolio

      Application Application Architecture Application Portfolio Internal

      A graphic listing the following products: UI, Applications, Middleware, Data, and Infrastructure. A banner reading APIs runs through all products, and UI, Applications, and Middleware are bracketed off as Application

      Info-Tech’s framework can be applied to portfolios of apps, products, and their related capabilities or services.

      However you organize your tech stack, Info-Tech’s application rationalization framework can be applied.

      Understand the multiple lenses of application rationalization and include in your framework

      There are many lenses to view your applications. Rationalize your applications using all perspectives to assess your portfolio and determine the most beneficial course of action.

      Application Alignment - Architect Perspective

      How well does the entire portfolio align to your business capabilities?

      Are there overlaps or redundancies in your application features?

      Covered in Discover Your Applications.

      Business Value - CEO Perspective

      Is the application producing sufficient business value?

      Does it impact profitability, enable capabilities, or add any critical factor that fulfills the mission and vision?

      TCO - CIO Perspective

      What is the overall cost of the application?

      What is the projected cost as your organization grows? What is the cost to maintain the application?

      End User

      How does the end user perceive the application?

      What is the user experience?

      Do the features adequately support the intended functions?

      Is the application important or does it have high utilization?

      Technical Value - App Team Perspective

      What is the state of the backend of the application?

      Has the application maintained sufficient code quality? Is the application reliable? How does it fit into your application architecture?

      Each perspective requires its own analysis and is an area of criteria for rationalization.

      Apply the appropriate amount of rigor for your ARF based on your specific goals and limitations

      Ideally, the richer the data the better the results, but the reality is in-depth analysis is challenging and you’ll need to play to your strengths to be successful.

      Light-Weight Assessment

      App to capability alignment.

      Determine overlaps.

      Subjective 1-10 scale

      Subjective T-shirt size (high, med., low)

      End-user surveys

      Performance temperature check

      Thorough Analysis

      App to process alignment.

      Determine redundancies.

      Apply a value measurement framework.

      Projected TCO with traceability to ALM & financial records.

      Custom build interviews with multiple end users

      Tool and metric-based analysis

      There is no one-size-fits all rationalization. The primary goal of this blueprint is to help you determine the appropriate level of analysis given your motivations and goals for this effort as well as the limitations of resources, timeline, and accessible information.

      Rationalize and build your application portfolio strategy the right way to ensure success

      Big-Bang Approach

      • An attempt to assess the whole portfolio at once.
      • The result is information overload.
      • Information gathered is likely incomplete and/or inaccurate.
      • Tangible benefits are a long time away.

      Covert Approach

      • Information is collected behind the scenes and whenever information sources are available.
      • Assumptions about the business use of applications go unconfirmed.

      Corner-of-the-Desk Approach

      • No one is explicitly dedicated to building a strategy or APM practices.
      • Information is collected whenever the application team has time available.
      • Benefits are pushed out and value is lost.

      Iterative Approach

      • Carried out in phases, concentrating on individual business units or subsets of applications.
      • Priority areas are completed first.
      • The APM practice strengthens through experience.

      Sponsored Mandate Approach

      • The appropriate business stakeholders participate.
      • Rationalization is given project sponsors who champion the practice and communicate the benefits across the organization.

      Dedicated Approach

      • Rationalization and other APM activities are given a budget and formal agenda.
      • Roles and responsibilities are assigned to team members.

      Use Info-Tech’s Application Portfolio Assessment Diagnostic to add the end users’ perspective to your decision making

      Prior to Blueprint: Call 1-888-670-8889 to inquire about or request the Application Portfolio Assessment.

      Info-Tech Best Practice

      The approach in this blueprint has been designed in coordination with Info-Tech’s Application Portfolio Assessment (APA) Diagnostic. While it is not a prerequisite, your project will experience the best results and be completed much quicker by taking advantage of our diagnostic offering prior to initiating the activities in this blueprint.

      Use the program diagnostic to:

      • Assess the importance and satisfaction of enterprise applications.
      • Solicit feedback from your end users on applications being used.
      • Understand the strengths and weaknesses of your current applications.
      • Perform a high-level application rationalization initiative.

      Integrate diagnostic results to:

      • Target which applications to analyze in greater detail.
      • Expand on the initial application rationalization results with a more comprehensive and business-value-focused criteria.

      Use Info-Tech’s Application Rationalization Tool to determine and then visualize your application portfolio strategy

      At the center of this project is an Application Rationalization Tool that is used as a living document of your:

        1. Customizable Application Rationalization Framework

        2. Recommendation Dispositions

        3. Application Portfolio Roadmap (seen below)

      Use the step-by-step advice within this blueprint to rationalize your application portfolio and build a realistic and accurate application roadmap that drives business value.

      Central to our approach to application rationalization are industry-leading frameworks

      Info-Tech uses the APQC and COBIT5 frameworks for certain areas of this research. Contextualizing application rationalization within these frameworks clarifies its importance and role and ensures that our assessment tool is focused on key priority areas. The APQC and COBIT5 frameworks are used as a starting point for assessing application effectiveness within specific business capabilities of the different components of application rationalization.

      APQC is one of the world's leading proponents of business benchmarking, best practices, and knowledge management research.

      COBIT 5 is the leading framework for the governance and management of enterprise IT.

      In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Our peer network of over 33,000 happy clients proves the effectiveness of our research.

      Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

      A public utility organization is using Info-Tech’s approach for rationalization of its applications for reduced complexity

      Case Study

      Industry: Public Sector

      Source: Info-Tech Research Group

      Challenge

      • The public utility has a complex application portfolio, with a large number of applications custom-built that provide limited functionality to certain business groups.
      • The organization needed to move away from custom point solutions and adopt more hosted solutions to cater to larger audiences across business domains.
      • The organization required a comprehensive solution for the following:
        • Understanding how applications are being used by business users.
        • Unraveling the complexity of its application landscape using a formal rationalization process.

      Solution

      • The organization went through a rationalization process with Info-Tech in a four-day onsite engagement to determine the following:
        • Satisfaction level and quality evaluation of end users’ perception of application functionality.
        • Confirmation on what needs to be done with each application under assessment.
        • The level of impact the necessary changes required for a particular application would have on the greater app ecosystem.
        • Prioritization methodology for application roadmap implementation.

      Results

      • Info-Tech’s Application Portfolio Assessment Diagnostic report helped the public utility understand what applications users valued and found difficult to use.
      • The rationalization process gave insight into situations where functionality was duplicated across multiple applications and could be consolidated within one application.
      • The organization determined that its application portfolio was highly complex, and Info-Tech provided a good framework for more in-depth analysis.
      • The organization now has a rationalization process that it can take to other business domains.

      Enter Into Mobile Development Without Confusion and Frustration

      • Buy Link or Shortcode: {j2store}282|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Mobile Development
      • Parent Category Link: /mobile-development
      • IT managers don’t know where to start when initiating a mobile program.
      • IT has tried mobile development in the past but didn't achieve success.
      • IT must initiate a mobile program quickly based on business priorities and needs a roadmap based on best practices.

      Our Advice

      Critical Insight

      • Form factors and mobile devices won't drive success – business alignment and user experience will. Don't get caught up with the latest features in mobile devices.
      • Software emulation testing is not true testing. Get on the device and run your tests.
      • Cross form-factor testing cannot be optimized to run in parallel. Therefore, anticipate longer testing cycles for cross form-factor testing.

      Impact and Result

      • Prepare your development, testing, and deployment teams for mobile development.
      • Get a realistic assessment of ROI for the launch of a mobile program.

      Enter Into Mobile Development Without Confusion and Frustration Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for a Mobile Program

      Understand the current mobile ecosystem. Use this toolkit to help you initiate a mobile development program.

      • Storyboard: Enter Into Mobile Development Without Confusion and Frustration

      2. Assess Your Dev Process for Readiness

      Review and evaluate your current application development process.

      3. Prepare to Execute Your Mobile Program

      Prioritize your mobile program based on your organization’s prioritization profile.

      • Mobile Program Tool

      4. Communicate with Stakeholders

      Summarize the execution of the mobile program.

      • Project Status Communication Worksheet
      [infographic]

      Workshop: Enter Into Mobile Development Without Confusion and Frustration

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build your Future Mobile Development State

      The Purpose

      Understand the alignment of stakeholder objectives and priorities to mobile dev IT drivers.

      Assess readiness of your organization for mobile dev.

      Understand how to build your ideal mobile dev process.

      Key Benefits Achieved

      Identify and address the gaps in your existing app dev process.

      Build your future mobile dev state.

      Activities

      1.1 Getting started

      1.2 Assess your current state

      1.3 Establish your future state

      Outputs

      List of key stakeholders

      Stakeholder and IT driver mapping and assessment of current app dev process

      List of practices to accommodate mobile dev

      2 Prepare and Execute your Mobile Program

      The Purpose

      Assess the impact of mobile dev on your existing app dev process.

      Prioritize your mobile program.

      Understand the dev practice metrics to gauge success.

      Key Benefits Achieved

      Properly prepare for the execution of your mobile program.

      Calculate the ROI of your mobile program.

      Prioritize your mobile program with dependencies in mind.

      Build a communication plan with stakeholders.

      Activities

      2.1 Conduct an impact analysis

      2.2 Prepare to execute

      2.3 Communicate with stakeholders

      Outputs

      Impact analysis of your mobile program and expected ROI

      Mobile program order of execution and project dependencies mapping

      List of dev practice metrics

      Fix Your IT Culture

      • Buy Link or Shortcode: {j2store}518|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $32,499 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Lead
      • Parent Category Link: /lead
      • Go beyond value statements to create a culture that enables the departmental strategy.
      • There is confusion about how to translate culture from an abstract concept to something that is measurable, actionable, and process driven.
      • Organizations lack clarity about who is accountable and responsible for culture, with groups often pointing fingers at each other.

      Our Advice

      Critical Insight

      • When it comes to culture, the lived experience can be different from stated values. Culture is the pattern of behaviors and the way work is done rather than simply perks, working environment, and policy.
      • Executives’ active participation in culture change is paramount. If executives aren’t willing to change the way they behave, attempts to shift the culture will fail.
      • Elevate culture to a business imperative. Foster a culture that is linked to strategy rather than trying to replicate the hot culture of the moment.
      • Target values that will have the greatest impact. Select a few focus values as a guide and align all behaviors and work practices to those values.

      Impact and Result

      • Executives need to clarify how the culture they want will help achieve their strategy and choose the focus values that will have the maximum impact.
      • Measure the current state of culture and facilitate the process of leveraging existing elements while shifting undesirable ones.

      Fix Your IT Culture Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should improve your culture to enable your strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assessment: Determine current culture and identify focus values

      Complete a cultural assessment and select focus values to form core culture efforts.

      • Culture Documentation Template
      • IT Departmental Values Survey
      • IT Culture Diagnostic
      • Cultural Assessment Report Template

      2. Tools: Give IT executives the tools to drive change

      Enable executives to gather feedback on behavioral perceptions and support behavioral change.

      • Executive Reflection Template

      3. Behavioral Alignment: Align IT behaviors to the desired culture

      Review all areas of the department to understand where the links to culture exist and create a communication plan.

      • Standard Internal Communications Plan
      • IT Competency Library
      • Leadership Competency Library

      4. Sustainment: Disseminate and manage culture within the department

      Customize a process to infuse behaviors aligned with focus values in work practices and complete the first wave of meetings.

      • Culture Facilitation Guide for Leaders
      [infographic]

      Build a Reporting and Analytics Strategy

      • Buy Link or Shortcode: {j2store}128|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $49,748 Average $ Saved
      • member rating average days saved: 28 Average Days Saved
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy
      • In respect to business intelligence (BI) matureness, you can’t expect the whole organization to be at the same place at the same time. Your BI strategy needs to recognize this and should strive to align rather than dictate.
      • Technology is just one aspect of your BI and analytics strategy and is not a quick solution or a guarantee for long-term success.

      Our Advice

      Critical Insight

      • The BI strategy drives data warehouse and integration strategies and the data needed to support business decisions.
      • The solution to better BI often lies in improving the BI practice, not acquiring the latest and greatest tool.

      Impact and Result

      • Align BI with corporate vision, mission, goals, and strategic direction.
      • Understand the needs of business partners.
      • BI & analytics informs data warehouse and integration layers for required content, latency, and quality.

      Build a Reporting and Analytics Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create or refresh the BI Strategy and review Info-Tech’s approach to developing a BI strategy that meets business needs.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the business context and BI landscape

      Lay the foundation for the BI strategy by detailing key business information and analyzing current BI usage.

      • Build a Reporting and Analytics Strategy – Phase 1: Understand the Business Context and BI Landscape
      • BI Strategy and Roadmap Template
      • BI End-User Satisfaction Survey Framework

      2. Evaluate the current BI practice

      Assess the maturity level of the current BI practice and envision a future state.

      • Build a Reporting and Analytics Strategy – Phase 2: Evaluate the Current BI Practice
      • BI Practice Assessment Tool

      3. Create a BI roadmap for continuous improvement

      Create BI-focused initiatives to build an improvement roadmap.

      • Build a Reporting and Analytics Strategy – Phase 3: Create a BI Roadmap for Continuous Improvement
      • BI Initiatives and Roadmap Tool
      • BI Strategy and Roadmap Executive Presentation Template
      [infographic]

      Workshop: Build a Reporting and Analytics Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Business Vision and Understand the Current BI Landscape

      The Purpose

      Document overall business vision, mission, and key objectives; assemble project team.

      Collect in-depth information around current BI usage and BI user perception.

      Create requirements gathering principles and gather requirements for a BI platform.

      Key Benefits Achieved

      Increased IT–business alignment by using the business context as the project starting point

      Identified project sponsor and project team

      Detailed understanding of trends in BI usage and BI perception of consumers

      Refreshed requirements for a BI solution

      Activities

      1.1 Gather key business information (overall mission, goals, objectives, drivers).

      1.2 Establish a high-level ROI.

      1.3 Identify ideal candidates for carrying out a BI project.

      1.4 Undertake BI usage analyses, BI user perception survey, and a BI artifact inventory.

      1.5 Develop requirements gathering principles and approaches.

      1.6 Gather and organize BI requirements

      Outputs

      Articulated business context that will guide BI strategy development

      ROI for refreshing the BI strategy

      BI project team

      Comprehensive summary of current BI usage that has quantitative and qualitative perspectives

      BI requirements are confirmed

      2 Evaluate Current BI Maturity and Identify the BI Patterns for the Future State

      The Purpose

      Define current maturity level of BI practice.

      Envision the future state of your BI practice and identify desired BI patterns.

      Key Benefits Achieved

      Know the correct migration method for Exchange Online.

      Prepare user profiles for the rest of the Office 365 implementation.

      Activities

      2.1 Perform BI SWOT analyses.

      2.2 Assess current state of the BI practice and review results.

      2.3 Create guiding principles for the future BI practice.

      2.4 Identify desired BI patterns and the associated BI functionalities/requirements.

      2.5 Define the future state of the BI practice.

      2.6 Establish the critical success factors for the future BI, identify potential risks, and create a mitigation plan.

      Outputs

      Exchange migration strategy

      Current state of BI practice is documented from multiple perspectives

      Guiding principles for future BI practice are established, along with the desired BI patterns linked to functional requirements

      Future BI practice is defined

      Critical success factors, potential risks, and a risk mitigation plan are defined

      3 Build Improvement Initiatives and Create a BI Development Roadmap

      The Purpose

      Build overall BI improvement initiatives and create a BI improvement roadmap.

      Identify supplementary initiatives for enhancing your BI program.

      Key Benefits Achieved

      Defined roadmap composed of robust improvement initiatives

      Activities

      3.1 Create BI improvement initiatives based on outputs from phase 1 and 2 activities. Build an improvement roadmap.

      3.2 Build an improvement roadmap.

      3.3 Create an Excel governance policy.

      3.4 Create a plan for a BI ambassador network.

      Outputs

      Comprehensive BI initiatives placed on an improvement roadmap

      Excel governance policy is created

      Internal BI ambassadors are identified

      Further reading

      Build a Reporting and Analytics Strategy

      Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

      Terminology

      As the reporting and analytics space matured over the last decade, software suppliers used different terminology to differentiate their products from others’. This caused a great deal of confusion within the business communities.

      Following are two definitions of the term Business Intelligence:

      Business intelligence (BI) leverages software and services to transform data into actionable insights that inform an organization’s strategic and tactical business decisions. BI tools access and analyze data sets and present analytical findings in reports, summaries, dashboards, graphs, charts, and maps to provide users with detailed intelligence about the state of the business.

      The term business intelligence often also refers to a range of tools that provide quick, easy-to-digest access to insights about an organization's current state, based on available data.

      CIO Magazine

      Business intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis of business information. BI technologies provide historical, current, and predictive views of business operations.

      Common functions of business intelligence technologies include reporting, online analytical processing, analytics, data mining, process mining, complex event processing, business performance management, benchmarking, text mining, predictive analytics, and prescriptive analytics.

      Wikipedia

      This blueprint will use the terms “BI,” “BI and Analytics,” and “Reporting and Analytics” interchangeably in different contexts, but always in compliance to the above definitions.

      ANALYST PERSPECTIVE

      A fresh analytics & reporting strategy enables new BI opportunities.

      We need data to inform the business of past and current performance and to support strategic decisions. But we can also drown in a flood of data. Without a clear strategy for business intelligence, a promising new solution will produce only noise.

      BI and Analytics teams must provide the right quantitative and qualitative insights for the business to base their decisions on.

      Your Business Intelligence and Analytics strategy must support the organization’s strategy. Your strategy for BI & Analytics provides direction and requirements for data warehousing and data integration, and further paves the way for predictive analytics, big data analytics, market/industry intelligence, and social network analytics.

      Dirk Coetsee,

      Director, Data and Analytics Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For:

      • A CIO or Business Unit (BU) Leader looking to improve reporting and analytics, reduce time to information, and embrace fact-based decision making with analytics, reporting, and business intelligence (BI).
      • Application Directors experiencing poor results from an initial BI tool deployment who are looking to improve the outcome.

      This Research Will Also Assist:

      • Project Managers and Business Analysts assigned to a BI project team to collect and analyze requirements.
      • Business units that have their own BI platforms and would like to partner with IT to take their BI to an enterprise level.

      This Research Will Help You:

      • Align your reporting and analytics strategy with the business’ strategic objectives before you rebuild or buy your Business Intelligence platform.
      • Identify reporting and analytics objectives to inform the data warehouse and integration requirements gathering process.
      • Avoid common pitfalls that derail BI and analytic deployments and lower their adoption.
      • Identify Business Intelligence gaps prior to deployment and incorporate remedies within your plans.

      This Research Will Help Them:

      • Recruit the right resources for the program.
      • Align BI with corporate vision, mission, goals, and strategic direction.
      • Understand the needs of business partners.
      • Assess BI maturity and plan for target state.
      • Develop a BI strategy and roadmap.
      • Track the success of the BI initiative.

      Executive summary

      Situation:

      BI drives a new reality. Uber is the world’s largest taxi company and they own no vehicles; Alibaba is the world’s most valuable retailer and they have no inventory; Airbnb is the world’s largest accommodation provider and they own no real estate. How did they disrupt their markets and get past business entry barriers? A deep understanding of their market through impeccable business intelligence!

      Complication:

      • In respect to BI matureness, you can’t expect the whole organization to be at the same place at the same time. Your BI strategy needs to recognize this and should strive to align rather than dictate.
      • Technology is just one aspect of your BI and Analytics strategy and is not a quick solution or a guarantee for long term success.

      Resolution:

      • Drive strategy development by establishing the business context upfront in order to align business intelligence providers with the most important needs of their BI consumers and the strategic priorities of the organization.
      • Revamp or create a BI strategy to update your BI program to make it fit for purpose.
      • Understand your existing BI baggage – e.g. your existing BI program, the artifacts generated from the program, and the users it supports. Those will inform the creation of the strategy and roadmap.
      • Assess current BI maturity and determine your future state BI maturity.
      • BI needs governance to ensure consistent planning, communication, and execution of the BI strategy.
      • Create a network of BI ambassadors across the organization to promote BI.
      • Plan for the future to ensure that required data will be available when the organization needs it.

      Info-Tech Insight

      1. Put the “B” back in BI. Don’t have IT doing BI for IT’s sake; ensure the voice and needs of the business are the primary drivers of your strategy.
      2. The BI strategy drives data warehouse and integration strategies and the data needs to support business decisions.
      3. Go beyond the platform. The solution to better BI often lies in improving the BI practice, not acquiring the latest and greatest tool.

      Metrics to track BI & Analytical program progress

      Goals for BI:

      • Understand business context and needs. Identify business processes that can leverage BI.
      • Define the Reporting & Analytics Roadmap. Develop data initiatives, and create a strategy and roadmap for Business Intelligence.
      • Continuous improvements. Your BI program is evolving and improving over time. The program should allow you to have faster, better, and more comprehensive information.

      Info-Tech’s Suggested Metrics for Tracking the BI Program

      Practice Improvement Metrics Data Collection and Calculation Expected Improvement
      Program Level Metrics Efficiency
      • Time to information
      • Self-service penetration
      • Derive from the ticket management system
      • Derive from the BI platform
      • 10% reduction in time to information
      • Achieve 10-15% self-service penetration
      • Effectiveness
      • BI Usage
      • Data quality
      • Derive from the BI platform
      • Data quality perception
      • Majority of the users use BI on a daily basis
      • 15% increase in data quality perception
      Comprehensiveness
      • # of integrated datasets
      • # of strategic decisions made
      • Derive from the data integration platform
      • Decision-making perception
      • Onboard 2-3 new data domains per year
      • 20% increase in decision-making perception

      Intangible Metrics:

      Tap into the results of Info-Tech’s CIO Business Vision diagnostic to monitor the changes in business-user satisfaction as you implement the initiatives in your BI improvement roadmap.

      Your Enterprise BI and Analytics Strategy is driven by your organization’s Vision and Corporate Strategy

      Formulating an Enterprise Reporting and Analytics Strategy requires the business vision and strategies to first be substantiated. Any optimization to the Data Warehouse, Integration and Source layer is in turn driven by the Enterprise Reporting and Analytics Strategy

      Flow chart showing 'Business Vision Strategies'

      The current state of your Integration and Warehouse platforms determine what data can be utilized for BI and Analytics

      Where we are, and how we got here

      How we got here

      • In the beginning was BI 1.0. Business intelligence began as an IT-driven centralized solution that was highly governed. Business users were typically the consumers of reports and dashboards created by IT, an analytics-trained minority, upon request.
      • In the last five to ten years, we have seen a fundamental shift in the business intelligence and analytics market, moving away from such large-scale, centralized IT-driven solutions focused on basic reporting and administration, towards more advanced user-friendly data discovery and visualization platforms. This has come to be known as BI 2.0.
      • Many incumbent market leaders were disrupted by the demand for more user-friendly business intelligence solutions, allowing “pure-play” BI software vendors to carve out a niche and rapidly expand into more enterprise environments.
      • BI-on-the-cloud has established itself as a solid alternative to in-house implementation and operation.

      Where we are now

      • BI 3.0 has arrived. This involves the democratization of data and analytics and a predominantly app-centric approach to BI, identifiable by an anywhere, anytime, and device-or-platform-independent collaborative methodology. Social workgroups and self-guided content creation, delivery, analysis, and management is prominent.
      • Where the need for reporting and dashboards remains, we’re seeing data discovery platforms fulfilling the needs of non-technical business users by providing easy-to-use interactive solutions to increase adoption across enterprises.
      • With more end users demanding access to data and the tools to extract business insights, IT is looking to meet these needs while continuing to maintain governance and administration over a much larger base of users. The race for governed data discovery is heated and will be a market differentiator.
      • The next kid on the block is Artificial Intelligence that put further demands on data quality and availability.

      RICOH Canada used this methodology to develop their BI strategy in consultation with their business stakeholders

      CASE STUDY

      Industry: Manufacturing and Retail

      Source: RICOH

      Ricoh Canada transforms the way people work with breakthrough technologies that help businesses innovate and grow. Its focus has always been to envision what the future will look like so that it can help its customers prepare for success. Ricoh empowers digital workplaces with a broad portfolio of services, solutions, and technologies – helping customers remove obstacles to sustained growth by optimizing the flow of information and automating antiquated processes to increase workplace productivity. In their commitment towards a customer-centric approach, Ricoh Canada recognized that BI and analytics can be used to inform business leaders in making strategic decisions.

      Enterprise BI and analytics Initiative

      Ricoh Canada enrolled in the ITRG Reporting & Analytics strategy workshop with the aim to create a BI strategy that will allow the business to harvest it strengths and build for the future. The workshop acted as a forum for the different business units to communicate, share ideas, and hear from each other what their pains are and what should be done to provide a full customer 360 view.

      Results

      “This workshop allowed us to collectively identify the various stakeholders and their unique requirements. This is a key factor in the development of an effective BI Analytics tool.” David Farrar

      The Customer 360 Initiative included the following components

      The Customer 360 Initiative includes the components shown in the image

      Improve BI Adoption Rates

      Graph showing Product Adoption Rates

      Sisense

      Reasons for low BI adoption

      • Employees that never used BI tools are slow to adopt new technology.
      • Lack of trust in data leads to lack of trust in the insights.
      • Complex data structures deter usage due to long learning curves and contained nuances.
      • Difficult to translate business requirements into tool linguistics due to lack of training or technical ineptness.
      • Business has not taken ownership of data, which affects access to data.

      How to foster BI adoption

      • Senior management proclaim data as a strategic asset and involved in the promotion of BI
      • Role Requirement that any business decision should be backed up by analytics
      • Communication of internal BI use case studies and successes
      • Exceptional data lineage to act as proof for the numbers
      • A Business Data glossary with clearly defined business terms. Use the Business Data Glossary in conjunction with data lineage and semantic layers to ensure that businesses are clearly defined and traced to sources.
      • Training in business to take ownership of data from inception to analytics.

      Why bother with analytics?

      In today’s ever-changing and global environment, organizations of every size need to effectively leverage their data assets to facilitate three key business drivers: customer intimacy, product/service innovation, and operational excellence. Plus, they need to manage their operational risk efficiently.

      Investing in a comprehensive business intelligence strategy allows for a multidimensional view of your organization’s data assets that can be operationalized to create a competitive edge:

      Historical Data

      Without a BI strategy, creating meaningful reports for business users that highlight trends in past performance and draw relationships between different data sources becomes a more complex task. Also, the ever growing need to identify and assess risks in new ways is driving many companies to BI.

      Data Democracy

      The core purpose of BI is to provide the right data, to the right users, at the right time, and in a format that is easily consumable and actionable. In developing a BI strategy, remember the driver for managed cross-functional access to data assets and features such as interactive dashboards, mobile BI, and self-service BI.

      Predictive and Big Data Analytics

      As the volume, variety, and velocity of data increases rapidly, businesses will need a strategy to outline how they plan to consume the new data in a manner that does not overwhelm their current capabilities and aligns with their desired future state. This same strategy further provides a foundation upon which organizations can transition from ad hoc reporting to using data assets in a codified BI platform for decision support.

      Business intelligence serves as the layer that translates data, information, and organizational knowledge into insights

      As executive decision making shifts to more fact-based, data-driven thinking, there is an urgent need for data assets to be organized and presented in a manner that enables immediate action.

      Typically, business decisions are based on a mix of intuition, opinion, emotion, organizational culture, and data. Though business users may be aware of its potential value in driving operational change, data is often viewed as inaccessible.

      Business intelligence bridges the gap between an organization’s data assets and consumable information that facilitates insight generation and informed decision making.

      Most organizations realize that they need a BI strategy; it’s no longer a nice-to-have, it’s a must-have.

      – Albert Hui, Principal, Data Economist

      A triangle grapg depicting the layers of business itelligence

      Business intelligence and business analytics: what is the difference and should you care

      Ask 100 people and you will get 100 answers. We like the prevailing view that BI looks at today and backward for improving who we are, while BA is forward-looking to support change decisions.

      The image depicts a chart flowing from Time Past to Future. Business Intelligence joins with Business Analytics over the Present
      • Business intelligence is concerned with looking at present and historical data.
      • Use this data to create reports/dashboards to inform a wide variety of information consumers of the past and current state of affairs.
      • Almost all organizations, regardless of size and maturity, use some level of BI even if it’s just very basic reporting.
      • Business analytics, on the other hand, is a forward-facing use of data, concerned with the present to the future.
      • Analytics uses data to both describe the present, and more importantly, predict the future, enabling strategic business decisions.
      • Although adoption is rapidly increasing, many organizations still do not utilize any advanced analytics in their environment.

      However, establishing a strong business intelligence program is a necessary precursor to an organization’s development of its business analytics capabilities.

      Organizations that successfully grow their BI capabilities are reaping the rewards

      Evidence is piling up: if planned well, BI contributes to the organization’s bottom line.

      It’s expected that there will be nearly 45 billion connected devices and a 42% increase in data volume each year posing a high business opportunity for the BI market (BERoE, 2020).

      The global business intelligence market size to grow from US$23.1 billion in 2020 to US$33.3 billion by 2025, at a compound annual growth rate (CAGR) of 7.6% (Global News Wire, 2020)

      In the coming years, 69% of companies plan on increasing their cloud business intelligence usage (BARC Research and Eckerson Group Study, 2017).

      Call to Action

      Small organizations of up to 100 employees had the highest rate of business intelligence penetration last year (Forbes, 2018).

      Graph depicting business value from 0 months to more than 24 months

      Source: IBM Business Value, 2015

      For the New England Patriots, establishing a greater level of customer intimacy was driven by a tactical analytics initiative

      CASE STUDY

      Industry: Professional Sports

      Source Target Marketing

      Problem

      Despite continued success as a franchise with a loyal fan base, the New England Patriots experienced one of their lowest season ticket renewal rates in over a decade for the 2009 season. Given the numerous email addresses that potential and current season-ticket holders used to engage with the organization, it was difficult for Kraft Sports Group to define how to effectively reach customers.

      Turning to a Tactical Analytics Approach

      Kraft Sports Group turned to the customer data that it had been collecting since 2007 and chose to leverage analytics in order to glean insight into season ticket holder behavior. By monitoring and reporting on customer activity online and in attendance at games, Kraft Sports Group was able to establish that customer engagement improved when communication from the organization was specifically tailored to customer preferences and historical behavior.

      Results

      By operationalizing their data assets with the help of analytics, the Patriots were able to achieve a record 97% renewal rate for the 2010 season. KSG was able to take their customer engagement to the next level and proactively look for signs of attrition in season-ticket renewals.

      We're very analytically focused and I consider us to be the voice of the customer within the organization… Ultimately, we should know when renewal might not happen and be able to market and communicate to change that behavior.

      – Jessica Gelman,

      VP Customer Marketing and Strategy, Kraft Sports Group

      A large percentage of all BI projects fail to meet the organization’s needs; avoid falling victim to common pitfalls

      Tool Usage Pitfalls

      • Business units are overwhelmed with the amount and type of data presented.
      • Poor data quality erodes trust, resulting in a decline in usage.
      • Analysis performed for the sake of analysis and doesn’t focus on obtaining relevant business-driven insights.

      Selection Pitfalls

      • Inadequate requirements gathering.
      • No business involvement in the selection process.
      • User experience is not considered.
      • Focus is on license fees and not total cost.

      Implementation Pitfalls

      • Absence of upfront planning
      • Lack of change management to facilitate adoption of the new platform
      • No quick wins that establish the value of the project early on
      • Inadequate initial or ongoing training

      Strategic Pitfalls

      • Poor alignment of BI goals with organization goals
      • Absence of CSFs/KPIs that can measure the qualitative and quantitative success of the project
      • No executive support during or after the project

      BI pitfalls are lurking around every corner, but a comprehensive strategy drafted upfront can help your organization overcome these obstacles. Info-Tech’s approach to BI has involvement from the business units built right into the process from the start and it equips IT to interact with key stakeholders early and often.

      Only 62% of Big Data and AI projects in 2019 provided measurable results.

      Source: NewVantage Partners LLC

      Business and IT have different priorities for a BI tool

      Business executives look for:

      • Ease of use
      • Speed and agility
      • Clear and concise information
      • Sustainability

      IT professionals are concerned about:

      • Solid security
      • Access controls on data
      • Compliance with regulations
      • Ease of integration

      Info-Tech Insight

      Combining these priorities will lead to better tool selection and more synergy.

      Elizabeth Mazenko

      The top-down BI Opportunity Analysis is a tool for senior executives to discover where Business Intelligence can provide value

      The image is of a top-down BI Opportunity Analysis.

      Example: Uncover BI opportunities with an opportunity analysis

      Industry Drivers Private label Rising input prices Retail consolidation
      Company strategies Win at supply chain execution Win at customer service Expand gross margins
      Value disciplines Strategic cost management Operational excellence Customer service
      Core processes Purchasing Inbound logistics Sales, service & distribution
      Enterprise management: Planning, budgeting, control, process improvement, HR
      BI Opportunities Customer service analysis Cost and financial analysis Demand management

      Williams (2016)

      Bridge the gap between business drivers and business intelligence features with a three-tiered framework

      Info-Tech’s approach to formulating a fit-for-purpose BI strategy is focused on making the link between factors that are the most important to the business users and the ways that BI providers can enable those consumers.

      Drivers to Establish Competitive Advantage

      • Operational Excellence
      • Client Intimacy
      • Innovation

      BI and Analytics Spectrum

      • Strategic Analytics
      • Tactical Analytics
      • Operational Analytics

      Info-Tech’s BI Patterns

      • Delivery
      • User Experience
      • Deep Analytics
      • Supporting

      This is the content for Layout H3 Tag

      Though business intelligence is primarily thought of as enabling executives, a comprehensive BI strategy involves a spectrum of analytics that can provide data-driven insight to all levels of an organization.

      Recommended

      Strategic Analytics

      • Typically focused on predictive modeling
      • Leverages data integrated from multiple sources (structured through unstructured)
      • Assists in identifying trends that may shift organizational focus and direction
      • Sample objectives:
        • Drive market share growth
        • Identify new markets, products, services, locations, and acquisitions
        • Build wider and deeper customer relationships earning more wallet share and keeping more customers

      Tactical Analytics

      • Often considered Response Analytics and used to react to situations that arise, or opportunities at a department level.
      • Sample objectives:
        • Staff productivity or cost analysis
        • Heuristics/algorithms for better risk management
        • Product bundling and packaging
        • Customer satisfaction response techniques

      Operational Analytics

      • Analytics that drive business process improvement whether internal, with external partners, or customers.
      • Sample objectives:
        • Process step elimination
        • Best opportunities for automation

      Business Intelligence Terminology

      Styles of BI New age BI New age data Functional Analytics Tools
      Reporting Agile BI Social Media data Performance management analytics Scorecarding dashboarding
      Ad hoc query SaaS BI Unstructured data Financial analytics Query & reporting
      Parameterized queries Pervasive BI Mobile data Supply chain analytics Statistics & data mining
      OLAP Cognitive Business Big data Customer analytics OLAP cubes
      Advanced analytics Self service analytics Sensor data Operations analytics ETL
      Cognitive business techniques Real-time Analytics Machine data HR Analytics Master data management
      Scorecards & dashboards Mobile Reporting & Analytics “fill in the blanks” analytics Data Governance

      Williams (2016)

      "BI can be confusing and overwhelming…"

      – Dirk Coetsee,

      Research Director,

      Info-Tech Research Group

      Business intelligence lies in the Information Dimensions layer of Info-Tech’s Data Management Framework

      The interactions between the information dimensions and overlying data management enablers such as data governance, data architecture, and data quality underscore the importance of building a robust process surrounding the other data practices in order to fully leverage your BI platform.

      Within this framework BI and analytics are grouped as one lens through which data assets at the business information level can be viewed.

      The image is the Information Dimensions layer of Info-Tech’s Data Management Framework

      Use Info-Tech’s three-phase approach to a Reporting & Analytics strategy and roadmap development

      Project Insight

      A BI program is not a static project that is created once and remains unchanged. Your strategy must be treated as a living platform to be revisited and revitalized in order to effectively enable business decision making. Develop a reporting and analytics strategy that propels your organization by building it on business goals and objectives, as well as comprehensive assessments that quantitatively and qualitatively evaluate your current reporting and analytical capabilities.

      Phase 1: Understand the Business Context and BI Landscape Phase 2: Evaluate Your Current BI Practice Phase 3: Create a BI Roadmap for Continuous Improvement
      1.1 Establish the Business Context
      • Business Vision, Goals, Key Drivers
      • Business Case Presentation
      • High-Level ROI
      2.1 Assess Your Current BI Maturity
      • BI Practice Assessment
      • Summary of Current State
      3.1 Construct a BI Initiative Roadmap
      • BI Improvement Initiatives
      • RACI
      • BI Strategy and Roadmap
      1.2 Assess Existing BI Environment
      • BI Perception Survey Framework
      • Usage Analyses
      • BI Report Inventory
      2.2 Envision BI Future State
      • BI Style Requirements
      • BI Practice Assessment
      3.2 Plan for Continuous Improvement
      • Excel/Access Governance Policy
      • BI Ambassador Network Draft
      1.3 Develop BI Solution Requirements
      • Requirements Gathering Principles
      • Overall BI Requirements

      Stand on the shoulders of Information Management giants

      As part of our research process, we leveraged the frameworks of COBIT5, Mike 2.0, and DAMA DMBOK2. Contextualizing business intelligence within these frameworks clarifies its importance and role and ensures that our assessment tool is focused on key priority areas.

      The DMBOK2 Data Management framework by the Data Asset Management Association (DAMA) provided a starting point for our classification of the components in our IM framework.

      Mike 2.0 is a data management framework that helped guide the development of our framework through its core solutions and composite solutions.

      The Cobit 5 framework and its business enablers were used as a starting point for assessing the performance capabilities of the different components of information management, including business intelligence.

      Info-Tech has a series of deliverables to facilitate the evolution of your BI strategy

      BI Strategy Roadmap Template

      BI Practice Assessment Tool

      BI Initiatives and Roadmap Tool

      BI Strategy and Roadmap Executive Presentation Template

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Reporting and Analytics Strategy – Project Overview

      1. Understand the Business Context and BI Landscape 2. Evaluate the Current BI Practice 3. Create a BI Roadmap for Continuous Improvement
      Best-Practice Toolkit

      1.1 Document overall business vision, mission, industry drivers, and key objectives; assemble a project team

      1.2 Collect in-depth information around current BI usage and BI user perception

      1.3 Create requirements gathering principles and gather requirements for a BI platform

      2.1 Define current maturity level of BI practice

      2.2 Envision the future state of your BI practice and identify desired BI patterns

      3.1 Build overall BI improvement initiatives and create a BI improvement roadmap

      3.2 Identify supplementary initiatives for enhancing your BI program

      Guided Implementations
      • Discuss Info-Tech’s approach for using business information to drive BI strategy formation
      • Review business context and discuss approaches for conducting BI usage and user analyses
      • Discuss strategies for BI requirements gathering
      • Discuss BI maturity model
      • Review practice capability gaps and discuss potential BI patterns for future state
      • Discuss initiative building
      • Review completed roadmap and next steps
      Onsite Workshop Module 1:

      Establish Business Vision and Understand the Current BI Landscape

      Module 2:

      Evaluate Current BI Maturity Identify the BI Patterns for the Future State

      Module 3:

      Build Improvement Initiatives and Create a BI Development Roadmap

      Phase 1 Outcome:
      • Business context
      • Project team
      • BI usage information, user perception, and new BI requirements
      Phase 2 Outcome:
      • Current and future state assessment
      • Identified BI patterns
      Phase 3 Outcome:
      • BI improvement strategy and initiative roadmap

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities

      Understand Business Context and Structure the Project

      1.1 Make the case for a BI strategy refresh.

      1.2 Understand business context.

      1.3 Determine high-level ROI.

      1.4 Structure the BI strategy refresh project.

      Understand Existing BI and Revisit Requirements

      2.1 Understand the usage of your existing BI.

      2.2 Gather perception of the current BI users.

      2.3 Document existing information artifacts.

      2.4 Develop a requirements gathering framework.

      2.5 Gather requirements.

      Revisit Requirements and Current Practice Assessment

      3.1 Gather requirements.

      3.2 Determine BI Maturity Level.

      3.3 Perform a SWOT for your existing BI program.

      3.4 Develop a current state summary.

      Roadmap Develop and Plan for Continuous Improvements

      5.1 Develop BI strategy.

      5.2 Develop a roadmap for the strategy.

      5.3 Plan for continuous improvement opportunities.

      5.4 Develop a re-strategy plan.

      Deliverables
      1. Business and BI Vision, Goals, Key Drivers
      2. Business Case Presentation
      3. High-Level ROI
      4. Project RACI
      1. BI Perception Survey
      2. BI Requirements Gathering Framework
      3. BI User Stories and Requirements
      1. BI User Stories and Requirements
      2. BI SWOT for your Current BI Program
      3. BI Maturity Level
      4. Current State Summary
      1. BI Strategy
      2. Roadmap accompanying the strategy with timeline
      3. A plan for improving BI
      4. Strategy plan

      Phase 2

      Understand the Business Context and BI Landscape

      Build a Reporting and Analytics Strategy

      Phase 1 overview

      Detailed Overview

      Step 1: Establish the business context in terms of business vision, mission, objectives, industry drivers, and business processes that can leverage Business Intelligence

      Step 2: Understand your BI Landscape

      Step 3: Understand business needs

      Outcomes

      • Clearly articulated high-level mission, vision, and key drivers from the business, as well as objectives related to business intelligence.
      • In-depth documentation regarding your organization’s BI usage, user perception, and outputs.
      • Consolidated list of requirements, existing and desired, that will direct the deployment of your BI solution.

      Benefits

      • Align business context and drivers with IT plans for BI and Analytics improvement.
      • Understand your current BI ecosystem’s performance.

      Understand your business context and BI landscape

      Phase 1 Overarching Insight

      The closer you align your new BI platform to real business interests, the stronger the buy-in, realized value, and groundswell of enthusiastic adoption will be. Get this phase right to realize a high ROI on your investment in the people, processes, and technology that will be your next generation BI platform.

      Understand the Business Context to Rationalize Your BI Landscape Evaluate Your Current BI Practice Create a BI Roadmap for Continuous Improvement
      Establish the Business Context
      • Business Vision, Goals, Key Drivers
      • Business Case Presentation
      • High-Level ROI
      Assess Your Current BI Maturity
      • SWOT Analysis
      • BI Practice Assessment
      • Summary of Current State
      Construct a BI Initiative Roadmap
      • BI Improvement Initiatives
      • BI Strategy and Roadmap
      Access Existing BI Environment
      • BI Perception Survey Framework
      • Usage Analyses
      • BI Report Inventory
      Envision BI Future State
      • BI Patterns
      • BI Practice Assessment
      • List of Functions
      Plan for Continuous Improvement
      • Excel Governance Policy
      • BI Ambassador Network Draft
      Undergo Requirements Gathering
      • Requirements Gathering Principles
      • Overall BI Requirements

      Track these metrics to measure your progress through Phase 1

      Goals for Phase 1:

      • Understand the business context. Determine if BI can be used to improve business outcomes by identifying benefits, costs, opportunities, and gaps.
      • Understand your existing BI. Plan your next generation BI based on a solid understanding of your existing BI.
      • Identify business needs. Determine the business processes that can leverage BI and Analytics.

      Info-Tech’s Suggested Metrics for Tracking Phase 1 Goals

      Practice Improvement Metrics Data Collection and Calculation Expected Improvement
      Monetary ROI
      • Quality of the ROI
      • # of user cases, benefits, and costs quantified
      Derive the number of the use cases, benefits, and costs in the scoping. Ask business SMEs to verify the quality. High-quality ROI studies are created for at least three use cases
      Response Rate of the BI Perception Survey Sourced from your survey delivery system Aim for 40% response rate
      # of BI Reworks Sourced from your project management system Reduction of 10% in BI reworks

      Intangible Metrics:

      1. Executives’ understanding of the BI program and what BI can do for the organization.
      2. Improved trust between IT and the business by re-opening the dialogue.
      3. Closer alignment with the organization strategy and business plan leading to higher value delivered.
      4. Increased business engagement and input into the Analytics strategy.

      Use advisory support to accelerate your completion of Phase 1 activities

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Understand the Business Context and BI Landscape

      Proposed Time to Completion: 2-4 weeks

      Step 1.0: Assemble Your Project Team

      Start with an analyst kick-off call:

      • Discuss Info-Tech’s viewpoint and definitions of business intelligence.
      • Discuss the project sponsorship, ideal team members and compositions.

      Then complete these activities…

      • Identify a project sponsor and the project team members.

      Step 1.1: Understand Your Business Context

      Start with an analyst kick-off call:

      • Discuss Info-Tech’s approach to BI strategy development around using business information as the key driver.

      Then complete these activities…

      • Detail the business context (vision, mission, goals, objectives, etc.).
      • Establish business–IT alignment for your BI strategy by detailing the business context.

      Step 1.2: Establish the Current BI Landscape

      Review findings with analyst:

      • Review the business context outputs from Step 1.1 activities.
      • Review Info-Tech’s approach for documenting your current BI landscape.
      • Review the findings of your BI landscape.

      Then complete these activities…

      • Gather information on current BI usage and perform a BI artifact inventory.
      • Construct and conduct a user perception survey.

      With these tools & templates:

      BI Strategy and Roadmap Template

      Step 1.0

      Assemble the Project Team

      Select a BI project sponsor

      Info-Tech recommends you select a senior executive with close ties to BI be the sponsor for this project (e.g. CDO, CFO or CMO). To maximize the chance of success, Info-Tech recommends you start with the CDO, CMO, CFO, or a business unit (BU) leader who represents strategic enterprise portfolios.

      Initial Sponsor

      CFO or Chief Risk Officer (CRO)

      • The CFO is responsible for key business metrics and cost control. BI is on the CFO’s radar as it can be used for both cost optimization and elimination of low-value activity costs.
      • The CRO is tasked with the need to identify, address, and when possible, exploit risk for business security and benefit.
      • Both of these roles are good initial sponsors but aren’t ideal for the long term.

      CDO or a Business Unit (BU) Leader

      • The CDO (Chief Data Officer) is responsible for enterprise-wide governance and utilization of information as an asset via data processing, analysis, data mining, information trading, and other means, and is the ideal sponsor.
      • BU leaders who represent a growth engine for a company look for ways to mine BI to help set direction.

      Ultimate Sponsor

      CEO

      • As a the primary driver of enterprise-wide strategy, the CEO is the ideal evangelist and project sponsor for your BI strategy.
      • Establishing a CEO–CIO partnership helps elevate IT to the level of a strategic partner, as opposed to the traditional view that IT’s only job is to “keep the lights on.”
      • An endorsement from the CEO may make other C-level executives more inclined to work with IT and have their business unit be the starting point for growing a BI program organically.

      "In the energy sector, achieving production KPIs are the key to financial success. The CFO is motivated to work with IT to create BI applications that drive higher revenue, identify operational bottlenecks, and maintain gross margin."

      – Yogi Schulz, Partner, Corvelle Consulting

      Select a BI project team

      Create a project team with the right skills, experience, and perspectives to develop a comprehensive strategy aligned to business needs.

      You may need to involve external experts as well as individuals within the organization who have the needed skills.

      A detailed understanding of what to look for in potential candidates is essential before moving forward with your BI project.

      Leverage several of Info-Tech’s Job Description Templates to aid in the process of selecting the right people to involve in constructing your BI strategy.

      Roles to Consider

      Business Stakeholders

      Business Intelligence Specialist

      Business Analyst

      Data Mining Specialist

      Data Warehouse Architect

      Enterprise Data Architect

      Data Steward

      "In developing the ideal BI team, your key person to have is a strong data architect, but you also need buy-in from the highest levels of the organization. Buy-in from different levels of the organization are indicators of success more than anything else."

      – Rob Anderson, Database Administrator and BI Manager, IT Research and Advisory Firm

      Create a RACI matrix to clearly define the roles and responsibilities for the parties involved

      A common project management pitfall for any endeavour is unclear definition of responsibilities amongst the individuals involved.

      As a business intelligence project requires a significant amount of back and forth between business and IT – bridged by the BI Steering Committee – clear guidelines at the project outset with a RACI chart provide a basic framework for assigning tasks and lines of communication for the later stages.

      Responsible Accountable Consulted Informed

      Obtaining Buy-in Project Charter Requirements Design Development Program Creation
      BI Steering Committee A C I I I C
      Project Sponsor - C I I I C
      Project Manager - R A I I C
      VP of BI R I I I I A
      CIO A I I I I R
      Business Analyst I I R C C C
      Solution Architect - - C A C C
      Data Architect - - C A C C
      BI Developer - - C C R C
      Data Steward - - C R C C
      Business SME C C C C C C

      Note: This RACI is an example of how role expectations would be broken down across the different steps of the project. Develop your own RACI based on project scope and participants.

      STEP 1.1

      Understand Your Business Context and Structure the Project

      Establish business–IT alignment for your BI strategy by detailing the business context

      Step Objectives

      • Engage the business units to find out where users need BI enablement.
      • Ideate preliminary points for improvement that will further business goals and calculate their value.

      Step Activities

      1.1.1 Craft the vision and mission statements for the Analytics program using the vision, mission, and strategies of your organization as basis.

      1.1.2 Articulate program goals and objectives

      1.1.3 Determine business differentiators and key drivers

      1.1.4 Brainstorm BI-specific constraints and improvement objectives

      Outcomes

      • Clearly articulated business context that will provide a starting point for formulating a BI strategy
      • High-level improvement objectives and ROI for the overall project
      • Vision, mission, and objectives of the analytics program

      Research Support

      • Info-Tech’s BI Strategy and Roadmap Template

      Proposed Participants in this Step

      • Project Manager
      • Project Team
      • Relevant Business Stakeholders and Subject Matter Experts

      Transform the way the business makes decisions

      Your BI strategy should enable the business to make fast, effective, and comprehensive decisions.

      Fast Effective Comprehensive
      Reduce time spent on decision-making by designing a BI strategy around information needs of key decision makers. Make the right data available to key decision makers. Make strategic high-value, impactful decisions as well as operational decisions.

      "We can improve BI environments in several ways. First, we can improve the speed with which we create BI objects by insisting that the environments are designed with flexibility and adaptability in mind. Second, we can produce higher quality deliverables by ensuring that IT collaborate with the business on every deliverable. Finally, we can reduce the costs of BI by giving access to the environment to knowledgeable business users and encouraging a self-service function."

      – Claudia Imhoff, Founder, Boulder BI Brain Trust, Intelligent Solutions Inc.

      Assess needs of various stakeholders using personas

      User groups/user personas

      Different users have different consumption and usage patterns. Categorize users into user groups and visualize the usage patterns. The user groups are the connection between the BI capabilities and the users.

      User groups Mindset Usage Pattern Requirements
      Front-line workers Get my job done; perform my job quickly. Reports (standard reports, prompted reports, etc.) Examples:
      • Report bursting
      • Prompted reports
      Analysts I have some ideas; I need data to validate and support my ideas. Dashboards, self-service BI, forecasting/budgeting, collaboration Examples:
      • Self-service datasets
      • Data mashup capability
      Management I need a big-picture view and yet I need to play around with the data to find trends to drive my business. Dashboards, scorecards, mobile BI, forecasting/budgeting Examples:
      • Multi-tab dashboards
      • Scorecard capability
      Data scientists I need to combine existing data, as well as external or new, unexplored data sources and types to find nuggets in the data. Data mashup, connections to data sources Examples:
      • Connectivity to big data
      • Social media analyses

      The pains of inadequate BI are felt across the entire organization – and land squarely on the shoulders of the CIO

      Organization:

      • Insufficient information to make decisions.
      • Unable to measure internal performance.
      • Losses incurred from bad decisions or delayed decisions.
      • Canned reports fail to uncover key insights.
      • Multiple versions of information exist in silos.

      IT Department

      • End users are completely dependent on IT for reports.
      • Ad hoc BI requests take time away from core duties.
      • Spreadsheet-driven BI is overly manual.
      • Business losing trust in IT.

      CIO

      • Under great pressure and has a strong desire to improve BI.
      • Ad hoc BI requests are consuming IT resources and funds.
      • My organization finds value in using data and having decision support to make informed decisions.

      The overarching question that needs to be continually asked to create an effective BI strategy is:

      How do I create an environment that makes information accessible and consumable to users, and facilitates a collaborative dialogue between the business and IT?

      Pre-requisites for success

      Prerequisite #1: Secure Executive Sponsorship

      Sponsorship of BI that is outside of IT and at the highest levels of the organization is essential to the success of your BI strategy. Without it, there is a high chance that your BI program will fail. Note that it may not be an epic fail, but it is a subtle drying out in many cases.

      Prerequisite #2: Understand Business Context

      Providing the right tools for business decision making doesn’t need to be a guessing game if the business context is laid as the project foundation and the most pressing decisions serve as starting points. And business is engaged in formulating and executing the strategy.

      Prerequisite #3: Deliver insights that lead to action

      Start with understanding the business processes and where analytics can improve outcomes. “Think business backwards, not data forward.” (McKinsey)

      11 reasons BI projects fail

      Lack of Executive support

      Old Technology

      Lack of business support

      Too many KPIs

      No methodology for gathering requirements

      Overly long project timeframes

      Bad user experience

      Lack of user adoption

      Bad data

      Lack of proper human resources

      No upfront definition of true ROI

      Mico Yuk, 2019

      Make it clear to the business that IT is committed to building and supporting a BI platform that is intimately tied to enabling changing business objectives.

      Leverage Info-Tech’s BI Strategy and Roadmap Template to accelerate BI planning

      How to accelerate BI planning using the template

      1. Prepopulated text that you can use for your strategy formulation:
      2. Prepopulated text that can be used for your strategy formulation
      3. Sample bullet points that you can pick and choose from:
      4. Sample bullet points to pick and choose from

      Document the BI program planning in Info-Tech’s

      BI Strategy and Roadmap Template.

      Activity: Describe your organization’s vision and mission

      1.1.1

      30-40 minutes

      Compelling vision and mission statements will help guide your internal members toward your company’s target state. These will drive your business intelligence strategy.

      1. Your vision clearly represents where your organization aspires to be in the future and aligns the entire organization. Write down a future-looking, inspirational, and realizable vision in one concise statement. Consider:
      • “Five years from now, our business will be _______.”
      • What do we want to do tomorrow? For whom? What is the benefit?
    • Your mission tells why your organization currently exists and clearly expresses how it will achieve your vision for the future. Write down a mission statement in one clear and concise paragraph consisting of, at most, five sentences. Consider:
      • Why does the business exist? What problems does it solve? Who are its customers?
      • How does the business accomplish strategic tasks or reach its target?
    • Reconvene stakeholders to share ideas and develop one concise vision statement and mission statement. Focus on clarity and message over wording.
    • Input

      • Business vision and mission statements

      Output

      • Alignment and understanding on business vision

      Materials

      Participants

      • BI project lead
      • Executive business stakeholders

      Info-Tech Insight

      Adjust your statements until you feel that you can elicit a firm understanding of both your vision and mission in three minutes or less.

      Formulating an Enterprise BI and Analytics Strategy: Top-down BI Opportunity analysis

      Top-down BI Opportunity analysis

      Example of deriving BI opportunities using BI Opportunity Analysis

      Industry Drivers Private label Rising input prices Retail consolidation
      Company strategies Win at supply chain execution Win at customer service Expand gross margins
      Value disciplines Strategic cost management Operational excellence Customer service
      Core processes Purchasing Inbound logistics Sales, service & distribution
      Enterprise management: Planning, budgeting, control, process improvement, HR
      BI Opportunities Customer service analysis Cost and financial analysis Demand management

      Williams 2016

      Get your organization buzzing about BI – leverage Info-Tech’s Executive Brief as an internal marketing tool

      Two key tasks of a project sponsor are to:

      1. Evangelize the realizable benefits of investing in a business intelligence strategy.
      2. Help to shift the corporate culture to one that places emphasis on data-driven insight.

      Arm your project sponsor with our Executive Brief for this blueprint as a quick way to convey the value of this project to potential stakeholders.

      Bolster this presentation by adding use cases and metrics that are most relevant to your organization.

      Develop a business framework

      Identifying organizational goals and how data can support those goals is key to creating a successful BI & Analytical strategy. Rounding out the business model with technology drivers, environmental factors (as described in previous steps), and internal barriers and enablers creates a holistic view of Business Intelligence within the context of the organization as a whole.

      Through business engagement and contribution, the following holistic model can be created to understand the needs of the business.

      business framework holistic model

      Activity: Describe the Industry Drivers and Organization strategy to mitigate the risk

      1.1.2

      30-45 minutes

      Industry drivers are external influencers that has an effect on a business such as economic conditions, competitor actions, trade relations, climate etc. These drivers can differ significantly by industry and even organizations within the same industry.

      1. List the industry drivers that influences your organization:
      • Public sentiment in regards to energy source
      • Rising cost of raw materials due to increase demand
    • List the company strategies, goals, objectives to counteract the external influencers:
      • Change production process to become more energy efficient
      • Win at customer service
    • Identify the value disciplines :
      • Strategic cost management
      • Operational Excellence
    • List the core process that implements the value disciplines :
      • Purchasing
      • Sales
    • Identify the BI Opportunities:
      • Cost and financial analysis
      • Customer service analysis

      Input

      • Industry drivers

      Output

      • BI Opportunities that business can leverage

      Materials

      • Industry driver section in the BI Strategy and Roadmap Template

      Participants

      • BI project lead
      • Executive business stakeholders

      Understand BI and analytics drivers and organizational objectives

      Environmental Factors Organizational Goals Business Needs Technology Drivers
      Definition External considerations are factors taking place outside the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business. Organizational drivers can be thought of as business-level metrics. These are tangible benefits the business can measure, such as customer retention, operation excellence, and/or financial performance. A requirement that specifies the behavior and the functions of a system. Technology drivers are technological changes that have created the need for a new BI solution. Many organizations turn to technology systems to help them obtain a competitive edge.
      Examples
      • Economy and politics
      • Laws and regulations
      • Competitive influencers
      • Time to market
      • Quality
      • Delivery reliability
      • Audit tracking
      • Authorization levels
      • Business rules
      • Deployment in the cloud
      • Integration
      • Reporting capabilities

      Activity: Discuss BI/Analytics drivers and organizational objectives

      1.1.3

      30-45 minutes

      1. Use the industry drivers and business goals identified in activity 1.1.2 as a starting point.
      2. Understand how the company runs today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard and markers to capture key findings.
      3. Take into account External Considerations, Organizational Drivers, Technology Drivers, and Key Functional Requirements.
      External Considerations Organizational Drivers Technology Considerations Functional Requirements
      • Funding Constraints
      • Regulations
      • Compliance
      • Scalability
      • Operational Efficiency
      • Data Accuracy
      • Data Quality
      • Better Reporting
      • Information Availability
      • Integration Between Systems
      • Secure Data

      Identify challenges and barriers to the BI project

      There are several factors that may stifle the success of a BI implementation. Scan the current environment to identify internal barriers and challenges to identify potential challenges so you can meet them head-on.

      Common Internal Barriers

      Management Support
      Organizational Culture
      Organizational Structure
      IT Readiness
      Definition The degree of management understanding and acceptance towards BI solutions. The collective shared values and beliefs. The functional relationships between people and departments in an organization. The degree to which the organization’s people and processes are prepared for a new BI solution.
      Questions
      • Is a BI project recognized as a top priority?
      • Will management commit time to the project?
      • Are employees resistant to change?
      • Is the organization highly individualized?
      • Is the organization centralized?
      • Is the organization highly formalized?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      Impact
      • Funding
      • Resources
      • Knowledge sharing
      • User acceptance
      • Flow of knowledge
      • Poor implementation
      • Reliance on consultants

      Activity: Discuss BI/Analytics challenges and pain points

      1.1.4

      30-45 minutes

      1. Identify challenges with the process identified in step 1.1.2.
      2. Brainstorm potential barriers to successful BI implementation and adoption. Use a whiteboard and marker to capture key findings.
      3. Consider Functional Gaps, Technical Gaps, Process Gaps, and Barriers to BI Success.
      Functional Gaps Technical Gaps Process Gaps Barriers to Success
      • No online purchase order requisition
      • Inconsistent reporting – data quality concerns
      • Duplication of data
      • Lack of system integration
      • Cultural mindset
      • Resistance to change
      • Lack of training
      • Funding

      Activity: Discuss opportunities and benefits

      1.1.5

      30-45 minutes

      1. Identify opportunities and benefits from an integrated system.
      2. Brainstorm potential enablers for successful BI implementation and adoption. Use a whiteboard and markers to capture key findings.
      3. Consider Business Benefits, IT Benefits, Organizational Benefits, and Enablers of BI success.
      Business Benefits IT Benefits Organizational Benefits Enablers of Success
      • Business-IT alignment
      • Compliance
      • Scalability
      • Operational Efficiency
      • Data Accuracy
      • Data Quality
      • Better Reporting
      • Change management
      • Training
      • Alignment to strategic objectives

      Your organization’s framework for Business Intelligence Strategy

      Blank organization framework for Business Intelligence Strategy

      Example: Business Framework for Data & Analytics Strategy

      The following diagram represents [Client]’s business model for BI and data. This holistic view of [Client]’s current environment serves as the basis for the generation of the business-aligned Data & Analytics Strategy.

      The image is an example of Business Framework for Data & Analytics Strategy.

      Info-Tech recommends balancing a top-down approach with bottom up for building your BI strateg

      Taking a top-down approach will ensure senior management’s involvement and support throughout the project. This ensures that the most critical decisions are supported by the right data/information, aligning the entire organization with the BI strategy. Furthermore, the gains from BI will be much more significant and visible to the rest of the organization.

      Two charts showing the top-down and bottom-up approach.

      Far too often, organizations taking a bottom-up approach to BI will fail to generate sufficient buy-in and awareness from senior management. Not only does a lack of senior involvement result in lower adoption from the tactical and operational levels, but more importantly, it also means that the strategic decision makers aren’t taking advantage of BI.

      Estimate the ROI of your BI and analytics strategy to secure executive support

      The value of creating a new strategy – or revamping an existing one – needs to be conveyed effectively to a high-level stakeholder, ideally a C-level executive. That executive buy-in is more likely to be acquired when effort has been made to determine the return on investment for the overall initiative.

      1. Business Impacts
        New revenue
        Cost savings
        Time to market
        Internal Benefits
        Productivity gain
        Process optimization
        Investment
        People – employees’ time, external resources
        Data – cost for new datasets
        Technology – cost for new technologies
      2. QuantifyCan you put a number or a percentage to the impacts and benefits? QuantifyCan you estimate the investments you need to put in?
      3. TranslateTranslate the quantities into dollar value
      4. The image depicts an equation for ROI estimate

      Example

      One percent increase in revenue; three more employees $225,000/yr, $150,000/yr 50%

      Activity: Establish a high-level ROI as part of an overall use case for developing a fit-for-purpose BI strategy

      1.1.6

      1.5 hours

      Communicating an ROI that is impactful and reasonable is essential for locking in executive-level support for any initiative. Use this activity as an initial touchpoint to bring business and IT perspectives as part of building a robust business case for developing your BI strategy.

      1. Revisit the business context detailed in the previous sections of this phase. Use priority objectives to identify use case(s), ideally where there are easily defined revenue generators/cost reductions (e.g. streamlining the process of mailing physical marketing materials to customers).
      2. Assign research tasks around establishing concrete numbers and dollar values.
      • Have a subject matter expert weigh in to validate your figures.
      • When calculating ROI, consider how you might leverage BI to create opportunities for upsell, cross-sell, or increased customer retention.
    • Reconvene the stakeholder group and discuss your findings.
      • This is the point where expectation management is important. Separate the need-to-haves from the nice-to-haves.

      Emphasize that ROI is not fully realized after the first implementation, but comes as the platform is built upon iteratively and in an integrated fashion to mature capabilities over time.

      Input

      • Vision statement
      • Mission statement

      Output

      • Business differentiators and key drivers

      Materials

      • Benefit Cost Analysis section of the BI Strategy and Roadmap Template

      Participants

      • BI project lead
      • Executive IT & business stakeholders

      An effective BI strategy positions business intelligence in the larger data lifecycle

      In an effort to keep users satisfied, many organizations rush into implementing a BI platform and generating reports for their business users. BI is, first and foremost, a presentation layer; there are several stages in the data lifecycle where the data that BI visualizes can be compromised.

      Without paying the appropriate amount of attention to the underlying data architecture and application integration, even the most sophisticated BI platforms will fall short of providing business users with a holistic view of company information.

      Example

      In moving away from single application-level reporting, a strategy around data integration practices and technology is necessary before the resultant data can be passed to the BI platform for additional analyses and visualization.

      BI doesn’t exist in a vacuum – develop an awareness of other key data management practices

      As business intelligence is primarily a presentation layer that allows business users to visualize data and turn information into actionable decisions, there are a number of data management practices that precede BI in the flow of data.

      Data Warehousing

      The data warehouse structures source data in a manner that is more operationally focused. The Reporting & Analytics Strategy must inform the warehouse strategy on data needs and building a data warehouse to meet those needs.

      Data Integration, MDM & RDM

      The data warehouse is built from different sources that must be integrated and normalized to enable Business Intelligence. The Info-Tech integration and MDM blueprints will guide with their implementation.

      Data Quality

      A major roadblock to building an effective BI solution is a lack of accurate, timely, consistent, and relevant data. Use Info-Tech’s blueprint to refine your approach to data quality management.

      Data quality, poor integration/P2P integration, poor data architecture are the primary barriers to truly leveraging BI, and a lot of companies haven’t gotten better in these areas.

      – Shari Lava, Associate Vice-President, IT Research and Advisory Firm

      Building consensus around data definitions across business units is a critical step in carrying out a BI strategy

      Business intelligence is heavily reliant on the ability of an organization to mesh data from different sources together and create a holistic and accurate source of truth for users.

      Useful analytics cannot be conducted if your business units define key business terms differently.

      Example

      Finance may label customers as those who have transactional records with the organization, but Marketing includes leads who have not yet had any transactions as customers. Neglecting to note these seemingly small discrepancies in data definition will undermine efforts to combine data assets from traditionally siloed functional units.

      In the stages prior to implementing any kind of BI platform, a top priority should be establishing common definitions for key business terms (customers, products, accounts, prospects, contacts, product groups, etc.).

      As a preliminary step, document different definitions for the same business terms so that business users are aware of these differences before attempting to combine data to create custom reports.

      Self-Assessment

      Do you have common definitions of business terms?

      • If not, identify common business terms.
      • At the very least, document different definitions of the same business terms so the corporate can compare and contrast them.

      STEP 1.2

      Assess the Current BI Landscape

      Establish an in-depth understanding of your current BI landscape

      Step Objectives

      • Inventory and assess the state of your current BI landscape
      • Document the artifacts of your BI environment

      Step Activities

      1.2.1 Analyze the usage levels of your current BI programs/platform

      1.2.2 Perform a survey to gather user perception of your current BI environment

      1.2.3 Take an inventory of your current BI artifacts

      Outcomes

      • Summarize the qualitative and quantitative performance of your existing BI environment
      • Understand the outputs coming from your BI sources

      Research Support

      • Info-Tech’s BI Strategy and Roadmap Template

      Project Manager

      Data Architect(s) or Enterprise Architect

      Project Team

      Understand your current BI landscape before you rationalize

      Relying too heavily on technology as the sole way to solve BI problems results in a more complex environment that will ultimately frustrate business users. Take the time to thoroughly assess the current state of your business intelligence landscape using a qualitative (user perception) and quantitative (usage statistics) approach. The insights and gaps identified in this step will serve as building blocks for strategy and roadmap development in later phases.

      Phase 1

      Current State Summary of BI Landscape

      1.2.1 1.2.2 1.2.3 1.2.4
      Usage Insights Perception Insights BI Inventory Insights Requirements Insights

      PHASE 2

      Strategy and Roadmap Formulation

      Gather usage insights to pinpoint the hot spots for BI usage amongst your users

      Usage data reflects the consumption patterns of end users. By reviewing usage data, you can identify aspects of your BI program that are popular and those that are underutilized. It may present some opportunities for trimming some of the underutilized content.

      Benefits of analyzing usage data:

      • Usage is a proxy for popularity and usability of the BI artifacts. The popular content should be kept and improved in your next generation BI.
      • Usage information provides insight on what, when, where, and how much users are consuming BI artifacts.
      • Unlike methods such as user interviews and focus groups, usage information is fact based and is not subject to peer pressure or “toning down.”

      Sample Sources of Usage Data:

      1. Usage reports from your BI platform Many BI platforms have out-of-the-box usage reports that log and summarize usage data. This is your ideal source for usage data.
      2. Administrator console in your BI platformBI platforms usually have an administrator console that allows BI administrators to configure settings and to monitor activities that include usage. You may obtain some usage data in the console. Note that the usage data is usually real-time in nature, and you may not have access to a historical view of the BI usage.

      Info-Tech Insight

      Don’t forget some of the power users. They may perform analytics by accessing datasets directly or with the help of a query tool (even straight SQL statements). Their usage information is important. The next generation BI should provide consumption options for them.

      Accelerate the process of gathering user feedback with Info-Tech’s Application Portfolio Assessment (APA)

      In an environment where multiple BI tools are being used, discovering what works for users and what doesn’t is an important first step to rationalizing the BI landscape.

      Info-Tech’s Application Portfolio Assessment allows you to create a custom survey based on your current applications, generate a custom report that will help you visualize user satisfaction levels, and pinpoint areas for improvement.

      Activity: Review and analyze usage data

      1.2.1

      2 hours

      This activity helps you to locate usage data in your existing environment. It also helps you to review and analyze usage data to come up with a few findings.

      1. Get to the usage source. You may obtain usage data from one of the below options. Usage reports are your ideal choice, followed by some alternative options:
      2. a. Administrator console – limited to real-time or daily usage data. You may need to track usage data over for several days to identify patterns.

        b. Info-Tech’s Application Portfolio Assessment (APA).

        c. Other – be creative. Some may use an IT usage monitoring system or web analytics to track time users spent on the BI portal.

      3. Develop categories for classifying the different sources of usage data in your current BI environment. Use the following table as starting point for creating these groups:

      This is the content for Layout H4 Tag

      By Frequency Real Time Daily Weekly Yearly
      By Presentation Format Report Dashboard Alert Scorecard
      By Delivery Web portal Excel PDF Mobile application

      INPUT

      • Usage reports
      • Usage statistics

      OUTPUT

      • Insights pertaining to usage patterns

      Materials

      • Usage Insights of the BI Strategy and Roadmap Template

      Participants

      • BA
      • BI Administrator
      • PM

      Activity: Review and analyze usage (cont.)

      1.2.1

      2 hours

      3. Sort your collection of BI artifacts by usage. Discuss some of the reasons why some content is popular whereas some has no usage at all.

      Popular BI Artifacts – Discuss improvements, opportunities and new artifacts

      Unpopular BI Artifacts – Discuss retirement, improvements, and realigning information needs

      4. Summarize your findings in the Usage Insights section of the BI Strategy and Roadmap Template.

      INPUT

      • Usage reports
      • Usage statistics

      OUTPUT

      • Insights pertaining to usage patterns

      Materials

      • Usage Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA
      • BI Administrator
      • PM

      Gather perception to understand the existing BI users

      In 1.2.1, we gathered the statistics for BI usage; it’s the hard data telling who uses what. However, it does not tell you the rationale, or the why, behind the usage. Gathering user perception and having conversations with your BI consumers is the key to bridging the gap.

      User Perception Survey

      Helps you to:

      1. Get general insights on user perception
      2. Narrow down to selected areas

      User Interviews

      Perception can be gathered by user interviews and surveys. Conducting user interviews takes time so it is a good practice to get some primary insights via survey before doing in-depth interviews in selected areas.

      – Shari Lava, Associate Vice-President, IT Research and Advisory Firm

      Define problem statements to create proof-of-concept initiatives

      Info-Tech’s Four Column Model of Data Flow

      Find a data-related problem or opportunity

      Ask open-ended discovery questions about stakeholder fears, hopes, and frustrations to identify a data-related problem that is clear, contained, and fixable. This is then to be written as a problem/opportunity statement.

      1. Fear: What is the number one risk you need to alleviate?
      2. Hope: What is the number one opportunity you wish to realize?
      3. Frustration: What is the number one annoying pet peeve you wish to scratch?
      4. Next, gather information to support a problem/opportunity statement:

      5. What are your challenges in performing the activity or process today?
      6. What does amazing look like if we solve this perfectly?
      7. What other business activities/processes will be impacted/improved if we solve this?
      8. What compliance/regulatory/policy concerns do we need to consider in any solution?
      9. What measures of success/change should we use to prove value of the effort (KPIs/ROI)?
      10. What are the steps in the process/activity?
      11. What are the applications/systems used at each step and from step to step?
      12. What data elements are created, used, and/or transformed at each step?

      Leverage Info-Tech’s BI survey framework to initiate a 360° perception survey

      Info-Tech has developed a BI survey framework to help existing BI practices gather user perception via survey. The framework is built upon best practices developed by McLean & Company.

      1. Communicate the survey
      2. Create a survey
      3. Conduct the survey
      4. Collect and clean survey data
      5. Analyze survey data
      6. Conduct follow-up interviews
      7. Identify and prioritize improvement initiatives

      The survey takes a comprehensive approach by examining your existing BI practices through the following lenses:

      360° Perception

      Demographics Who are the users? From which department?
      Usage How is the current BI being used?
      People Web portal
      Process How good is your BI team from a user perspective?
      Data How good is the BI data in terms of quality and usability?
      Technology How good are your existing BI/reporting tools?
      Textual Feedback The sky’s the limit. Tell us your comments and ideas via open-ended questions.

      Use Info-Tech’s BI End-User Satisfaction Survey Framework to develop a comprehensive BI survey tailored to your organization.

      Activity: Develop a plan to gather user perception of your current BI program

      1.2.2

      2 hours

      This activity helps you to plan for a BI perception survey and subsequent interviews.

      1. Proper communication while conducting surveys helps to boost response rate. The project team should have a meeting with business executives to decide:
      • The survey goals
      • Which areas to cover
      • Which trends and hypotheses you want to confirm
      • Which pre-, during, and post-survey communications should be sent out
    • Have the project team create the first draft of the survey for subsequent review by select business stakeholders. Several iterations may be needed before finalizing.
    • In planning for the conclusion of the survey, the project team should engage a data analyst to:
      1. Organize the data in a useful format
      2. Clean up the survey data when there are gaps
      3. Summarize the data into a presentable/distributable format

      Collectively, the project team and the BI consuming departments should review the presentation and discuss these items:

      Misalignment

      Opportunities

      Inefficiencies

      Trends

      Need detailed interviews?

      INPUT

      • Usage information and analyses

      OUTPUT

      • User-perception survey

      Materials

      • Perception Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA
      • BI Administrator
      • PM
      • Business SMEs

      Create a comprehensive inventory of your BI artifacts

      Taking an inventory of your BI artifacts allows you to understand what deliverables have been developed over the years. Inventory taking should go beyond the BI content. You may want to include additional information products such as Excel spreadsheets, reports that are coming out of an Access database, and reports that are generated from front-end applications (e.g. Salesforce).

      1. Existing Reports from BI platform

      2. If you are currently using a BI platform, you have some BI artifacts (reports, scorecards, dashboards) that are developed within the platform itself.

      • BI Usage Reports (refer to step 2.1) – if you are getting a comprehensive BI usage reports for all your BI artifacts, there is your inventory report too.
      • BI Inventory Reports – Your BI platform may provide out-of-the-box inventory reports. You can use them as your inventory.
      • If the above options are not feasible, you may need to manually create the BI inventory. You may build that from some of your existing BI documentations to save time.
    • Excel and Access

      • Work with the business units to identify if Excel and Access are used to generate reports.
    • Application Reports

      • Data applications such as Salesforce, CRM, and ERP often provide reports as an out-of-the-box feature.
      • Those reports only include data within their respective applications. However, this may present opportunities for integrating application data with additional data sources.

      Activity: Inventory your BI artifacts

      1.2.3

      2+ hours

      This activity helps you to inventory your BI information artifacts and other related information artifacts.

      1. Define the scope of your inventory. Work with the project sponsor and CIO to define which sources should be captured in the inventory process. Consider: BI inventory, Excel spreadsheets, Access reports, and application reporting.
      2. Define the depth of your inventory. Work with the project sponsor and CIO to define the level of granularity. In some settings, the artifact name and a short description may be sufficient. In other cases, you may need to document users and business logic of the artifacts.
      3. Review the inventory results. Discuss findings and opportunities around the following areas:

      Interpret your Inventory

      Duplicated reports/ dashboards Similar reports/ dashboards that may be able to merge Excel and Access reports that are using undocumented, unconventional business logics Application reports that need to be enhanced by additional data Classify artifacts by BI Type

      INPUT

      • Current BI artifacts and documents
      • BI Type classification

      OUTPUT

      • Summary of BI artifacts

      Materials

      • BI Inventory Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA
      • Data analyst
      • PM
      • Project sponsor

      Project sponsor

      1.2.4

      2+ hours

      This activity helps you to inventory your BI by report type.

      1. Classify BI artifacts by type. Use the BI Type tool to classify Work with the project sponsor and CIO to define which sources should be captured in the inventory process. Consider: BI inventory, Excel spreadsheets, Access reports, and application reporting.
      2. Define the depth of your inventory. Work with the project sponsor and CIO to define the level of granularity. In some settings, the artifact name and a short description may be sufficient. In other cases, you may need to document users and business logic of the artifacts.
      3. Review the inventory results. Discuss findings and opportunities around the following areas:

      Interpretation of your Inventory

      Duplicated reports/dashboards Similar reports/dashboards that may be able to merge Excel and Access reports that are using undocumented, unconventional business logics Application reports that need to be enhanced by additional data

      INPUT

      • The BI Type as used by different business units
      • Business BI requirements

      OUTPUT

      • Summary of BI type usage across the organization

      Materials

      • BI Inventory Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA
      • Data analyst
      • PM
      • Project sponsor

      STEP 1.3

      Undergo BI Requirements Gathering

      Perform requirements gathering for revamping your BI environment

      Step Objectives

      • Create principles that will direct effective requirements gathering
      • Create a list of existing and desired BI requirements

      Step Activities

      1.3.1 Create requirements gathering principles

      1.3.2 Gather appropriate requirements

      1.3.3 Organize and consolidate the outputs of requirements gathering activities

      Outcomes

      • Requirements gathering principles that are flexible and repeatable
      • List of BI requirements

      Research Support

      • Info-Tech’s BI Strategy and Roadmap Template

      Proposed Participants in this Step

      Project Manager

      Data Architect(s) or Enterprise Architect

      Project Team

      Business Users

      Don’t let your new BI platform become a victim of poor requirements gathering

      The challenges in requirements management often have underlying causes; find and eliminate the root causes rather than focusing on the symptoms.

      Root Causes of Poor Requirements Gathering:

      • Requirements gathering procedures exist but aren’t followed.
      • There isn't enough time allocated to the requirements gathering phase.
      • There isn't enough involvement or investment secured from business partners.
      • There is no senior leadership involvement or mandate to fix requirements gathering.
      • There are inadequate efforts put towards obtaining and enforcing sign off.

      Outcomes of Poor Requirements Gathering:

      • Rework due to poor requirements leads to costly overruns.
      • Final deliverables are of poor quality and are implemented late.
      • Predicted gains from deployed applications are not realized.
      • There are low feature utilization rates by end users.
      • Teams are frustrated within IT and the business.

      Info-Tech Insight

      Requirements gathering is the number one failure point for most development or procurement projects that don’t deliver value. This has been, and continues to be, the case as most organizations still don't get requirements gathering right. Overcoming organizational cynicism can be a major obstacle to clear when it is time to optimize the requirements gathering process.

      Define the attributes of a good requirement to help shape your requirements gathering principles

      A good requirement has the following attributes:

      Verifiable It is stated in a way that can be tested.
      Unambiguous It is free of subjective terms and can only be interpreted in one way.
      Complete It contains all relevant information.
      Consistent It does not conflict with other requirements.
      Achievable It is possible to accomplish given the budgetary and technological constraints.
      Traceable It can be tracked from inception to testing.
      Unitary It addresses only one thing and cannot be deconstructed into multiple requirements.
      Accurate It is based on proven facts and correct information.

      Other Considerations

      Organizations can also track a requirement owner, rationale, priority level (must have vs. nice to have), and current status (approved, tested, etc.).

      Info-Tech Insight

      Requirements must be solution agnostic – they should focus on the underlying need rather than the technology required to satisfy the need.

      Activity: Define requirements gathering principles

      1.3.1

      1 hour

      1. Invite representatives from the project management office, project management team, and BA team, as well as some key business stakeholders.
      2. Use the sample categories and principles in the table below as starting points for creating your own requirements gathering principles.
      3. Document the requirements gathering principles in the BI Strategy and Roadmap Template.
      4. Communicate the requirements gathering principles to the affected BI stakeholders.

      Sample Principles to Start With

      Effectiveness Face-to-face interviews are preferred over phone interviews.
      Alignment Clarify any misalignments, even the tiniest ones.
      Validation Rephrase requirements at the end to validate requirements.
      Ideation Use drawings and charts to explain ideas.
      Demonstration Make use of Joint Application Development (JAD) sessions.

      INPUT

      • Existing requirement principles (if any)

      OUTPUT

      • Requirements gathering principles that can be revisited and reused

      Materials

      • Requirements Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA Team
      • PM
      • Business stakeholders
      • PMO

      Info-Tech Insight

      Turn requirements gathering principles into house rules. The house rules should be available in every single requirements gathering session and the participants should revisit them when there are disagreements, confusion, or silence.

      Right-size your approach to BI requirements management

      Info-Tech suggests four requirements management approaches based on project complexity and business significance. BI projects usually require the Strategic Approach in requirements management.

      Requirements Management Process Explanations

      Approach Definition Recommended Strategy
      Strategic Approach High business significance and high project complexity merits a significant investment of time and resources in requirements gathering. Treat the requirements gathering phase as a project within a project. A large amount of time should be dedicated to elicitation, business process mapping, and solution design.
      Fundamental Approach High business significance and low project complexity merits a heavy emphasis on the elicitation phase to ensure that the project bases are covered and business value is realized. Look to achieve quick wins and try to survey a broad cross-section of stakeholders during elicitation and validation. The elicitation phase should be highly iterative. Do not over-complicate the analysis and validation of a straightforward project.
      Calculated Approach Low business significance and high project complexity merits a heavy emphasis on the analysis and validation phases to ensure that the solution meets the needs of users. Allocate a significant amount of time to business process modeling, requirements categorization, prioritization, and solution modeling.
      Elementary Approach Low business significance and low project complexity does not merit a high amount of rigor for requirements gathering. Do not rush or skip steps, but aim to be efficient. Focus on basic elicitation techniques (e.g. unstructured interviews, open-ended surveys) and consider capturing requirements as user stories. Focus on efficiency to prevent project delays and avoid squandering resources.

      Vary the modes used in eliciting requirements from your user base

      Requirements Gathering Modes

      Info-Tech has identified four effective requirements gathering modes. During the requirements gathering process, you may need to switch between the four gathering modes to establish a thorough understanding of the information needs.

      Dream Mode

      • Mentality: Let users’ imaginations go wild. The sky’s the limit.
      • How it works: Ask users to dream up the ideal future state and ask how analytics can support those dreams.
      • Limitations: Not all dreams can be fulfilled. A variety of constraints (budget, personnel, technical skills) may prevent the dreams from becoming reality.

      Pain Mode

      • Mentality: Users are currently experiencing pains related to information needs.
      • How it works: Vent the pains. Allow end users to share their information pains, ask them how their pains can be relieved, then convert those pains to requirements.
      • Limitations: Users are limited by the current situation and aren’t looking to innovate.

      Decode Mode

      • Mentality: Read the hidden messages from users. Speculate as to what the users really want.
      • How it works: Decode the underlying messages. Be innovative to develop hypotheses and then validate with the users.
      • Limitations: Speculations and hypothesis could be invalid. They may direct the users into some pre-determined directions.

      Profile Mode

      • Mentality: “I think you may want XYZ because you fall into that profile.”
      • How it works: The information user may fall into some existing user group profile or their information needs may be similar to some existing users.
      • Limitations: This mode doesn’t address very specific needs.

      Supplement BI requirements with user stories and prototyping to ensure BI is fit for purpose

      BI is a continually evolving program. BI artifacts that were developed in the past may not be relevant to the business anymore due to changes in the business and information usage. Revamping your BI program entails revisiting some of the BI requirements and/or gathering new BI requirements.

      Three-Step Process for Gathering Requirements

      Requirements User Stories Rapid Prototyping
      Gather requirements. Most importantly, understand the business needs and wants. Leverage user stories to organize and make sense of the requirements. Use a prototype to confirm requirements and show the initial draft to end users.

      Pain Mode: “I can’t access and manipulate data on my own...”

      Decode Mode: Dig deeper: could this hint at a self-service use case?

      Dream Mode: E.g. a sandbox area where I can play around with clean, integrated, well-represented data.

      Profile Mode: E.g. another marketing analyst is currently using something similar.

      ExampleMary has a spreadmart that keeps track of all campaigns. Maintaining and executing that spreadmart is time consuming.

      Mary is asking for a mash-up data set that she can pivot on her own…

      Upon reviewing the data and the prototype, Mary decided to use a heat map and included two more data points – tenure and lifetime value.

      Identify which BI styles best meet user requirements

      A spectrum of Business Intelligence solutions styles are available. Use Info-Tech’s BI Styles Tool to assess which business stakeholder will be best served by which style.

      Style Description Strategic Importance (1-5) Popularity (1-5) Effort (1-5)
      Standards Preformatted reports Standard, preformatted information for backward-looking analysis. 5 5 1
      User-defined analyses Pre-staged information where “pick lists” enable business users to filter (select) the information they wish to analyze, such as sales for a selected region during a selected previous timeframe. 5 4 2
      Ad-hoc analyses Power users write their own queries to extract self-selected pre-staged information and then use the information to perform a user-created analysis. 5 4 3
      Scorecards and dashboards Predefined business performance metrics about performance variables that are important to the organization, presented in a tabular or graphical format that enables business users to see at a glance how the organization is performing. 4 4 3
      Multidimensional analysis (OLAP) Multidimensional analysis (also known as on-line analytical processing): Flexible tool-based, user-defined analysis of business performance and the underlying drivers or root causes of that performance. 4 3 3
      Alerts Predefined analyses of key business performance variables, comparison to a performance standard or range, and communication to designated businesspeople when performance is outside the predefined performance standard or range. 4 3 3
      Advanced Analytics Application of long-established statistical and/or operations research methods to historical business information to look backward and characterize a relevant aspect of business performance, typically by using descriptive statistics. 5 3 4
      Predictive Analytics Application of long-established statistical and/or operations research methods and historical business information to predict, model, or simulate future business and/or economic performance and potentially prescribe a favored course of action for the future. 5 3 5

      Activity: Gather BI requirements

      1.3.2

      2-6 hours

      Using the approaches discussed on previous slides, start a dialogue with business users to confirm existing requirements and develop new ones.

      1. Invite business stakeholders to a requirements gathering session.
      2. For existing BI artifacts – Invite existing users of those artifacts.

        For new BI development – Invite stakeholders at the executive level to understand the business operation and their needs and wants. This is especially important if their department is new to BI.

      3. Discuss the business requirements. Systematically switch between the four requirements gathering modes to get a holistic view of the requirements.
      4. Once requirements are gathered, organize them to tell a story. A story usually has these components:
      The Setting The Characters The Venues The Activities The Future
      Example Customers are asking for a bundle discount. CMO and the marketing analysts want to… …the information should be available in the portal, mobile, and Excel. …information is then used in the bi-weekly pricing meeting to discuss… …bundle information should contain historical data in a graphical format to help executives.

      INPUT

      • Existing documentations on BI artifacts

      OUTPUT

      • Preliminary, uncategorized list of BI requirements

      Materials

      • Requirements Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA team
      • Business stakeholders
      • Business SMEs
      • BI developers

      Clarify consumer needs by categorizing BI requirements

      Requirements are too broad in some situations and too detailed in others. In the previous step we developed user stories to provide context. Now you need to define requirement categories and gather detailed requirements.

      Considerations for Requirement Categories

      Category Subcategory Sample Requirements
      Data Granularity Individual transaction
      Transformation Transform activation date to YYYY-MM format
      Selection Criteria Client type: consumer. Exclude SMB and business clients. US only. Recent three years
      Fields Required Consumer band, Region, Submarket…
      Functionality Filters Filters required on the dashboard: date range filter, region filter…
      Drill Down Path Drill down from a summary report to individual transactions
      Analysis Required Cross-tab, time series, pie chart
      Visual Requirements Mock-up See attached drawing
      Section The dashboard will be presented using three sections
      Conditional Formatting Below-average numbers are highlighted
      Security Mobile The dashboard needs to be accessed from mobile devices
      Role Regional managers will get a subset of the dashboard according to the region
      Users John, Mary, Tom, Bob, and Dave
      Export Dashboard data cannot be exported into PDF, text, or Excel formats
      Performance Speed A BI artifact must be loaded in three seconds
      Latency Two seconds response time when a filter is changed
      Capacity Be able to serve 50 concurrent users with the performance expected
      Control Governance Govern by the corporate BI standards
      Regulations Meet HIPPA requirements
      Compliance Meet ISO requirements

      Prioritize requirements to assist with solution modeling

      Prioritization ensures that the development team focuses on the right requirements.

      The MoSCoW Model of Prioritization

      Must Have Requirements that mustbe implemented for the solution to be considered successful.
      Should Have Requirements that are high priority and should be included in the solution if possible.
      Could Have Requirements that are desirable but not necessary and could be included if resources are available.
      Won't Have Requirements that won’t be in the next release but will be considered for the future releases.

      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

      Prioritization is the process of ranking each requirement based on its importance to project success. Hold a separate meeting for the domain SMEs, implementation SMEs, project managers, and project sponsors to prioritize the requirements list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation SMEs will use these priority levels to ensure that efforts are targeted towards the proper requirements and the plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order requirements.

      Activity: Finalize the list of BI requirements

      1.3.3

      1-4 hours

      Requirement Category Framework

      Category Subcategory
      Data Granularity
      Transformation
      Selection Criteria
      Fields Required
      Functionality Filters
      Drill Down Path
      Analysis Required
      Visual Requirements Mock-up
      Section
      Conditional Formatting
      Security Mobile
      Role
      Users
      Export
      Performance Speed
      Latency
      Capacity
      Control Governance
      Regulations
      Compliance

      Create requirement buckets and classify requirements.

      1. Define requirement categories according to the framework.
      2. Review the user story and requirements you collected in Step 1.3.2. Classify the requirements within requirement categories.
      3. Review the preliminary list of categorized requirements and look for gaps in this detailed view. You may need to gather additional requirements to fill the gaps.
      4. Prioritize the requirements according to the MoSCoW framework.
      5. Document your final list of requirements in the BI Strategy and Roadmap Template.

      INPUT

      • Existing requirements and new requirements from step 1.3.2

      OUTPUT

      • Prioritized and categorized requirements

      Materials

      • Requirements Insights section of the BI Strategy and Roadmap Template

      Participants

      • BA
      • Business stakeholders
      • PMO

      Translate your findings and ideas into actions that will be integrated into the BI Strategy and Roadmap Template

      As you progress through each phase, document findings and ideas as they arise. At phase end, hold a brainstorming session with the project team focused on documenting findings and ideas and substantiating them into improvement actions.

      Translating findings and ideas into actions that will be integrated into the BI Strategy and Roadmap Template

      Ask yourself how BI or analytics can be used to address the gaps and explore opportunities uncovered in each phase. For example, in Phase 1, how do current BI capabilities impede the realization of the business vision?

      Document and prioritize Phase 1 findings, ideas, and action items

      1.3.4

      1-2 hours

      1. Reconvene as a group to review findings, ideas, and actions harvested in Phase 1. Write the findings, ideas, and actions on sticky notes.
      2. Prioritize the sticky notes to yield those with high business value and low implementation effort. View some sample findings below:
      3. High Business Value, Low Effort High Business Value, High Effort
        Low Business Value, High Effort Low Business Value, High Effort

        Phase 1

        Sample Phase 1 Findings Found two business objectives that are not supported by BI/analytics
        Some executives still think BI is reporting
        Some confusion around operational reporting and BI
        Data quality plays a big role in BI
        Many executives are not sure about the BI ROI or asking for one
      4. Select the top findings and document them in the “Other Phase 1 Findings” section of the BI Strategy and Roadmap Template. The findings will be used again in Phase 3.

      INPUT

      • Phase 1 activities
      • Business context (vision, mission, goals, etc.

      OUTPUT

      • Other Phase 1 Findings section of the BI Strategy and Roadmap Template

      Materials

      • Whiteboard
      • Sticky notes

      Participants

      • Project manger
      • Project team
      • Business stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1-1.1.5

      Establish the business context

      To begin the workshop, your project team will be taken through a series of activities to establish the overall business vision, mission, objectives, goals, and key drivers. This information will serve as the foundation for discerning how the revamped BI strategy needs to enable business users.

      1.2.1- 1.2.3

      Create a comprehensive documentation of your current BI environment

      Our analysts will take your project team through a series of activities that will facilitate an assessment of current BI usage and artifacts, and help you design an end-user interview survey to elicit context around BI usage patterns.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-tech analysts

      1.3.1-1.3.3

      Establish new BI requirements

      Our analysts will guide your project team through frameworks for eliciting and organizing requirements from business users, and then use those frameworks in exercises to gather some actual requirements from business stakeholders.

      Phase 2

      Evaluate Your Current BI Practice

      Build a Reporting and Analytics Strategy

      Revisit project metrics to track phase progress

      Goals for Phase 2:

      • Assess your current BI practice. Determine the maturity of your current BI practice from different viewpoints.
      • Develop your BI target state. Plan your next generation BI with Info-Tech’s BI patterns and best practices.
      • Safeguard your target state. Avoid BI pitfalls by proactively monitoring BI risks.

      Info-Tech’s Suggested Metrics for Tracking Phase 2 Goals

      Practice Improvement Metrics Data Collection and Calculation Expected Improvement
      # of groups participated in the current state assessment The number of groups joined the current assessment using Info-Tech’s BI Practice Assessment Tool Varies; the tool can accommodate up to five groups
      # of risks mitigated Derive from your risk register At least two to five risks will be identified and mitigated

      Intangible Metrics:

      • Prototyping approach allows the BI group to understand more about business requirements, and in the meantime, allows the business to understand how to partner with the BI group.
      • The BI group and the business have more confidence in the BI program as risks are monitored and mitigated on an ad hoc basis.

      Evaluate your current BI practice

      Phase 2 Overarching Insight

      BI success is not based solely on the technology it runs on; technology cannot mask gaps in capabilities. You must be capable in your environment, and data management, data quality, and related data practices must be strong. Otherwise, the usefulness of the intelligence suffers. The best BI solution does not only provide a technology platform, but also addresses the elements that surround the platform. Look beyond tools and holistically assess the maturity of your BI practice with input from both the BI consumer and provider perspectives.

      Understand the Business Context to Rationalize Your BI Landscape Evaluate Your Current BI Practice Create a BI Roadmap for Continuous Improvement
      Establish the Business Context
      • Business Vision, Goals, Key Drivers
      • Business Case Presentation
      • High-Level ROI
      Assess Your Current BI Maturity
      • SWOT Analysis
      • BI Practice Assessment
      • Summary of Current State
      Construct a BI Initiative Roadmap
      • BI Improvement Initiatives
      • BI Strategy and Roadmap
      Access Existing BI Environment
      • BI Perception Survey Framework
      • Usage Analyses
      • BI Report Inventory
      Envision BI Future State
      • BI Patterns
      • BI Practice Assessment
      • List of Functions
      Plan for Continuous Improvement
      • Excel Governance Policy
      • BI Ambassador Network Draft
      Undergo Requirements Gathering
      • Requirements Gathering Principles
      • Overall BI Requirements

      Phase 2 overview

      Detailed Overview

      Step 1: Assess Your Current BI Practice

      Step 2: Envision a Future State for Your BI Practice

      Outcomes

      • A comprehensive assessment of current BI practice maturity and capabilities.
      • Articulation of your future BI practice.
      • Improvement objectives and activities for developing your current BI program.

      Benefits

      • Identification of clear gaps in BI practice maturity.
      • A current state assessment that includes the perspectives of both BI providers and consumers to highlight alignment and/or discrepancies.
      • A future state is defined to provide a benchmark for your BI program.
      • Gaps between the future and current states are identified; recommendations for the gaps are defined.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Evaluate Your Current BI Practice

      Proposed Time to Completion: 1-2 weeks

      Step 2.1: Assess Your Current BI Practice

      Start with an analyst kick-off call:

      • Detail the benefits of conducting multidimensional assessments that involve BI providers as well as consumers.
      • Review Info-Tech’s BI Maturity Model.

      Then complete these activities…

      • SWOT analyses
      • Identification of BI maturity level through a current state assessment

      With these tools & templates:

      BI Practice Assessment Tool

      BI Strategy and Roadmap Template

      Step 2.2: Envision a Future State for Your BI Practice

      Review findings with an analyst:

      • Discuss overall maturity gaps and patterns in BI perception amongst different units of your organization.
      • Discuss how to translate activity findings into robust initiatives, defining critical success factors for BI development and risk mitigation.

      Then complete these activities…

      • Identify your desired BI patterns and functionalities.
      • Complete a target state assessment for your BI practice.
      • Review capability practice gaps and phase-level metrics.

      With these tools & templates:

      BI Practice Assessment Tool

      BI Strategy and Roadmap Template

      Phase 2 Results & Insights:

      • A comprehensive assessment of the organization’s current BI practice capabilities and gaps
      • Visualization of BI perception from a variety of business users as well as IT
      • A list of tasks and initiatives for constructing a strategic BI improvement roadmap

      STEP 2.1

      Assess the Current State of Your BI Practice

      Assess your organization’s current BI capabilities

      Step Objectives

      • Understand the definitions and roles of each component of BI.
      • Contextualize BI components to your organization’s environment and current practices.

      Step Activities

      2.1.1 Perform multidimensional SWOT analyses

      2.1.2 Assess current BI and analytical capabilities, Document challenges, constraints, opportunities

      2.1.3 Review the results of your current state assessment

      Outcomes

      • Holistic perspective of current BI strengths and weaknesses according to BI users and providers
      • Current maturity in BI and related data management practices

      Research Support

      • Info-Tech’s Data Management Framework
      • Info-Tech’s BI Practice Assessment Tool
      • Info-Tech’s BI Strategy and Roadmap Template

      Proposed Participants in this Step

      Project Manager

      Data Architect(s) or Enterprise Architect

      Project Team

      Gather multiple BI perspectives with comprehensive SWOT analyses

      SWOT analysis is an effective tool that helps establish a high-level context for where your practice stands, where it can improve, and the factors that will influence development.

      Strengths

      Best practices, what is working well

      Weaknesses

      Inefficiencies, errors, gaps, shortcomings

      Opportunities

      Review internal and external drivers

      Threats

      Market trends, disruptive forces

      While SWOT is not a new concept, you can add value to SWOT by:

      • Conducting a multi-dimensional SWOT to diversify perspectives – involve the existing BI team, BI management, business executives and other business users.
      • SWOT analyses traditionally provide a retrospective view of your environment. Add a future-looking element by creating improvement tasks/activities at the same time as you detail historical and current performance.

      Info-Tech Insight

      Consider a SWOT with two formats: a private SWOT worksheet and a public SWOT session. Participants will be providing suggestions anonymously while solicited suggestions will be discussed in the public SWOT session to further the discussion.

      Activity: Perform a SWOT analysis in groups to get a holistic view

      2.1.1

      1-2 hours

      This activity will take your project team through a holistic SWOT analysis to gather a variety of stakeholder perception of the current BI practice.

      1. Identify individuals to involve in the SWOT activity. Aim for a diverse pool of participants that are part of the BI practice in different capacities and roles. Solution architects, application managers, business analysts, and business functional unit leaders are a good starting point.
      2. Review the findings summary from Phase 1. You may opt to facilitate this activity with insights from the business context. Each group will be performing the SWOT individually.
      3. The group results will be collected and consolidated to pinpoint common ideas and opinions. Individual group results should be represented by a different color. The core program team will be reviewing the consolidated result as a group.
      4. Document the results of these SWOT activities in the appropriate section of the BI Strategy and Roadmap Template.

      SWOT

      Group 1 Provider Group E.g. The BI Team

      Group 2 Consumer Group E.g. Business End Users

      INPUT

      • IT and business stakeholder perception

      OUTPUT

      • Multi-faceted SWOT analyses
      • Potential BI improvement activities/objectives

      Materials

      • SWOT Analysis section of the BI Strategy and Roadmap Template

      Participants

      • Selected individuals in the enterprise (variable)

      Your organization’s BI maturity is determined by several factors and the degree of immersion into your enterprise

      BI Maturity Level

      A way to categorize your analytics maturity to understand where you are currently and what next steps would be best to increase your BI maturity.

      There are several factors used to determine BI maturity:

      Buy-in and Data Culture

      Determines if there is enterprise-wide buy-in for developing business intelligence and if a data-driven culture exists.

      Business–IT Alignment

      Examines if current BI and analytics operations are appropriately enabling the business objectives.

      Governance Structure

      Focuses on whether or not there is adequate governance in place to provide guidance and structure for BI activities.

      Organization Structure and Talent

      Pertains to how BI operations are distributed across the overall organizational structure and the capabilities of the individuals involved.

      Process

      Reviews analytics-related processes and policies and how they are created and enforced throughout the organization.

      Data

      Deals with analytical data in terms of the level of integration, data quality, and usability.

      Technology

      Explores the opportunities in building a fit-for-purpose analytics platform and consolidation opportunities.

      Evaluate Your Current BI Practice with the CMMI model

      To assess BI, Info-Tech uses the CMMI model for rating capabilities in each of the function areas on a scale of 1-5. (“0” and “0.5” values are used for non-existent or emerging capabilities.)

      The image shows an example of a CMMI model

      Use Info-Tech’s BI Maturity Model as a guide for identifying your current analytics competence

      Leverage a BI strategy to revamp your BI program to strive for a high analytics maturity level. In the future you should be doing more than just traditional BI. You will perform self-service BI, predictive analytics, and data science.

      Ad Hoc Developing Defined Managed Trend Setting
      Questions What’s wrong? What happened? What is happening? What happened, is happening, and will happen? What if? So what?
      Scope One business problem at a time One particular functional area Multiple functional areas Multiple functional areas in an integrated fashion Internal plus internet scale data
      Toolset Excel, Access, primitive query tools Reporting tools or BI BI BI, business analytics tools Plus predictive platforms, data science tools
      Delivery Model IT delivers ad hoc reports IT delivers BI reports IT delivers BI reports and some self-service BI Self-service BI and report creation at the business units Plus predictive models and data science projects
      Mindset Firefighting using data Manage using data Analyze using data; shared tooling Data is an asset, shared data Data driven
      BI Org. Structure Data analysts in IT BI BI program BI CoE Data Innovation CoE

      Leverage Info-Tech’s BI Practice Assessment Tool to define your BI current state

      BI Practice Assessment Tool

      1. Assess Current State
      • Eight BI practice areas to assess maturity.
      • Based on CMMI maturity scale.
    • Visualize Current State Results
      • Determine your BI maturity level.
      • Identify areas with outstanding maturity.
      • Uncover areas with low maturity.
      • Visualize the presence of misalignments.
    • Target State
      • Tackle target state from two views: business and IT.
      • Calculate gaps between target and current state.
    • Visualize Target State and Gaps
      • A heat map diagram to compare the target state and the current state.
      • Show both current and target maturity levels.
      • Detailed charts to show results for each area.
      • Detailed list of recommendations.

      Purposes:

      • Assess your BI maturity.
      • Visualize maturity assessment to quickly spot misalignments, gaps, and opportunities.
      • Provide right-sized recommendations.

      Info-Tech Insight

      Assessing current and target states is only the beginning. The real value comes from the interpretation and analysis of the results. Use visualizations of multiple viewpoints and discuss the results in groups to come up with the most effective ideas for your strategy and roadmap.

      Activity: Conduct a current state assessment of your BI practice maturity

      2.1.2

      2-3 hours

      Use the BI Practice Assessment Tool to establish a baseline for your current BI capabilities and maturity.

      1. Navigate to Tab 2. Current State Assessment in the BI Practice Assessment Tool and complete the current state assessment together or in small groups. If running a series of assessments, do not star or scratch every time. Use the previous group’s results to start the conversation with the users.
      2. Info-Tech suggests the following groups participate in the completion of the assessment to holistically assess BI and to uncover misalignment:

        Providers Consumers
        CIO & BI Management BI Work Groups (developers, analysts, modelers) Business Unit #1 Business Unit #2 Business Unit #3
      3. For each assessment question, answer the current level of maturity in terms of:
        1. Initial/Ad hoc – the starting point for use of a new or undocumented repeat process
        2. Developing – the process is documented such that it is repeatable
        3. Defined – the process is defined/confirmed as a standard business process
        4. Managed and Measurable – the process is quantitatively managed in accordance with agreed-upon metrics.
        5. Optimized – the process includes process optimization/improvement.

      INPUT

      • Observations of current maturity

      OUTPUT

      • Comprehensive current state assessment

      Materials

      • BI Practice Assessment Tool
      • Current State Assessment section of the BI Strategy and Roadmap Template

      Participants

      • Selected individuals as suggested by the assessment tool

      Info-Tech Insight

      Discuss the rationale for your answers as a group. Document the comments and observations as they may be helpful in formulating the final strategy and roadmap.

      Activity: Review and analyze the results of the current state assessment

      2.1.3

      2-3 hours

      1. Navigate to Tab 3. Current State Results in the BI Practice Assessment Tool and review the findings:

      The tool provides a brief synopsis of your current BI state. Review the details of your maturity level and see where this description fits your organization and where there may be some discrepancies. Add additional comments to your current state summary in the BI Strategy and Roadmap Document.

      In addition to reviewing the attributes of your maturity level, consider the following:

      1. What are the knowns – The knowns confirm your understanding on the current landscape.
    • What are the unknowns – The unknowns show you the blind spots. They are very important to give you an alternative view of the your current state. The group should discuss those blind spots and determine what to do with them.
    • Activity: Review and analyze the results of the current state assessment (cont.)

      2.1.3

      2-3 hours

      2. Tab 3 will also visualize a breakdown of your maturity by BI practice dimension. Use this graphic as a preliminary method to identify where your organization is excelling and where it may need improvement.

      Better Practices

      Consider: What have you done in the areas where you perform well?

      Candidates for Improvement

      Consider: What can you do to improve these areas? What are potential barriers to improvement?

      STEP 2.2

      Envision a Future State for Your Organization’s BI Practice

      Detail the capabilities of your next generation BI practice

      Step Objectives

      • Create guiding principles that will shape your organization’s ideal BI program.
      • Pinpoint where your organization needs to improve across several BI practice dimensions.
      • Develop approaches to remedy current impediments to BI evolution.
      • Step Activities

        2.2.1 Define guiding principles for the future state

        2.2.2 Define the target state of your BI practice

        2.2.3 Confirm requirements for BI Styles by management group

        2.2.4 Analyze gaps in your BI practice and generate improvement activities and objectives

        2.2.5 Define the critical success factors for future BI

        2.2.6 Identify potential risks for your future state and create a mitigation plan

      Outcomes

      • Defined landscape for future BI capabilities, including desired BI functionalities.
      • Identification of crucial gaps and improvement points to include in a BI roadmap.
      • Updated BI Styles Usage sheet.

      Research Support

      • Info-Tech’s Data Management Framework
      • Info-Tech’s BI Practice Assessment Tool
      • Info-Tech’s BI Strategy and Roadmap Template

      Proposed Participants in this Step

      Project Manager

      Data Architect(s) or Enterprise Architect

      Project Team

      Define guiding principles to drive your future state envisioning

      Envisioning a BI future state is essentially architecting the future for your BI program. It is very similar to enterprise architecture (EA). Guiding principles are widely used in enterprise architecture. This best practice should also be used in BI envisioning.

      Benefits of Guiding Principles in a BI Context

      • BI planning involves a number of business units. Defining high-level future state principles helps to establish a common ground for those different business units.
      • Ensure the next generation BI aligns with the corporate enterprise architecture and data architecture principles.
      • Provide high-level guidance without depicting detailed solutioning by leaving room for innovation.

      Sample Principles for BI Future State

      1. BI should be fit for purpose. BI is a business technology that helps business users.
      2. Business–IT collaboration should be encouraged to ensure deliverables are relevant to the business.
      3. Focus on continuous improvement on data quality.
      4. Explore opportunities to onboard and integrate new datasets to create a holistic view of your data.
      5. Organize and present data in an easy-to-consume, easy-to-digest fashion.
      6. BI should be accessible to everything, as soon as they have a business case.
      7. Do not train just on using the platform. Train on the underlying data and business model as well.
      8. Develop a training platform where trainees can play around with the data without worrying about messing it up.

      Activity: Define future state guiding principles for your BI practice

      2.2.1

      1-2 hours

      Guiding principles are broad statements that are fundamental to how your organization will go about its activities. Use this as an opportunity to gather relevant stakeholders and solidify how your BI practice should perform moving forward.

      1. To ensure holistic and comprehensive future state principles, invite participants from the business, the data management team, and the enterprise architecture team. If you do not have an enterprise architecture practice, invite people that are involved in building the enterprise architecture. Five to ten people is ideal.
      2. BI Future State

        Awareness Buy-in Business-IT Alignment Governance Org. Structure; People Process; Policies; Standards Data Technology
      3. Once the group has some high-level ideas on what the future state looks like, brainstorm guiding principles that will facilitate the achievement of the future state (see above).
      4. Document the future state principles in the Future State Principles for BI section of the BI Strategy and Roadmap Template

      INPUT

      • Existing enterprise architecture guiding principles
      • High-level concept of future state BI

      OUTPUT

      • Guiding principles for prospective BI practice

      Materials

      • Future State Principles section of the BI Strategy and Roadmap Template

      Participants

      • Business representatives
      • IT representatives
      • The EA group

      Leverage prototypes to facilitate a continuous dialogue with end users en route to creating the final deliverable

      At the end of the day, BI makes data and information available to the business communities. It has to be fit for purpose and relevant to the business. Prototypes are an effective way to ensure relevant deliverables are provided to the necessary users. Prototyping makes your future state a lot closer and a lot more business friendly.

      Simple Prototypes

      • Simple paper-based, whiteboard-based prototypes with same notes.
      • The most basic communication tool that facilitates the exchange of ideas.
      • Often used in Joint Application Development (JAD) sessions.
      • Improve business and IT collaboration.
      • Can be used to amend requirements documents.

      Discussion Possibilities

      • Initial ideation at the beginning
      • Align everyone on the same page
      • Explain complex ideas/layouts
      • Improve collaboration

      Elaborated Prototypes

      • Demonstrates the possibilities of BI in a risk-free environment.
      • Creates initial business value with your new BI platform.
      • Validates the benefits of BI to the organization.
      • Generates interest and support for BI from senior management.
      • Prepares BI team for the eventual enterprise-wide deployment.

      Discussion Possibilities

      • Validate and refine requirements
      • Fail fast, succeed fast
      • Acts as checkpoints
      • Proxy for the final working deliverable

      Leverage Info-Tech’s BI Practice Assessment Tool to define your BI target state and visualize capability gaps

      BI Practice Assessment Tool

      1. Assess Current State
      • Eight BI practice areas to assess maturity.
      • Based on CMMI maturity scale.
    • Visualize Current State Results
      • Determine your BI maturity level.
      • Identify areas with outstanding maturity.
      • Uncover areas with low maturity.
      • Visualize the presence of misalignments.
    • Target State
      • Tackle target state from two views: business and IT.
      • Calculate gaps between target and current state.
    • Visualize Target State and Gaps
      • A heat map diagram to compare the target state and the current state.
      • Show both current and target maturity levels.
      • Detailed charts to show results for each area.
      • Detailed list of recommendations.

      Purposes:

      • Assess your BI maturity.
      • Visualize maturity assessment to quickly spot misalignments, gaps, and opportunities.
      • Provide right-sized recommendations.

      Document essential findings in Info-Tech’s BI Strategy and Roadmap Template.

      Info-Tech Insight

      Assessing current and target states is only the beginning. The real value comes from the interpretation and analyses of the results. Use visualizations of multiple viewpoints and discuss the results in groups to come up with the most effective ideas for your strategy and roadmap.

      Activity: Define the target state for your BI practice

      2.2.2

      2 hours

      This exercise takes your team through establishing the future maturity of your BI practice across several dimensions.

      1. Envisioning of the future state will involve input from the business side as well as the IT department.
      2. The business and IT groups should get together separately and determine the target state maturity of each of the BI practice components:

      The image is a screenshot of Tab 4: Target State Evaluation of the BI Practice Assessment Tool

      INPUT

      • Desired future practice capabilities

      OUTPUT

      • Target state assessment

      Materials

      • Tab 4 of the BI Practice Assessment Tool

      Participants

      • Business representatives
      • IT representatives

      Activity: Define the target state for your BI practice (cont.)

      2.2.2

      2 hours

      2. The target state levels from the two groups will be averaged in the column “Target State Level.” The assessment tool will automatically calculate the gaps between future state value and the current state maturity determined in Step 2.1. Significant gaps in practice maturity will be highlighted in red; smaller or non-existent gaps will appear green.

      The image is a screenshot of Tab 4: Target State Evaluation of the BI Practice Assessment Tool with Gap highlighted.

      INPUT

      • Desired future practice capabilities

      OUTPUT

      • Target state assessment

      Materials

      • Tab 4 of the BI Practice Assessment Tool

      Participants

      • Business representatives
      • IT representatives

      Activity: Revisit the BI Style Analysis sheet to define new report and analytical requirements by C-Level

      2.2.3

      1-2 hours

      The information needs for each executive is unique to their requirements and management style. During this exercise you will determine the reporting and analytical needs for an executive in regards to content, presentation and cadence and then select the BI style that suite them best.

      1. To ensure a holistic and comprehensive need assessment, invite participants from the business and BI team. Discuss what data the executive currently use to base decisions on and explore how the different BI styles may assist. Sample reports or mock-ups can be used for this purpose.
      2. Document the type of report and required content using the BI Style Tool.
      3. The BI Style Tool will then guide the BI team in the type of reporting to develop and the level of Self-Service BI that is required. The tool can also be used for product selection.

      INPUT

      • Information requirements for C-Level Executives

      OUTPUT

      • BI style(s) that are appropriate for an executive’s needs

      Materials

      • BI Style Usage sheet from BI Strategy and Roadmap Template
      • Sample Reports

      Participants

      • Business representatives
      • BI representatives

      Visualization tools facilitate a more comprehensive understanding of gaps in your existing BI practice

      Having completed both current and target state assessments, the BI Practice Assessment Tool allows you to compare the results from multiple angles.

      At a higher level, you can look at your maturity level:

      At a detailed level, you can drill down to the dimensional level and item level.

      The image is a screenshots from Tab 4: Target State Evaluation of the BI Practice Assessment Tool

      At a detailed level, you can drill down to the dimensional level and item level.

      Activity: Analyze gaps in BI practice capabilities and generate improvement objectives/activities

      2.2.4

      2 hours

      This interpretation exercise helps you to make sense of the BI practice assessment results to provide valuable inputs for subsequent strategy and roadmap formulation.

      1. IT management and the BI team should be involved in this exercise. Business SMEs should be consulted frequently to obtain clarifications on what their ideal future state entails.
      2. Begin this exercise by reviewing the heat map and identifying:

      • Areas with very large gaps
      • Areas with small gaps

      Areas with large gaps

      Consider: Is the target state feasible and achievable? What are ways we can improve incrementally in this area? What is the priority for addressing this gap?

      Areas with small/no gaps

      Consider: Can we learn from those areas? Are we setting the bar too low for our capabilities?

      INPUT

      • Current and target state visualizations

      OUTPUT

      • Gap analysis (Tab 5)

      Materials

      • Tab 5 of the BI Practice Assessment Tool
      • Future State Assessment Results section of the BI Strategy and Roadmap Template

      Participants

      • Business representatives
      • IT representatives

      Activity: Analyze gaps in BI practice capabilities and generate improvement objectives/activities (cont.)

      2.2.4

      2 hours

      2. Discuss the differences in the current and target state maturity level descriptions. Questions to ask include:

      • What are the prerequisites before we can begin to build the future state?
      • Is the organization ready for that future state? If not, how do we set expectations and vision for the future state?
      • Do we have the necessary competencies, time, and support to achieve our BI vision?

      INPUT

      • Current and target state visualizations

      OUTPUT

      • Gap analysis (Tab 5)

      Materials

      • Tab 5 of the BI Practice Assessment Tool
      • Future State Assessment Results section of the BI Strategy and Roadmap Template

      Participants

      • Business representatives
      • IT representatives

      Activity: Analyze gaps in BI practice capabilities and generate improvement objectives/activities (cont.)

      2.2.4

      2 hours

      3. Have the same group members reconvene and discuss the recommendations at the BI practice dimension level on Tab 5. of the BI Practice Assessment Tool. These recommendations can be used as improvement actions or translated into objectives for building your BI capabilities.

      Example

      The heat map displayed the largest gap between target state and current state in the technology dimension. The detailed drill-down chart will further illustrate which aspect(s) of the technology dimension is/are showing the most room for improvement in order to better direct your objective and initiative creation.

      The image is of an example and recommendations.

      Considerations:

      • What dimension parameters have the largest gaps? And why?
      • Is there a different set of expectations for the future state?

      Define critical success factors to direct your future state

      Critical success factors (CSFs) are the essential factors or elements required for ensuring the success of your BI program. They are used to inform organizations with things they should focus on to be successful.

      Common Provider (IT Department) CSFs

      • BI governance structure and organization is created.
      • Training is provided for the BI users and the BI team.
      • BI standards are in place.
      • BI artifacts rely on quality data.
      • Data is organized and presented in a usable fashion.
      • A hybrid BI delivery model is established.
      • BI on BI; a measuring plan has to be in place.

      Common Consumer (Business) CSFs

      • Measurable business results have been improved.
      • Business targets met/exceeded.
      • Growth plans accelerated.
      • World-class training to empower BI users.
      • Continuous promotion of a data-driven culture.
      • IT–business partnership is established.
      • Collaborative requirements gathering processes.
      • Different BI use cases are supported.

      …a data culture is essential to the success of analytics. Being involved in a lot of Bay Area start-ups has shown me that those entrepreneurs that are born with the data DNA, adopt the data culture and BI naturally. Other companies should learn from these start-ups and grow the data culture to ensure BI adoption.

      – Cameran Hetrick, Senior Director of Data Science & Analytics, thredUP

      Activity: Define provider and consumer critical success factors for your future BI capabilities

      2.2.5

      2 hours

      Create critical success factors that are important to both BI providers and BI consumers.

      1. Divide relevant stakeholders into two groups:
      2. BI Provider (aka IT) BI Consumer (aka Business)
      3. Write two headings on the board: Objective and Critical Success Factors. Write down each of the objectives created in Phase 1.
      4. Divide the group into small teams and assign each team an objective. For each objective, ask the following question:
      5. What needs to be put in place to ensure that this objective is achieved?

        The answer to the question is your candidate CSF. Write CSFs on sticky notes and stick them by the relevant objective.

      6. Rationalize and consolidate CSFs. Evaluate the list of candidate CSFs to find the essential elements for achieving success.
      7. For each CSF, identify at least one key performance indicator that will serve as an appropriate metric for tracking achievement.

      As you evaluate candidate CSFs, you may uncover new objectives for achieving your future state BI.

      INPUT

      • Business objectives

      OUTPUT

      • A list of critical success factors mapped to business objectives

      Materials

      • Whiteboard and colored sticky notes
      • CSFs for the Future State section of the BI Strategy and Roadmap Template

      Participants

      • Business and IT representatives
      • CIO
      • Head of BI

      Round out your strategy for BI growth by evaluating risks and developing mitigation plans

      A risk matrix is a useful tool that allows you to track risks on two dimensions: probability and impact. Use this matrix to help organize and prioritize risk, as well as develop mitigation strategies and contingency plans appropriately.

      Example of a risk matrix using colour coding

      Info-Tech Insight

      Tackling risk mitigation is essentially purchasing insurance. You cannot insure everything – focus your investments on mitigating risks with a reasonably high impact and high probability.

      Be aware of some common barriers that arise in the process of implementing a BI strategy

      These are some of the most common BI risks based on Info-Tech’s research:

      Low Impact Medium Impact High Impact
      High Probability
      • Users revert back to Microsoft Excel to analyze data.
      • BI solution does not satisfy the business need.
      • BI tools become out of sync with new strategic direction.
      • Poor documentation creates confusion and reduces user adoption.
      • Fail to address data issues: quality, integration, definition.
      • Inadequate communication with stakeholders throughout the project.
      • Users find the BI tool interface too confusing.
      Medium Probability
      • Fail to define and monitor KPIs.
      • Poor training results in low user adoption.
      • Organization culture is resistant to the change.
      • Lack of support from the sponsors.
      • No governance over BI.
      • Poor training results in misinformed users.
      Low Probability
      • Business units independently invest in BI as silos.

      Activity: Identify potential risks for your future state and create a mitigation plan

      2.2.6

      1 hour

      As part of developing your improvement actions, use this activity to brainstorm some high-level plans for mitigating risks associated with those actions.

      Example:

      Users find the BI tool interface too confusing.

      1. Use the probability-impact matrix to identify risks systematically. Collectively vote on the probability and impact for each risk.
      2. Risk mitigation. Risk can be mitigated by three approaches:
      3. A. Reducing its probability

        B. Reducing its impact

        C. Reducing both

        Option A: Brainstorm ways to reduce risk probability

        E.g. The probability of the above risk may be reduced by user training. With training, the probability of confused end users will be reduced.

        Option B: Brainstorm ways to reduce risk impact

        E.g. The impact can be reduced by ensuring having two end users validate each other’s reports before making a major decision.

      4. Document your high-level mitigation strategies in the BI Strategy and Roadmap Template.

      INPUT

      • Step 2.2 outputs

      OUTPUT

      • High-level risk mitigation plans

      Materials

      • Risks and Mitigation section of the BI Strategy and Roadmap Template

      Participants

      • BI sponsor
      • CIO
      • Head of BI

      Translate your findings and ideas into actions that will be integrated into the BI strategy and roadmap

      As you progress through each phase, document findings and ideas as they arise. By phase end, hold a brainstorming session with the project team focused on documenting findings and ideas and substantiating them into improvement actions.

      Translated findings and ideas into actions that will be integrated into the BI strategy and roadmap.

      Ask yourself how BI or analytics can be used to address the gaps and explore opportunities uncovered in each phase. For example, in Phase 1, how do current BI capabilities impede the realization of the business vision?

      Document and prioritize Phase 2 findings, ideas, and action items

      2.2.7

      1-2 hours

      1. Reconvene as a group to review the findings, ideas, and actions harvested in Phase 2. Write the findings, ideas, and actions on sticky notes.
      2. Prioritize the sticky notes to yield those with high business value and low implementation effort. View some sample findings below:
      3. High Business Value, Low Effort High Business Value, High Effort
        Low Business Value, High Effort Low Business Value, High Effort

        Phase 2

        Sample Phase 2 Findings Found a gap between the business expectation and the existing BI content they are getting.
        Our current maturity level is “Level 2 – Operational.” Almost everyone thinks we should be at least “Level 3 – Tactical” with some level 4 elements.
        Found an error in a sales report. A quick fix is identified.
        The current BI program is not able to keep up with the demand.
      4. Select the top items and document the findings in the BI Strategy Roadmap Template. The findings will be used to build a Roadmap in Phase 3.

      INPUT

      • Phase 2 activities

      OUTPUT

      • Other Phase 2 Findings section of the BI Strategy and Roadmap Template

      Materials

      • Whiteboard
      • Sticky notes

      Participants

      • Project manger
      • Project team
      • Business stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1

      Determine your current BI maturity level

      The analyst will take your project team through Info-Tech’s BI Practice Assessment Tool, which collects perspectives from BI consumer and provider groups on multiple facets of your BI practice in order to establish a current maturity level.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      2.2.1

      Define guiding principles for your target BI state

      Using enterprise architecture principles as a starting point, our analyst will facilitate exercises to help your team establish high-level standards for your future BI practice.

      2.2.2-2.2.3

      Establish your desired BI patterns and matching functionalities

      In developing your BI practice, your project team will have to decide what BI-specific capabilities are most important to your organization. Our analyst will take your team through several BI patterns that Info-Tech has identified and discuss how to bridge the gap between these patterns, linking them to specific functional requirements in a BI solution.

      2.2.4-2.2.5

      Analyze the gaps in your BI practice capabilities

      Our analyst will guide your project team through a number of visualizations and explanations produced by our assessment tool in order to pinpoint the problem areas and generate improvement ideas.

      Phase 3

      Create a BI Roadmap for Continuous Improvement

      Build a Reporting and Analytics Strategy

      Create a BI roadmap for continuous improvement

      Phase 3 Overarching Insight

      The benefit of creating a comprehensive and actionable roadmap is twofold: not only does it keep BI providers accountable and focused on creating incremental improvement, but a roadmap helps to build momentum around the overall project, provides a continuous delivery of success stories, and garners grassroots-level support throughout the organization for BI as a key strategic imperative.

      Understand the Business Context to Rationalize Your BI Landscape Evaluate Your Current BI Practice Create a BI Roadmap for Continuous Improvement
      Establish the Business Context
      • Business Vision, Goals, Key Drivers
      • Business Case Presentation
      • High-Level ROI
      Assess Your Current BI Maturity
      • SWOT Analysis
      • BI Practice Assessment
      • Summary of Current State
      Construct a BI Initiative Roadmap
      • BI Improvement Initiatives
      • BI Strategy and Roadmap
      Access Existing BI Environment
      • BI Perception Survey Framework
      • Usage Analyses
      • BI Report Inventory
      Envision BI Future State
      • BI Patterns
      • BI Practice Assessment
      • List of Functions
      Plan for Continuous Improvement
      • Excel Governance Policy
      • BI Ambassador Network Draft
      Undergo Requirements Gathering
      • Requirements Gathering Principles
      • Overall BI Requirements

      Phase 3 overview

      Detailed Overview

      Step 1: Establish Your BI Initiative Roadmap

      Step 2: Identify Opportunities to Enhance Your BI Practice

      Step 3: Create Analytics Strategy

      Step 4: Define CSF and metrics to monitor success of BI and analytics

      Outcomes

      • Consolidate business intelligence improvement objectives into robust initiatives.
      • Prioritize improvement initiatives by cost, effort, and urgency.
      • Create a one-year, two-year, or three-year timeline for completion of your BI improvement initiatives.
      • Identify supplementary programs that will facilitate the smooth execution of road-mapped initiatives.

      Benefits

      • Clear characterization of comprehensive initiatives with a detailed timeline to keep team members accountable.

      Revisit project metrics to track phase progress

      Goals for Phase 3:

      • Put everything together. Findings and observations from Phase 1 and 2 are rationalized in this phase to develop data initiatives and create a strategy and roadmap for BI.
      • Continuous improvements. Your BI program is evolving and improving over time. The program should allow you to have faster, better, and more comprehensive information.

      Info-Tech’s Suggested Metrics for Tracking Phase 3 Goals

      Practice Improvement Metrics Data Collection and Calculation Expected Improvement
      Program Level Metrics Efficiency
      • Time to information
      • Self-service penetration
      • Derive from the ticket management system
      • Derive from the BI platform
      • 10% reduction in time to information
      • Achieve 10-15% self-service penetration
      • Effectiveness
      • BI Usage
      • Data quality
      • Derive from the BI platform
      • Data quality perception
      • Majority of the users use BI on a daily basis
      • 15% increase in data quality perception
      Comprehensiveness
      • # of integrated datasets
      • # of strategic decisions made
      • Derive from the data integration platform
      • Decision-making perception
      • Onboard 2-3 new data domains per year
      • 20% increase in decision-making perception

      Learn more about the CIO Business Vision program.

      Intangible Metrics:

      Tap into the results of Info-Tech’s CIO Business Vision diagnostic to monitor the changes in business-user satisfaction as you implement the initiatives in your BI improvement roadmap.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that helps you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Create a BI Roadmap for Continuous Improvement

      Proposed Time to Completion: 1-2 weeks

      Step 3.1: Construct a BI Improvement Initiative Roadmap

      Start with an analyst kick off call:

      • Review findings and insights from completion of activities pertaining to current and future state assessments
      • Discuss challenges around consolidating activities into initiatives

      Then complete these activities…

      • Collect improvement objectives/tasks from previous phases
      • Develop comprehensive improvement initiatives
      • Leverage value-effort matrix activities to prioritize these initiatives and place them along an improvement roadmap

      With these tools & templates:

      BI Initiatives and Roadmap Tool

      BI Strategy and Roadmap Template

      Step 3.2: Continuous Improvement Opportunities for BI

      Review findings with analyst:

      • Review completed BI improvement initiatives and roadmap
      • Discuss guidelines presenting a finalized improvement to the relevant committee or stakeholders
      • Discuss additional policies and programs that can serve to enhance your established BI improvement roadmap

      Then complete these activities…

      • Present BI improvement roadmap to relevant stakeholders
      • Develop Info-Tech’s recommended supplementary policies and programs for BI

      With these tools & templates:

      BI Strategy and Roadmap Executive Presentation Template

      Phase 3 Results & Insights:

      • Comprehensive initiatives with associated tasks/activities consolidated and prioritized in an improvement roadmap

      STEP 3.1

      Construct a BI Improvement Initiative Roadmap

      Build an improvement initiative roadmap to solidify your revamped BI strategy

      Step Objectives

      • Bring together activities and objectives for BI improvement to form initiatives
      • Develop a fit-for-purpose roadmap aligned with your BI strategy

      Step Activities

      3.1.1 Characterize individual improvement objectives and activities ideated in previous phases.

      3.1.2 Synthesize and detail overall BI improvement initiatives.

      3.1.3 Create a plan of action by placing initiatives on a roadmap.

      Outcomes

      • Detailed BI improvement initiatives, prioritized by value and effort
      • Defined roadmap for completion of tasks associated with each initiative and accountability

      Research Support

      • Info-Tech’s BI Initiatives and Roadmap Tool

      Proposed Participants in this Step

      Project Manager

      Project Team

      Create detailed BI strategy initiatives by bringing together the objectives listed in the previous phases

      When developing initiatives, all components of the initiative need to be considered, from its objectives and goals to its benefits, risks, costs, effort required, and relevant stakeholders.

      Use outputs from previous project steps as inputs to the initiative and roadmap building:

      The image shows the previous project steps as inputs to the initiative and roadmap building, with arrow pointing from one to the next.

      Determining the dependencies that exist between objectives will enable the creation of unique initiatives with associated to-do items or tasks.

      • Group objectives into similar buckets with dependencies
      • Select one overarching initiative
      • Adapt remaining objectives into tasks of the main initiative
      • Add any additional tasks

      Leverage Info-Tech’s BI Initiatives and Roadmap Tool to build a fit-for-purpose improvement roadmap

      BI Initiatives and Roadmap Tool

      Overview

      Use the BI Initiatives and Roadmap Tool to develop comprehensive improvement initiatives and add them to a BI strategy improvement roadmap.

      Recommended Participants

      • BI project team

      Tool Guideline

      Tab 1. Instructions Use this tab to get an understanding as to how the tool works.
      Tab 2. Inputs Use this tab to customize the inputs used in the tool.
      Tab 3. Activities Repository Use this tab to list and prioritize activities, to determine dependencies between them, and build comprehensive initiatives with them.
      Tab 4. Improvement Initiatives Use this tab to develop detailed improvement initiatives that will form the basis of the roadmap. Map these initiatives to activities from Tab 3.
      Tab 5. Improvement Roadmap Use this tab to create your BI strategy improvement roadmap, assigning timelines and accountability to initiatives and tasks, and to monitor your project performance over time.

      Activity: Consolidate BI activities into the tool and assign dependencies and priorities

      3.1.1

    • 2 hours
      1. Have one person from the BI project team populate Tab 3. Activities Repository with the BI strategy activities that were compiled in Phases 1 and 2. Use drop-downs to indicate in which phase the objective was originally ideated.
      2. With BI project team executives, discuss and assign dependencies between activities in the Dependencies columns. A dependency exists if:
      • An activity requires consideration of another activity.
      • An activity requires the completion of another activity.
      • Two activities should be part of the same initiative.
      • Two activities are very similar in nature.
    • Then discuss and assign priorities to each activity in the Priority column using input from previous Phases. For example, if an activity was previously indicated as critical to the business, if a similar activity appears multiple times, or if an activity has several dependencies, it should be higher priority.
    • Inputs

      • BI improvement activities created in Phases 1 and 2

      Output

      • Activities with dependencies and priorities

      Materials

      • BI Initiatives and Roadmap Tool

      Participants

      • BI project team

      Activity: Consolidate BI activities into the tool and assign dependencies and priorities (cont’d.)

      3.1.1

      2 hours

      Screenshot of Tab 3. BI Activities Repository, with samples improvement activities, dependencies, statuses, and priorities

      The image is of a screenshot of Tab 3. BI Activities Repository, with samples improvement activities, dependencies, statuses, and priorities.

      Revisit the outputs of your current state assessment and note which activities have already been completed in the “Status” column, to avoid duplication of your efforts.

      When classifying the status of items in your activity repository, distinguish between broader activities (potential initiatives) and granular activities (tasks).

      Activity: Customize project inputs and build out detailed improvement initiatives

      3.1.2

      1.5 hours

      1. Follow instructions on Tab 2. Inputs to customize inputs you would like to use for your project.
      2. Review the activities repository and select up to 12 overarching initiatives based on the activities with extreme or highest priority and your own considerations.
      • Rewording where necessary, transfer the names of your initiatives in the banners provided on Tab 4. Improvement Initiatives.
      • On Tab 3, indicate these activities as “Selected (initiatives)” in the Status column.
    • In Tab 4, develop detailed improvement initiatives by indicating the owner, taxonomy, start and end periods, cost and effort estimates, goal, benefit/value, and risks of each initiative.
    • Use drop-downs to list “Related activities,” which will become tasks under each initiative.
      • activities with dependency to the initiative
      • activities that lead to the same goal or benefit/value of the main initiative

      Screenshot of the Improvement Initiative template, to be used for developing comprehensive initiatives

      <p data-verified=The image is a screenshot of the Improvement Initiative template, to be used for developing comprehensive initiatives.">

      Inputs

      • Tab 3. Activities Repository

      Output

      • Unique and detailed improvement initiatives

      Materials

      • BI Initiatives and Roadmap Tool
      • BI Initiatives section of the BI Strategy and Roadmap Template

      Participants

      • BI project team

      Visual representations of your initiative landscape can aid in prioritizing tasks and executing the roadmap

      Building a comprehensive BI program will be a gradual process involving a variety of stakeholders. Different initiatives in your roadmap will either be completed sequentially or in parallel to one another, given dependencies and available resources. The improvement roadmap should capture and represent this information.

      To determine the order in which main initiatives should be completed, exercises such as a value–effort map can be very useful.

      Example: Value–Effort Map for a BI Project

      Initiatives that are high value–low effort are found in the upper left quadrant and are bolded; These may be your four primary initiatives. In addition, initiative five is valuable to the business and critical to the project’s success, so it too is a priority despite requiring high effort. Note that you need to consider dependencies to prioritize these key initiatives.

      Value–Effort Map for a BI Project
      1. Data profiling techniques training
      2. Improve usage metrics
      3. Communication plan for BI
      4. Staff competency evaluation
      5. Formalize practice capabilities
      6. Competency improvement plan program
      7. Metadata architecture improvements
      8. EDW capability improvements
      9. Formalize oversight for data manipulation

      This exercise is best performed using a white board and sticky notes, and axes can be customized to fit your needs (E.g. cost, risk, time, etc.).

      Activity: Build an overall BI strategy improvement roadmap for the entire project

      3.1.3

      45 minutes

      The BI Strategy Improvement Roadmap (Tab 5 of the BI Initiatives and Roadmap Tool) has been populated with your primary initiatives and related tasks. Read the instructions provided at the top of Tab 5.

      1. Use drop-downs to assign a Start Period and End Period to each initiative (already known) and each task (determined here). As you do so, the roadmap will automatically fill itself in. This is where the value–effort map or other prioritization exercises may help.
      2. Assign Task Owners reporting Managers.
      3. Update the Status and Notes columns on an ongoing basis. Hold meetings with task owners and managers about blocked or overdue items.
      • Updating status should also be an ongoing maintenance requirement for Tab 3 in order to stay up to date on which activities have been selected as initiatives or tasks, are completed, or are not yet acted upon.

      Screenshot of the BI Improvement Roadmap (Gantt chart) showing an example initiative with tasks, and assigned timeframes, owners, and status updates.

      INPUTS

      • Tab 3. Activities Repository
      • Tab 4. Improvement Initiatives

      OUTPUT

      • BI roadmap

      Materials

      • BI Initiatives and Roadmap Tool
      • Roadmap section of the BI Strategy and Roadmap Template

      Participants

      • BI project team

      Obtain approval for your BI strategy roadmap by organizing and presenting project findings

      Use a proprietary presentation template

      Recommended Participants

      • Project sponsor
      • Relevant IT & business executives
      • CIO
      • BI project team

      Materials & Requirements

      Develop your proprietary presentation template with:

      • Results from Phases 1 and 2 and Step 3.1
      • Information from:
        • Info-Tech’s Build a Reporting and Analytics Strategy
      • Screen shots of outputs from the:
        • BI Practice Assessment Tool
        • BI Initiatives and Roadmap Tool

      Next Steps

      Following the approval of your roadmap, begin to plan the implementation of your first initiatives.

      Overall Guidelines

      • Invite recommended participants to an approval meeting.
      • Present your project’s findings with the goal of gaining key stakeholder support for implementing the roadmap.
      1. Set the scene using BI vision & objectives.
      2. Present the results and roadmap next.
      3. Dig deeper into specific issues by touching on the important components of this blueprint to generate a succinct and cohesive presentation.
    • Make the necessary changes and updates stemming from discussion notes during this meeting.
    • Submit a formal summary of findings and roadmap to your governing body for review and approval (e.g. BI steering committee, BI CoE).
    • Info-Tech Insight

      At this point, it is likely that you already have the support to implement a data quality improvement roadmap. This meeting is about the specifics and the ROI.

      Maximize support by articulating the value of the data quality improvement strategy for the organization’s greater information management capabilities. Emphasize the business requirements and objectives that will be enhanced as a result of tackling the recommended initiatives, and note any additional ramifications of not doing so.

      Leverage Info-Tech’s presentation template to present your BI strategy to the executives

      Use the BI Strategy and Roadmap Executive Presentation Template to present your most important findings and brilliant ideas to the business executives and ensure your BI program is endorsed. Business executives can also learn about how the BI strategy empowers them and how they can help in the BI journey.

      Important Messages to Convey

      • Executive summary of the presentation
      • Current challenges faced by the business
      • BI benefits and associated opportunities
      • SWOT analyses of the current BI
      • BI end-user satisfaction survey
      • BI vision, mission, and goals
      • BI initiatives that take you to the future state
      • (Updated) Analytical Strategy
      • Roadmap that depicts the timeline

      STEP 3.2

      Continuous Improvement Opportunities for BI

      Create supplementary policies and programs to augment your BI strategy

      Step Objectives

      • Develop a plan for encouraging users to continue to use Excel, but in a way that does not compromise overall BI effectiveness.
      • Take steps to establish a positive organizational culture around BI.

      Step Activities

      3.2.1 Construct a concrete policy to integrate Excel use with your new BI strategy.

      3.2.2 Map out the foundation for a BI Ambassador network.

      Outcomes

      • Business user understanding of where Excel manipulation should and should not occur
      • Foundation for recognizing exceptional BI users and encouraging development of enterprise-wide business intelligence

      Research Support

      • Info-Tech’s BI Initiatives and Roadmap Tool
      • Info-Tech’s BI Strategy and Roadmap Template

      Proposed Participants in this Step

      Project Manager

      Project Team

      Additional Business Users

      Establish Excel governance to better serve Excel users while making sure they comply with policies

      Excel is the number one BI tool

      • BI applications are developed to support information needs.
      • The reality is that you will never migrate all Excel users to BI. Some Excel users will continue to use it. The key is to support them while imposing governance.
      • The goal is to direct them to use the data in BI or in the data warehouse instead of extracting their own data from various source systems.

      The Tactic: Centralize data extraction and customize delivery

      • Excel users formerly extracted data directly from the production system, cleaned up the data, manipulated the data by including their own business logic, and presented the data in graphs and pivot tables.
      • With BI, the Excel users can still use Excel to look at the information. The only difference is that BI or data warehouse will be the data source of their Excel workbook.

      Top-Down Approach

      • An Excel policy should be created at the enterprise level to outline which Excel use cases are allowed, and which are not.
      • Excel use cases that involve extracting data from source systems and transforming that data using undisclosed business rules should be banned.
      • Excel should be a tool for manipulating, filtering, and presenting data, not a tool for extracting data and running business rules.

      Excel

      Bottom-Up Approach

      • Show empathy to your users. They just want information to get their work done.
      • A sub-optimal information landscape is the root cause, and they are the victims. Excel spreadmarts are the by-products.
      • Make the Excel users aware of the risks associated with Excel, train them in BI, and provide them with better information in the BI platform.

      Activity: Create an Excel governance policy

      3.2.1

      4 hours

      Construct a policy around Excel use to ensure that Excel documents are created and shared in a manner that does not compromise the integrity of your overall BI program.

      1. Review the information artifact list harvested from Step 2.1 and identify all existing Excel-related use cases.
      2. Categorize the Excel use cases into “allowed,” “not allowed,” and “not sure.” For each category define:
      3. Category To Do: Policy Context
        Allowed Discuss what makes these use cases ideal for BI. Document use cases, scenarios, examples, and reasons that allow Excel as an information artifact.
        Not Allowed Discuss why these cases should be avoided. Document forbidden use cases, scenarios, examples, and reasons that use Excel to generate information artifacts.
        Not Sure Discuss the confusions; clarify the gray area. Document clarifications and advise how end users can get help in those “gray area” cases.
      4. Document the findings in the BI Strategy and Roadmap Template in the Manage and Sustain BI Strategy section, or a proprietary template. You may also need to create a separate Excel policy to communicate the Dos and Don’ts.

      Inputs

      • Step 2.1 – A list of information artifacts

      Output

      • Excel-for-BI Use Policy

      Materials

      • BI Strategy Roadmap and Template, or proprietary document

      Participants

      • Business executives
      • CIO
      • Head of BI
      • BI team

      Build a network of ambassadors to promote BI and report to IT with end-user feedback and requests

      The Building of an Insider Network: The BI Ambassador Network

      BI ambassadors are influential individuals in the organization that may be proficient at using BI tools but are passionate about analytics. The network of ambassadors will be IT’s eyes, ears, and even mouth on the frontline with users. Ambassadors will promote BI, communicate any messages IT may have, and keep tabs on user satisfaction.

      Ideal candidate:

      • A good relationship with IT.
      • A large breadth of experience with BI, not just one dashboard.
      • Approachable and well-respected amongst peers.
      • Has a passion for driving organizational change using BI and continually looking for opportunities to innovate.

      Push

      • Key BI Messages
      • Best Practices
      • Training Materials

      Pull

      • Feedback
      • Complaints
      • Thoughts and New Ideas

      Motivate BI ambassadors with perks

      You need to motivate ambassadors to take on this additional responsibility. Make sure the BI ambassadors are recognized in their business units when they go above and beyond in promoting BI.

      Reward Approach Reward Type Description
      Privileges High Priority Requests Given their high usage and high visibility, ambassadors’ BI information requests should be given a higher priority.
      First Look at New BI Development Share the latest BI updates with ambassadors before introducing them to the organization. Ambassadors may even be excited to test out new functionality.
      Recognition Featured in Communications BI ambassadors’ use cases and testimonials can be featured in BI communications. Be sure to create a formal announcement introducing the ambassadors to the organization.
      BI Ambassador Certificate A certificate is a formal way to recognize their efforts. They can also publicly display the certificate in their workspace.
      Rewards Appointed by Senior Executives Have the initial request to be a BI ambassador come from a senior executive to flatter the ambassador and position the role as a reward or an opportunity for success.
      BI Ambassador Awards Award an outstanding BI ambassador for the year. The award should be given by the CEO in a major corporate event.

      Activity: Plan for a BI ambassador network

      3.2.2

      2 hours

      Identify individuals within your organization to act as ambassadors for BI and a bridge between IT and business users.

      1. Obtain a copy of your latest organizational chart. Review your most up-to-date organizational chart and identify key BI consumers across a variety of functional units. In selecting potential BI ambassadors, reflect on the following questions:
      • Does this individual have a good relationship with IT?
      • What is the depth of their experience with developing/consuming business intelligence?
      • Is this individual respected and influential amongst their respective business units?
      • Has this individual shown a passion for innovating within their role?
    • Create a mandate and collateral detailing the roles and responsibilities for the ambassador role, e.g.:
      • Promote BI to members of your group
      • Represent the “voice of the data consumers”
    • Approach the ambassador candidates and explain the responsibilities and perks of the role, with the goal of enlisting about 10-15 ambassadors
    • Inputs

      • An updated organizational chart
      • A list of BI users

      Output

      • Draft framework for BI ambassador network

      Materials

      • BI Strategy and Roadmap Template or proprietary document

      Participants

      • Business executives
      • CIO
      • Head of BI
      • BI team

      Keeping tabs on metadata is essential to creating a data democracy with BI

      A next generation BI not only provides a platform that mirrors business requirements, but also creates a flexible environment that empowers business users to explore data assets without having to go back and forth with IT to complete queries.

      Business users are generally not interested in the underlying architecture or the exact data lineages; they want access to the data that matters most for decision-making purposes.

      Metadata is data about data

      It comes in the form of structural metadata (information about the spaces that contain data) and descriptive metadata (information pertaining to the data elements themselves), in order to answer questions such as:

      • What is the intended purpose of this data?
      • How up-to-date is this information?
      • Who owns this data?
      • Where is this data coming from?
      • How have these data elements been transformed?

      By creating effective metadata, business users are able to make connections between and bring together data sources from multiple areas, creating the opportunity for holistic insight generation.

      Like BI, metadata lies in the Information Dimension layer of our data management framework.

      The metadata needs to be understood before building anything. You need to identify fundamentals of the data, who owns not only that data, but also its metadata. You need to understand where the consolidation is happening and who owns it. Metadata is the core driver and cost saver for building warehouses and requirements gathering.

      – Albert Hui, Principal, Data Economist

      Deliver timely, high quality, and affordable information to enable fast and effective business decisions

      In order to maximize your ROI on business intelligence, it needs to be treated less like a one-time endeavor and more like a practice to be continually improved upon.

      Though the BI strategy provides the overall direction, the BI operating model – which encompasses organization structure, processes, people, and application functionality – is the primary determinant of efficacy with respect to information delivery. The alterations made to the operating model occur in the short term to improve the final deliverables for business users.

      An optimal BI operating model satisfies three core requirements:

      Timeliness

      Effectiveness

    • Affordability
    • Bring tangible benefits of your revamped BI strategy to business users by critically assessing how your organization delivers business intelligence and identifying opportunities for increased operational efficiency.

      Assess and Optimize BI Operations

      Focus on delivering timely, quality, and affordable information to enable fast and effective business decisions

      Implement a fit-for-purpose BI and analytics solution to augment your next generation BI strategy

      Organizations new to business intelligence or with immature BI capabilities are under the impression that simply getting the latest-and-greatest tool will provide the insights business users are looking for.

      BI technology can only be as effective as the processes surrounding it and the people leveraging it. Organizations need to take the time to select and implement a BI suite that aligns with business goals and fosters end-user adoption.

      As an increasing number of companies turn to business intelligence technology, vendors are responding by providing BI and analytics platforms with more and more features.

      Our vendor landscape will simplify the process of selecting a BI and analytics solution by:

      Differentiating between the platforms and features vendors are offering.

      Detailing a robust framework for requirements gathering to pinpoint your organization’s needs.

      Developing a high-level plan for implementation.

      Select and Implement a Business Intelligence and Analytics Solution

      Find the diamond in your data-rough using the right BI & Analytics solution

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-tech analysts with your team:

      3.1.1-3.1.3

      Construct a BI improvement initiative roadmap

      During these activities, your team will consolidate the list of BI initiatives generated from the assessments conducted in previous phases, assign timelines to each action, prioritize them using a value–effort matrix, and finally produce a roadmap for implementing your organization’s BI improvement strategy.

      3.2

      Identify continuous improvement opportunities for BI

      Our analyst team will work with your organization to ideate supplementary programs to support your BI strategy. Defining Excel use cases that are permitted and prohibited in conjunction with your BI strategy, as well as structuring an internal BI ambassador network, are a few extra initiatives that can enhance your BI improvement plans.

      Insight breakdown

      Your BI platform is not a one-and-done initiative.

      A BI program is not a static project that is created once and remains unchanged. Your strategy must be treated as a living platform to be revisited and revitalized in order to provide effective enablement of business decision making. Develop a BI strategy that propels your organization by building it on business goals and objectives, as well as comprehensive assessments that quantitatively and qualitatively evaluate your current BI capabilities.

      Put the “B” back in “BI.”

      The closer you align your new BI platform to real business interests, the stronger will be the buy-in, realized value, and groundswell of enthusiastic adoption. Ultimately, getting this phase right sets the stage to best realize a strong ROI for your investment in the people, processes, and technology that will be your next generation BI platform.

      Go beyond the platform.

      BI success is not based solely on the technology it runs on; technology cannot mask gaps in capabilities. You must be capable in your environment – data management, data quality, and related data practices must be strong, otherwise the usefulness of the intelligence suffers. The best BI solution does not only provide a technology platform, but also addresses the elements that surround the platform. Look beyond tools and holistically assess the maturity of your BI practice with input from both the BI consumer and provider perspectives.

      Appendix

      Detailed list of BI Types

      Style Description Strategic Importance (1-5) Popularity (1-5) Effort (1-5)
      Standards Preformatted reports Standard, preformatted information for backward-looking analysis. 5 5 1
      User-defined analyses Pre-staged information where “pick lists” enable business users to filter (select) the information they wish to analyze, such as sales for a selected region during a selected previous timeframe. 5 4 2
      Ad-hoc analyses Power users write their own queries to extract self-selected pre-staged information and then use the information to perform a user-created analysis. 5 4 3
      Scorecards and dashboards Predefined business performance metrics about performance variables that are important to the organization, presented in a tabular or graphical format that enables business users to see at a glance how the organization is performing. 4 4 3
      Multidimensional analysis (OLAP) Multidimensional analysis (also known as On-line analytical processing): Flexible tool-based user-defined analysis of business performance and the underlying drivers or root causes of that performance. 4 3 3
      Alerts Predefined analyses of key business performance variables, comparison to a performance standard or range, and communication to designated businesspeople when performance is outside the predefined performance standard or range. 4 3 3
      Advanced Analytics Application of long-established statistical and/or operations research methods to historical business information to look backward and characterize a relevant aspect of business performance, typically by using descriptive statistics 5 3 4
      Predictive Analytics Application of long-established statistical and/or operations research methods to historical business information to predict, model, or simulate future business and/or economic performance and potentially prescribe a favored course of action for the future 5 3 5

      Our BI strategy approach follows Info-Tech’s popular IT Strategy Framework

      A comprehensive BI strategy needs to be developed under the umbrella of an overall IT strategy. Specifically, creating a BI strategy is contributing to helping IT mature from a firefighter to a strategic partner that has close ties with business units.

      1. Determine mandate and scope 2. Assess drivers and constraints 3. Evaluate current state of IT 4. Develop a target state vision 5. Analyze gaps and define initiatives 6. Build a roadmap 8. Revamp 7. Execute
      Mandate Business drivers Holistic assessments Vision and mission Initiatives Business-driven priorities
      Scope External drivers Focus-area specific assessments Guiding principles Risks
      Project charter Opportunities to innovate Target state vision Execution schedule
      Implications Objectives and measures

      This BI strategy blueprint is rooted in our road-tested and proven IT strategy framework as a systematic method of tackling strategy development.

      Research contributors

      Internal Contributors

      • Andy Woyzbun, Executive Advisor
      • Natalia Nygren Modjeska, Director, Data & Analytics
      • Crystal Singh, Director, Data & Analytic
      • Andrea Malick, Director, Data & Analytics
      • Raj Parab, Director, Data & Analytics
      • Igor Ikonnikov, Director, Data & Analytics
      • Andy Neill, Practice Lead, Data & Analytics
      • Rob Anderson, Manager Sales Operations
      • Shari Lava, Associate Vice-President, Vendor Advisory Practice

      External Contributors

      • Albert Hui, Principal, DataEconomist
      • Cameran Hetrick, Senior Director of Data Science & Analytics, thredUP
      • David Farrar, Director – Marketing Planning & Operations, Ricoh Canada Inc
      • Emilie Harrington, Manager of Analytics Operations Development, Lowe’s
      • Sharon Blanton, VP and CIO, The College of New Jersey
      • Raul Vomisescu, Independent Consultant

      Research contributors and experts

      Albert Hui

      Consultant, Data Economist

      Albert Hui is a cofounder of Data Economist, a data-consulting firm based in Toronto, Canada. His current assignment is to redesign Scotiabank’s Asset Liability Management for its Basel III liquidity compliance using Big Data technology. Passionate about technology and problem solving, Albert is an entrepreneur and result-oriented IT technology leader with 18 years of experience in consulting and software industry. His area of focus is on data management, specializing in Big Data, business intelligence, and data warehousing. Beside his day job, he also contributes to the IT community by writing blogs and whitepapers, book editing, and speaking at technology conferences. His recent research and speaking engagement is on machine learning on Big Data.

      Albert holds an MBA from the University of Toronto and a master’s degree in Industrial Engineering. He has twin boys and enjoys camping and cycling with them in his spare time.

      Albert Hui Consultant, Data Economist

      Cameran Hetrick

      Senior Director of Analytics and Data Science, thredUP

      Cameran is the Senior Director of Analytics and Data Science at thredUP, a startup inspiring a new generation to think second hand first. There she helps drives top line growth through advanced and predictive analytics. Previously, she served as the Director of Data Science at VMware where she built and led the data team for End User Computing. Before moving to the tech industry, she spent five years at The Disneyland Resort setting ticket and hotel prices and building models to forecast attendance. Cameran holds an undergraduate degree in Economics/Mathematics from UC Santa Barbara and graduated with honors from UC Irvine's MBA program.

      Cameran Hetrick Senior Director of Analytics and Data Science, thredUP

      Bibliography

      Bange, Carsten and Wayne Eckerson. “BI and Data Management in the Cloud: Issues and Trends.” BARC and Eckerson Group, January 2017. Web.

      Business Intelligence: The Strategy Imperative for CIOs. Tech. Information Builders. 2007. Web. 1 Dec. 2015.

      COBIT 5: Enabling Information. Rolling Meadows, IL: ISACA, 2013. Web.

      Dag, Naslund, Emma Sikander, and Sofia Oberg. "Business Intelligence - a Maturity Model Covering Common Challenges." Lund University Publications. Lund University, 2014. Web. 23 Oct. 2015.

      “DAMA Guide to the Data Management Body of Knowledge (DAMA-DMBOK Guide).” First Edition. DAMA International. 2009. Digital. April 2014.

      Davenport, Thomas H. and Bean, Randy. “Big Data and AI Executive Survey 2019.” NewVantage Partners LLC. 2019. Web.

      "Debunking the Business of Analytics." Experian Data Quality. Sept. 2013. Web.

      Bibliography

      Drouin, Sue. "Value Chain." SAP Analytics. February 27, 2015.

      Farrar, David. “BI & Data analytics workshop feedback.” Ricoh Canada. Sept. 2019.

      Fletcher, Heather. "New England Patriots Use Analytics & Trigger Emails to Retain Season Ticket Holders." Target Marketing. 1 Dec. 2011. Web.

      Gonçalves, Alex. "Social Media Analytics Strategy - Using Data to Optimize Business Performance.” Apress. 2017.

      Imhoff, Claudia, and Colin White. "Self Service Business Intelligence: Empowering Users to Generate Insights." SAS Resource Page. The Data Warehouse Institute, 2011. Web.

      Khamassi, Ahmed. "Building An Analytical Roadmap : A Real Life Example." Wipro. 2014.

      Kuntz, Jerry, Pierre Haren, and Rebecca Shockley. IBM Insight 2015 Teleconference Series. Proc. of Analytics: The Upside of Disruption. IBM Institute for Business Value, 19 Oct. 2015. Web.

      Kwan, Anne , Maximillian Schroeck, Jon Kawamura. “Architecting and operating model, A platform for accelerating digital transformation.” Part of a Deliotte Series on Digital Industrial Transformation, 2019. Web.

      Bibliography

      Lebied, Mona. "11 Steps on Your BI Roadmap To Implement A Successful Business Intelligence Strategy." Business Intelligence. July 20, 2018. Web.

      Light, Rob. “Make Business Intelligence a Necessity: How to Drive User Adoption.” Sisense Blog. 30 July 2018.

      Mazenko, Elizabeth. “Avoid the Pitfalls: 3 Reasons 80% of BI Projects Fail.” BetterBuys. October 2015.

      Marr, Bernard. "Why Every Business Needs A Data And Analytics Strategy.” Bernard Marr & Co. 2019.

      Mohr, Niko and Hürtgen, Holger. “Achieving Business Impact with Data.” McKinsey. April 2018.

      MIT Sloan Management

      Quinn, Kevin R. "Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail." (2007): 1-19. BeyeNetwork. Information Builders, 2007. Web. 1 Dec. 2015.

      Ringdal, Kristen. "Learning multilevel Analysis." European social Survey. 2019.

      Bibliography

      Schaefer, Dave, Ajay Chandramouly, Burt Carmak, and Kireeti Kesavamurthy. "Delivering Self-Service BI, Data Visualization, and Big Data Analytics." IT@Intel White Paper (2013): 1-11. June 2013. Web. 30 Nov. 2015.

      Schultz, Yogi. “About.” Corvelle Consulting. 2019.

      "The Current State of Analytics: Where Do We Go From Here?" SAS Resource Page. SAS & Bloomberg Businessweek, 2011. Web.

      "The Four Steps to Defining a Customer Analytics Strategy." CCG Analytics Solutions & Services. Nov 10,2017.

      Traore, Moulaye. "Without a strategic plan, your analytics initiatives are risky." Advisor. March 12, 2018. web.

      Wells, Dave. "Ten Mistakes to Avoid When Gathering BI Requirements." Engineering for Industry. The Data Warehouse Institute, 2008. Web.

      “What is a Business Intelligence Strategy and do you need one?” Hydra. Sept 2019. Web.

      Williams, Steve. “Business Intelligence Strategy and Big Data Analytics.” Morgan Kaufman. 2016.

      Wolpe, Toby. "Case Study: How One Firm Used BI Analytics to Track Staff Performance | ZDNet." ZDNet. 3 May 2013. Web.

      Yuk, Mico. “11 Reasons Why Most Business Intelligence Projects Fail.” Innovative enterprise Channels. May 2019.

      Considerations for a Move to Virtual Desktops

      • Buy Link or Shortcode: {j2store}69|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy
      • Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have accelerated the move to VDI and DaaS.
      • IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, including complicated shared infrastructure, inadequate training or insufficient staff, and security and compliance concerns.
      • If you do not consider how your end user will be impacted, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption.
      • How will you manage and navigate the right solution for your organization?

      Our Advice

      Critical Insight

      • In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

      Impact and Result

      • The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business: performance, availability, functionality, and security.
      • Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business.

      Considerations for a Move to Virtual Desktops Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Move to Virtual Desktops Storyboard – A guide to the strategic, technical, and support implications that should be considered in support of a move to VDI or DaaS.

      By defining your goals, framing solutions based on end-user workloads, and understanding the pros and cons of various solutions, you can visualize what success looks like for your VDI/DaaS deployment. This includes defining your KPIs by end-user experience, knowing the decision gates for a successful deployment, and defining your hypothesis for value to make your decision more accurate and gain C-suite buy-in.

      • Considerations for a Move to Virtual Desktops Storyboard
      [infographic]

      Further reading

      What strategic, technical, and support implications should be considered in support of a move to VDI or DaaS?

      Executive Summary

      Insight

      End-user experience is your #1 consideration

      Virtual desktop infrastructure (VDI)/desktop as a service (DaaS) users expect their user experience to be at least equal to that provided by a physical PC, and they do not care about the underlying infrastructure. If the experience is less, then IT has failed in the considerations for VDI/ DaaS. In this research we analyze the data that the IT industry tracks but doesn't use or sometimes even look at regarding user experience (UX).

      Identify the gaps in your IT resources that are critical to success

      Understanding the strengths and weaknesses in your in-house technical skills and business requirements will assist you in making the right decision when it comes to VDI or DaaS solutions. In the case of DaaS this will include a managed service provider for small to medium-sized IT teams. Many IT teams lack a seasoned IT project manager who can identify gaps, risks, and weaknesses in the organization's preparedness. Redeploy your IT staff to new roles that impact management and monitoring of UX.

      IT should think about VDI and DaaS solutions

      Ultimately, IT needs to reduce its complexity, increase user satisfaction, reduce management and storage costs, and maintain a secure and effective environment for both the end user and the business. They must also ensure productivity standards throughout the considerations, strategically, tactically, and in support of a move to a VDI or DaaS solution.

      Executive Summary

      Your Challenge

      With the evolution of VDI over the last 15-plus years, there has been a proliferation of solutions, such as Citrix desktop services, VMware Horizon, and in-house hypervisor solutions (e.g. ESX hosts). There has also been a great deal of growth and competition of DaaS and SaaS solutions in the cloud space. Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have certainly accelerated the move to VDI and DaaS.

      How will you manage and navigate the right solution for your organization?

      Common Obstacles

      IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, such as:

      • Complicated shared infrastructure such as federated multitenant partners and legacy app servers.
      • Inadequate in-house training or insufficient staff to execute migration or manage post-migration activates such as governance and retention policies.
      • Security, compliance, legal, and data classification concerns. Some security tools cannot be deployed in the cloud, limiting you to an on-premises solution.
      Info-Tech’s Approach

      By defining your end goals, framing solutions based on end-user workloads, and understanding the pros and cons of what solution(s) will meet your needs, you can visualize what success looks like.

      1. Define your KPIs by end-user experience.
      2. Knowing what the decision gates are for a successful VDI/DaaS deployment will prove out your selection process.
      3. Define your hypothesis for value. How you determine value will make your decision more accurate and gain C-suite buy-in.

      Info-Tech Insight

      Every IT organization needs to be asking what success looks like. If you do not consider how your end user will be impacted, whether they are doing something as simple as holding a team meeting with voice and video or working with highly technical workloads on a virtual environment, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption. Understand the tension metrics that may conflict with meeting business objectives and KPIs.

      Voice of the customer

      Client-Driven Insight

      Different industries have different requirements and issues, so they look at solutions differently.

      Info-Tech Insight

      If end-user experience is at the forefront of business requirements, then any solution that fits the business KPIs can be successful.

      Client Pain Point

      Description Indicators

      Flexible work environmentWhat VDI solution can support a work-from-anywhere scenario? Possible solutions: Azure Virtual Desktop, IGEL client, Citrix virtual apps, and desktop services.
      Security concerns Corporate resources need to be secure. Working with untrusted endpoints or unsecured locations. Using VPN-type solution.
      End-user experience What performance metrics should be used to evaluate UX? Are there issues around where the endpoint is located? What kind of link do they have to the virtual desktop? What solutions are there?
      Optimization of routing What routings need to take place to achieve reduced latency and improved experience?
      Multifactor authenticationSecurity features such as a multilayered MFA and corporate data protection.
      Business continuity What are the options when dealing with cloud outages, meeting SLAs, and building resilience?
      Optimizing app performance and response times Define users based on a multiuser environment. Engineers and designers require more CPU resources, which negatively impacts on other users. Optimize CPU to avoid this situation. MS Teams and video streaming apps are not performing in an optimized manner.
      Optimization of cloud costs Scalability and usage schedule. Minimize cloud costs with tools to handle workloads and usage.
      Third-party access outsourcingContractors and third parties accessing business resources need to control data and source code along with developer tools in a centrally managed SaaS.

      The enterprise end-user compute landscape is changing

      Starting on the left are three computer types 'Windows on a PC', 'Mac', and 'VDI on a Thick Client'. In the next part, the first two are combined into 'BYOD', and the tree begins at 'Win11'. Branches from Win11 are: 'DIY' which branches to 'Autopilot & Endpoint Manager (Intune)'; 'Outsource' which branches to 'Device as a Service' which brances to 'Dell', 'Lenovo', and 'HP'; and another branch from 'Outsource', 'Azure Desktop', Which snakes us around to the top of the diagram at 'VDI'. VDI branches to 'VDI on a thin client' and 'VDI on a Browser', then they both branch into 'DIY' which branches to 'Citrix', 'VMware', and 'Azure', and 'Outsource' which branches to 'Desktop as a Service Vendor'.

      Surveys are telling us a story

      Questions you should be asking before you create your RFP
      • What are the use cases and types of workloads?
      • What is the quality of the network connection and bandwidth for the user base?
      • What are the application requirements?
      • What type of end points does the user have and what is the configuration?
      • Where are the data storage containers, how are they accessed, and are there proximity constraints?
      • What is the business security and identity policy requirements?
      • What are the functional and nonfunctional requirements?
      • Will the virtual desktops be persistent or non-persistent?

      How would you rate the user experience on your VDI/DaaS solution?


      (Source: Hysolate, 2020)

      • 18% of CISOs say htue employees are happy with their company's VDI/DaaS solution
      • 82% say their employees are neutral or unhappy with their company's VDI/DaaS solution

      Info-Tech Insight

      Asking critical use-case questions should give you a clear picture of the end-user experience outcome.

      End-user KPI metrics are difficult to gather

      Security is always quoted as a primary justification for VDI/DaaS, while UX is far down the list of KPIs. WHY?

      IT engineers use network and performance metrics to manage end-user complaints of “slowness,” which in reality is not what the user is experiencing.

      IT needs to invest in more meaningful metrics to manage end-user pain:

      • Logon duration
      • App load time
      • App response time
      • Session response time
      • Graphic quality and responsiveness and latency
      • Application availability and performance
      Bar chart of justifications used for business investment in VDI/DaaS. The most used justification is 'IT Efficiency' at 38%, and highlighted in the 2nd last place is 'Employee Experience' at 11%.
      (Source: Enterprise Strategy Group, 2020)

      Dimensions of user experience

      The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business.

      Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business. We will investigate how these scenarios impact the end user, what that means, and how that can guide the questions that you are asking as you move to an RFP.

      Info-Tech Insight

      In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

      Three arrows pointing right with labels in sequence 'Dimensions', 'Operational Metrics', and 'Technical Capabilities/ Controls'

      Cycle diagram with many tiers, titled 'USER EXPERIENCE'. The first tier from the center has four items cycling clockwise 'Availability', 'Functionality', 'Security', and 'Performance'. The second tier is associated to the first tier: under Availability is 'Maintenance', 'Uptime', and 'Degradation'; under Functionality is 'Graphics Quality', 'User Friction', and 'Usability'; under Security is 'Endpoint Monitoring', 'Plane Control', and 'Identity'; under Performance is 'Response Time', 'Reliability', and 'Latency'. Around the edge on the third tier are many different related terms.

      KPIs and metrics

      • Understand the types of end-user activities that are most likely to be reported as being slow.
      • You need to know what storage, CPU, memory, and network resources are being used when the user performs those activities. In other words, what is the OS doing behind the scenes and what hardware is it using?
      • Once you have determined which resources are being used by the various activities you will have to monitor the UX metrics to see which OS, network, storage, or server configuration issue is causing the performance issue that the user is reporting.

      What IT measures

      Most business KPI objectives concentrate on business goals, whether it be cost containment, security, simplification, ease of management, or centralization of apps and data, but rarely is there a KPI for end-user experience.

      You can’t fix what you can’t see. Putting a cost benefit to end-user satisfaction may come in the form of productivity.

      This may be a central reason why VDI has not been widely adopted as an architecture since it came to the marketplace more than 15 years ago.

      Samples of different KPIs and metrics.

      VDI processes to monitor

      Monitoring end-user metrics will mitigate the tension between business KPIs and end-user satisfaction

      Metric

      Description

      End-User
      Experience

      PERFORMANCELogon durationOnce the user puts in their password, how long does it take to get to their desktop? What is the measurement and how do you measure?
      App load timeWhen an app is launched by the user there should be immediate indication that it is loading.
      App response timeWhen the user performs a task, there should be no wait time, or hourglass icon, waiting for the app to catch up to the user input. (There is no succinct way to measure this.)
      Session response timeHow does the user’s OS respond to I/O? The user should not experience any latency issues when doing a drag and drop, clicking on a menu item, or doing a search.
      AVAILABILITYSLAsWhen something goes wrong in the VDI/DaaS environment, how quickly can the user expect to get back to their tasks?
      Geographic locationWhen all other considerations are configured correctly, the user experience may be impacted by their location. So, for example, a user working out of Mexico and logging into a VDI may experience latency based on location compared to a user in California, for example, where the resources are stored, managed, and monitored.
      Application availabilityMuch like app load time and response time, the only factor affecting the user experience is the back-end load on the app itself, for example a CAD or heavy resource app not properly resourced.
      FUNCTIONALITYConfiguration of user desktopDegradation in functionality is caused by improper allocation of CPU, RAM, and GPU for the tasks at hand, creating a bad UX and end-user satisfaction score.
      Graphics quality and responsivenessThe user should have the same experience as if on their own physical machine. A video experience should not have any lag in it, for example. MS Teams should not have latency or sound quality issues.
      Predictive analysisContinuous performance and availability monitoring.
      END USERBrowser real user monitoring (RUM)A real-time view into how the web application is performing from the point of view of a real end user.
      Customer satisfaction scoreSurvey-based metrics on customer satisfaction.

      “If employees are the competitive edge and key differentiator for a business, I&O has a duty of care to ensure that the employees’ digital experience enables and does not impede the value of that asset.” (John Annand, Principal Director, Info-Tech Research Group)

      The case for VDI today

      Is security and data sovereignty the only reason?

      Technical capability
      AVAILABILITYVDI is a better fit than DaaS in organizations that have limited or unreliable internet connectivity.
      FUNCTIONALITYApplication flexibility: Resource-intensive applications may require specific virtual desktop configurations, for example in-house GIS apps, CAD, and gaming software requiring specific GPU configurations.
      SECURITYData protection is often stated as a need to maintain an on-premises VDI solution, ensuring sensitive and highly privileged data does not travel across the internet.
      AVAILABILITYWhile some cloud providers will allow you to bring your OS licensing along with a cloud migration, many subscriptions already include OS licensing, and you may be paying additional licensing costs.
      SECURITYVDI makes sense if security and control are primary business KPIs, the IT resources are experienced virtual infrastructure engineers and administrators, and funding is not a hindrance.
      PERFORMANCEWhen processing power is a functional requirement, such as CPU, GPU, and storage capacity, VDI offers performance benefits over a standard PC, reducing the need to deploy high-powered PCs to end users.

      “Though the desktops are moving to the cloud, accountability is not.” (Gary Bea, Director of Consulting Services and Technical Operations, Goliath Technologies)

      The case for DaaS

      Any device anywhere: key benefits of DaaS

      Technical capabilityChallenges
      AVAILABILITYDelivers a consistent user experience regardless of location or device.

      Info-Tech Insight

      The total cost of the solution will be higher than you anticipate, and management is complex. Additionally, your ability to set your conditions and controls is limited.

      Info-Tech Insight

      Depending on your technical abilities and experience with cloud services, you will likely benefit from professional third-party services, technical services, and consulting, which can be critical when deciding if DaaS can fit into your current IT architecture, processes, and security posture.

      SECURITYEnhances security posture by eliminating your client VPN and keeping sensitive data off the endpoint device.
      FUNCTIONALITYOnboard and offboard users quickly and securely.
      FUNCTIONALITYProvides centralize workspace management.
      FUNCTIONALITYScale up or down on demand with a consumption- and subscription-based contract.
      FUNCTIONALITYSignificantly reduce operational overhead compared to managing a traditional VDI deployment.

      Technical capability comparison

      Table comparing technical capabilities using a scale of circle quarters: zero quarters being 'Poor' and 4 quarters being 'Good'. There are six columns in the body, three of which are under 'VDI': 'Thin Client', 'Thick Client', and 'Web Client', and the other three are 'Desktop as a service', 'Device as a service', and 'Win11 w/ Autopilot & Intune'. Rows are split into four categories: In 'Performance' are 'Reliability', 'Response Time', and 'Latency'; in 'Availability' are 'Uptime' and 'Degradation'; in 'Functionality' are 'Usability', 'Graphics Quality', and 'User Friction'; in 'Security' are 'Endpoint Mgt.', 'Control Plane', and 'Identity'.

      X as an endpoint client

      From an end-user experience perspective, what makes sense in terms of usage and cost?

      Thin Client
      • ✓ Easy provisioning and simple to use and manage
      • ✓ Easy to secure and update
      • ✓ Less vulnerable to data loss
      • ✓ Easily scaled
      • ✓ Requires less power
      • ✓ Cheaper than PCs
      • x compared to a PC
      • x Not powerful enough to manage loads such as CAD
      • x Infrastructure and network must be robust and up to date to avoid possible network latency
      • Examples: Terminals, Dell Wyse 5070, Lenovo M625, IGEL, HP Thin Client, repurposed PCs, Chromebook
      Desktop as a Service
      • ✓ Flexibility: work from anywhere, on any device, collaboratively
      • ✓ Resource scalability not reliant on on-premises server hardware
      • ✓ Easy to configure, install, and maintain
      • ✓ Reliable and easy to provision
      • ✓ Centralized sensitive data cloud security
      • x Requires high-speed internet, especially for remote users
      • x Learning curve can cause user friction
      • x Workload configuration use cases
      • Examples: Citrix, VM Horizon, AWS WorkSpaces, WVD, BYOD
      Thick Client
      • ✓ Completely flexible, for use with on-premises or cloud infrastructure
      • ✓ Able to work offline
      • ✓ Multimedia or bandwidth-intensive resource processing
      • ✓ Higher server capacity due to less resource load on servers
      • x Higher maintenance and updates attention
      • x Patching, security, and data migration friction
      • x More security vulnerability
      • x Less cost effective
      • Examples: Windows, MacOS desktops, laptops, smartphones, tablets
      Device as a Service
      • ✓ Device supply chain flow fulfillment, services, and recovery
      • ✓ Able to update to new equipment more frequently
      • ✓ Scale up and down as needed
      • ✓ Better device backup, asset tracking , security, and EOL disposal
      • x Challenging risk management, regulatory obligations, and liabilities
      • x Change in helpdesk and business workflows
      • x Vendor may limit selection
      • Examples: PCs, smartphones, mobile computing devices, Lenovo, HP, Microsoft, Dell, Macs, iPads, iPhones
      Web Client
      • ✓ Can be accessed from any computer; only requires username and password
      • ✓ Client works with a URL, so browser-based
      • ✓ Updates are easier than on a Windows client
      • x Security risk and information leakage
      • x Dependent on internet access
      • x Unable to work on high-impact resource apps (e.g. CAD, graphics)
      • x Limited user base, less technical operations
      • Examples: Chrome, Edge, HTML5

      Security: on-premises versus cloud

      Security decisions based on risk tolerance

      • What is your risk tolerance? When deciding between VDI and DaaS, the first consideration is whether the business is better served with an on-premises or a cloud solution.
      • Low risk tolerance: Considerer data sovereignty, complex compliance requirements, and data classification. For example, at the Pentagon, DoD requires heavy compliance with security and data sovereignty. DaaS cloud providers may be in a better position to respond to threats and attacks in a timely manner.
      • Low risk tolerance: If the business mandates security tools that cannot be deployed in cloud solutions, VDI is a better solution.
      • Low risk tolerance: Smaller businesses that don’t have resources with the expertise and skill set to handle security are better served in cloud. Security operations centers (SOCs) are more likely to present in large corporations.
      • Low risk tolerance: When patching requires customization, for example in legacy applications, the ability to test patches is impacted, which may cause possible complications or failures.
      • High risk tolerance: For cloud-based solutions, patching is taken out of the IT team’s hands, and testing is done against the complete cloud solution.

      Info-Tech Insight

      What is the better security posture and control plane? Clarify your stakeholders’ objectives, then see if VDI is an adequate solution.

      Security needs for VDI and DaaS

      • IDENTITY AND ACCESS MANAGEMENT — MFA, authorization, provisioning, SSO, identity federation, data owners, workflows, role-based access control (RBAC), user lifecycle management
      • ENCRYPTION — TLS 1.3, and 256-bit, endpoint encryption, file encryption, AES, PKI, BitLocker
      • DATA LOSS PREVENTION — Centralized policy management, sensitive data detection, HIPAA, GDPR
      • ANTIVIRUS & PATCH MANAGEMENT — Group policy management, AV exclusions, anti-ransomware, keylogger mitigation
      • DDoS protection — HTTP, UDP flood mitigation, content delivery network, always-on services
      • ENDPOINT DETECTION & RESPONSE — Detect and react to advanced active attacks on endpoints

      Activity

      Define the virtual infrastructure solution for your end users

      1. Define and build your value hypothesis/proposition
        1. What is the business case? Who is championing the investment?
        2. Identify the project management team and stakeholders.
        3. Set goals to be achieved based on value.
        4. Identify KPIs and metrics to measure success.
      2. Identify use cases and personas
        1. Identify possible user friction (e.g. emotional, cognitive, interaction).
        2. Understand current infrastructure shortcomings/capabilities (e.g. network, security posture/tolerance, staffing needs, qualified technicians, end-user devices).
      3. Articulate use cases into functional and nonfunctional requirements
        1. Separate must haves and nice to haves.
        2. Categorize requirements into identifiable functionality capabilities.
        3. Review your outputs and identify “gotchas” using the MECE (mutually exclusive, collectively exhaustive) principle.

      Related Info-Tech Research

      Stock image of a dashboard.Modernize and Transform Your End-User Computing Strategy

      Phase 3.2 of this research set covers virtual desktop infrastructure.

      Stock image of a world surrounded by clouds.Implement Desktop Virtualization and Transition to Everything as a Service

      Follow Info-Tech’s process for implementing the right desktop virtualization solution to create a project plan that will help ensure that you not only choose the right solution but also implement it effectively.

      Stock image of a finger pushing a button.Cloud Strategy Workbook

      Use this tool to assess cloud services (desktop-as-a-service).

      Stock image of a world surrounded by clouds.Desktop Virtualization TCO Calculator

      This tool is designed to help you understand what desktop virtualization looks like from a cost perspective.

      Bibliography

      Anderson, Joseph. “Five Ways VDI Will Grow in 2022 Thanks to Hybrid Work.” StratoDesk, 28 Feb. 2022. Web.

      Bowker, Mark. “Are Desktops Doomed? Trends in Digital Workspaces, VDI, and DaaS.” ESG, May 2020. Web.

      “The CISO's Dilemma: How Chief Information Security Officers Are Balancing Enterprise Endpoint Security and Worker Productivity in Response to COVID-19.” Hysolate, Oct. 2020. Web.

      King, Val. “Why the End-User Experience Is Not Good for Your Remote Workforce .” Whitehat Virtual Technologies, 2 Dec. 2021. Web.

      Perry, Yifat. “VDI vs DaaS: 5 Key Differences and 6 Leading Solutions.” NetApp, 26 Aug. 2020. Web.

      Rigg, Christian. “Best virtual desktop services 2022.” TechRadar, 20 Jan. 2022 . Web.

      Seget, Vladan. “Key metrics to consider when assessing the performance of your VDI/DaaS environment.” vladan.fr, 19 April 2021. Web.

      Spruijt, Ruben. “Why Should You Care About VDI and Desktop-as-a-Service?” Nutanix, 28 Jan. 2020. Web.

      Stowers, Joshua. “The Best Desktop as a Service (DaaS) Providers 2022.” business.com, 21 Dec. 2021. Web.

      “Virtual Desktop Infrastructure(VDI) Market 2022.” MarketWatch, 5 Jan. 2022. Web. Press release.

      Zamir, Tal. “VDI Security Best Practices: Busting the Myths.” Hysolate, 29 Nov. 2021. Web.

      Zychowicz, Paul. “Why do virtual desktop deployments fail?” Turbonomic Blog, 16 Dec. 2016. Web.

      Select an EA Tool Based on Business and User Need

      • Buy Link or Shortcode: {j2store}274|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $62,999 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Architecture Domains
      • Parent Category Link: /architecture-domains
      • A mature EA function is increasingly becoming an organizational priority to drive innovation, provide insight, and define digital capabilities.
      • Proliferation of digital technology has increased complexity, straining the EA function to deliver insights.
      • An EA tool increases the efficiency with which the EA function can deliver insights, but a large number of organizations have not a selected an EA tool that suits their needs.

      Our Advice

      Critical Insight

      • EA tool value largely comes from tying organizational context and requirements to the selection process.
      • Organizations that have selected an EA tool often fail to have it adopted and show its true value. To ensure successful adoption and value delivery, the EA tool selection process must account for the needs of business stakeholders and tool users.

      Impact and Result

      • Link the need for the EA tool to your organization’s EA value proposition. The connection enables the EA tool to address the future needs of stakeholders and the design style of the EA team.
      • Use Info-Tech’s EA Solution Recommendation Tool to create a shortlist of EA tools that is suited to the preferences of the organization.
      • Gather additional information on the shortlist of EA tool vendors to narrow down the selection using the EA Tool Request for Information Template.

      Select an EA Tool Based on Business and User Need Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should procure an EA tool in the digital age, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Select an EA Tool Based on Business and User Need – Executive Brief
      • Select an EA Tool Based on Business and User Need – Phases 1-3

      1. Make the case

      Decide if an EA tool is needed in your organization and define the requirements of EA tool users.

      • Select an EA Tool Based on Business and User Need – Phase 1: Make the Case
      • EA Value Proposition Template
      • EA Tool User Requirements Template

      2. Shortlist EA tools

      Determine your organization’s preferences in terms of product capabilities and vendor characteristics.

      • Select an EA Tool Based on Business and User Need – Phase 2: Shortlist EA Tools
      • EA Solution Recommendation Tool

      3. Select and communicate the process

      Gather information on shortlisted vendors and make your final decision.

      • Select an EA Tool Based on Business and User Need – Phase 3: Select and Communicate the Process
      • EA Tool Request for Information Template
      • EA Tool Demo Script Template
      • Request for Proposal (RFP) Template
      • EA Tool Selection Process Template
      [infographic]

      Achieve Digital Resilience by Managing Digital Risk

      • Buy Link or Shortcode: {j2store}375|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $123,999 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:

      • An increasingly large vendor ecosystem within which to manage risk.
      • A fragmented approach to risk management that separates cyber and IT risk from enterprise risk.
      • A rapidly growing number of threat actors and a larger attack surface.

      Our Advice

      Critical Insight

      • All risks are digital risks.
      • Manage digital risk with a collaborative approach that supports digital transformation, ensures digital resilience, and distributes responsibility for digital risk management across the organization.

      Impact and Result

      Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:

      • Defining digital risk, including primary risk categories and prevalent risk factors.
      • Leveraging industry examples to help identify external risk considerations.
      • Building a digital risk profile, addressing core risk categories, and creating a correlating plan for digital risk management.

      Achieve Digital Resilience by Managing Digital Risk Research & Tools

      Start here – read the Executive Brief

      Risk does not exist in isolation and must extend beyond your cyber and IT teams. Read our concise Executive Brief to find out how to manage digital risk to help drive digital transformation and build your organization's digital resilience.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redefine digital risk and resilience

      Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.

      • Achieve Digital Resilience by Managing Digital Risk – Phases 1-2
      • Digital Risk Management Charter

      2. Build your digital risk profile

      Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.

      • Digital Risk Profile Tool
      • Digital Risk Management Executive Report
      [infographic]

      Workshop: Achieve Digital Resilience by Managing Digital Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope and Define Digital Risk

      The Purpose

      Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.

      Key Benefits Achieved

      Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.

      Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.

      Activities

      1.1 Review the business context

      1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization

      1.3 Define digital transformation and list transformation initiatives

      1.4 Define digital risk in the context of the organization

      1.5 Define digital resilience in the context of the organization

      Outputs

      Digital risk drivers

      Applicable definition of digital risk

      Applicable definition of digital resilience

      2 Make the Case for Digital Risk Management

      The Purpose

      Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.

      Key Benefits Achieved

      An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization

      Industry considerations that highlight the importance of managing digital risk

      A structured approach to managing the categories of digital risk

      Activities

      2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk

      2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)

      2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)

      2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization

      Outputs

      Digital Risk Management Charter

      Industry-specific digital risks, factors, considerations, and scenarios

      The organization's digital risks mapped to its digital transformation initiatives

      3 Build Your Digital Risk Profile

      The Purpose

      Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.

      Key Benefits Achieved

      A unique digital risk profile for the organization

      Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks

      Activities

      3.1 Review category control questions within the Digital Risk Profile Tool

      3.2 Complete all sections (tabs) within the Digital Risk Profile Tool

      3.3 Assess the results of your Digital Risk Profile Tool

      3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders

      Outputs

      Completion of all category tabs within the Digital Risk Profile Tool

      Initial stakeholder ownership assignments of digital risk categories

      4 Manage Your Digital Risk

      The Purpose

      Refine the digital risk management plan for the organization.

      Key Benefits Achieved

      A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis

      An executive presentation that outlines digital risk management for your senior leadership team

      Activities

      4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.

      4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories

      4.3 Begin to build an actionable digital risk management plan

      4.4 Present your findings to the organization's relevant risk leaders and executive team

      Outputs

      A finalized and assessed Digital Risk Profile Tool

      Stakeholder ownership for digital risk management

      A draft Digital Risk Management plan and Digital Risk Management Executive Report

      Explore the Secrets of Oracle Cloud Licensing

      • Buy Link or Shortcode: {j2store}142|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Organizations are considering moving workloads to the cloud; however, they often struggle to understand Oracle's licensing and services models.
      • Complexity of licensing and high price tags can make the renewal process an overwhelming experience.
      • Oracle’s SaaS applications are the most mature, but Oracle’s on-premises E-Business Suite still has functionality gaps in comparison to Oracle’s cloud apps.

      Our Advice

      Critical Insight

      • Understand the Oracle agenda. Oracle has established a unique approach to their cloud offerings – they want all of your workloads on the Red Stack.
      • Communicate effectively. Be aware that Oracle will reach out to members at your organization at various levels. Having your executives on the same page is critical to successfully managing Oracle.
      • Negotiate hard. Oracle needs the deal more than the customer. Oracle's top leaders are heavily incentivized to drive massive cloud adoption and increase Oracle's share price. Use this to your advantage.

      Impact and Result

      • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the “Oracle way” of conducting business, which includes a best-in-class sales structure, highly unique contracts, and license use policies coupled with a hyper-aggressive compliance function.
      • Leverage cloud spend to retire support on shelf-ware licenses, or gain virtualization rights for an on-premises environment.
      • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
      • Carefully review key clauses in the Oracle Cloud Services Agreement to avoid additional spend and compliance risks.

      Explore the Secrets of Oracle Cloud Licensing Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should explore the secrets of Oracle Cloud licensing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evaluate licensing requirements

      Review current licensing options and models to determine which cloud products will most appropriately fit the organization's environment.

      • Oracle Cloud Services Agreement Terms and Conditions Evaluation Tool
      [infographic]

      Modernize Your Applications

      • Buy Link or Shortcode: {j2store}178|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Application modernization is essential to stay competitive and productive in today’s digital environment. Your stakeholders have outlined their digital business goals that IT is expected to meet.
      • Your application portfolio cannot sufficiently support the flexibility and efficiency the business needs because of legacy challenges.
      • Your teams do not have a framework to illustrate, communicate, and justify the modernization effort and organizational changes in the language your stakeholders understand.

      Our Advice

      Critical Insight

      • Build your digital applications around continuous modernization. End-user needs, technology, business direction, and regulations rapidly change in today’s competitive and fast-paced industry. This reality will quickly turn your modern applications into shelfware. Build continuous modernization at the center of your digital application vision to keep up with evolving business, end-user, and IT needs.
      • Application modernization is organizational change management. If you build and modernize it, they may not come. The crux of successful application modernization is centered on the strategic, well-informed, and onboarded adoption of changes in key business areas, capabilities, and processes. Organizational change management must be front and center so that applications are fit for purpose and are something that end users want and need to use.
      • Business-IT collaboration is not optional. Application modernization will not be successful if your lines of business (LOBs) and IT are not working together. IT must empathize how LOBs operate and proactively support the underlying operational systems. LOBs must be accountable for all products leveraging modern technologies and be able to rationalize the technical feasibility of their digital application vision.

      Impact and Result

      • Establish the digital application vision. Gain a grounded understanding of the digital application construct and prioritize these attributes against your digital business goals.
      • Define your modernization approach. Obtain a thorough view of your business and technical complexities, risks, and impacts. Employ the right modernization techniques based on your organization’s change tolerance.
      • Build your roadmap. Clarify the organizational changes needed to support modernization and adoption of your digital applications.

      Modernize Your Applications Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should strategically modernize your applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set your vision

      Describe your application vision and set the right modernization expectations with your stakeholders.

      • Modernize Your Applications – Phase 1: Set Your Vision

      2. Identify your modernization opportunities

      Focus your modernization efforts on the business opportunities that your stakeholders care about.

      • Modernize Your Applications – Phase 2: Identify Your Modernization Opportunities

      3. Plan your modernization

      Describe your modernization initiatives and build your modernization tactical roadmap.

      • Modernize Your Applications – Phase 3: Plan Your Modernization
      [infographic]

      Workshop: Modernize Your Applications

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set Your Vision

      The Purpose

      Discuss the goals of your application modernization initiatives

      Define your digital application vision and priorities

      List your modernization principles

      Key Benefits Achieved

      Clear application modernization objectives and high priority value items

      Your digital application vision and attributes

      Key principles that will guide your application modernization initiatives

      Activities

      1.1 State Your Objectives

      1.2 Characterize Your Digital Application

      1.3 Define Your Modernization Principles

      Outputs

      Application modernization objectives

      Digital application vision and attributes definitions

      List of application modernization principles and guidelines

      2 Identify Your Modernization Opportunities

      The Purpose

      Identify the value streams and business capabilities that will benefit the most from application modernization

      Conduct a change tolerance assessment

      Build your modernization strategic roadmap

      Key Benefits Achieved

      Understanding of the value delivery improvements modernization can bring

      Recognizing the flexibility and tolerance of your organization to adopt changes

      Select an approach that best fits your organization’s goals and capacity

      Activities

      2.1 Identify the Opportunities

      2.2 Define Your Modernization Approach

      Outputs

      Value streams and business capabilities that are ideal modernization opportunities

      Your modernization strategic roadmap based on your change tolerance and modernization approach

      3 Plan Your Modernization

      The Purpose

      Identify the most appropriate modernization technique and the scope of changes to implement your techniques

      Develop an actionable tactical roadmap to complete your modernization initiatives

      Key Benefits Achieved

      Clear understanding of what must be changed to the organization and application considering your change tolerance

      An achievable modernization plan

      Activities

      3.1 Shortlist Your Modernization Techniques

      3.2 Roadmap Your Modernization Initiatives

      Outputs

      Scope of your application modernization initiatives

      Your modernization tactical roadmap

      Extend Agile Practices Beyond IT

      • Buy Link or Shortcode: {j2store}175|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Your organization has started to realize benefits from adopting Agile principles and practices. However, these advances are contained within your IT organization.
      • You are seeking to extend Agile development beyond IT into other areas of the organization. You are looking for a coordinated approach aligned to business priorities.

      Our Advice

      Critical Insight

      • Not all lessons from scaling Agile to IT are transferable. IT Agile scaling processes are tailored to IT’s scope, team, and tools, which may not account for diverse attributes within your organization.
      • Control may be necessary for coordination. With increased time-to-value, enforcing consistent cadences, reporting, and communication is a must if teams are not disciplined or lack good governance.
      • Extend Agile in departments tolerant to change. Incrementally roll out Agile in departments where its principles are accepted (e.g. a culture that embraces failures as lessons).

      Impact and Result

      • Complete an assessment of your prior efforts to scale Agile across IT to gauge successful, consistent adoption. Identify the business objectives and the group drivers that are motivating the extension of Agile to the business.
      • Understand the challenges that you may face when extending Agile to business partners. Investigate the root causes of existing issues that can derail your efforts.
      • Ideate solutions to your scaling challenges and envision a target state for your growing Agile environment. Your target state should realize new opportunities to drive more business value and eliminate current activities driving down productivity.
      • Coordinate the implementation and execution of your scaling Agile initiatives with an implementation action plan. This collaborative document will lay out the process, roles, goals, and objectives needed to successfully manage your Agile environment.

      Extend Agile Practices Beyond IT Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should extend Agile practices to improve product delivery, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess your readiness to scale agile vertically

      Assess your readiness to scale Agile vertically by identifying and mitigating potential Agile maturity gaps remaining after scaling Agile across your IT organization.

      • Extend Agile Practices Beyond IT – Phase 1: Assess Your Readiness to Scale Agile Vertically
      • Agile Maturity Assessment Tool

      2. Establish an enterprise scaled agile framework

      Complete an overview of various scaled Agile models to help you develop your own customized delivery framework.

      • Extend Agile Practices Beyond IT – Phase 2: Establish an Enterprise Scaled Agile Framework
      • Framework Selection Tool

      3. Create your implementation action plan

      Determine the effort and steps required to implement your extended delivery framework.

      • Extend Agile Practices Beyond IT – Phase 3: Create Your Implementation Action Plan
      [infographic]

      Workshop: Extend Agile Practices Beyond IT

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Current State of Agile Maturity

      The Purpose

      Assess your readiness to scale Agile vertically.

      Identify and mitigate potential Agile maturity gaps remaining after scaling Agile across your IT organization.

      Key Benefits Achieved

      IT Agile maturity gaps identified and mitigated to ensure successful extension of Agile to the business

      Activities

      1.1 Characterize your Agile implementation using the CLAIM model.

      1.2 Assess the maturity of your Agile teams and organization.

      Outputs

      Maturity gaps identified with mitigation requirements

      2 Establish an Enterprise Scaled Agile Framework

      The Purpose

      Complete a review of scaled Agile models to help you develop your own customized delivery framework.

      Key Benefits Achieved

      A customized Agile delivery framework

      Activities

      2.1 Explore various scaled frameworks.

      2.2 Select an appropriate scaled framework for your enterprise.

      2.3 Define the future state of your team and the communication structure of your functional business group.

      Outputs

      Blended framework delivery model

      Identification of team and communication structure impacts resulting from the new framework

      3 Create Your Implementation Action Plan

      The Purpose

      Create your implementation action plan for the new Agile delivery framework.

      Key Benefits Achieved

      A clearly defined action plan

      Activities

      3.1 Define your value drivers.

      3.2 Brainstorm the initiatives that must be completed to achieve your target state.

      3.3 Estimate the effort of your Agile initiatives.

      3.4 Define your Agile implementation action plan.

      Outputs

      List of target state initiatives

      Estimation of effort to achieve target state

      An implementation action plan

      Audit the Project Portfolio

      • Buy Link or Shortcode: {j2store}442|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • As a CIO you know you should audit your portfolio, but you don’t know where to start.
      • There is a lack of portfolio and project visibility.
      • Projects are out of scope, over budget, and over schedule.

      Our Advice

      Critical Insight

      • Organizations establish processes and assume people are following them.
      • There is a dilution of practices from external influences and rapid turnover rates.
      • Many organizations build their processes around existing frameworks. These frameworks are great resources but they’re often missing context and clear links to tools, templates, and fiduciary duty.

      Impact and Result

      • The best way to get insight into your current state is to get an objective set of observations of your processes.
      • Use Info-Tech’s framework to audit your portfolios and projects:
        • Triage at a high level to assess the need for an audit by using the Audit Standard Triage Tool to assess your current state and the importance of conducting a deeper audit.
        • Complete Info-Tech’s Project Portfolio Audit Tool:
          • Validate the inputs.
          • Analyze the data.
          • Review the findings and create your action plan.

      Audit the Project Portfolio Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should audit the project portfolio, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess readiness

      Understand your current state and determine the need for a deeper audit.

      • Audit the Project Portfolio – Phase 1: Assess Readiness
      • Info-Tech Audit Standard for Project Portfolio Management
      • Audit Glossary of Terms
      • Audit Standard Triage Tool

      2. Perform project portfolio audit

      Audit your selected projects and portfolios. Understand the gaps in portfolio practices.

      • Audit the Project Portfolio – Phase 2: Perform Project Portfolio Audit
      • Project Portfolio Audit Tool

      3. Establish a plan

      Document the steps you are going to take to address any issues that were uncovered in phase 2.

      • Audit the Project Portfolio – Phase 3: Establish a Plan
      • PPM Audit Timeline Template
      [infographic]

      Workshop: Audit the Project Portfolio

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Portfolio Audit

      The Purpose

      An audit of your portfolio management practices.

      Key Benefits Achieved

      Analysis of audit results.

      Activities

      1.1 Info-Tech’s Audit Standard/Engagement Context

      1.2 Portfolio Audit

      1.3 Input Validation

      1.4 Portfolio Audit Analysis

      1.5 Start/Stop/Continue

      Outputs

      Audit Standard and Audit Glossary of Terms

      Portfolio and Project Audit Tool

      Start/Stop/Continue

      2 Project Audit

      The Purpose

      An audit of your project management practices.

      Key Benefits Achieved

      Analysis of audit results.

      Activities

      2.1 Project Audit

      2.2 Input Validation

      2.3 Project Audit Analysis

      2.4 Start/Stop/Continue

      Outputs

      Portfolio and Project Audit Tool

      Start/Stop/Continue

      3 Action Plan

      The Purpose

      Create a plan to start addressing any vulnerabilities.

      Key Benefits Achieved

      A plan to move forward.

      Activities

      3.1 Action Plan

      3.2 Key Takeaways

      Outputs

      Audit Timeline Template

      Responsibly Resume IT Operations in the Office

      • Buy Link or Shortcode: {j2store}423|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity

      Having shifted operations almost overnight to a remote work environment, and with the crisis management phase of the COVID-19 pandemic winding down, IT leaders and organizations are faced with the following issues:

      • A reduced degree of control with respect to the organization’s assets.
      • Increased presence of unapproved workaround methods, including applications and devices not secured by the organization.
      • Pressure to resume operations at pre-pandemic cadence while still operating in recovery mode.
      • An anticipated game plan for restarting the organization’s project activities.

      Our Advice

      Critical Insight

      An organization’s shift back toward the pre-pandemic state cannot be carried out in isolation. Things have changed. Budgets, resource availability, priorities, etc., will not be the same as they were in early March. Organizations must ensure that all departments work collaboratively to support office repatriation. IT must quickly identify the must-dos to allow safe return to the office, while prioritizing tasks relating to the repopulation of employees, technical assets, and operational workloads via an informed and streamlined roadmap.

      As employees return to the office, PMO and portfolio leaders must sift through unclear requirements and come up with a game plan to resume project activities mid-pandemic. You need to develop an approach, and fast.

      Impact and Result

      Responsibly resume IT operations in the office:

      • Evaluate risk tolerance
      • Prepare to repatriate people to the office
      • Prepare to repatriate assets to the office
      • Prepare to repatriate workloads to the office
      • Prioritize your tasks and build your roadmap

      Quickly restart the engine of your PPM:

      • Restarting the engine of the project portfolio won’t be as simple as turning a key and hitting the gas. The right path forward will differ for every project portfolio practice.
      • Therefore, in this publication we put forth a multi-pass approach that PMO and portfolio managers can follow depending on their unique situations and needs.
      • Each approach is accompanied by a checklist and recommendations for next steps to get you on right path fast.

      Responsibly Resume IT Operations in the Office Research & Tools

      Start here – read the Executive Brief

      As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back to the office.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evaluate your new risk tolerance

      Identify the new risk landscape and risk tolerance for your organization post-pandemic. Determine how this may impact the second wave of pandemic transition tasks.

      • Responsibly Resume IT Operations in the Office – Phase 1: Evaluate Your New Risk Tolerance
      • Resume Operations Information Security Pressure Analysis Tool

      2. Repatriate people to the office

      Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees, while creating an efficient and sustainable working environment

      • Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office
      • Mid-Pandemic IT Prioritization Tool

      3. Repatriate assets to the office

      Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took place during the pandemic response and facilitates a secure reintegration to the workplace.

      • Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

      4. Repatriate workloads to the office

      Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and providing additional workstreams to support employee processes.

      • Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

      5. Prioritize your tasks and build the roadmap

      Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business, and security risk reduction weightings. The result is an operational action plan for resuming office life.

      • Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and Build the Roadmap

      6. Restart the engine of your project portfolio

      Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path forward for your organization.

      • Restart the Engine of Your Project Portfolio
      [infographic]

      Adopt an Exponential IT Mindset

      • Buy Link or Shortcode: {j2store}103|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      New technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are ushering in an exciting new era of business transformation. By adopting an exponential IT mindset, IT leaders will be able to lead the autonomization of business capabilities.

      To capitalize on this upcoming opportunity, exponential IT leaders will have to become business advisors who unlock exponential value for the business and help mitigate exponential risk.

      Adopt a renewed focus on business outcomes to achieve autonomization

      An exponential IT mindset means that IT leaders will need to take a lead role in transforming business capabilities.

      • Embrace an expanded role as business advisors: CIOs will be tasked with greater responsibility for determining business strategy alongside the C-suite.
      • Know the rewards and mitigate the risks: New value chain opportunities and efficiency gains will create significant ROI. Protect these returns by mitigating higher risks to business continuity, information security, and delivery performance.
      • Plan to fully leverage technologies such as AI: It will be integral for IT to enable autonomous technologies in this new era of exponential technology progress.

      Adopt an Exponential IT Mindset Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Adopt an Exponential IT Mindset Deck – An introduction to IT’s role in the autonomization era

      The role of IT has evolved throughout the past couple generations to enable fundamental business transformations. In the autonomization era, it will have to evolve again to lead the business through a world of exponential opportunity.

      • Adopt an Exponential IT Mindset Storyboard

      Infographic

      Further reading

      Adopt an Exponential IT Mindset

      Thrive through the next paradigm shift

      Executive Summary

      For more than 40 years, information technology has significantly transformed businesses, from the computerization of operations to the digital transformation of business models. As technological disruption accelerates exponentially, a world of exponential business opportunity is within reach.

      Newly emerging technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are enabling autonomous business capabilities.

      The role of IT has evolved throughout the past couple generations to enable business transformations. In the autonomization era, it will have to evolve again. IT will have a new mission, an adapted governance structure, innovative capabilities, and an advanced partnership model.

      CIOs embracing exponential IT require a new mindset. Their IT practices will need to progress to the top of the maturity ladder as they make business outcomes their own.

      Over the past two generations, we have witnessed major technology-driven business transformations

      1980s

      Computerization

      The use of computer devices, networks, and applications became widespread in the enterprise. The focus was on improving the efficiency of back-office tasks.

      2000s

      Digitalization

      As the world became connected through the internet, new digitally enabled business models emerged in the enterprise. Orders were now being received online, and many products and services were partially or fully digitized for online fulfillment.

      Recent pandemic measures contributed to a marked acceleration in the digitalization of organizations

      The massive disruption resulting from pandemic measures led businesses to shift to more digital interactions with customers.

      The global average share of customer interactions that are digital went from 36% in December 2019 to 58% in July 2020.

      The global average share of customer interactions that are digital went from 36% to 58% in less than a year.*

      Moreover, companies across business areas have accelerated the digitization of their offerings.

      The global average share of partially or fully digitized products went from 35% in 2019 to 55% in July 2020.

      The global average share of partially or fully digitized products went from 35% to 55% in the same period.*

      The adoption of digitalized business models has accelerated during the pandemic. Post-pandemic, it is unlikely for adoption to recede.

      With more business applications ported to the cloud and more data available online, “digital-first” organizations started to envisage a next wave of automation.

      *Source: “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever,” McKinsey & Company, 2020

      A majority of IT leaders plan to use artificial intelligence within their organizations in 2023

      In August 2022, Info-Tech surveyed 506 IT leaders and asked which tasks would involve AI in their organizations in 2023.

      Graph showing tasks that would involve AI in organizations in 2023.

      We found that 63% of IT leaders plan to use AI within their organizations to automate repetitive, low-level tasks by the end of 2023.

      With the release of the ChatGPT prototype in November 2022, setting a record for the fastest user growth (reaching 100 million active users just two months after launch), we foresee that AI adoption will accelerate significantly and its use will extend to more complex tasks.

      Newly emerging technologies and business realities are ushering in the next business transformation

      1980s

      Computerization

      2000s

      Digitalization

      2020s

      Autonomization

      As digitalization accelerates, a post-pandemic world with a largely online workforce and digitally transformed enterprise business models now enters an era where more business capabilities become autonomous, with humans at the center of a loop* that is gradually becoming larger.

      Deep Learning, Quantum Computing, 5G Networks, Robotics

      * Download Info-Tech’s CIO Trend Report 2019 – Become a Leader in the Loop

      The role of IT needs to evolve as it did through the previous two generations

      1980s

      Computerization

      IT professionals gathered functional requirements from the business to help automate back-office tasks and improve operational efficiency.

      2000s

      Digitalization

      IT professionals acquired business analysis skills and leveraged the SMAC (social, mobile, analytics, and cloud) stack to accelerate the automation of the front office and enable the digital transformation of business models.

      2020s

      Autonomization

      IT professionals will become business advisors and enable the establishment of autonomous yet differentiated business processes and capabilities.

      The autonomization era brings enormous opportunity for organizations, coupled with enormous risk

      Graph of Risk Severity versus Value Opportunity. Autonomization has a high value of opportunity and high risk severity.

      While some analysts have been quick to announce the demise of the IT department and the transition of the role of IT to the business, the budgets that CIOs control have continued to rise steadily over time.

      In a high-risk, high-reward endeavor to make business processes autonomous, the role of IT will continue to be pivotal, because while everyone in the organization will rush to seize the value opportunity, the technology risk will be left for IT to manage.

      Exponential IT represents a necessary change in a CIO’s focus to lead through the next paradigm shift

      EXPONENTIAL RISK

      Autonomous processes will integrate with human-led processes, creating risks to business continuity, information security, and quality of delivery. Supplier power will exacerbate business risks.

      EXPONENTIAL REWARD

      The efficiency gains and new value chains created through artificial intelligence, robotics, and additive manufacturing will be very significant. Most of this value will be realized through the augmentation of human labor.

      EXPONENTIAL DEMAND

      Autonomous solutions for productivity and back-office applications will eventually become commoditized and provided by a handful of large vendors. There will, however, be a proliferation of in-house algorithms and workflows to autonomize the middle and front office, offered by a busy landscape of industry-centric capability vendors.

      EXPONENTIAL IT

      Exponential IT involves IT leading the cognitive reengineering of the organization with evolved practices for:

      • IT governance
      • Asset management
      • Vendor management
      • Data management
      • Business continuity management
      • Information security management

      To succeed, IT will have to adopt different priorities in its mission, governance, capabilities, and partnerships

      Digitalization

      A Connected World

      Progressive IT

      • Mission

        Enable the digital transformation of the business
      • Governance

        Service metrics, security perimeters, business intelligence, compliance management
      • Capabilities

        Service management, business analysis, application portfolio management, data management
      • Partnerships

        Management of technology service agreements

      Autonomization

      An Exponential World

      Exponential IT

      • Mission

        Lead the business through autonomization.
      • Governance

        Outcome-based metrics, zero trust, ESG reporting, digital trust
      • Capabilities

        Experience management, business advisory, enterprise innovation, data differentiation
      • Partnerships

        Management of business capability agreements

      Fortune favors the bold: The CIO now has an opportunity to cement their role as business leader

      Levels of digital maturity.  From bottom: Unstable - inability to consistently deliver basic services, Firefighter - Reliable infrastructure and IT service desk, Trusted Operator - Enablement of business through applications and work orders, Business Partner - Effective delivery of strategic business projects, Innovator - Information and technology as a competitive advantage.

      Research has shown that companies that are more digitally mature have higher growth than the industry average. In these companies, the CIO is part of the executive management team.

      And while the role of the CIO is generally tied to their mandate within the organization, we have seen their role progress from doer to leader as IT climbs the maturity ladder.

      As companies strive to succeed in the next phase of technology-driven transformation, CIOs have an opportunity to demonstrate their business leadership. To do so, they will have to provide exceptionally mature services while owning business targets.

      Build a Strong Technology Foundation for Customer Experience Management

      • Buy Link or Shortcode: {j2store}526|cart{/j2store}
      • member rating overall impact: 8.6/10 Overall Impact
      • member rating average dollars saved: $340,152 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Technology is a fundamental enabler of an organization’s customer experience management (CXM) strategy. However, many IT departments fail to take a systematic approach when building a portfolio of applications for supporting marketing, sales, and customer service functions.
      • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high-profile applications like CRM).

      Our Advice

      Critical Insight

      • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision and strategic requirements for enabling a strong CXM program.
      • To deploy applications that specifically align with the needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction and ultimately, revenue.
      • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
      • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

      Impact and Result

      • Establish strong application alignment to strategic requirements for CXM that is based on concrete customer personas.
      • Improve underlying business metrics across marketing, sales, and service, including customer acquisition, retention, and satisfaction metrics.
      • Better align IT with customer experience needs.

      Build a Strong Technology Foundation for Customer Experience Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a strong technology foundation for CXM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive value with CXM

      Understand the benefits of a robust CXM strategy.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 1: Drive Value with CXM
      • CXM Strategy Stakeholder Presentation Template
      • CXM Strategy Project Charter Template

      2. Create the framework

      Identify drivers and objectives for CXM using a persona-driven approach and deploy the right applications to meet those objectives.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 2: Create the Framework
      • CXM Business Process Shortlisting Tool
      • CXM Portfolio Designer

      3. Finalize the framework

      Complete the initiatives roadmap for CXM.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 3: Finalize the Framework
      [infographic]

      Workshop: Build a Strong Technology Foundation for Customer Experience Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Create the Vision for CXM Technology Enablement

      The Purpose

      Establish a consistent vision across IT, marketing, sales, and customer service for CXM technology enablement.

      Key Benefits Achieved

      A clear understanding of key business and technology drivers for CXM.

      Activities

      1.1 CXM fireside chat

      1.2 CXM business drivers

      1.3 CXM vision statement

      1.4 Project structure

      Outputs

      CXM vision statement

      CXM project charter

      2 Conduct the Environmental Scan and Internal Review

      The Purpose

      Create a set of strategic requirements for CXM based on a thorough external market scan and internal capabilities assessment.

      Key Benefits Achieved

      Well-defined technology requirements based on rigorous, multi-faceted analysis.

      Activities

      2.1 PEST analysis

      2.2 Competitive analysis

      2.3 Market and trend analysis

      2.4 SWOT analysis

      2.5 VRIO analysis

      2.6 Channel map

      Outputs

      Completed external analysis

      Strategic requirements (from external analysis)

      Completed internal review

      Channel interaction map

      3 Build Customer Personas and Scenarios

      The Purpose

      Augment strategic requirements through customer persona and scenario development.

      Key Benefits Achieved

      Functional requirements aligned to supporting steps in customer interaction scenarios.

      Activities

      3.1 Persona development

      3.2 Scenario development

      3.3 Requirements definition for CXM

      Outputs

      Personas and scenarios

      Strategic requirements (based on personas)

      4 Create the CXM Application Portfolio

      The Purpose

      Using the requirements identified in the preceding modules, build a future-state application inventory for CXM.

      Key Benefits Achieved

      A cohesive, rationalized portfolio of customer interaction applications that aligns with identified requirements and allows investment (or rationalization) decisions to be made.

      Activities

      4.1 Build business process maps

      4.2 Review application satisfaction

      4.3 Create the CXM application portfolio

      4.4 Prioritize applications

      Outputs

      Business process maps

      Application satisfaction diagnostic

      Prioritized CXM application portfolio

      5 Review Best Practices and Confirm Initiatives

      The Purpose

      Establish repeatable best practices for CXM applications in areas such as data management and end-user adoption.

      Key Benefits Achieved

      Best practices for rollout of new CXM applications.

      A prioritized initiatives roadmap.

      Activities

      5.1 Create data integration map

      5.2 Define adoption best practices

      5.3 Build initiatives roadmap

      5.4 Confirm initiatives roadmap

      Outputs

      Integration map for CXM

      End-user adoption plan

      Initiatives roadmap

      Further reading

      Build a Strong Technology Foundation for Customer Experience Management

      Design an end-to-end technology strategy to enhance marketing effectiveness, drive sales, and create compelling customer service experiences.

      ANALYST PERSPECTIVE

      Technology is the catalyst to create – and keep! – your customers.

      "Customers want to interact with your organization on their own terms, and in the channels of their choice (including social media, mobile applications, and connected devices). Regardless of your industry, your customers expect a frictionless experience across the customer lifecycle. They desire personalized and well-targeted marketing messages, straightforward transactions, and effortless service. Research shows that customers value – and will pay more for! – well-designed experiences.

      Strong technology enablement is critical for creating customer experiences that drive revenue. However, most organizations struggle with creating a cohesive technology strategy for customer experience management (CXM). IT leaders need to take a proactive approach to developing a strong portfolio of customer interaction applications that are in lockstep with the needs of their marketing, sales, and customer service teams. It is critical to incorporate the voice of the customer into this strategy.

      When developing a technology strategy for CXM, don’t just “pave the cow path,” but instead move the needle forward by providing capabilities for customer intelligence, omnichannel interactions, and predictive analytics. This blueprint will help you build an integrated CXM technology roadmap that drives top-line revenue while rationalizing application spend."

      Ben Dickie

      Research Director, Customer Experience Strategy

      Info-Tech Research Group

      Framing the CXM project

      This Research Is Designed For:

      • IT leaders who are responsible for crafting a technology strategy for customer experience management (CXM).
      • Applications managers who are involved with the selection and implementation of critical customer-centric applications, such as CRM platforms, marketing automation tools, customer intelligence suites, and customer service solutions.

      This Research Will Help You:

      • Clearly link your technology-enablement strategy for CXM to strategic business requirements and customer personas.
      • Build a rationalized portfolio of enterprise applications that will support customer interaction objectives.
      • Adopt standard operating procedures for CXM application deployment that address issues such as end-user adoption and data quality.

      This Research Will Also Assist:

      • Business leaders in marketing, sales, and customer service who want to deepen their understanding of CXM technologies, and apply best practices for using these technologies to drive competitive advantage.
      • Marketing, sales, and customer service managers involved with defining requirements and rolling out CXM applications.

      This Research Will Help Them:

      • Work hand-in-hand with counterparts in IT to deploy high-value business applications that will improve core customer-facing metrics.
      • Understand the changing CXM landscape and use the art of the possible to transform the internal technology ecosystem and drive meaningful customer experiences.

      Executive summary

      Situation

      • Customer expectations for personalization, channel preferences, and speed-to-resolution are at an all-time high.
      • Your customers are willing to pay more for high-value experiences, and having a strong customer CXM strategy is a proven path to creating sustainable value for the organization.

      Complication

      • Technology is a fundamental enabler of an organization’s CXM strategy. However, many IT departments fail to take a systematic approach to building a portfolio of applications to support Marketing, Sales, and Customer Service.
      • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high profile applications like CRM).

      Resolution

      • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision, strategic requirements and roadmap for enabling strong customer experience capabilities.
      • In order to deploy applications that don’t simply follow previously established patterns but are aligned with the specific needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction – and ultimately revenue.
      • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
      • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

      Info-Tech Insight

      1. IT can’t hide behind the firewall. IT must understand the organization’s customers to properly support marketing, sales, and service efforts.
      2. IT – or Marketing – must not build the CXM strategy in a vacuum if they want to achieve a holistic, consistent, and seamless customer experience.
      3. IT must get ahead of shadow IT. To be seen as an innovator within the business, IT must be a leading enabler in building a rationalized and integrated CXM application portfolio.

      Guide to frequently used acronyms

      CXM - Customer Experience Management

      CX - Customer Experience

      CRM - Customer Relationship Management

      CSM - Customer Service Management

      MMS - Marketing Management System

      SMMP - Social Media Management Platform

      RFP - Request for Proposal

      SaaS - Software as a Service

      Customers’ expectations are on the rise: meet them!

      Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.

      67% of end consumers will pay more for a world-class customer experience. 74% of business buyers will pay more for strong B2B experiences. (Salesforce, 2018)

      5 CORE CUSTOMER EXPECTATIONS

      1. More personalization
      2. More product options
      3. Constant contact
      4. Listen closely, respond quickly
      5. Give front-liners more control

      (Customer Experience Insight, 2016)

      Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

      Realize measurable value by enabling CXM

      Providing a seamless customer experience increases the likelihood of cross-sell and up-sell opportunities and boosts customer loyalty and retention. IT can contribute to driving revenue and decreasing costs by providing the business with the right set of tools, applications, and technical support.

      Contribute to the bottom line

      Cross-sell, up-sell, and drive customer acquisition.

      67% of consumers are willing to pay more for an upgraded experience. (Salesforce, 2018)

      80%: The margin by which CX leaders outperformer laggards in the S&P 500.(Qualtrics, 2017)

      59% of customers say tailored engagement based on past interactions is very important to winning their business. (Salesforce, 2018)

      Enable cost savings

      Focus on customer retention as well as acquisition.

      It is 6-7x more costly to attract a new customer than it is to retain an existing customer. (Salesforce Blog, 2019)

      A 5% increase in customer retention has been found to increase profits by 25% to 95%. (Bain & Company, n.d.)

      Strategic CXM is gaining traction with your competition

      Organizations are prioritizing CXM capabilities (and associated technologies) as a strategic investment. Keep pace with the competition and gain a competitive advantage by creating a cohesive strategy that uses best practices to integrate marketing, sales, and customer support functions.

      87% of customers share great experiences they’ve had with a company. (Zendesk, n.d.)

      61% of organizations are investing in CXM. (CX Network, 2015)

      53% of organizations believe CXM provides a competitive advantage. (Harvard Business Review, 2014)

      Top Investment Priorities for Customer Experience

      1. Voice of the Customer
      2. Customer Insight Generation
      3. Customer Experience Governance
      4. Customer Journey Mapping
      5. Online Customer Experience
      6. Experience Personalization
      7. Emotional Engagement
      8. Multi-Channel Integration/Omnichannel
      9. Quality & Customer Satisfaction Management
      10. Customer/Channel Loyalty & Rewards Programs

      (CX Network 2015)

      Omnichannel is the way of the future: don’t be left behind

      Get ahead of the competition by doing omnichannel right. Devise a CXM strategy that allows you to create and maintain a consistent, seamless customer experience by optimizing operations within an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage a wide range of interaction channels.

      Omnichannel is a “multi-channel approach to sales that seeks to provide the customer with a seamless transactional experience whether the customer is shopping online from a desktop or mobile device, by telephone, or in a bricks and mortar store.” (TechTarget, 2014)

      97% of companies say that they are investing in omnichannel. (Huffington Post, 2015)

      23% of companies are doing omnichannel well.

      CXM applications drive effective multi-channel customer interactions across marketing, sales, and customer service

      The success of your CXM strategy depends on the effective interaction of various marketing, sales, and customer support functions. To deliver on customer experience, organizations need to take a customer-centric approach to operations.

      From an application perspective, a CRM platform generally serves as the unifying repository of customer information, supported by adjacent solutions as warranted by your CXM objectives.

      CXM ECOSYSTEM

      Customer Relationship Management Platform

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management Platform
      • Customer Intelligence Platform
      • Customer Service Management Tools
      • Marketing Management Suite

      Application spotlight: Customer experience platforms

      Description

      CXM solutions are a broad range of tools that provide comprehensive feature sets for supporting customer interaction processes. These suites supplant more basic applications for customer interaction management. Popular solutions that fall under the umbrella of CXM include CRM suites, marketing automation tools, and customer service applications.

      Features and Capabilities

      • Manage sales pipelines, provide quotes, and track client deliverables.
      • View all opportunities organized by their current stage in the sales process.
      • View all interactions that have occurred between employees and the customer, including purchase order history.
      • Manage outbound marketing campaigns via multiple channels (email, phone, social, mobile).
      • Build visual workflows with automated trigger points and business rules engine.
      • Generate in-depth customer insights, audience segmentation, predictive analytics, and contextual analytics.
      • Provide case management, ticketing, and escalation capabilities for customer service.

      Highlighted Vendors

      Microsoft Dynamics

      Adobe

      Marketo

      sprinklr

      Salesforce

      SugarCRM

      Application spotlight: Customer experience platforms

      Key Trends

      • CXM applications have decreased their focus on departmental silos to make it easier to share information across the organization as departments demand more data.
      • Vendors are developing deeper support of newer channels for customer interaction. This includes providing support for social media channels, native mobile applications, and SMS or text-based services like WhatsApp and Facebook Messenger.
      • Predictive campaigns and channel blending are becoming more feasible as vendors integrate machine learning and artificial intelligence into their applications.
      • Content blocks are being placed on top of scripting languages to allow for user-friendly interfaces. There is a focus on alleviating bottlenecks where content would have previously needed to go through a specialist.
      • Many vendors of CXM applications are placing increased emphasis on strong application integration both within and beyond their portfolios, with systems like ERP and order fulfillment.

      Link to Digital Strategy

      • For many organizations that are building out a digital strategy, improving customer experience is often a driving factor: CXM apps enable this goal.
      • As part of a digital strategy, create a comprehensive CXM application portfolio by leveraging both core CRM suites and point solutions.
      • Ensure that a point solution aligns with the digital strategy’s technology drivers and user personas.

      CXM KPIs

      Strong CXM applications can improve:

      • Lead Intake Volume
      • Lead Conversion Rate
      • Average Time to Resolution
      • First-Contact Resolution Rate
      • Customer Satisfaction Rate
      • Share-of-Mind
      • Share-of-Wallet
      • Customer Lifetime Value
      • Aggregate Reach/Impressions

      IT is critical to the success of your CXM strategy

      Technology is the key enabler of building strong customer experiences: IT must stand shoulder-to-shoulder with the business to develop a technology framework for CXM.

      Top 5 Challenges with CXM for Marketing

      1. Maximizing customer experience ROI
      2. Achieving a single view of the customer
      3. Building new customer experiences
      4. Cultivating a customer-focused culture
      5. Measuring CX investments to business outcomes

      Top 5 Obstacles to Enabling CXM for IT

      1. Systems integration
      2. Multichannel complexity
      3. Organizational structure
      4. Data-related issues
      5. Lack of strategy

      (Harvard Business Review, 2014)

      Only 19% of organizations have a customer experience team tasked with bridging gaps between departments. (Genesys, 2018)

      IT and Marketing can only tackle CXM with the full support of each other. The cooperation of the departments is crucial when trying to improve CXM technology capabilities and customer interaction and drive a strong revenue mandate.

      CXM failure: Blockbuster

      CASE STUDY

      Industry Entertainment

      Source Forbes, 2014

      Blockbuster

      As the leader of the video retail industry, Blockbuster had thousands of retail locations internationally and millions of customers. Blockbuster’s massive marketing budget and efficient operations allowed it to dominate the competition for years.

      Situation

      Trends in Blockbuster’s consumer market changed in terms of distribution channels and customer experience. As the digital age emerged and developed, consumers were looking for immediacy and convenience. This threatened Blockbuster’s traditional, brick-and-mortar B2C operating model.

      The Competition

      Netflix entered the video retail market, making itself accessible through non-traditional channels (direct mail, and eventually, the internet).

      Results

      Despite long-term relationships with customers and competitive standing in the market, Blockbuster’s inability to understand and respond to changing technology trends and customer demands led to its demise. The organization did not effectively leverage internal or external networks or technology to adapt to customer demands. Blockbuster went bankrupt in 2010.

      Customer Relationship Management

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management
      • Customer Intelligence
      • Customer Service
      • Marketing Management

      Blockbuster did not leverage emerging technologies to effectively respond to trends in its consumer network. It did not optimize organizational effectiveness around customer experience.

      CXM success: Netflix

      CASE STUDY

      Industry Entertainment

      Source Forbes, 2014

      Netflix

      Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

      The Situation

      In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

      The Competition

      Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.

      Results

      Netflix’s disruptive innovation is built on the foundation of great CXM. Netflix is now a $28 billion company, which is tenfold what Blockbuster was worth.

      Customer Relationship Management Platform

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management Platform
      • Customer Intelligence Platform
      • Customer Service Management Tools
      • Marketing Management Suite

      Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.

      Leverage Info-Tech’s approach to succeed with CXM

      Creating an end-to-end technology-enablement strategy for CXM requires a concerted, dedicated effort: Info-Tech can help with our proven approach.

      Build the CXM Project Charter

      Conduct a Thorough Environmental Scan

      Build Customer Personas and Scenarios

      Draft Strategic CXM Requirements

      Build the CXM Application Portfolio

      Implement Operational Best Practices

      Why Info-Tech’s Approach?

      Info-Tech draws on best-practice research and the experiences of our global member base to develop a methodology for CXM that is driven by rigorous customer-centric analysis.

      Our approach uses a unique combination of techniques to ensure that your team has done its due diligence in crafting a forward-thinking technology-enablement strategy for CXM that creates measurable value.

      A global professional services firm drives measurable value for CXM by using persona design and scenario development

      CASE STUDY

      Industry Professionals Services

      Source Info-Tech Workshop

      The Situation

      A global professional services firm in the B2B space was experiencing a fragmented approach to customer engagement, particularly in the pre-sales funnel. Legacy applications weren’t keeping pace with an increased demand for lead evaluation and routing technology. Web experience management was also an area of significant concern, with a lack of ongoing customer engagement through the existing web portal.

      The Approach

      Working with a team of Info-Tech facilitators, the company was able to develop several internal and external customer personas. These personas formed the basis of strategic requirements for a new CXM application stack, which involved dedicated platforms for core CRM, lead automation, web content management, and site analytics.

      Results

      Customer “stickiness” metrics increased, and Sales reported significantly higher turnaround times in lead evaluations, resulting in improved rep productivity and faster cycle times.

      Components of a persona
      Name Name personas to reflect a key attribute such as the persona’s primary role or motivation.
      Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.)
      Wants, needs, pain points Identify surface-level motivations for buying habits.
      Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.).

      Follow Info-Tech’s approach to build your CXM foundation

      Create the Project Vision

      • Identify business and IT drivers
      • Outputs:
        • CXM Strategy Guiding Principles

      Structure the Project

      • Identify goals and objectives for CXM project
      • Form Project Team
      • Establish timeline
      • Obtain project sponsorship
      • Outputs:
        • CXM Strategy Project Charter

      Scan the External Environment

      • Create CXM operating model
      • Conduct external analysis
      • Create customer personas
      • Outputs:
        • CXM Operating Model
      • Conduct PEST analysis
      • Create persona scenarios
      • Outputs:
        • CXM Strategic Requirements

      Assess the Current State of CXM

      • Conduct SWOT analysis
      • Assess application usage and satisfaction
      • Conduct VRIO analysis
      • Outputs:
        • CXM Strategic Requirements

      Create an Application Portfolio

      • Map current processes
      • Assign business process owners
      • Create channel map
      • Build CXM application portfolio
      • Outputs:
        • CXM Application Portfolio Map

      Develop Deployment Best Practices

      • Develop CXM integration map
      • Create mitigation plan for poor data quality
      • Outputs:
        • Data Quality Preservation Map

      Create an Initiative Rollout Plan

      • Create risk management plan
      • Identify work initiative dependencies
      • Create roadmap
      • Outputs:
        • CXM Initiative Roadmap

      Confirm and Finalize the CXM Blueprint

      • Identify success metrics
      • Create stakeholder communication plan
      • Present CXM strategy to stakeholders
      • Outputs:
        • Stakeholder Presentation

      Info-Tech offers various levels of support to suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Strong Technology Foundation for CXM – project overview

      1. Drive Value With CXM 2. Create the Framework 3. Finalize the Framework
      Best-Practice Toolkit

      1.1 Create the Project Vision

      1.2 Structure the CXM Project

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Guided Implementations
      • Determine project vision for CXM.
      • Review CXM project charter.
      • Review environmental scan.
      • Review application portfolio for CXM.
      • Confirm deployment best practices.
      • Review initiatives rollout plan.
      • Confirm CXM roadmap.
      Onsite Workshop Module 1: Drive Measurable Value with a World-Class CXM Program Module 2: Create the Strategic Framework for CXM Module 3: Finalize the CXM Framework

      Phase 1 Outcome:

      • Completed drivers
      • Completed project charter

      Phase 2 Outcome:

      • Completed personas and scenarios
      • CXM application portfolio

      Phase 3 Outcome:

      • Strategic summary blueprint

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Create the Vision for CXM Enablement

      1.1 CXM Fireside Chat

      1.2 CXM Business Drivers

      1.3 CXM Vision Statement

      1.4 Project Structure

      Conduct the Environmental Scan and Internal Review

      2.1 PEST Analysis

      2.2 Competitive Analysis

      2.3 Market and Trend Analysis

      2.4 SWOT Analysis

      2.5 VRIO Analysis

      2.6 Channel Mapping

      Build Personas and Scenarios

      3.1 Persona Development

      3.2 Scenario Development

      3.3 Requirements Definition for CXM

      Create the CXM Application Portfolio

      4.1 Build Business Process Maps

      4.2 Review Application Satisfaction

      4.3 Create the CXM Application Portfolio

      4.4 Prioritize Applications

      Review Best Practices and Confirm Initiatives

      5.1 Create Data Integration Map

      5.2 Define Adoption Best Practices

      5.3 Build Initiatives Roadmap

      5.4 Confirm Initiatives Roadmap

      Deliverables
      1. CXM Vision Statement
      2. CXM Project Charter
      1. Completed External Analysis
      2. Completed Internal Review
      3. Channel Interaction Map
      4. Strategic Requirements (from External Analysis)
      1. Personas and Scenarios
      2. Strategic Requirements (based on personas)
      1. Business Process Maps
      2. Application Satisfaction Diagnostic
      3. Prioritized CXM Application Portfolio
      1. Integration Map for CXM
      2. End-User Adoption Plan
      3. Initiatives Roadmap

      Phase 1

      Drive Measurable Value With a World-Class CXM Program

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Drive Measurable Value With a World-Class CXM Program

      Proposed Time to Completion: 2 weeks

      Step 1.1: Create the Project Vision

      Start with an analyst kick-off call:

      • Review key drivers from a technology and business perspective for CXM
      • Discuss benefits of strong technology enablement for CXM

      Then complete these activities…

      • CXM Fireside Chat
      • CXM Business and Technology Driver Assessment
      • CXM Vision Statement

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Step 1.2: Structure the Project

      Review findings with analyst:

      • Assess the CXM vision statement for competitive differentiators
      • Determine current alignment disposition of IT with different business units

      Then complete these activities…

      • Team Composition and Responsibilities
      • Metrics Definition

      With these tools & templates:

      • CXM Strategy Project Charter Template

      Phase 1 Results & Insights:

      • Defined value of strong technology enablement for CXM
      • Completed CXM project charter

      Step 1.1: Create the Project Vision

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Fireside Chat: Discuss past challenges and successes with CXM
      • Identify business and IT drivers to establish guiding principles for CXM

      Outcomes:

      • Business benefits of a rationalized technology strategy to support CXM
      • Shared lessons learned
      • Guiding principles for providing technology enablement for CXM

      Building a technology strategy to support customer experience isn’t an option – it’s a mission-critical activity

      • Customer-facing departments supply the lifeblood of a company: revenue. In today’s fast-paced and interconnected world, it’s becoming increasingly imperative to enable customer experience processes with a wide range of technologies, from lead automation to social relationship management. CXM is the holistic management of customer interaction processes across marketing, sales, and customer service to create valuable, mutually beneficial customer experiences. Technology is a critical building block for enabling CXM.
      • The parallel progress of technology and process improvement is essential to an efficient and effective CXM program. While many executives prefer to remain at the status quo, new technologies have caused major shifts in the CXM environment. If you stay with the status quo, you will fall behind the competition.
      • However, many IT departments are struggling to keep up with the pace of change and find themselves more of a firefighter than a strategic partner to marketing, sales, and service teams. This not only hurts the business, but it also tarnishes IT’s reputation.

      An aligned, optimized CX strategy is:

      Rapid: to intentionally and strategically respond to quickly-changing opportunities and issues.

      Outcome-based: to make key decisions based on strong business cases, data, and analytics in addition to intuition and judgment.

      Rigorous: to bring discipline and science to bear; to improve operations and results.

      Collaborative: to conduct activities in a broader ecosystem of partners, suppliers, vendors, co-developers, and even competitors.

      (The Wall Street Journal, 2013)

      Info-Tech Insight

      If IT fails to adequately support marketing, sales, and customer service teams, the organization’s revenue will be in direct jeopardy. As a result, CIOs and Applications Directors must work with their counterparts in these departments to craft a cohesive and comprehensive strategy for using technology to create meaningful (and profitable) customer experiences.

      Fireside Chat, Part 1: When was technology an impediment to customer experience at your organization?

      1.1.1 30 minutes

      Input

      • Past experiences of the team

      Output

      • Lessons learned

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Think about a time when technology was an impediment to a positive customer experience at your organization. Reflect on the following:
        • What frustrations did the application or the technology cause to your customers? What was their reaction?
        • How did IT (and the business) identify the challenge in the first place?
        • What steps were taken to mitigate the impact of the problem? Were these steps successful?
        • What were the key lessons learned as part of the challenge?

      Fireside Chat, Part 2: What customer success stories has your organization created by using new technologies?

      1.1.2 30 minutes

      Input

      • Past experiences of the team

      Output

      • Lessons learned

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Think about a time when your organization successfully leveraged a new application or new technology to enhance the experience it provided to customers. Reflect on this experience and consider:
        • What were the organizational drivers for rolling out the new application or solution?
        • What obstacles had to be overcome in order to successfully deploy the solution?
        • How did the application positively impact the customer experience? What metrics improved?
        • What were the key lessons learned as part of the deployment? If you had to do it all over again, what would you do differently?

      Develop a cohesive, consistent, and forward-looking roadmap that supports each stage of the customer lifecycle

      When creating your roadmap, consider the pitfalls you’ll likely encounter in building the IT strategy to provide technology enablement for customer experience.

      There’s no silver bullet for developing a strategy. You can encounter pitfalls at a myriad of different points including not involving the right stakeholders from the business, not staying abreast of recent trends in the external environment, and not aligning sales, marketing, and support initiatives with a focus on the delivery of value to prospects and customers.

      Common Pitfalls When Creating a Technology-Enablement Strategy for CXM

      Senior management is not involved in strategy development.

      Not paying attention to the “art of the possible.”

      “Paving the cow path” rather than focusing on revising core processes.

      Misalignment between objectives and financial/personnel resources.

      Inexperienced team on either the business or IT side.

      Not paying attention to the actions of competitors.

      Entrenched management preferences for legacy systems.

      Sales culture that downplays the potential value of technology or new applications.

      IT is only one or two degrees of separation from the end customer: so take a customer-centric approach

      IT →Marketing, Sales, and Service →External Customers

      Internal-Facing Applications

      • IT enables, supports, and maintains the applications used by the organization to market to, sell to, and service customers. IT provides the infrastructural and technical foundation to operate the function.

      Customer-Facing Applications

      • IT supports customer-facing interfaces and channels for customer interaction.
      • Channel examples include web pages, mobile device applications and optimization, and interactive voice response for callers.

      Info-Tech Insight

      IT often overlooks direct customer considerations when devising a technology strategy for CXM. Instead, IT leaders rely on other business stakeholders to simply pass on requirements. By sitting down with their counterparts in marketing and sales, and fully understanding business drivers and customer personas, IT will be much better positioned to roll out supporting applications that drive customer engagement.

      A well-aligned CXM strategy recognizes a clear delineation of responsibilities between IT, sales, marketing, and service

      • When thinking about CXM, IT must recognize that it is responsible for being a trusted partner for technology enablement. This means that IT has a duty to:
        • Develop an in-depth understanding of strategic business requirements for CXM. Base your understanding of these business requirements on a clear conception of the internal and external environment, customer personas, and business processes in marketing, sales, and customer service.
        • Assist with shortlisting and supporting different channels for customer interaction (including email, telephony, web presence, and social media).
        • Create a rationalized, cohesive application portfolio for CXM that blends different enabling technologies together to support strategic business requirements.
        • Provide support for vendor shortlisting, selection, and implementation of CXM applications.
        • Assist with end-user adoption of CXM applications (i.e. training and ongoing support).
        • Provide initiatives that assist with technical excellence for CXM (such as data quality, integration, analytics, and application maintenance).
      • The business (marketing, sales, customer service) owns the business requirements and must be responsible for setting top-level objectives for customer interaction (e.g. product and pricing decisions, marketing collateral, territory management, etc.). IT should not take over decisions on customer experience strategy. However, IT should be working in lockstep with its counterparts in the business to assist with understanding business requirements through a customer-facing lens. For example, persona development is best done in cross-functional teams between IT and Marketing.

      Activity: Identify the business drivers for CXM to establish the strategy’s guiding principles

      1.1.3 30 minutes

      Input

      • Business drivers for CXM

      Output

      • Guiding principles for CXM strategy

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Define the assumptions and business drivers that have an impact on technology enablement for CXM. What is driving the current marketing, sales, and service strategy on the business side?
      Business Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
      High degree of customer-centric solution selling A technically complex product means that solution selling approaches are employed – sales cycles are long. There is a strong need for applications and data quality processes that support longer-term customer relationships rather than transactional selling.
      High desire to increase scalability of sales processes Although sales cycles are long, the organization wishes to increase the effectiveness of rep time via marketing automation where possible. Sales is always looking for new ways to leverage their reps for face-to-face solution selling while leaving low-level tasks to automation. Marketing wants to support these tasks.
      Highly remote sales team and unusual hours are the norm Not based around core hours – significant overtime or remote working occurs frequently. Misalignment between IT working only core hours and after-hours teams leads to lag times that can delay work. Scheduling of preventative sales maintenance must typically be done on weekends rather than weekday evenings.

      Activity: Identify the IT drivers for CXM to establish the strategy’s guiding principles

      1.1.4 30 minutes

      Input

      • IT drivers for CXM

      Output

      • Guiding principles for CXM strategy

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Define the assumptions and IT drivers that have an impact on technology enablement for CXM. What is driving the current IT strategy for supporting marketing, sales, and service initiatives?
      IT Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
      Sales Application Procurement Methodology Strong preference for on-premise COTS deployments over homebrewed applications. IT may not be able to support cloud-based sales applications due to security requirements for on premise.
      Vendor Relations Minimal vendor relationships; SLAs not drafted internally but used as part of standard agreement. IT may want to investigate tightening up SLAs with vendors to ensure more timely support is available for their sales teams.
      Development Methodology Agile methodology employed, some pockets of Waterfall employed for large-scale deployments. Agile development means more perfective maintenance requests come in, but it leads to greater responsiveness for making urgent corrective changes to non-COTS products.
      Data Quality Approach IT sees as Sales’ responsibility IT is not standing as a strategic partner for helping to keep data clean, causing dissatisfaction from customer-facing departments.
      Staffing Availability Limited to 9–5 Execution of sales support takes place during core hours only, limiting response times and access for on-the-road sales personnel.

      Activity: Use IT and business drivers to create guiding principles for your CXM technology-enablement project

      1.1.5 30 minutes

      Input

      • Business drivers and IT drivers from 1.1.3 and 1.1.4

      Output

      • CXM mission statement

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Based on the IT and business drivers identified, craft guiding principles for CXM technology enablement. Keep guiding principles in mind throughout the project and ensure they support (or reconcile) the business and IT drivers.

      Guiding Principle Description
      Sales processes must be scalable. Our sales processes must be able to reach a high number of target customers in a short time without straining systems or personnel.
      Marketing processes must be high touch. Processes must be oriented to support technically sophisticated, solution-selling methodologies.

      2. Summarize the guiding principles above by creating a CXM mission statement. See below for an example.

      Example: CXM Mission Statement

      To ensure our marketing, sales and service team is equipped with tools that will allow them to reach out to a large volume of contacts while still providing a solution-selling approach. This will be done with secure, on-premise systems to safeguard customer data.

      Ensure that now is the right time to take a step back and develop the CXM strategy

      Determine if now is the right time to move forward with building (or overhauling) your technology-enablement strategy for CXM.

      Not all organizations will be able to proceed immediately to optimize their CXM technology enablement. Determine if the organizational willingness, backbone, and resources are present to commit to overhauling the existing strategy. If you’re not ready to proceed, consider waiting to begin this project until you can procure the right resources.

      Do not proceed if:

      • Your current strategy for supporting marketing, sales, and service is working well and IT is already viewed as a strategic partner by these groups. Your current strategy is well aligned with customer preferences.
      • The current strategy is not working well, but there is no consensus or support from senior management for improving it.
      • You cannot secure the resources or time to devote to thoroughly examining the current state and selecting improvement initiatives.
      • The strategy has been approved, but there is no budget in place to support it at this time.

      Proceed if:

      • Senior management has agreed that technology support for CXM should be improved.
      • Sub-divisions within IT, sales, marketing, and service are on the same page about the need to improve alignment.
      • You have an approximate budget to work with for the project and believe you can secure additional funding to execute at least some improvement initiatives.
      • You understand how improving CXM alignment will fit into the broader customer interaction ecosystem in your organization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.3; 1.1.4; 1.1.5 - Identify business and IT drivers to create CXM guiding principles

      The facilitator will work with stakeholders from both the business and IT to identify implicit or explicit strategic drivers that will support (or pose constraints on) the technology-enablement framework for the CXM strategy. In doing so, guiding principles will be established for the project.

      Step 1.2: Structure the Project

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Define the project purpose, objectives, and business metrics
      • Define the scope of the CXM strategy
      • Create the project team
      • Build a RACI chart
      • Develop a timeline with project milestones
      • Identify risks and create mitigation strategies
      • Complete the strategy project charter and obtain approval

      Outcomes:

      CXM Strategy Project Charter Template

      • Purpose, objectives, metrics
      • Scope
      • Project team & RACI
      • Timeline
      • Risks & mitigation strategies
      • Project sponsorship

      Use Info-Tech’s CXM Strategy Project Charter Template to outline critical components of the CXM project

      1.2.1 CXM Strategy Project Charter Template

      Having a project charter is the first step for any project: it specifies how the project will be resourced from a people, process, and technology perspective, and it clearly outlines major project milestones and timelines for strategy development. CXM technology enablement crosses many organizational boundaries, so a project charter is a very useful tool for ensuring everyone is on the same page.

      Sections of the document:

      1. Project Drivers, Rationale, and Context
      2. Project Objectives, Metrics, and Purpose
      3. Project Scope Definition
      4. Project Team Roles and Responsibilities (RACI)
      5. Project Timeline
      6. Risk Mitigation Strategy
      7. Project Metrics
      8. Project Review & Approvals

      INFO-TECH DELIVERABLE

      CXM Strategy Project Charter Template

      Populate the relevant sections of your project charter as you complete activities 1.2.2-1.2.8.

      Understand the roles necessary to complete your CXM technology-enablement strategy

      Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.

      Title Role Within Project Structure
      Project Sponsor
      • Owns the project at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CIO, CMO, VP of Sales, VP of Customer Care, or similar
      Project Manager
      • The IT individual(s) that will oversee day-to-day project operations
      • Responsible for preparing and managing the project plan and monitoring the project team’s progress
      • Applications or other IT Manager, Business Analyst, Business Process Owner, or similar
      Business Lead
      • Works alongside the IT PM to ensure that the strategy is aligned with business needs
      • In this case, likely to be a marketing, sales, or customer service lead
      • Sales Director, Marketing Director, Customer Care Director, or similar
      Project Team
      • Comprised of individuals whose knowledge and skills are crucial to project success
      • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions. Can assist with persona and scenario development for CXM.
      • Project Manager, Business Lead, CRM Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs
      Steering Committee
      • Comprised of C-suite/management level individuals that act as the project’s decision makers
      • Responsible for validating goals and priorities, defining the project scope, enabling adequate resourcing, and managing change
      • Project Sponsor, Project Manager, Business Lead, CFO, Business Unit SMEs and similar

      Info-Tech Insight

      Do not limit project input or participation to the aforementioned roles. Include subject matter experts and internal stakeholders at particular stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CXM technology-enablement strategy.

      Activity: Kick-off the CXM project by defining the project purpose, project objectives, and business metrics

      1.2.2 30 minutes

      Input

      • Activities 1.1.1 to 1.1.5

      Output

      • Drivers & rationale
      • Purpose statement
      • Business goals
      • Business metrics
      • CXM Strategy Project Charter Template, sections 1.0, 2.0, and 2.1

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Sponsor
      • Project Manager
      • Business Lead
      • Steering Committee

      Instructions

      Hold a meeting with IT, Marketing, Sales, Service, Operations, and any other impacted business stakeholders that have input into CXM to accomplish the following:

      1. Discuss the drivers and rationale behind embarking on a CXM strategy.
      2. Develop and concede on objectives for the CXM project, metrics that will gauge its success, and goals for each metric.
      3. Create a project purpose statement that is informed by decided-upon objectives and metrics from the steps above. When establishing a project purpose, ask the question, “what are we trying to accomplish?”
      • Example: Project Purpose Statement
        • The organization is creating a CXM strategy to gather high-level requirements from the business, IT, and Marketing, Sales, and Service, to ensure that the selection and deployment of the CXM meets the needs of the broader organization and provides the greatest return on investment.
    • Document your project drivers and rationale, purpose statement, project objectives, and business metrics in Info-Tech’s CXM Strategy Project Charter Template in sections 1.0 and 2.0.
    • Info-Tech Insight

      Going forward, set up a quarterly review process to understand changing needs. It is rare that organizations never change their marketing and sales strategy. This will change the way the CXM will be utilized.

      Establish baseline metrics for customer engagement

      In order to gauge the effectiveness of CXM technology enablement, establish core metrics:

      1. Marketing Metrics: pertaining to share of voice, share of wallet, market share, lead generation, etc.
      2. Sales Metrics: pertaining to overall revenue, average deal size, number of accounts, MCV, lead warmth, etc.
      3. Customer Service Metrics: pertaining to call volumes, average time to resolution, first contact resolution, customer satisfaction, etc.
      4. IT Metrics: pertaining to end-user satisfaction with CXM applications, number of tickets, contract value, etc.
      Metric Description Current Metric Future Goal
      Market Share 25% 35%
      Share of Voice (All Channels) 40% 50%
      Average Deal Size $10,500 $12,000
      Account Volume 1,400 1,800
      Average Time to Resolution 32 min 25 min
      First Contact Resolution 15% 35%
      Web Traffic per Month (Unique Visitors) 10,000 15,000
      End-User Satisfaction 62% 85%+
      Other metric
      Other metric
      Other metric

      Understand the importance of setting project expectations with a scope statement

      Be sure to understand what is in scope for a CXM strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling ERP or BI under CXM.

      In Scope

      Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of CXM will be based on the scope statement.

      Scope Creep

      Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. CRM, MMS, SMMP, etc.), rather than granular requirements that would lead to vendor application selection (e.g. Salesforce, Marketo, Hootsuite, etc.).

      Out of Scope

      Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration. For example, fulfilment and logistics management is out of scope as it pertains to CXM.

      In Scope
      Strategy
      High-Level CXM Application Requirements CXM Strategic Direction Category Level Application Solutions (e.g. CRM, MMS, etc.)
      Out of Scope
      Software Selection
      Vendor Application Review Vendor Application Selection Granular Application System Requirements

      Activity: Define the scope of the CXM strategy

      1.2.3 30 minutes

      Input

      • N/A

      Output

      • Project scope and parameters
      • CXM Strategy Project Charter Template, section 3.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Sponsor
      • Project Manager
      • Business Lead

      Instructions

      1. Formulate a scope statement. Decide which people, processes, and functions the CXM strategy will address. Generally, the aim of this project is to develop strategic requirements for the CXM application portfolio – not to select individual vendors.
      2. Document your scope statement in Info-Tech’s CXM Strategy Project Charter Template in section 3.0.

      To form your scope statement, ask the following questions:

      • What are the major coverage points?
      • Who will be using the systems?
      • How will different users interact with the systems?
      • What are the objectives that need to be addressed?
      • Where do we start?
      • Where do we draw the line?

      Identify the right stakeholders to include on your project team

      Consider the core team functions when composing the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CXM strategy.

      Required Skills/Knowledge Suggested Project Team Members
      IT
      • Application development
      • Enterprise integration
      • Business processes
      • Data management
      • CRM Application Manager
      • Business Process Manager
      • Integration Manager
      • Application Developer
      • Data Stewards
      Business
      • Understanding of the customer
      • Departmental processes
      • Sales Manager
      • Marketing Manager
      • Customer Service Manager
      Other
      • Operations
      • Administrative
      • Change management
      • Operations Manager
      • CFO
      • Change Management Manager

      Info-Tech Insight

      Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as marketing, sales, service, and finance, as well as IT.

      Activity: Create the project team

      1.2.4 45 minutes

      Input

      • Scope Statement (output of Activity 1.2.3).

      Output

      • Project Team
      • CXM Strategy Project Charter Template, section 4.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Review your scope statement. Have a discussion to generate a complete list of key stakeholders that are needed to achieve the scope of work.
      2. Using the previously generated list, identify a candidate for each role and determine their responsibilities and expected time commitment for the CXM strategy project.
      3. Document the project team in Info-Tech’s CXM Strategy Project Charter Template in section 4.0.

      Define project roles and responsibilities to improve progress tracking

      Build a list of the core CXM strategy team members, and then structure a RACI chart with the relevant categories and roles for the overall project.

      Responsible - Conducts work to achieve the task

      Accountable - Answerable for completeness of task

      Consulted - Provides input for the task

      Informed - Receives updates on the task

      Info-Tech Insight

      Avoid missed tasks between inter-functional communications by defining roles and responsibilities for the project as early as possible.

      Benefits of Assigning RACI Early:

      • Improve project quality by assigning the right people to the right tasks.
      • Improve chances of project task completion by assigning clear accountabilities.
      • Improve project buy-in by ensuring that stakeholders are kept informed of project progress, risks, and successes.

      Activity: Build a RACI chart

      1.2.5 30 minutes

      Input

      • Project Team (output of Activity 1.2.4)

      Output

      • RACI chart
      • CXM Strategy Project Charter Template, section 4.2

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Identify the key stakeholder teams that should be involved in the CXM strategy project. You should have a cross-functional team that encompasses both IT (various units) and the business.
      2. Determine whether each stakeholder should be responsible, accountable, consulted, and/or informed with respect to each overarching project step.
      3. Confirm and communicate the results to relevant stakeholders and obtain their approval.
      4. Document the RACI chart in Info-Tech’s CXM Strategy Project Charter Template in section 4.2.
      Example: RACI Chart Project Sponsor (e.g. CMO) Project Manager (e.g. Applications Manager) Business Lead (e.g. Marketing Director) Steering Committee (e.g. PM, CMO, CFO…) Project Team (e.g. PM, BL, SMEs…)
      Assess Project Value I C A R C
      Conduct a Current State Assessment I I A C R
      Design Application Portfolio I C A R I
      Create CXM Roadmap R R A I I
      ... ... ... ... ... ...

      Activity: Develop a timeline in order to specify concrete project milestones

      1.2.6 30 minutes

      Input

      • N/A

      Output

      • Project timeline
      • CXM Strategy Project Charter Template, section 5.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Assign responsibilities, accountabilities, and other project involvement to each project team role using a RACI chart. Remember to consider dependencies when creating the schedule and identifying appropriate subtasks.
      2. Document the timeline in Info-Tech’s CXM Strategy Project Charter Template in section 5.0.
      Key Activities Start Date End Date Target Status Resource(s)
      Structure the Project and Build the Project Team
      Articulate Business Objectives and Define Vision for Future State
      Document Current State and Assess Gaps
      Identify CXM Technology Solutions
      Build the Strategy for CXM
      Implement the Strategy

      Assess project-associated risk by understanding common barriers and enablers

      Common Internal Risk Factors

      Management Support Change Management IT Readiness
      Definition The degree of understanding and acceptance of CXM as a concept and necessary portfolio of technologies. The degree to which employees are ready to accept change and the organization is ready to manage it. The degree to which the organization is equipped with IT resources to handle new systems and processes.
      Assessment Outcomes
      • Is CXM enablement recognized as a top priority?
      • Will management commit time to the project?
      • Are employees resistant to change?
      • Is there an organizational awareness of the importance of customer experience?
      • Who are the owners of process and content?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      • What are the important integration points throughout the business?
      Risk
      • Low management buy-in
      • Lack of funding
      • Lack of resources
      • Low employee motivation
      • Lack of ownership
      • Low user adoption
      • Poor implementation
      • Reliance on consultants

      Activity: Identify the risks and create mitigation strategies

      1.2.7 45 minutes

      Input

      • N/A

      Output

      • Risk mitigation strategy
      • CXM Strategy Project Charter Template, section 6.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead
      • Project Team

      Instructions

      1. Brainstorm a list of possible risks that may impede the progress of your CXM project.
      2. Classify risks as strategy based (related to planning) or systems based (related to technology).
      3. Brainstorm mitigation strategies to overcome each risk.
      4. On a scale of 1 to 3, determine the impact of each risk on project success and the likelihood of each risk occurring.
      5. Document your findings in Info-Tech’s CXM Strategy Project Charter Template in section 6.0.

      Likelihood:

      1 - High/Needs Focus

      2 - Can Be Mitigated

      3 - Unlikely

      Impact

      1 - High Impact

      2 - Moderate Impact

      3 - Minimal Impact

      Example: Risk Register and Mitigation Tactics

      Risk Impact Likelihood Mitigation Effort
      Cost of time and implementation: designing a robust portfolio of CXM applications can be a time consuming task, representing a heavy investment for the organization 1 1
      • Have a clear strategic plan and a defined time frame
      • Know your end-user requirements
      • Put together an effective and diverse strategy project team
      Availability of resources: lack of in-house resources (e.g. infrastructure, CXM application developers) may result in the need to insource or outsource resources 1 2
      • Prepare a plan to insource talent by hiring or transferring talent from other departments – e.g. marketing and customer service

      Activity: Complete the project charter and obtain approval

      1.2.8 45 minutes

      Input

      • N/A

      Output

      • Project approval
      • CXM Strategy Project Charter Template, section 8.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead
      • Project Team

      Instructions

      Before beginning to develop the CXM strategy, validate the project charter and metrics with senior sponsors or stakeholders and receive their approval to proceed.

      1. Schedule a 30-60 minute meeting with senior stakeholders and conduct a live review of your CXM strategy project charter.
      2. Obtain stakeholder approval to ensure there are no miscommunications or misunderstandings around the scope of the work that needs to be done to reach a successful project outcome. Final sign-off should only take place when mutual consensus has been reached.
        • Obtaining approval should be an iterative process; if senior management has concerns over certain aspects of the plan, revise and review again.

      Info-Tech Insight

      In most circumstances, you should have your CXM strategy project charter validated with the following stakeholders:

      • Chief Information Officer
      • IT Applications Director
      • CFO or Comptroller (for budget approval)
      • Chief Marketing Office or Head of Marketing
      • Chief Revenue Officer or VP of Sales
      • VP Customer Service

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.2.2 Define project purpose, objectives, and business metrics

      Through an in-depth discussion, an analyst will help you prioritize corporate objectives and organizational drivers to establish a distinct project purpose.

      1.2.3 Define the scope of the CXM strategy

      An analyst will facilitate a discussion to address critical questions to understand your distinct business needs. These questions include: What are the major coverage points? Who will be using the system?

      1.2.4; 1.2.5; 1.2.6 Create the CXM project team, build a RACI chart, and establish a timeline

      Our analysts will guide you through how to create a designated project team to ensure the success of your CXM strategy and suite selection initiative, including project milestones and team composition, as well as designated duties and responsibilities.

      Phase 2

      Create a Strategic Framework for CXM Technology Enablement

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 2 outline: Steps 2.1 and 2.2

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

      Proposed Time to Completion: 4 weeks

      Step 2.1: Scan the External Environment

      Start with an analyst kick-off call:

      • Discuss external drivers
      • Assess competitive environment
      • Review persona development
      • Review scenarios

      Then complete these activities…

      • Build the CXM operating model
      • Conduct a competitive analysis
      • Conduct a PEST analysis
      • Build personas and scenarios

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Step 2.2: Assess the Current State for CRM

      Review findings with analyst:

      • Review SWOT analysis
      • Review VRIO analysis
      • Discuss strategic requirements for CXM

      Then complete these activities…

      • Conduct a SWOT analysis
      • Conduct a VRIO analysis
      • Inventory existing applications

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Phase 2 outline: Steps 2.3 and 2.4

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

      Proposed Time to Completion: 4 weeks

      Step 2.3: Create an Application Portfolio

      Start with an analyst kick-off call:

      • Discuss possible business process maps
      • Discuss strategic requirements
      • Review application portfolio results

      Then complete these activities…

      • Build business maps
      • Execute application mapping

      With these tools & templates:

      CXM Portfolio Designer

      CXM Strategy Stakeholder Presentation Template

      CXM Business Process Shortlisting Tool

      Step 2.4: Develop Deployment Best Practices

      Review findings with analyst:

      • Review possible integration maps
      • Discuss best practices for end-user adoption
      • Discuss best practices for customer data quality

      Then complete these activities…

      • Create CXM integration ecosystem
      • Develop adoption game plan
      • Create data quality standards

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Phase 2 Results & Insights:

      • Application portfolio for CXM
      • Deployment best practices for areas such as integration, data quality, and end-user adoption

      Step 2.1: Scan the External Environment

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Inventory CXM drivers and organizational objectives
      • Identify CXM challenges and pain points
      • Discuss opportunities and benefits
      • Align corporate and CXM strategies
      • Conduct a competitive analysis
      • Conduct a PEST analysis and extract strategic requirements
      • Build customer personas and extract strategic requirements

      Outcomes:

      • CXM operating model
        • Organizational drivers
        • Environmental factors
        • Barriers
        • Enablers
      • PEST analysis
      • External customer personas
      • Customer journey scenarios
      • Strategic requirements for CXM

      Develop a CXM technology operating model that takes stock of needs, drivers, barriers, and enablers

      Establish the drivers, enablers, and barriers to developing a CXM technology enablement strategy. In doing so, consider needs, environmental factors, organizational drivers, and technology drivers as inputs.

      CXM Strategy

      • Barriers
        • Lack of Resources
        • Cultural Mindset
        • Resistance to Change
        • Poor End-User Adoption
      • Enablers
        • Senior Management Support
        • Customer Data Quality
        • Current Technology Portfolio
      • Business Needs (What are your business drivers? What are current marketing, sales, and customer service pains?)
        • Acquisition Pipeline Management
        • Live Chat for Support
        • Social Media Analytics
        • Etc.
      • Organizational Goals
        • Increase Profitability
        • Enhance Customer Experience Consistency
        • Reduce Time-to-Resolution
        • Increase First Contact Resolution
        • Boost Share of Voice
      • Environmental Factors (What factors that affect your strategy are out of your control?)
        • Customer Buying Habits
        • Changing Technology Trends
        • Competitive Landscape
        • Regulatory Requirements
      • Technology Drivers (Why do you need a new system? What is the purpose for becoming an integrated organization?)
        • System Integration
        • Reporting Capabilities
        • Deployment Model

      Understand your needs, drivers, and organizational objectives for creating a CXM strategy

      Business Needs Organizational Drivers Technology Drivers Environmental Factors
      Definition A business need is a requirement associated with a particular business process (for example, Marketing needs customer insights from the website – the business need would therefore be web analytics capabilities). Organizational drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance. Technology drivers are technological changes that have created the need for a new CXM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business.
      Examples
      • Web analytics
      • Live chat capabilities
      • Mobile self-service
      • Social media listening
      • Data quality
      • Customer satisfaction
      • Branding
      • Time-to-resolution
      • Deployment model (i.e. SaaS)
      • Integration
      • Reporting capabilities
      • Fragmented technologies
      • Economic factors
      • Customer preferences
      • Competitive influencers
      • Compliance regulations

      Info-Tech Insight

      A common organizational driver is to provide adequate technology enablement across multiple channels, resulting in a consistent customer experience. This driver is a result of external considerations. Many industries today are highly competitive and rapidly changing. To succeed under these pressures, you must have a rationalized portfolio of enterprise applications for customer interaction.

      Activity: Inventory and discuss CXM drivers and organizational objectives

      2.1.1 30 minutes

      Input

      • Business needs
      • Exercise 1.1.3
      • Exercise 1.1.4
      • Environmental factors

      Output

      • CXM operating model inputs
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm the business needs, organizational drivers, technology drivers, and environmental factors that will inform the CXM strategy. Draw from exercises 1.1.3-1.1.5.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is a graphic, with a rectangle split into three sections in the centre. The three sections are: Barriers; CXM Strategy; Enablers. Around the centre are 4 more rectangles, labelled: Business Needs; Organizational Drivers; Technology Drivers; Environmental Factors. The outer rectangles are a slightly darker shade of grey than the others, highlighting them.

      Understand challenges and barriers to creating and executing the CXM technology-enablement strategy

      Take stock of internal challenges and barriers to effective CXM strategy execution.

      Example: Internal Challenges & Potential Barriers

      Understanding the Customer Change Management IT Readiness
      Definition The degree to which a holistic understanding of the customer can be created, including customer demographic and psychographics. The degree to which employees are ready to accept operational and cultural changes and the degree to which the organization is ready to manage it. The degree to which IT is ready to support new technologies and processes associated with a portfolio of CXM applications.
      Questions to Ask
      • As an organization, do we have a true understanding of our customers?
      • How might we achieve a complete understanding of the customer throughout different phases of the customer lifecycle?
      • Are employees resistant to change?
      • Are there enough resources to drive an CXM strategy?
      • To what degree is the existing organizational culture customer-centric?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      Implications
      • Uninformed creation of CXM strategic requirements
      • Inadequate understanding of customer needs and wants
      • User acceptance
      • Lack of ownership
      • Lack of accountability
      • Lack of sustainability
      • Poor implementation
      • Reliance on expensive external consultants
      • Lack of sustainability

      Activity: Identify CXM challenges and pain points

      2.1.2 30 minutes

      Input

      • Challenges
      • Pain points

      Output

      • CXM operating model barriers
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm the challenges and pain points that may act as barriers to the successful planning and execution of a CXM strategy.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is the same graphic from a previous section. In this instance, the Barriers sections is highlighted.

      Identify opportunities that can enable CXM strategy execution

      Existing internal conditions, capabilities, and resources can create opportunities to enable the CXM strategy. These opportunities are critical to overcoming challenges and barriers.

      Example: Opportunities to Leverage for Strategy Enablement

      Management Buy-In Customer Data Quality Current Technology Portfolio
      Definition The degree to which upper management understands and is willing to enable a CXM project, complete with sponsorship, funding, and resource allocation. The degree to which customer data is accurate, consistent, complete, and reliable. Strong customer data quality is an opportunity – poor data quality is a barrier. The degree to which the existing portfolio of CXM-supporting enterprise applications can be leveraged to enable the CXM strategy.
      Questions to Ask
      • Is management informed of changing technology trends and the subsequent need for CXM?
      • Are adequate funding and resourcing available to support a CXM project, from strategy creation to implementation?
      • Are there any data quality issues?
      • Is there one source of truth for customer data?
      • Are there duplicate or incomplete sets of data?
      • Does a strong CRM backbone exist?
      • What marketing, sales, and customer service applications exist?
      • Are CXM-enabling applications rated highly on usage and performance?
      Implications
      • Need for CXM clearly demonstrated
      • Financial and logistical feasibility
      • Consolidated data quality governance initiatives
      • Informed decision making
      • Foundation for CXM technology enablement largely in place
      • Reduced investment of time and money needed

      Activity: Discuss opportunities and benefits

      2.1.3 30 minutes

      Input

      • Opportunities
      • Benefits

      Output

      • Completed CXM operating model
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm opportunities that should be leveraged or benefits that should be realized to enable the successful planning and execution of a CXM strategy.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is the same graphic from earlier sections, this time with the Enablers section highlighted.

      Ensure that you align your CXM technology strategy to the broader corporate strategy

      A successful CXM strategy requires a comprehensive understanding of an organization’s overall corporate strategy and its effects on the interrelated departments of marketing, sales, and service, including subsequent technology implications. For example, a CXM strategy that emphasizes tools for omnichannel management and is at odds with a corporate strategy that focuses on only one or two channels will fail.

      Corporate Strategy

      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.

      CXM Strategy

      • Communicates the company’s budget and spending on CXM applications and initiatives.
      • Identifies IT initiatives that will support the business and key CXM objectives, specific to marketing, sales, and service.
      • Outlines staffing and resourcing for CXM initiatives.

      Unified Strategy

      • The CXM implementation can be linked, with metrics, to the corporate strategy and ultimate business objectives.

      Info-Tech Insight

      Your organization’s corporate strategy is especially important in dictating the direction of the CXM strategy. Corporate strategies are often focused on customer-facing activity and will heavily influence the direction of marketing, sales, customer service, and consequentially, CXM. Corporate strategies will often dictate market targeting, sales tactics, service models, and more.

      Review sample organizational objectives to decipher how CXM technologies can support such objectives

      Identifying organizational objectives of high priority will assist in breaking down CXM objectives to better align with the overall corporate strategy and achieve buy-in from key stakeholders.

      Corporate Objectives Aligned CXM Technology Objectives
      Increase Revenue Enable lead scoring Deploy sales collateral management tools Improve average cost per lead via a marketing automation tool
      Enhance Market Share Enhance targeting effectiveness with a CRM Increase social media presence via an SMMP Architect customer intelligence analysis
      Improve Customer Satisfaction Reduce time-to-resolution via better routing Increase accessibility to customer service with live chat Improve first contact resolution with customer KB
      Increase Customer Retention Use a loyalty management application Improve channel options for existing customers Use customer analytics to drive targeted offers
      Create Customer-Centric Culture Ensure strong training and user adoption programs Use CRM to provide 360-degree view of all customer interaction Incorporate the voice of the customer into product development

      Activity: Review your corporate strategy and validate its alignment with the CXM operating model

      2.1.4 30 minutes

      Input

      • Corporate strategy
      • CXM operating model (completed in Activity 2.1.3)

      Output

      • Strategic alignment between the business and CXM strategies

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm and create a list of organizational objectives at the corporate strategy level.
      2. Break down each organizational objective to identify how CXM may support it.
      3. Validate CXM goals and organizational objectives with your CXM operating model. Be sure to address the validity of each with the business needs, organizational drivers, technology drivers, and environmental factors identified as inputs to the operating model.

      Amazon leverages customer data to drive decision making around targeted offers and customer experience

      CASE STUDY

      Industry E-Commerce

      Source Pardot, 2012

      Situation

      Amazon.com, Inc. is an American electronic commerce and cloud computing company. It is the largest e-commerce retailer in the US.

      Amazon originated as an online book store, later diversifying to sell various forms of media, software, games, electronics, apparel, furniture, food, toys, and more.

      By taking a data-driven approach to marketing and sales, Amazon was able to understand its customers’ needs and wants, penetrate different product markets, and create a consistently personalized online-shopping customer experience that keeps customers coming back.

      Technology Strategy

      Use Browsing Data Effectively

      Amazon leverages marketing automation suites to view recent activities of prospects on its website. In doing so, a more complete view of the customer is achieved, including insights into purchasing interests and site navigation behaviors.

      Optimize Based on Interactions

      Using customer intelligence, Amazon surveys and studies standard engagement metrics like open rate, click-through rate, and unsubscribes to ensure the optimal degree of marketing is being targeted to existing and prospective customers, depending on level of engagement.

      Results

      Insights gained from having a complete understanding of the customer (from basic demographic characteristics provided in customer account profiles to observed psychographic behaviors captured by customer intelligence applications) are used to personalize Amazon’s sales and marketing approaches. This is represented through targeted suggestions in the “recommended for you” section of the browsing experience and tailored email marketing.

      It is this capability, partnered with the technological ability to observe and measure customer engagement, that allows Amazon to create individual customer experiences.

      Scan the external environment to understand your customers, competitors, and macroenvironmental trends

      Do not develop your CXM technology strategy in isolation. Work with Marketing to understand your STP strategy (segmentation, targeting, positioning): this will inform persona development and technology requirements downstream.

      Market Segmentation

      • Segment target market by demographic, geographic, psychographic, and behavioral characteristics
      • What does the competitive market look like?
      • Who are the key customer segments?
      • What segments are you going to target?

      Market Targeting

      • Evaluate potential and commercial attractiveness of each segment, considering the dynamics of the competition
      • How do you target your customers?
      • How should you target them in the future?
      • How do your products/services differ from the competition?

      Product Positioning

      • Develop detailed product positioning and marketing mixes for selected segments
      • What is the value of the product/service to each segment of the market?
      • How are you positioning your product/service in the market?

      Info-Tech Insight

      It is at this point that you should consider the need for and viability of an omnichannel approach to CXM. Through which channels do you target your customers? Are your customers present and active on a wide variety of channels? Consider how you can position your products, services, and brand through the use of omnichannel methodologies.

      Activity: Conduct a competitive analysis to understand where your market is going

      2.1.5 1 hour

      Input

      • Scan of competitive market
      • Existing customer STP strategy

      Output

      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team
      • Marketing SME

      Instructions

      1. Scan the market for direct and indirect competitors.
      2. Evaluate current and/or future segmentation, targeting, and positioning strategies by answering the following questions:
      • What does the competitive market look like?
      • Who are the key customer segments?
      • What segments are you going to target?
      • How do you target your customers?
      • How should you target them in the future?
      • How do your products/services differ from the competition?
      • What is the value of the product/service to each segment of the market?
      • How are you positioning your product/service in the market?
      • Other helpful questions include:
        • How formally do you target customers? (e.g. through direct contact vs. through passive brand marketing)
        • Does your organization use the shotgun or rifle approach to marketing?
          • Shotgun marketing: targets a broad segment of people, indirectly
          • Rifle marketing: targets smaller and more niche market segments using customer intelligence
    • For each point, identify CXM requirements.
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Activity: Conduct a competitive analysis (cont’d)

      2.1.5 30 minutes

      Input

      • Scan of competitive market

      Output

      • Competitive analysis
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team
      • Marketing SME (e.g. Market Research Stakeholders)

      Instructions

      1. List recent marketing technology and customer experience-related initiatives that your closest competitors have implemented.
      2. For each identified initiative, elaborate on what the competitive implications are for your organization.
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Competitive Implications

      Competitor Organization Recent Initiative Associated Technology Direction of Impact Competitive Implication
      Organization X Multichannel E-Commerce Integration WEM – hybrid integration Positive
      • Up-to-date e-commerce capabilities
      • Automatic product updates via PCM
      Organization Y Web Social Analytics WEM Positive
      • Real-time analytics and customer insights
      • Allows for more targeted content toward the visitor or customer

      Conduct a PEST analysis to determine salient political, economic, social, and technological impacts for CXM

      A PEST analysis is a structured planning method that identifies external environmental factors that could influence the corporate and IT strategy.

      Political - Examine political factors, such as relevant data protection laws and government regulations.

      Economic - Examine economic factors, such as funding, cost of web access, and labor shortages for maintaining the site(s).

      Technological - Examine technological factors, such as new channels, networks, software and software frameworks, database technologies, wireless capabilities, and availability of software as a service.

      Social - Examine social factors, such as gender, race, age, income, and religion.

      Info-Tech Insight

      When looking at opportunities and threats, PEST analysis can help to ensure that you do not overlook external factors, such as technological changes in your industry. When conducting your PEST analysis specifically for CXM, pay particular attention to the rapid rate of change in the technology bucket. New channels and applications are constantly emerging and evolving, and seeing differential adoption by potential customers.

      Activity: Conduct and review the PEST analysis

      2.1.6 30 minutes

      Input

      • Political, economic, social, and technological factors related to CXM

      Output

      • Completed PEST analysis

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Identify your current strengths and weaknesses in managing the customer experience.
      2. Identify any opportunities to take advantage of and threats to mitigate.

      Example: PEST Analysis

      Political

      • Data privacy for PII
      • ADA legislation for accessible design

      Economic

      • Spending via online increasing
      • Focus on share of wallet

      Technological

      • Rise in mobile
      • Geo-location based services
      • Internet of Things
      • Omnichannel

      Social

      • Increased spending power by millennials
      • Changing channel preferences
      • Self-service models

      Activity: Translate your PEST analysis into a list of strategic CXM technology requirements to be addressed

      2.1.7 30 minutes

      Input

      • PEST Analysis conducted in Activity 2.1.6.

      Output

      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      For each PEST quadrant:

      1. Document the point and relate it to a goal.
      2. For each point, identify CXM requirements.
      3. Sort goals and requirements to eliminate duplicates.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Parsing Requirements from PEST Analysis

      Technological Trend: There has been a sharp increase in popularity of mobile self-service models for buying habits and customer service access.

      Goal: Streamline mobile application to be compatible with all mobile devices. Create consistent branding across all service delivery applications (e.g. website, etc.).

      Strategic Requirement: Develop a native mobile application while also ensuring that resources through our web presence are built with responsive design interface.

      IT must fully understand the voice of the customer: work with Marketing to develop customer personas

      Creating a customer-centric CXM technology strategy requires archetypal customer personas. Creating customer personas will enable you to talk concretely about them as consumers of your customer experience and allow you to build buyer scenarios around them.

      A persona (or archetypal user) is an invented person that represents a type of user in a particular use-case scenario. In this case, personas can be based on real customers.

      Components of a persona Example – Organization: Grocery Store
      Name Name personas to reflect a key attribute such as the persona’s primary role or motivation Brand Loyal Linda: A stay-at-home mother dedicated to maintaining and caring for a household of 5 people
      Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) Age: 42 years old Geographic location: London Suburbia Language: English Education: Post-secondary Job: Stay-at-home mother Annual Household Income: $100,000+
      Wants, needs, pain points Identify surface-level motivations for buying habits

      Wants: Local products Needs: Health products; child-safe products

      Pain points: Fragmented shopping experience

      Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.)

      Psychographic: Detail-oriented, creature of habit

      Behavioral: Shops at large grocery store twice a week, visits farmers market on Saturdays, buys organic products online

      Activity: Build personas for your customers

      2.1.8 2 hours

      Input

      • Customer demographics and psychographics

      Output

      • List of prioritized customer personas
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      Project Team

      Instructions

      1. In 2-4 groups, list all the customer personas that need to be built. In doing so, consider the people who interact with your organization most often.
      2. Build a demographic profile for each customer persona. Include information such as age, geographic location, occupation, annual income, etc.
      3. Augment the persona with a psychographic profile of each customer. Consider the goals and objectives of each customer persona and how these might inform buyer behaviors.
      4. Introduce your group’s personas to the entire group, in a round-robin fashion, as if you are introducing your persona at a party.
      5. Summarize the personas in a persona map. Rank your personas according to importance and remove any duplicates.

      Info-Tech Insight

      For CXM, persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with CXM applications), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, customer service directors, etc.

      Sample Persona Templates

      Fred, 40

      The Family Man

      Post-secondary educated, white-collar professional, three children

      Goals & Objectives

      • Maintain a stable secure lifestyle
      • Progress his career
      • Obtain a good future for his children

      Behaviors

      • Manages household and finances
      • Stays actively involved in children’s activities and education
      • Seeks potential career development
      • Uses a cellphone and email frequently
      • Sometimes follows friends Facebook pages

      Services of Interest

      • SFA, career counselling, job boards, day care, SHHS
      • Access to information via in-person, phone, online

      Traits

      General Literacy - High

      Digital Literacy - Mid-High

      Detail-Oriented - High

      Willing to Try New Things - Mid-High

      Motivated and Persistent - Mid-High

      Time Flexible - Mid-High

      Familiar With [Red.] - Mid

      Access to [Red.] Offices - High

      Access to Internet - High

      Ashley, 35

      The Tourist

      Single, college educated, planning vacation in [redacted], interested in [redacted] job opportunities

      Goals & Objectives

      • Relax after finishing a stressful job
      • Have adventures and try new things
      • Find a new job somewhere in Canada

      Behaviors

      • Collects information about things to do in [redacted]
      • Collects information about life in [redacted]
      • Investigates and follows up on potential job opportunities
      • Uses multiple social media to keep in touch with friends
      • Shops online frequently

      Services of Interest

      • SFA, job search, road conditions, ferry schedules, hospital, police station, DL requirements, vehicle rental
      • Access to information via in-person, phone, website, SMS, email, social media

      Traits

      General Literacy - Mid

      Digital Literacy - High

      Detail-Oriented - Mid

      Willing to Try New Things - High

      Motivated and Persistent - Mid

      Time Flexible - Mid-High

      Familiar With [Red.] - Low

      Access to [Red.] Offices - Low

      Access to Internet - High

      Bill, 25

      The Single Parent

      15-year resident of [redacted], high school education, waiter, recently divorced, two children

      Goals & Objectives

      • Improve his career options so he can support his family
      • Find an affordable place to live
      • Be a good parent
      • Work through remaining divorce issues

      Behaviors

      • Tries to get training or experience to improve his career
      • Stays actively involved in his children’s activities
      • Looks for resources and supports to resolve divorce issues
      • Has a cellphone and uses the internet occasionally

      Services of Interest

      • Child care, housing authority, legal aid, parenting resources
      • Access to information via in person, word-of mouth, online, phone, email

      Traits

      General Literacy - Mid

      Digital Literacy - Mid-Low

      Detail-Oriented - Mid-Low

      Willing to Try New Things - Mid

      Motivated and Persistent - High

      Time Flexible - Mid

      Familiar With [Red.] - Mid-High

      Access to [Red.] Offices - High

      Access to Internet - High

      Marie, 19

      The Regional Youth

      Single, [redacted] resident, high school graduate

      Goals & Objectives

      • Get a good job
      • Maintain ties to family and community

      Behaviors

      • Looking for work
      • Gathering information about long-term career choices
      • Trying to get the training or experience that can help her develop a career
      • Staying with her parents until she can get established
      • Has a new cellphone and is learning how to use it
      • Plays videogames and uses the internet at least weekly

      Services of Interest

      • Job search, career counselling
      • Access to information via in-person, online, phone, email, web applications

      Traits

      General Literacy - Mid

      Digital Literacy - Mid

      Detail-Oriented - Mid-Low

      Willing to Try New Things - Mid-High

      Motivated and Persistent - Mid-Low

      Time Flexible - High

      Familiar With [Red.] - Mid-Low

      Access to [Red.] Offices - Mid-Low

      Access to Internet - Mid

      Build key scenarios for each persona to extract strategic requirements for your CXM application portfolio

      A scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help parse requirements used to design the CXM application portfolio.

      A Good Scenario…

      • Describes specific task(s) that need to be accomplished
      • Describes user goals and motivations
      • Describes interactions with a compelling but not overwhelming amount of detail
      • Can be rough, as long as it provokes ideas and discussion

      Scenarios Are Used To…

      • Provide a shared understanding about what a user might want to do, and how they might want to do it
      • Help construct the sequence of events that are necessary to address in your user interface(s)

      To Create Good Scenarios…

      • Keep scenarios high level, not granular in nature
      • Identify as many scenarios as possible. If you’re time constrained, try to develop 2-3 key scenarios per persona
      • Sketch each scenario out so that stakeholders understand the goal of the scenario

      Activity: Build scenarios for each persona and extract strategic requirements for the CXM strategy

      2.1.9 1.5 hours

      Input

      • Customer personas (output of Activity 2.1.5)

      Output

      • CX scenario maps
      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. For each customer persona created in Activity 2.1.5, build a scenario. Choose and differentiate scenarios based on the customer goal of each scenario (e.g. make online purchase, seek customer support, etc.).
      2. Think through the narrative of how a customer interacts with your organization, at all points throughout the scenario. List each step in the interaction in a sequential order to form a scenario journey.
      3. Examine each step in the scenario and brainstorm strategic requirements that will be needed to support the customer’s use of technology throughout the scenario.
      4. Repeat steps 1-3 for each persona. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Scenario Map

      Persona Name: Brand Loyal Linda

      Scenario Goal: File a complaint about in-store customer service

      Look up “[Store Name] customer service” on public web. →Reach customer support landing page. →Receive proactive notification prompt for online chat with CSR. →Initiate conversation: provide order #. →CSR receives order context and information. →Customer articulates problem, CSR consults knowledgebase. →Discount on next purchase offered. →Send email with discount code to Brand Loyal Linda.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1; 2.1.2; 2.1.3; 2.1.4 - Create a CXM operating model

      An analyst will facilitate a discussion to identify what impacts your CXM strategy and how to align it to your corporate strategy. The discussion will take different perspectives into consideration and look at organizational drivers, external environmental factors, as well as internal barriers and enablers.

      2.1.5 Conduct a competitive analysis

      Calling on their depth of expertise in working with a broad spectrum of organizations, our facilitator will help you work through a structured, systematic evaluation of competitors’ actions when it comes to CXM.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.1.6; 2.1.7 - Conduct a PEST analysis

      The facilitator will use guided conversation to target each quadrant of the PEST analysis and help your organization fully enumerate political, economic, social, and technological trends that will influence your CXM strategy. Our analysts are deeply familiar with macroenvironmental trends and can provide expert advice in identifying areas of concern in the PEST and drawing strategic requirements as implications.

      2.1.8; 2.1.9 - Build customer personas and subsequent persona scenarios

      Drawing on the preceding exercises as inputs, the facilitator will help the team create and refine personas, create respective customer interaction scenarios, and parse strategic requirements to support your technology portfolio for CXM.

      Step 2.2: Assess the Current State of CXM

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Conduct a SWOT analysis and extract strategic requirements
      • Inventory existing CXM applications and assess end-user usage and satisfaction
      • Conduct a VRIO analysis and extract strategic requirements

      Outcomes:

      • SWOT analysis
      • VRIO analysis
      • Current state application portfolio
      • Strategic requirements

      Conduct a SWOT analysis to prepare for creating your CXM strategy

      A SWOT analysis is a structured planning method that evaluates the strengths, weaknesses, opportunities, and threats involved in a project.

      Strengths - Strengths describe the positive attributes that are within your control and internal to your organization (i.e. what do you do better than anyone else?)

      Weaknesses - Weaknesses are internal aspects of your business that place you at a competitive disadvantage; think of what you need to enhance to compete with your top competitor.

      Opportunities - Opportunities are external factors the project can capitalize on. Think of them as factors that represent reasons your business is likely to prosper.

      Threats - Threats are external factors that could jeopardize the project. While you may not have control over these, you will benefit from having contingency plans to address them if they occur.

      Info-Tech Insight

      When evaluating weaknesses of your current CXM strategy, ensure that you’re taking into account not just existing applications and business processes, but also potential deficits in your organization’s channel strategy and go-to-market messaging.

      Activity: Conduct a SWOT analysis

      2.2.1 30 minutes

      Input

      • CXM strengths, weaknesses, opportunities, and threats

      Output

      • Completed SWOT analysis

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Identify your current strengths and weaknesses in managing the customer experience. Consider marketing, sales, and customer service aspects of the CX.
      2. Identify any opportunities to take advantage of and threats to mitigate.

      Example: SWOT Analysis

      Strengths

      • Strong customer service model via telephony

      Weaknesses

      • Customer service inaccessible in real-time through website or mobile application

      Opportunities

      • Leverage customer intelligence to measure ongoing customer satisfaction

      Threats

      • Lack of understanding of customer interaction platforms by staff could hinder adoption

      Activity: Translate your SWOT analysis into a list of requirements to be addressed

      2.2.2 30 minutes

      Input

      • SWOT Analysis conducted in Activity 2.2.1.

      Output

      • Strategic CXM requirements
      • CXM Stakeholder Presentation Template

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      For each SWOT quadrant:

      1. Document the point and relate it to a goal.
      2. For each point, identify CXM requirements.
      3. Sort goals and requirements to eliminate duplicates.
      4. Document your outputs in the CXM Stakeholder Presentation Template.

      Example: Parsing Requirements from SWOT Analysis

      Weakness: Customer service inaccessible in real-time through website or mobile application.

      Goal: Increase the ubiquity of access to customer service knowledgebase and agents through a web portal or mobile application.

      Strategic Requirement: Provide a live chat portal that matches the customer with the next available and qualified agent.

      Inventory your current CXM application portfolio

      Applications are the bedrock of technology enablement for CXM. Review your current application portfolio to identify what is working well and what isn’t.

      Understand Your CXM Application Portfolio With a Four-Step Approach

      Build the CXM Application Inventory →Assess Usage and Satisfaction →Map to Business Processes and Determine Dependencies →Determine Grow/Maintain/ Retire for Each Application

      When assessing the CXM applications portfolio, do not cast your net too narrowly; while CRM and MMS applications are often top of mind, applications for digital asset management and social media management are also instrumental for ensuring a well-integrated CX.

      Identify dependencies (either technical or licensing) between applications. This dependency tracing will come into play when deciding which applications should be grown (invested in), which applications should be maintained (held static), and which applications should be retired (divested).

      Info-Tech Insight

      Shadow IT is prominent here! When building your application inventory, ensure you involve Marketing, Sales, and Service to identify any “unofficial” SaaS applications that are being used for CXM. Many organizations fail to take a systematic view of their CXM application portfolio beyond maintaining a rough inventory. To assess the current state of alignment, you must build the application inventory and assess satisfaction metrics.

      Understand which of your organization’s existing enterprise applications enable CXM

      Review the major enterprise applications in your organization that enable CXM and align your requirements to these applications (net-new or existing). Identify points of integration to capture the big picture.

      The image shows a graphic titled Example: Integration of CRM, SMMP, and ERP. It is a flow chart, with icons defined by a legend on the right side of the image

      Info-Tech Insight

      When assessing the current application portfolio that supports CXM, the tendency will be to focus on the applications under the CXM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, CRM or similar applications. Examples of these systems are ERP systems, ECM (e.g. SharePoint) applications, and more.

      Assess CXM application usage and satisfaction

      Having a portfolio but no contextual data will not give you a full understanding of the current state. The next step is to thoroughly assess usage patterns as well as IT, management, and end-user satisfaction with each application.

      Example: Application Usage & Satisfaction Assessment

      Application Name Level of Usage IT Satisfaction Management Satisfaction End-User Satisfaction Potential Business Impact
      CRM (e.g. Salesforce) Medium High Medium Medium High
      CRM (e.g. Salesforce) Low Medium Medium High Medium
      ... ... ... ... ... ...

      Info-Tech Insight

      When evaluating satisfaction with any application, be sure to consult all stakeholders who come into contact with the application or depend on its output. Consider criteria such as ease of use, completeness of information, operational efficiency, data accuracy, etc.

      Use Info-Tech’s Application Portfolio Assessment to gather end-user feedback on existing CXM applications

      2.2.3 Application Portfolio Assessment: End-User Feedback

      Info-Tech’s Application Portfolio Assessment: End-User Feedback diagnostic is a low-effort, high-impact program that will give you detailed report cards on end-user satisfaction with an application. Use these insights to identify problems, develop action plans for improvement, and determine key participants.

      Application Portfolio Assessment: End-User Feedback is an 18-question survey that provides valuable insights on user satisfaction with an application by:

      • Performing a general assessment of the application portfolio that provides a full view of the effectiveness, criticality, and prevalence of all relevant applications.
      • Measuring individual application performance with open-ended user feedback surveys about the application, organized by department to simplify problem resolution.
      • Providing targeted department feedback to identify end-user satisfaction and focus improvements on the right group or line of business.

      INFO-TECH DIAGNOSTIC

      Activity: Inventory your CXM applications, and assess application usage and satisfaction

      2.2.4 1 hour

      Input

      • List of CXM applications

      Output

      • Complete inventory of CXM applications
      • CXM Stakeholder Presentation Template

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. List all existing applications that support the creation, management, and delivery of your customer experience.
      2. Identify which processes each application supports (e.g. content deployment, analytics, service delivery, etc.).
      3. Identify technical or licensing dependencies (e.g. data models).
      4. Assess the level of application usage by IT, management, and internal users (high/medium/low).
      5. Assess the satisfaction with and performance of each application according to IT, management, and internal users (high/medium/low). Use the Info-Tech Diagnostic to assist.

      Example: CXM Application Inventory

      Application Name Deployed Date Processes Supported Technical and Licensing Dependencies
      Salesforce June 2018 Customer relationship management XXX
      Hootsuite April 2019 Social media listening XXX
      ... ... ... ...

      Conduct a VRIO analysis to identify core competencies for CXM applications

      A VRIO analysis evaluates the ability of internal resources and capabilities to sustain a competitive advantage by evaluating dimensions of value, rarity, imitability, and organization. For critical applications like your CRM platform, use a VRIO analysis to determine their value.

      Is the resource or capability valuable in exploiting an opportunity or neutralizing a threat? Is the resource or capability rare in the sense that few of your competitors have a similar capability? Is the resource or capability costly to imitate or replicate? Is the organization organized enough to leverage and capture value from the resource or capability?
      NO COMPETITIVE DISADVANTAGE
      YES NO→ COMPETITIVE EQUALITY/PARITY
      YES YES NO→ TEMPORARY COMPETITIVE ADVANTAGE
      YES YES YES NO→ UNUSED COMPETITIVE ADVANTAGE
      YES YES YES YES LONG-TERM COMPETITIVE ADVANTAGE

      (Strategic Management Insight, 2013)

      Activity: Conduct a VRIO analysis on your existing application portfolio

      2.2.5 30 minutes

      Input

      • Inventory of existing CXM applications (output of Activity 2.2.4)

      Output

      • Completed VRIO analysis
      • Strategic CXM requirements
      • CXM Stakeholder Presentation Template

      Materials

      • VRIO Analysis model
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Evaluate each CXM application inventoried in Activity 2.2.4 by answering the four VRIO questions in sequential order. Do not proceed to the following question if “no” is answered at any point.
      2. Record the results. The state of your organization’s competitive advantage, based on each resource/capability, will be determined based on the number of questions with a “yes” answer. For example, if all four questions are answered positively, then your organization is considered to have a long-term competitive advantage.
      3. Document your outputs in the CXM Stakeholder Presentation Template.

      If you want additional support, have our analysts guide your through this phase as part of an Info-Tech workshop

      2.2.1; 2.2.2 Conduct a SWOT Analysis

      Our facilitator will use a small-team approach to delve deeply into each area, identifying enablers (strengths and opportunities) and challenges (weaknesses and threats) relating to the CXM strategy.

      2.2.3; 2.2.4 Inventory your CXM applications, and assess usage and satisfaction

      Working with your core team, the facilitator will assist with building a comprehensive inventory of CXM applications that are currently in use and with identifying adjacent systems that need to be identified for integration purposes. The facilitator will work to identify high and low performing applications and analyze this data with the team during the workshop exercise.

      2.2.5 Conduct a VRIO analysis

      The facilitator will take you through a VRIO analysis to identify which of your internal technological competencies ensure, or can be leveraged to ensure, your competitiveness in the CXM market.

      Step 2.3: Create an Application Portfolio

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities

      • Shortlist and prioritize business processes for improvement and reengineering
      • Map current CXM processes
      • Identify business process owners and assign job responsibilities
      • Identify user interaction channels to extract strategic requirements
      • Aggregate and develop strategic requirements
      • Determine gaps in current and future state processes
      • Build the CXM application portfolio

      Outcomes

      CXM application portfolio map

      • Shortlist of relevant business processes
      • Current state map
      • Business process ownership assignment
      • Channel map
      • Complete list of strategic requirements

      Understand business process mapping to draft strategy requirements for marketing, sales, and customer service

      The interaction between sales, marketing, and customer service is very process-centric. Rethink sales and customer-centric workflows and map the desired workflow, imbedding the improved/reengineered process into the requirements.

      Using BPM to Capture Strategic Requirements

      Business process modeling facilitates the collaboration between the business and IT, recording the sequence of events, tasks performed, who performed them, and the levels of interaction with the various supporting applications.

      By identifying the events and decision points in the process and overlaying the people that perform the functions, the data being interacted with, and the technologies that support them, organizations are better positioned to identify gaps that need to be bridged.

      Encourage the analysis by compiling an inventory of business processes that support customer-facing operations that are relevant to achieving the overall organizational strategies.

      Outcomes

      • Operational effectiveness
      • Identification, implementation, and maintenance of reusable enterprise applications
      • Identification of gaps that can be addressed by acquisition of additional applications or process improvement/ reengineering

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

      Leverage the APQC framework to help define your inventory of sales, marketing, and service processes

      APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      OPERATING PROCESSES
      1.0 Develop Vision and Strategy 2.0 Develop and Manage Products and Services 3.0 Market and Sell Products and Services 4.0 Deliver Products and Services 5.0 Manage Customer Service
      MANAGEMENT AND SUPPORT SERVICES
      6.0 Develop and Manage Human Capital
      7.0 Manage Information Technology
      8.0 Manage Financial Resources
      9.0 Acquire, Construct, and Manage Assets
      10.0 Manage Enterprise Risk, Compliance, and Resiliency
      11.0 Manage External Relationships
      12.0 Develop and Manage Business Capabilities

      (APQC, 2011)

      MORE ABOUT APQC

      • APQC serves as a high-level, industry-neutral enterprise model that allows organizations to see activities from a cross-industry process perspective.
      • Sales processes have been provided up to Level 3 of the APQC framework.
      • The APQC Framework can be accessed through APQC’s Process Classification Framework.
      • Note: The framework does not list all processes within a specific organization, nor are the processes that are listed in the framework present in every organization.

      Understand APQC’s “Market and Sell Products and Services” framework

      3.0 Market and Sell Products

      3.1 Understand markets, customers, and capabilities

      • 3.1.1 Perform customer and market intelligence analysis
      • 3.1.2 Evaluate and prioritize market opportunities

      3.2 Develop marketing strategy

      • 3.2.1 Define offering and customer value proposition
      • 3.2.2 Define pricing strategy to align to value proposition
      • 3.2.3 Define and manage channel strategy

      3.3 Develop sales strategy

      • 3.3.1 Develop sales forecast
      • 3.3.2 Develop sales partner/alliance relationships
      • 3.3.3 Establish overall sales budgets
      • 3.3.4 Establish sales goals and measures
      • 3.3.5 Establish customer management measures

      3.4 Develop and manage marketing plans

      • 3.4.1 Establish goals, objectives, and metrics by products by channels/segments
      • 3.4.2 Establish marketing budgets
      • 3.4.3 Develop and manage media
      • 3.4.4 Develop and manage pricing
      • 3.4.5 Develop and manage promotional activities
      • 3.4.6 Track customer management measures
      • 3.4.7 Develop and manage packaging strategy

      3.5 Develop and manage sales plans

      • 3.5.1 Generate leads
      • 3.5.2 Manage customers and accounts
      • 3.5.3 Manage customer sales
      • 3.5.4 Manage sales orders
      • 3.5.5 Manage sales force
      • 3.5.6 Manage sales partners and alliances

      Understand APQC’s “Manage Customer Service” framework

      5.0 Manage Customer Service

      5.1 Develop customer care/customer service strategy

      • 5.1.1 Develop customer service segmentation
        • 5.1.1.1 Analyze existing customers
        • 5.1.1.2 Analyze feedback of customer needs
      • 5.1.2 Define customer service policies and procedures
      • 5.1.3 Establish service levels for customers

      5.2 Plan and manage customer service operations

      • 5.2.1 Plan and manage customer service work force
        • 5.2.1.1 Forecast volume of customer service contacts
        • 5.2.1.2 Schedule customer service work force
        • 5.2.1.3 Track work force utilization
        • 5.2.1.4 Monitor and evaluate quality of customer interactions with customer service representatives

      5.2 Plan and 5.2.3.1 Receive customer complaints 5.2.3.2 Route customer complaints 5.2.3.3 Resolve customer complaints 5.2.3.4 Respond to customer complaints manage customer service operations

      • 5.2.2 Manage customer service requests/inquiries
        • 5.2.2.1 Receive customer requests/inquiries
        • 5.2.2.2 Route customer requests/inquiries
        • 5.2.2.3 Respond to customer requests/inquiries
      • 5.2.3 Manage customer complaints
        • 5.2.3.1 Receive customer complaints
        • 5.2.3.2 Route customer complaints
        • 5.2.3.3 Resolve customer complaints
        • 5.2.3.4 Respond to customer complaints

      Leverage the APQC framework to inventory processes

      The APQC framework provides levels 1 through 3 for the “Market and Sell Products and Services” framework. Level 4 processes and beyond will need to be defined by your organization as they are more granular (represent the task level) and are often industry-specific.

      Level 1 – Category - 1.0 Develop vision and strategy (10002)

      Represents the highest level of process in the enterprise, such as manage customer service, supply chain, financial organization, and human resources.

      Level 2 – Process Group - 1.1 Define the business concept and long-term vision (10014)

      Indicates the next level of processes and represents a group of processes. Examples include perform after sales repairs, procurement, accounts payable, recruit/source, and develop sales strategy.

      Level 3 – Process - 1.1.1 Assess the external environment (10017)

      A series of interrelated activities that convert input into results (outputs); processes consume resources and require standards for repeatable performance; and processes respond to control systems that direct quality, rate, and cost of performance.

      Level 4 – Activity - 1.1.1.1 Analyze and evaluate competition (10021)

      Indicates key events performed when executing a process. Examples of activities include receive customer requests, resolve customer complaints, and negotiate purchasing contracts.

      Level 5 – Task - 12.2.3.1.1 Identify project requirements and objectives (11117)

      Tasks represent the next level of hierarchical decomposition after activities. Tasks are generally much more fine grained and may vary widely across industries. Examples include create business case and obtain funding, and design recognition and reward approaches.

      Info-Tech Insight

      Define the Level 3 processes in the context of your organization. When creating a CXM strategy, concern yourself with the interrelatedness of processes across existing departmental silos (e.g. marketing, sales, customer service). Reserve the analysis of activities (Level 4) and tasks (Level 3) for granular work initiatives involved in the implementation of applications.

      Use Info-Tech’s CXM Business Process Shortlisting Tool to prioritize processes for improvement

      2.3.1 CXM Business Process Shortlisting Tool

      The CXM Business Process Shortlisting Tool can help you define which marketing, sales, and service processes you should focus on.

      Working in concert with stakeholders from the appropriate departments, complete the short questionnaire.

      Based on validated responses, the tool will highlight processes of strategic importance to your organization.

      These processes can then be mapped, with requirements extracted and used to build the CXM application portfolio.

      INFO-TECH DELIVERABLE

      The image shows a screenshot of the Prioritize Your Business Processes for Customer Experience Management document, with sample information filled in.

      Activity: Define your organization’s top-level processes for reengineering and improvement

      2.3.2 1 hour

      Input

      • Shortlist business processes relating to customer experience (output of Tool 2.3.1)

      Output

      • Prioritized list of top-level business processes by department

      Materials

      • APQC Framework
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory all business processes relating to customer experience.
      2. Customize the impacted business units and factor weightings on the scorecard below to reflect the structure and priorities of your organization.
      3. Using the scorecard, identify all processes essential to your customer experience. The scorecard is designed to determine which processes to focus on and to help you understand the impact of the scrutinized process on the different customer-centric groups across the organization.

      The image shows a chart with the headings Factor, Check If Yes, repeated. The chart lists various factors, and the Check if Yes columns are left blank.

      This image shows a chart with the headings Factor, Weights, and Scores. It lists factors, and the rest of the chart is blank.

      Current legend for Weights and Scores

      F – Finance

      H – Human Resources

      I – IT

      L – Legal

      M – Marketing

      BU1 – Business Unit 1

      BU2 – Business Unit 2

      Activity: Map top-level business processes to extract strategic requirements for the CXM application portfolio

      2.3.3 45 minutes

      Input

      • Prioritized list of top-level business processes (output of Activity 2.3.2)

      Output

      • Current state process maps
      • CXM Strategy Stakeholder Presentation

      Materials

      • APQC Framework
      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Project Team

      Instructions

      1. List all prioritized business processes, as identified in Activity 2.3.2. Map your processes in enough detail to capture all relevant activities and system touchpoints, using the legend included in the example. Focus on Level 3 processes, as explained in the APQC framework.
      2. Record all of the major process steps on sticky notes. Arrange the sticky notes in sequential order.
      3. On a set of different colored sticky notes, record all of the systems that enable the process. Map these system touchpoints to the process steps.
      4. Draw arrows in between the steps to represent manual entry or automation.
      5. Identify effectiveness and gaps in existing processes to determine process technology requirements.
      6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

      Info-Tech Insight

      Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future state vision, and ensures that these gaps are documented as part of the overall requirements.

      Example: map your current CXM processes to parse strategic requirements (customer acquisition)

      The image shows an example of a CXM process map, which is formatted as a flow chart, with a legend at the bottom.

      Activity: Extract requirements from your top-level business processes

      2.3.4 30 minutes

      Input

      • Current state process maps (output of Activity 2.3.3)

      Output

      • Requirements for future state mapping

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Discuss the current state of priority business processes, as mapped in Activity 2.3.3.
      2. Extract process requirements for business process improvement by asking the following questions:
      • What is the input?
      • What is the output?
      • What are the underlying risks and how can they be mitigated?
      • What conditions should be met to mitigate or eliminate each risk?
      • What are the improvement opportunities?
      • What conditions should be met to enable these opportunities?
      1. Break business requirements into functional and non-functional requirements, as outlined on this slide.

      Info-Tech Insight

      The business and IT should work together to evaluate the current state of business processes and the business requirements necessary to support these processes. Develop a full view of organizational needs while still obtaining the level of detail required to make informed decisions about technology.

      Establish process owners for each top-level process

      Identify the owners of the business processes being evaluated to extract requirements. Process owners will be able to inform business process improvement and assume accountability for reengineered or net-new processes going forward.

      Process Owner Responsibilities

      Process ownership ensures support, accountability, and governance for CXM and its supporting processes. Process owners must be able to negotiate with business users and other key stakeholders to drive efficiencies within their own process. The process owner must execute tactical process changes and continually optimize the process.

      Responsibilities include the following:

      • Inform business process improvement
      • Introduce KPIs and metrics
      • Monitor the success of the process
      • Present process findings to key stakeholders within the organization
      • Develop policies and procedures for the process
      • Implement new methods to manage the process

      Info-Tech Insight

      Identify the owners of existing processes early so you understand who needs to be involved in process improvement and reengineering. Once implemented, CXM applications are likely to undergo a series of changes. Unstructured data will multiply, the number of users may increase, administrators may change, and functionality could become obsolete. Should business processes be merged or drastically changed, process ownership can be reallocated during CXM implementation. Make sure you have the right roles in place to avoid inefficient processes and poor data quality.

      Use Info-Tech’s Process Owner Assignment Guide to aid you in choosing the right candidates

      2.3.5 Process Owner Assignment Guide

      The Process Owner Assignment Guide will ensure you are taking the appropriate steps to identify process owners for existing and net-new processes created within the scope of the CXM strategy.

      The steps in the document will help with important considerations such as key requirements and responsibilities.

      Sections of the document:

      1. Define responsibilities and level of commitment
      2. Define job requirements
      3. Receive referrals
      4. Hold formal interviews
      5. Determine performance metrics

      INFO-TECH DELIVERABLE

      Activity: Assign business process owners and identify job responsibilities

      2.3.6 30 minutes

      Input

      • Current state map (output of Activity 2.3.3)

      Output

      • Process owners assigned
      • CXM Strategy Stakeholder Presentation

      Materials

      Participants

      • Project Team

      Instructions

      1. Using Info-Tech’s Process Owner Assignment Guide, assign process owners for each process mapped out in Activity 2.3.3. To assist in doing so, answer the following questions
      • What is the level of commitment expected from each process owner?
      • How will the process owner role be tied to a formal performance appraisal?
      • What metrics can be assigned?
      • How much work will be required to train process owners?
      • Is there support staff available to assist process owners?
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Choose the channels that will make your target customers happy – and ensure they’re supported by CXM applications

      Traditional Channels

      Face-to-Face is efficient and has a positive personalized aspect that many customers desire, be it for sales or customer service.

      Telephony (or IVR) has been a mainstay of customer interaction for decades. While not fading, it must be used alongside newer channels.

      Postal used to be employed extensively for all domains, but is now used predominantly for e-commerce order fulfillment.

      Web 1.0 Channels

      Email is an asynchronous interaction channel still preferred by many customers. Email gives organizations flexibility with queuing.

      Live Chat is a way for clients to avoid long call center wait times and receive a solution from a quick chat with a service rep.

      Web Portals permit transactions for sales and customer service from a central interface. They are a must-have for any large company.

      Web 2.0 Channels

      Social Media consists of many individual services (like Facebook or Twitter). Social channels are exploding in consumer popularity.

      HTML5 Mobile Access allows customers to access resources from their personal device through its integrated web browser.

      Dedicated Mobile Apps allow customers to access resources through a dedicated mobile application (e.g. iOS, Android).

      Info-Tech Insight

      Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. Millennials) but see limited adoption in other demographics or use cases (i.e. B2B).

      Activity: Extract requirements from your channel map

      2.3.7 30 minutes

      Input

      • Current state process maps (output of Activity 2.3.3)

      Output

      • Channel map
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory which customer channels are currently used by each department.
      2. Speak with the department heads for Marketing, Sales, and Customer Service and discuss future channel usage. Identify any channels that will be eliminated or added.
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Business Unit Channel Use Survey

      Marketing Sales Customer Service
      Current Used? Future Use? Current Used? Future Use? Current Used? Future Use?
      Email Yes Yes No No No No
      Direct Mail Yes No No No No No
      Phone No No Yes Yes Yes Yes
      In-Person No No Yes Yes Yes No
      Website Yes Yes Yes Yes Yes Yes
      Social Channels No Yes Yes Yes No Yes

      Bring it together: amalgamate your strategic requirements for CXM technology enablement

      Discovering your organizational requirements is vital for choosing the right business-enabling initiative, technology, and success metrics. Sorting the requirements by marketing, sales, and service is a prudent mechanism for clarification.

      Strategic Requirements: Marketing

      Definition: High-level requirements that will support marketing functions within CXM.

      Examples

      • Develop a native mobile application while also ensuring that resources for your web presence are built with responsive design interface.
      • Consolidate workflows related to content creation to publish all brand marketing from one source of truth.
      • Augment traditional web content delivery by providing additional functionality such as omnichannel engagement, e-commerce, dynamic personalization, and social media functionality.

      Strategic Requirements: Sales

      Definition: High-level requirements that will support sales functions within CXM.

      Examples

      • Implement a system that reduces data errors and increases sales force efficiency by automating lead management workflows.
      • Achieve end-to-end visibility of the sales process by integrating the CRM, inventory, and order processing and shipping system.
      • Track sales force success by incorporating sales KPIs with real-time business intelligence feeds.

      Strategic Requirements: Customer Service

      Definition: High-level requirements that will support customer service functions within CXM.

      Examples

      • Provide a live chat portal that connects the customer, in real time, with the next available and qualified agent.
      • Bridge the gap between the source of truth for sales with customer service suites to ensure a consistent, end-to-end customer experience from acquisition to customer engagement and retention.
      • Use customer intelligence to track customer journeys in order to best understand and resolve customer complaints.

      Activity: Consolidate your strategic requirements for the CXM application portfolio

      2.3.8 30 minutes

      Input

      • Strategic CXM requirements (outputs of Activities 2.1.5, 2.1.6, and 2.2.2)

      Output

      • Aggregated strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Aggregate strategic CXM requirements that have been gathered thus far in Activities 2.1.5, 2.1.6, and 2.2.2, 2.3.5, and 2.3.7.
      2. Identify and rectify any obvious gaps in the existing set of strategic CXM requirements. To do so, consider the overall corporate and CXM strategy: are there any objectives that have not been addressed in the requirements gathering process?
      3. De-duplicate the list. Prioritize the aggregated/augmented list of CXM requirements as “high/critical,” “medium/important,” or “low/desirable.” This will help manage the relative importance and urgency of different requirements to itemize respective initiatives, resources, and the time in which they need to be addressed. In completing the prioritization of requirements, consider the following:
      • Requirements prioritization must be completed in collaboration with all key stakeholders (across the business and IT). Stakeholders must ask themselves:
        • What are the consequences to the business objectives if this requirement is omitted?
        • Is there an existing system or manual process/workaround that could compensate for it?
        • What business risk is being introduced if a particular requirement cannot be implemented right away?
    • Document your outputs in the CXM Strategic Stakeholder Presentation Template.
    • Info-Tech Insight

      Strategic CXM requirements will be used to prioritize specific initiatives for CXM technology enablement and application rollout. Ensure that IT, the business, and executive management are all aligned on a consistent and agreed upon set of initiatives.

      Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront

      CASE STUDY

      Industry Consumer Goods, Clothing

      Source Retail Congress, 2017

      Burberry London

      Situation

      Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

      Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

      Technology Strategy

      RFID tags were attached to products to trigger interactive videos on the store’s screens in the common areas or in a fitting room. Consumers are to have instant access to relevant product combinations, ranging from craftsmanship information to catwalk looks. This is equivalent to the rich, immediate information consumers have grown to expect from the online shopping experience.

      Another layer of Burberry’s added capabilities includes in-memory-based analytics to gather and analyze data in real-time to better understand customers’ desires. Burberry builds customer profiles based on what items the shoppers try on from the RFID-tagged garments. Although this requires customer privacy consent, customers are willing to provide personal information to trusted brands.

      This program, called “Customer 360,” assisted sales associates in providing data-driven shopping experiences that invite customers to digitally share their buying history and preferences via their tablet devices. As the data is stored in Burberry’s customer data warehouse and accessed through an application such as CRM, it is able to arm sales associates with personal fashion advice on the spot.

      Lastly, the customer data warehouse/CRM application is linked to Burberry’s ERP system and other custom applications in a cloud environment to achieve real-time inventory visibility and fulfillment.

      Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront (cont'd)

      CASE STUDY

      Industry Consumer Goods, Clothing

      Source Retail Congress, 2017

      Burberry London

      Situation

      Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

      Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

      The Results

      Burberry achieved one of the most personalized retail shopping experiences. Immediate personal fashion advice using customer data is only one component of the experience. Not only are historic purchases and preference data analyzed, a customer’s social media posts and fashion industry trend data is proactively incorporated into the interactions between the sales associate and the customer.

      Burberry achieved CEO Angela Ahrendts’ vision of “Burberry World,” in which the brand experience is seamlessly integrated across channels, devices, retail locations, products, and services.

      The organizational alignment between Sales, Marketing, and IT empowered employees to bring the Burberry brand to life in unique ways that customers appreciated and were willing to advocate.

      Burberry is now one of the most beloved and valuable luxury brands in the world. The brand tripled sales in five years, became one of the leading voices on trends, fashion, music, and beauty while redefining what top-tier customer experience should be both digitally and physically.

      Leverage both core CRM suites and point solutions to create a comprehensive CXM application portfolio

      The debate between best-of-breed point solutions versus comprehensive CRM suites is ongoing. There is no single best answer. In most cases, an effective portfolio will include both types of solutions.

      • When the CRM market first evolved, vendors took a heavy “module-centric” approach – offering basic suites with the option to add a number of individual modules. Over time, vendors began to offer suites with a high degree of out-of-the-box functionality. The market has now witnessed the rise of powerful point solutions for the individual business domains.
      • Point solutions augment, rather than supplant, the functionality of a CRM suite in the mid-market to large enterprise context. Point solutions do not offer the necessary spectrum of functionality to take the place of a unified CRM suite.
      • Point solutions enhance aspects of CRM. For example, most CRM vendors have yet to provide truly impressive social media capabilities. An organization seeking to dominate the social space should consider purchasing a social media management platform to address this deficit in their CRM ecosystem.

      Customer Relationship Management (CRM)

      Social Media Management Platform (SMMP)

      Field Sales/Service Automation (FSA)

      Marketing Management Suites

      Sales Force Automation

      Email Marketing Tools

      Lead Management Automation (LMA)

      Customer Service Management Suites

      Customer Intelligence Systems

      Don’t adopt multiple point solutions without a genuine need: choose domains most in need of more functionality

      Some may find that the capabilities of a CRM suite are not enough to meet their specific requirements: supplementing a CRM suite with a targeted point solution can get the job done. A variety of CXM point solutions are designed to enhance your business processes and improve productivity.

      Sales

      Sales Force Automation: Automatically generates, qualifies, tracks, and contacts leads for sales representatives, minimizing time wasted on administrative duties.

      Field Sales: Allows field reps to go through the entire sales cycle (from quote to invoice) while offsite.

      Sales Compensation Management: Models, analyzes, and dispenses payouts to sales representatives.

      Marketing

      Social Media Management Platforms (SMMP): Manage and track multiple social media services, with extensive social data analysis and insight capabilities.

      Email Marketing Bureaus: Conduct email marketing campaigns and mine results to effectively target customers.

      Marketing Intelligence Systems: Perform in-depth searches on various data sources to create predictive models.

      Service

      Customer Service Management (CSM): Manages the customer support lifecycle with a comprehensive array of tools, usually above and beyond what’s in a CRM suite.

      Customer Service Knowledge Management (CSKM): Advanced knowledgebase and resolution tools.

      Field Service Automation (FSA): Manages customer support tickets, schedules work orders, tracks inventory and fleets, all on the go.

      Info-Tech Insight

      CRM and point solution integration is critical. A best-of-breed product that poorly integrates with your CRM suite compromises the value generated by the combined solution, such as a 360-degree customer view. Challenge point solution vendors to demonstrate integration capabilities with CRM packages.

      Refer to your use cases to decide whether to add a dedicated point solution alongside your CRM suite

      Know your end state and what kind of tool will get you there. Refer to your strategic requirements to evaluate CRM and point solution feature sets.

      Standalone CRM Suite

      Sales Conditions: Need selling and lead management capabilities for agents to perform the sales process, along with sales dashboards and statistics.

      Marketing or Communication Conditions: Need basic campaign management and ability to refresh contact records with information from social networks.

      Member Service Conditions: Need to keep basic customer records with multiple fields per record and basic channels such as email and telephony.

      Add a Best-of-Breed or Point Solution

      Environmental Conditions: An extensive customer base with many different interactions per customer along with industry specific or “niche” needs. Point solutions will benefit firms with deep needs in specific feature areas (e.g. social media or field service).

      Sales Conditions: Lengthy sales process and account management requirements for assessing and managing opportunities – in a technically complex sales process.

      Marketing Conditions: Need social media functionality for monitoring and social property management.

      Customer Service Conditions: Need complex multi-channel service processes and/or need for best-of-breed knowledgebase and service content management.

      Info-Tech Insight

      The volume and complexity of both customers and interactions have a direct effect on when to employ just a CRM suite and when to supplement with a point solution. Check to see if your CRM suite can perform a specific business requirement before deciding to evaluate potential point solutions.

      Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications

      2.3.9 CXM Portfolio Designer

      The CXM Portfolio Designer features a set of questions geared toward understanding your needs for marketing, sales, and customer service enablement.

      These results are scored and used to suggest a comprehensive solution-level set of enterprise applications for CXM that can drive your application portfolio and help you make investment decisions in different areas such as CRM, marketing management, and customer intelligence.

      Sections of the tool:

      1. Introduction
      2. Customer Experience Management Questionnaire
      3. Business Unit Recommendations
      4. Enterprise-Level Recommendations

      INFO-TECH DELIVERABLE

      Understand the art of the possible and how emerging trends will affect your application portfolio (1)

      Cloud

      • The emergence and maturation of cloud technologies has broken down the barriers of software adoption.
      • Cloud has enabled easy-to-implement distributed sales centers for enterprises with global or highly fragmented workforces.
      • Cloud offers the agility, scalability, and flexibility needed to accommodate dynamic, evolving customer requirements while minimizing resourcing strain on IT and sales organizations.
      • It is now easier for small to medium enterprises to acquire and implement advanced sales capabilities to compete against larger competitors in a business environment where the need for business agility is key.
      • Although cost and resource reduction is a prominent view of the impact of cloud computing, it is also seen as an agile way to innovate and deliver a product/service experience that customers are looking for – the key to competitive differentiation.

      Mobile

      • Smartphones and other mobile devices were adopted faster than the worldwide web in the late 1990s, and the business and sales implications of widespread adoption cannot be ignored – mobile is changing how businesses operate.
        • Accenture’s Mobility Research Report states that 87% of companies in the study have been guided by a formal mobility strategy – either one that spans the enterprise or for specific business functions.
      • Mobile is now the first point of interaction with businesses. With this trend, gaining visibility into customer insights with mobile analytics is a top priority for organizations.
      • Enterprises need to develop and optimize mobile experiences for internal salespeople and customers alike as part of their sales strategy – use mobile to enable a competitive, differentiated sales force.
      • The use of mobile platforms by sales managers is becoming a norm. Sales enablement suites should support real-time performance metrics on mobile dashboards.

      Understand the art of the possible and how emerging trends will affect your application portfolio (2)

      Social

      • The rise of social networking brought customers together. Customers are now conversing with each other over a wide range of community channels that businesses neither own nor control.
        • The Power Shift: The use of social channels empowered customers to engage in real-time, unstructured conversations for the purpose of product/service evaluations. Those who are active in social environments come to wield considerable influence over the buying decisions of other prospects and customers.
      • Organizations need to identify the influencers and strategically engage them as well as developing an active presence in social communities that lead to sales.
      • Social media does have an impact on sales, both B2C and B2B. A study conducted in 2012 by Social Centered Selling states that 72.6% of sales people using social media as part of their sales process outperformed their peers and exceeded their quota 23% more often (see charts at right).

      The image shows two bar graphs, the one on top titled Achieving Quota: 2010-2012 and the one below titled Exceeding Quota: 2010-2012.

      (Social Centered Learning, n.d.)

      Understand the art of the possible and how emerging trends will affect your application portfolio (3)

      Internet of Things

      • Definition: The Internet of Things (IoT) is the network of physical objects accessed through the internet. These objects contain embedded technology to interact with internal states or the external environment.
      • Why is this interesting?
        • IoT will make it possible for everybody and everything to be connected at all times, processing information in real time. The result will be new ways of making business and sales decisions supported by the availability of information.
        • With ubiquitous connectivity, the current product design-centric view of consumers is changing to one of experience design that aims to characterize the customer relationship with a series of integrated interaction touchpoints.
        • The above change contributes to the shift in focus from experience and will mean further acceleration of the convergence of customer-centric business functions. IoT will blur the lines between marketing, sales, and customer service.
        • Products or systems linked to products are capable of self-operating, learning, updating, and correcting by analyzing real-time data.
        • Take for example, an inventory scale in a large warehouse connected to the company’s supply chain management (SCM) system. When a certain inventory weight threshold is reached due to outgoing shipments, the scale automatically sends out a purchase requisition to restock inventory levels to meet upcoming demand.
      • The IoT will eventually begin to transform existing business processes and force organizations to fundamentally rethink how they produce, operate, and service their customers.

      The image shows a graphic titled The Connected Life by 2020, and shows a number of statistics on use of connected devices over time.

      For categories covered by existing applications, determine the disposition for each app: grow it or cut it loose

      Use the two-by-two matrix below to structure your optimal CXM application portfolio. For more help, refer to Info-Tech’s blueprint, Use Agile Application Rationalization Instead of Going Big Bang.

      1

      0

      Richness of Functionality

      INTEGRATE RETAIN
      1
      REPLACE REPLACE OR ENHANCE

      0

      Degree of Integration

      Integrate: The application is functionally rich, so spend time and effort integrating it with other modules by building or enhancing interfaces.

      Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.

      Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g. through configuration or custom development), consider enhancement or replace it.

      Replace: The application neither offers the functionality sought nor is it integrated with other modules, and thus should be considered for replacement.

      Activity: Brainstorm the art of the possible, and build and finalize the CXM application portfolio

      2.3.10 1-2 hours

      Input

      • Process gaps identified (output of Activity 2.3.9)

      Output

      • CXM application portfolio
      • CXM Strategy Stakeholder Presentation

      Materials

      Participants

      • Project Team

      Instructions

      1. Review the complete list of strategic requirements identified in the preceding exercises, as well as business process maps.
      2. Identify which application would link to which process (e.g. customer acquisition, customer service resolution, etc.).
      3. Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications.
      4. Define rationalization and investment areas.
      5. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Brainstorming the Art of the Possible

      Application Gap Satisfied Related Process Number of Linked Requirements Do we have the system? Priority
      LMA
      • Lead Generation
      • Social Lead Management
      • CRM Integration
      Sales 8 No Business Critical
      Customer Intelligence
      • Web Analytics
      • Customer Journey Tracking
      Customer Service 6 Yes Business Enabling
      ... ... ... ... ... ...

      Use Info-Tech’s comprehensive reports to make granular vendor selection decisions

      Now that you have developed the CXM application portfolio and identified areas of new investment, you’re well positioned to execute specific vendor selection projects. After you have built out your initiatives roadmap in phase 3, the following reports provide in-depth vendor reviews, feature guides, and tools and templates to assist with selection and implementation.

      Info-Tech Insight

      Not all applications are created equally well for each use case. The vendor reports help you make informed procurement decisions by segmenting vendor capabilities among major use cases. The strategic requirements identified as part of this project should be used to select the use case that best fits your needs.

      If you want additional support, have our analyst guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.3.2; 2.3.3 Shortlist and map the key top-level business processes

      Based on experience working with organizations in similar verticals, the facilitator will help your team map out key sample workflows for marketing, sales, and customer service.

      2.3.6 Create your strategic requirements for CXM

      Drawing on the preceding exercises, the facilitator will work with the team to create a comprehensive list of strategic requirements that will be used to drive technology decisions and roadmap initiatives.

      2.3.10 Create and finalize the CXM application portfolio

      Using the strategic requirements gathered through internal, external, and technology analysis up to this point, a facilitator will assist you in assembling a categorical technology application portfolio to support CXM.

      Step 2.4: Develop Deployment Best Practices

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Develop a CXM integration map
      • Develop a mitigation plan for poor quality customer data
      • Create a framework for end-user adoption of CXM applications

      Outcomes:

      • CXM application portfolio integration map
      • Data quality preservation plan
      • End-user adoption plan

      Develop an integration map to specify which applications will interface with each other

      Integration is paramount: your CXM application portfolio must work as a unified face to the customer. Create an integration map to reflect a system of record and the exchange of data.

      • CRM
        • ERP
        • Telephony Systems (IVR, CTI)
        • Directory Services
        • Email
        • Content Management
        • Point Solutions (SMMP, MMS)

      The points of integration that you’ll need to establish must be based on the objectives and requirements that have informed the creation of the CXM application portfolio. For instance, achieving improved customer insights would necessitate a well-integrated portfolio with customer interaction point solutions, business intelligence tools, and customer data warehouses in order to draw the information necessary to build insight. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).

      Info-Tech Insight

      If the CXM application portfolio is fragmented, it will be nearly impossible to build a cohesive view of the customer and deliver a consistent customer experience. Points of integration (POIs) are the junctions between the applications that make up the CXM portfolio. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments. Be sure to include enterprise applications that are not included in the CXM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

      After identifying points of integration, profile them by business significance, complexity, and investment required

      • After enumerating points of integration between the CRM platform and other CXM applications and data sources, profile them by business significance and complexity required to determine a rank-ordering of priorities.
      • Points of integration that are of high business significance with low complexity are your must do’s – these are your quick wins that deliver maximum value without too much cost. This is typically the case when integrating a vendor-to-vendor solution with available native connectors.
      • On the opposite end of the spectrum are your POIs that will require extensive work to deliver but offer negligible value. These are your should not do’s – typically, these are niche requests for integration that will only benefit the workflows of a small (and low priority) group of end users. Only accommodate them if you have slack time and budget built into your implementation timeline.

      The image shows a square matrix with Point of Integration Value Matrix in the centre. On the X-axis is Business Significance, and on the Y-axis is POI complexity. In the upper left quadrant is Should Not Do, upper right is Should Do, lower left is Could Do, and lower right is Must do.

      "Find the absolute minimum number of ‘quick wins’ – the POIs you need from day one that are necessary to keep end users happy and deliver value." – Maria Cindric, Australian Catholic University Source: Interview

      Activity: Develop a CXM application integration map

      2.4.1 1 hour

      Input

      • CXM application portfolio (output of Activity 2.3.10)

      Output

      • CXM application portfolio integration map
      • CXM Strategy Stakeholder Presentation

      Materials

      • Sticky notes
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. On sticky notes, record the list of applications that comprise the CXM application portfolio (built in Activity 2.3.10) and all other relevant applications. Post the sticky notes on a whiteboard so you can visualize the portfolio.
      2. Discuss the key objectives and requirements that will drive the integration design of the CXM application portfolio.
      3. As deemed necessary by step 2, rearrange the sticky notes and draw connecting arrows between applications to reflect their integration. Allow the point of the arrow to indicate direction of data exchanges.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Mapping the Integration of CXM Applications

      The image shows several yellow rectangles with text in them, connected by arrows.

      Plug the hole and bail the boat – plan to be preventative and corrective with customer data quality initiatives

      Data quality is king: if your customer data is garbage in, it will be garbage out. Enable strategic CXM decision making with effective planning of data quality initiatives.

      Identify and Eliminate Dead Weight

      Poor data can originate in the firm’s system of record, which is typically the CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.

      Loose rules in the CRM system lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.

      • Conduct a data flow analysis: map the path that data takes through the organization.
      • Use a mass cleanup to identify and destroy dead weight data. Merge duplicates either manually or with the aid of software tools. Delete incomplete data, taking care to reassign related data.
      • COTS packages typically allow power users to merge records without creating orphaned records in related tables, but custom-built applications typically require IT expertise.

      Create and Enforce Standards & Policies

      Now that the data has been cleaned, protect the system from relapsing.

      Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.

      • Truncated data is usually caused by mismatches in data structures during either one-time data loads or ongoing data integrations.
      • Don’t go overboard on assigning required fields – users will just put key data in note fields.
      • Discourage the use of unstructured note fields: the data is effectively lost unless it gets subpoenaed.
      • To specify policies, use Info-Tech’s Master Data Record Tool.

      Profile your customer and sales-related data

      Applications are a critical component of how IT supports Sales, but IT also needs to help Sales keep its data current and accurate. Conducting a sales data audit is critical to ensure Sales has the right information at the right time.

      Info-Tech Insight

      Data is king. More than ever, having accurate data is essential for your organization to win in hyper-competitive marketplaces. Prudent current state analysis looks at both the overall data model and data architecture, as well as assessing data quality within critical sales-related repositories. As the amount of customer data grows exponentially due to the rise of mobility and the Internet of Things, you must have a forward-looking data model and data marts/customer data warehouse to support sales-relevant decisions.

      • A current state analysis for sales data follows a multi-step process:
        • Determine the location of all sales-relevant and customer data – the sales data inventory. Data can reside in applications, warehouses, and documents (e.g. Excel and Access files) – be sure to take a holistic approach.
      • For each data source, assess data quality across the following categories:
        • Completeness
        • Currency (Relevancy)
        • Correctness
        • Duplication
      • After assessing data quality, determine which repositories need the most attention by IT and Sales. We will look at opportunities for data consolidation later in the blueprint.

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Develop a Master Data Management Strategy and Roadmap blueprint for further reference and assistance in data management for your sales-IT alignment.

      Activity: Develop a mitigation plan for poor quality customer data

      2.4.2 30 minutes

      Input

      • List of departments involved in maintenance of CXM data

      Output

      • Data quality preservation plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory a list of departments that will be interacting directly with CXM data.
      2. Identify data quality cleansing and preservation initiatives, such as those in previous examples.
      3. Assign accountability to an individual in the department as a data steward. When deciding on a data steward, consider the following:
      • Data stewards are designated full-time employees who serve as the go-to resource for all issues pertaining to data quality, including keeping a particular data silo clean and free of errors.
      • Data stewards are typically mid-level managers in the business (not IT), preferably with an interest in improving data quality and a relatively high degree of tech-savviness.
      • Data stewards can sometimes be created as a new role with a dedicated FTE, but this is not usually cost effective for small and mid-sized firms.
      • Instead, diffuse the steward role across several existing positions, including one for CRM and other marketing, sales, and service applications.
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Example: Data Steward Structure

      Department A

      • Data Steward (CRM)
      • Data Steward (ERP)

      Department B

      • Data Steward (All)

      Department C

      • Data Steward (All)

      Determine if a customer data warehouse will add value to your CXM technology-enablement strategy

      A customer data warehouse (CDW) “is a subject-oriented, integrated, time-variant, non-volatile collection of data used to support the strategic decision-making process across marketing, sales, and service. It is the central point of data integration for customer intelligence and is the source of data for the data marts, delivering a common view of customer data” (Corporate Information Factory, n.d.).

      Analogy

      CDWs are like a buffet. All the food items are in the buffet. Likewise, your corporate data sources are centralized into one repository. There are so many food items in a buffet that you may need to organize them into separate food stations (data marts) for easier access.

      Examples/Use Cases

      • Time series analyses with historical data
      • Enterprise level, common view analyses
      • Integrated, comprehensive customer profiles
      • One-stop repository of all corporate information

      Pros

      • Top-down architectural planning
      • Subject areas are integrated
      • Time-variant, changes to the data are tracked
      • Non-volatile, data is never over-written or deleted

      Cons

      • A massive amount of corporate information
      • Slower delivery
      • Changes are harder to make
      • Data format is not very business friendly

      Activity: Assess the need for a customer data warehouse

      2.4.3. 30 minutes

      Input

      • List of data sources
      • Data inflows and outflows

      Output

      • Data quality preservation plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Create a shortlist of customer data sources.
      2. Profile the integration points that are necessary to support inflows and outflows of customer data.
      3. Ask the following questions around the need for a CDW based on these data sources and points of integration:
      • What is the volume of customer information that needs to be stored? The greater the capacity, the more likely that you should build a dedicated CDW.
      • How complex is the data? The more complex the data, the greater the need for a CDW.
      • How often will data interchange happen between various applications and data sources? The greater and more frequent the interchange, the greater the need for a CDW.
      • What are your organizational capabilities for building a CDW? Do you have the resources in-house to create a CDW at this time?
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Build an Agile Data Warehouse blueprint for more information on building a centralized and integrated data warehouse.

      Create a plan for end-user training on new (or refocused) CXM applications and data quality processes

      All training modules will be different, but some will have overlapping areas of interest.

      – Assign Project Evangelists – Analytics Training – Mobile Training

      Application Training

      • Customer Service - Assign Project Evangelists – Analytics Training – Mobile Training
        • Focus training on:
          • What to do with inbound tickets.
          • Routing and escalation features.
          • How to use knowledge management features effectively.
          • Call center capabilities.
      • Sales – Assign Project Evangelists – Analytics Training – Mobile Training
        • Focus training on:
          • Recording of opportunities, leads, and deals.
          • How to maximize sales with sales support decision tree.
      • Marketing - Assign Project Evangelists – Analytics Training
        • Focus training on:
          • Campaign management features.
          • Social media monitoring and engagement capabilities.
      • IT
        • Focus training on:
          • Familiarization with the software.
          • Software integration with other enterprise applications.
          • The technical support needed to maintain the system in the future.

      Info-Tech Insight

      Train customers too. Keep the customer-facing sales portals simple and intuitive, have clear explanations/instructions under important functions (e.g. brief directions on how to initiate service inquiries), and provide examples of proper uses (e.g. effective searches). Make sure customers are aware of escalation options available to them if self-service falls short.

      Ensure adoption with a formal communication process to keep departments apprised of new application rollouts

      The team leading the rollout of new initiatives (be they applications, new governance structures, or data quality procedures) should establish a communication process to ensure management and users are well informed.

      CXM-related department groups or designated trainers should take the lead and implement a process for:

      • Scheduling application platform/process rollout/kick-off meetings.
      • Soliciting preliminary input from the attending groups to develop further training plans.
      • Establishing communication paths and the key communication agents from each department who are responsible for keeping lines open moving forward.

      The overall objective for inter-departmental kick-off meetings is to confirm that all parties agree on certain key points and understand alignment rationale and new sales app or process functionality.

      The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.

      The kick-off meeting(s) should encompass:

      • Target business-user requirements
      • The high-level application overview
      • Tangible business benefits of alignment
      • Special consideration needs
      • Other IT department needs
      • Target quality of service (QoS) metrics

      Info-Tech Insight

      Determine who in each department will send out a message about initiative implementation, the tone of the message, the medium, and the delivery date.

      Construct a formal communication plan to engage stakeholders through structured channels

      Tangible Elements of a Communications Plan

      • Stakeholder Group Name
      • Stakeholder Description
      • Message
      • Concerns Relative to Application Maintenance
      • Communication Medium
      • Role Responsible for Communication
      • Frequency
      • Start and End Date

      Intangible Elements of a Communications Plan

      • Establish biweekly meetings with representatives from sales functional groups, who are tasked with reporting on:
        • Benefits of revised processes
        • Metrics of success
        • Resource restructuring
      • Establish a monthly interdepartmental meeting, where all representatives from sales and IT leadership discuss pressing bug fixes and minor process improvements.
      • Create a webinar series, complete with Q&A, so that stakeholders can reference these changes at their leisure.

      Info-Tech Insight

      Every piece of information that you give to a stakeholder that is not directly relevant to their interests is a distraction from your core message. Always remember to tailor the message, medium, and timing accordingly.

      Carry the CXM value forward with linkage and relationships between sales, marketing, service, and IT

      Once the sales-IT alignment committees have been formed, create organizational cadence through a variety of formal and informal gatherings between the two business functions.

      • Organizations typically fall in one of three maturity stages: isolation, collaboration, or synergy. Strive to achieve business-technology synergy at the operational level.
      • Although collaboration cannot be mandated, it can be facilitated. Start with a simple gauge of the two functions’ satisfaction with each other, and determine where and how inter-functional communication and synergy can be constructed.

      Isolation

      The image shows four shapes, with the words IT, Sales, Customer Service, and Marketing in them.

      • Point solutions are implemented on an ad-hoc basis by individual departments for specific projects.
      • Internal IT is rarely involved in these projects from beginning to end.

      Collaboration

      The image features that same four shapes and text from the previous image, but this time they are connected by dotted lines.

      • There is a formal cross-departmental effort to integrate some point solutions.
      • Internal IT gets involved to integrate systems and then support system interactions.

      Synergy

      The image features the same shapes and text from previous instances, except the shapes are now connect by solid lines and the entire image is surrounded by dotted lines.

      • Cross-functional, business technology teams are established to work on IT-enabled revenue generation initiatives.
      • Team members are collocated if possible.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.4.1 Develop a CXM application integration map

      Using the inventory of existing CXM-supporting applications and the newly formed CXM application portfolio as inputs, your facilitator will assist you in creating an integration map of applications to establish a system of record and flow of data.

      2.4.2 Develop a mitigation plan for poor quality customer data

      Our facilitator will educate your stakeholders on the importance of quality data and guide you through the creation of a mitigation plan for data preservation.

      2.4.3 Assess the need for a customer data warehouse

      Addressing important factors such as data volume, complexity, and flow, a facilitator will help you assess whether or not a customer data warehouse for CXM is the right fit for your organization.

      Phase 3

      Finalize the CXM Framework

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Finalize the CXM Framework

      Proposed Time to Completion: 1 week

      Step 3.1: Create an Initiative Rollout Plan

      Start with an analyst kick-off call:

      • Discuss strategic requirements and the associated application portfolio that has been proposed.

      Then complete these activities…

      • Initiatives prioritization

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Step 3.2: Confirm and Finalize the CXM Blueprint

      Review findings with analyst:

      • Discuss roadmap and next steps in terms of rationalizing and implementing specific technology-centric initiatives or rollouts.

      Then complete these activities…

      • Confirm stakeholder strategy presentation

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Phase 3 Results & Insights:

      • Initiatives roadmap

      Step 3.1: Create an Initiative Rollout Plan

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Create a risk management plan
      • Brainstorm initiatives for CXM roadmap
      • Identify dependencies and enabling projects for your CXM roadmap
      • Complete the CXM roadmap

      Outcomes:

      • Risk management plan
      • CXM roadmap
        • Quick-win initiatives

      A CXM technology-enablement roadmap will provide smooth and timely implementation of your apps/initiatives

      Creating a comprehensive CXM strategy roadmap reduces the risk of rework, misallocation of resources, and project delays or abandonment.

      • People
      • Processes
      • Technology
      • Timeline
      • Tasks
      • Budget

      Benefits of a Roadmap

      1. Prioritize execution of initiatives in alignment with business, IT, and needs.
      2. Create clearly defined roles and responsibilities for IT and business stakeholders.
      3. Establish clear timelines for rollout of initiatives.
      4. Identify key functional areas and processes.
      5. Highlight dependencies and prerequisites for successful deployment.
      6. Reduce the risk of rework due to poor execution.

      Implement planning and controls for project execution

      Risk Management

      • Track risks associated with your CXM project.
      • Assign owners and create plans for resolving open risks.
      • Identify risks associated with related projects.
      • Create a plan for effectively communicating project risks.

      Change Management

      • Brainstorm a high-level training plan for various users of the CXM.
      • Create a communication plan to notify stakeholders and impacted users about the tool and how it will alter their workday and performance of role activities.
      • Establish a formal change management process that is flexible enough to meet the demands for change.

      Project Management

      • Conduct a post-mortem to evaluate the completion of the CXM strategy.
      • Design the project management process to be adaptive in nature.
      • Communication is key to project success, whether it is to external stakeholders or internal project team members..
      • Review the project’s performance against metrics and expectations.

      INFO-TECH OPPORTUNITIES

      Optimize the Change Management Process

      You need to design a process that is flexible enough to meet demand for change and strict enough to protect the live environment from change-related incidents.

      Create Project Management Success

      Investing time up front to plan the project and implementing best practices during project execution to ensure the project is delivered with the planned outcome and quality is critical to project success.

      Activity: Create a risk management plan

      3.1.1 45 minutes

      Input

      • Inventory of risks

      Output

      • Risk management plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Create a list of possible risks that may hamper the progress of your CXM project.
      2. Classify risks as strategy-based, related to planning, or systems-based, related to technology.
      3. Brainstorm mitigation strategies to overcome each listed risk.
      4. On a score of 1 to 3, determine the impact of each risk on the success of the project.
      5. On a score of 1 to 3, determine the likelihood of the occurrence for each risk.
      6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Constructing a Risk Management Plan

      Risk Impact Likelihood Mitigation Effort
      Strategy Risks Project over budget
      • Detailed project plan
      • Pricing guarantees
      Inadequate content governance
      System Risks Integration with additional systems
      • Develop integration plan and begin testing integration methods early in the project
      .... ... ... ...

      Likelihood

      1 – High/ Needs Focus

      2 – Can Be Mitigated

      3 - Unlikely

      Impact

      1 - High Risk

      2 - Moderate Risk

      3 - Minimal Risk

      Prepare contingency plans to minimize time spent handling unexpected risks

      Understanding technical and strategic risks can help you establish contingency measures to reduce the likelihood that risks will occur. Devise mitigation strategies to help offset the impact of risks if contingency measures are not enough.

      Remember

      The biggest sources of risk in a CXM strategy are lack of planning, poorly defined requirements, and lack of governance.

      Apply the following mitigation tips to avoid pitfalls and delays.

      Risk Mitigation Tips

      • Upfront planning
      • Realistic timelines
      • Resource support
      • Change management
      • Executive sponsorship
      • Sufficient funding
      • Expectation setting
      1. Project Starts
      • Expectations are high
    • Project Workload Increases
      • Expectations are high
    • Pit of Despair
      • Why are we doing this?
    • Project Nears Close
      • Benefits are being realized
    • Implementation is Completed
      • Learning curve dip
    • Standardization & Optimization
      • Benefits are high
    • Identify factors to complete your CXM initiatives roadmap

      Completion of initiatives for your CXM project will be contingent upon multiple variables.

      Defining Dependencies

      Initiative complexity will define the need for enabling projects. Create a process to define dependencies:

      1. Enabling projects: complex prerequisites.
      2. Preceding tasks: direct and simplified assignments.

      Establishing a Timeline

      • Assign realistic timelines for each initiative to ensure smooth progress.
      • Use milestones and stage gates to track the progress of your initiatives and tasks.

      Defining Importance

      • Based on requirements gathering, identify the importance of each initiative to your marketing department.
      • Each initiative can be ranked high, medium, or low.

      Assigning Ownership

      • Owners are responsible for on-time completion of their assigned initiatives.
      • Populate a RACI chart to ensure coverage of all initiatives.

      Complex....Initiative

      • Enabling Project
        • Preceding Task
        • Preceding Task
      • Enabling Project
        • Preceding Task
        • Preceding Task

      Simple....Initiative

      • Preceding Task
      • Preceding Task
      • Preceding Task

      Activity: Brainstorm CXM application initiatives for implementation in alignment with business needs

      3.1.2 45 minutes

      Input

      • Inventory of CXM initiatives

      Output

      • Prioritized and quick-win initiatives
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. As a team, identify and list CXM initiatives that need to be addressed.
      2. Plot the initiatives on the complexity-value matrix to determine priority.
      3. Identify quick wins: initiatives that can realize quick benefits with little effort.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Importance-Capability Matrix

      The image shows a matrix, with Initiative Complexity on the X-axis, and Business Value on the Y-axis. There are circle of different sizes in the matrix.

      Pinpoint quick wins: high importance, low effort initiatives.

      The size of each plotted initiative must indicate the effort or the complexity and time required to complete.
      Top Right Quadrant Strategic Projects
      Top Left Quadrant Quick Wins
      Bottom Right Quadrant Risky Bets
      Bottom Left Quadrant Discretionary Projects

      Activity: Identify any dependencies or enabling projects for your CXM roadmap

      3.1.3 1 hour

      Input

      • Implementation initiatives
      • Dependencies

      Output

      • CXM project dependencies

      Materials

      • Sticky notes
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Using sticky notes and a whiteboard, have each team member rank the compiled initiatives in terms of priority.
      2. Determine preceding tasks or enabling projects that each initiative is dependent upon.
      3. Determine realistic timelines to complete each quick win, enabling project, and long-term initiative.
      4. Assign an owner for each initiative.

      Example: Project Dependencies

      Initiative: Omnichannel E-Commerce

      Dependency: WEM Suite Deployment; CRM Suite Deployment; Order Fulfillment Capabilities

      Activity: Complete the implementation roadmap

      3.1.4 30 minutes

      Input

      • Implementation initiatives
      • Dependencies

      Output

      • CXM Roadmap
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Establish time frames to highlight enabling projects, quick wins, and long-term initiatives.
      2. Indicate the importance of each initiative as high, medium, or low based on the output in Activity 3.1.2.
      3. Assign each initiative to a member of the project team. Each owner will be responsible for the execution of a given initiative as planned.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Importance-Capability Matrix

      Importance Initiative Owner Completion Date
      Example Projects High Gather business requirements. Project Manager MM/DD/YYYY
      Quick Wins
      Long Term Medium Implement e-commerce across all sites. CFO & Web Manager MM/DD/YYYY

      Importance

      • High
      • Medium
      • Low

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Create a risk management plan

      Based on the workshop exercises, the facilitator will work with the core team to design a priority-based risk mitigation plan that enumerates the most salient risks to the CXM project and addresses them.

      3.1.2; 3.1.3; 3.1.4 Identify initiative dependencies and create the CXM roadmap

      After identifying dependencies, our facilitators will work with your IT SMEs and business stakeholders to create a comprehensive roadmap, outlining the initiatives needed to carry out your CXM strategy roadmap.

      Step 3.2: Confirm and Finalize the CXM Blueprint

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Identify success metrics
      • Create a stakeholder power map
      • Create a stakeholder communication plan
      • Complete and present CXM strategy stakeholder presentation

      Outcomes:

      • Stakeholder communication plan
      • CXM strategy stakeholder presentation

      Ensure that your CXM applications are improving the performance of targeted processes by establishing metrics

      Key Performance Indicators (KPIs)

      Key performance indicators (KPIs) are quantifiable measures that demonstrate the effectiveness of a process and its ability to meet business objectives.

      Questions to Ask

      1. What outputs of the process can be used to measure success?
      2. How do you measure process efficiency and effectiveness?

      Creating KPIs

      Specific

      Measurable

      Achievable

      Realistic

      Time-bound

      Follow the SMART methodology when developing KPIs for each process.

      Adhering to this methodology is a key component of the Lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.

      Info-Tech Insight

      Metrics are essential to your ability to measure and communicate the success of the CXM strategy to the business. Speak the same language as the business and choose metrics that relate to marketing, sales, and customer service objectives.

      Activity: Identify metrics to communicate process success

      3.2.1 1 hour

      Input

      • Key organizational objectives

      Output

      • Strategic business metrics
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Recap the major functions that CXM will focus on (e.g. marketing, sales, customer service, web experience management, social media management, etc.)
      2. Identify business metrics that reflect organizational objectives for each function.
      3. Establish goals for each metric (as exemplified below).
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.
      5. Communicate the chosen metrics and the respective goals to stakeholders.

      Example: Metrics for Marketing, Sales, and Customer Service Functions

      Metric Example
      Marketing Customer acquisition cost X% decrease in costs relating to advertising spend
      Ratio of lifetime customer value X% decrease in customer churn
      Marketing originated customer % X% increase in % of customer acquisition driven by marketing
      Sales Conversion rate X% increase conversion of lead to sale
      Lead response time X% decrease in response time per lead
      Opportunity-to-win ratio X% increase in monthly/annual opportunity-to-win ratio
      Customer Service First response time X% decreased time it takes for customer to receive first response
      Time-to-resolution X% decrease of average time-to-resolution
      Customer satisfaction X% improvement of customer satisfaction ratings on immediate feedback survey

      Use Info-Tech’s Stakeholder Power Map Template to identify stakeholders crucial to CXM application rollouts

      3.2.2 Stakeholder Power Map Template

      Use this template and its power map to help visualize the importance of various stakeholders and their concerns. Prioritize your time according to the most powerful and most impacted stakeholders.

      Answer questions about each stakeholder:

      • Power: How much influence does the stakeholder have? Enough to drive the project forward or into the ground?
      • Involvement: How interested is the stakeholder? How involved is the stakeholder in the project already?
      • Impact: To what degree will the stakeholder be impacted? Will this significantly change how they do their job?
      • Support: Is the stakeholder a supporter of the project? Neutral? A resistor?

      Focus on key players: relevant stakeholders who have high power, should have high involvement, and are highly impacted.

      INFO-TECH DELIVERABLE

      Stakeholder Power Map Template

      Use Info-Tech’s Stakeholder Communication Planning Template to document initiatives and track communication

      3.2.3 Stakeholder Communication Planning Template

      Use the Stakeholder Communication Planning Template to document your list of initiative stakeholders so you can track them and plan communication throughout the initiative.

      Track the communication methods needed to convey information regarding CXM initiatives. Communicate how a specific initiative will impact the way employees work and the work they do.

      Sections of the document:

      1. Document the Stakeholder Power Map (output of Tool 3.2.2).
      2. Complete the Communicate Management Plan to aid in the planning and tracking of communication and training.

      INFO-TECH DELIVERABLE

      Activity: Create a stakeholder power map and communication plan

      3.2.4 1 hour

      Input

      • Stakeholder power map

      Output

      • Stakeholder communication plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech’s Stakeholder Communication Planning Template
      • Info-Tech’s Stakeholder Power Map Template

      Participants

      • Project Team

      Instructions

      1. Using Info-Tech’s Stakeholder Power Map Template, identify key stakeholders for ensuring the success of the CXM strategy (Tool 3.2.2).
      2. Using Info-Tech’s Stakeholder Communication Plan Template, construct a communication plan to communicate and track CXM initiatives with all CXM stakeholders (Tool 3.2.3).
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Use Info-Tech’s CXM Strategy Stakeholder Presentation Template to sell your CXM strategy to the business

      3.2.5 CXM Strategy Stakeholder Presentation Template

      Complete the presentation template as indicated when you see the green icon throughout this deck. Include the outputs of all activities that are marked with this icon.

      Info-Tech has designed the CXM Strategy Stakeholder Presentation Template to capture the most critical aspects of the CXM strategy. Customize it to best convey your message to project stakeholders and to suit your organization.

      The presentation should be no longer than one hour. However, additional slides can be added at the discretion of the presenter. Make sure there is adequate time for a question and answer period.

      INFO-TECH DELIVERABLE

      After the presentation, email the deck to stakeholders to ensure they have it available for their own reference.

      Activity: Determine the measured value received from the project

      3.2.6 30 minutes

      Input

      • Project Metrics

      Output

      • Measured Value Calculation

      Materials

      • Workbook

      Participants

      • Project Team

      Instructions

      1. Review project metrics identified in phase 1 and associated benchmarks.
      2. After executing the CXM project, compare metrics that were identified in the benchmarks with the revised and assess the delta.
      3. Calculate the percentage change and quantify dollar impact (i.e. as a result of increased customer acquisition or retention).

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2.4 Create a stakeholder power map and communication plan

      An analyst will walk the project team through the creation of a communication plan, inclusive of project metrics and their respective goals. If you are planning a variety of CXM initiatives, track how the change will be communicated and to whom. Determine the employees who will be impacted by the change.

      Insight breakdown

      Insight 1

      • IT must work in lockstep with Marketing, Sales, and Customer Service to develop a comprehensive technology-enablement strategy for CXM.
      • As IT works with its stakeholders in the business, it must endeavor to capture and use the voice of the customer in driving strategic requirements for CXM portfolio design.
      • IT must consider the external environment, customer personas, and internal processes as it designs strategic requirements to build the CXM application portfolio.

      Insight 2

      • The cloud is bringing significant disruption to the CXM space: to maintain relevancy, IT must become deeply involved in ensuring alignment between vendor capabilities and strategic requirements.
      • IT must serve as a trusted advisor on technical implementation challenges related to CXM, such as data quality, integration, and end-user training and adoption.
      • IT is responsible for technology enablement and is an indispensable partner in this regard; however, the business must ultimately own the objectives and communication strategy for customer engagement.

      Insight 3

      • When crafting a portfolio for CXM, be aware of the art of the possible: capabilities are rapidly merging and evolving to support new interaction channels. Social, mobile, and IoT are disrupting the customer experience landscape.
      • Big data and analytics-driven decision making is another significant area of value. IT must allow for true customer intelligence by providing an integration framework across customer-facing applications.

      Summary of accomplishment

      Knowledge Gained

      • Voice of the Customer for CXM Portfolio Design
      • Understanding of Strategic Requirements for CXM
      • Customer Personas and Scenarios
      • Environmental Scan
      • Deployment Considerations
      • Initiatives Roadmap Considerations

      Processes Optimized

      • CXM Technology Portfolio Design
      • Customer Data Quality Processes
      • CXM Integrations

      Deliverables Completed

      • Strategic Summary for CXM
      • CXM Project Charter
      • Customer Personas
      • External and Competitive Analysis
      • CXM Application Portfolio

      Bibliography

      Accenture Digital. “Growing the Digital Business: Accenture Mobility Research 2015.” Accenture. 2015. Web.

      Afshar, Vala. “50 Important Customer Experience Stats for Business Leaders.” Huffington Post. 15 Oct. 2015. Web.

      APQC. “Marketing and Sales Definitions and Key Measures.” APQC’s Process Classification Framework, Version 1.0.0. APQC. Mar. 2011. Web.

      CX Network. “The Evolution of Customer Experience in 2015.” Customer Experience Network. 2015. Web.

      Genesys. “State of Customer Experience Research”. Genesys. 2018. Web.

      Harvard Business Review and SAS. “Lessons From the Leading Edge of Customer Experience Management.” Harvard Business School Publishing. 2014. Web.

      Help Scout. “75 Customer Service Facts, Quotes & Statistics.” Help Scout. n.d. Web.

      Inmon Consulting Services. “Corporate Information Factory (CIF) Overview.” Corporate Information Factory. n.d. Web

      Jurevicius, Ovidijus. “VRIO Framework.” Strategic Management Insight. 21 Oct. 2013. Web.

      Keenan, Jim, and Barbara Giamanco. “Social Media and Sales Quota.” A Sales Guy Consulting and Social Centered Selling. n.d. Web.

      Malik, Om. “Internet of Things Will Have 24 Billion Devices by 2020.” Gigaom. 13 Oct. 2011. Web.

      McGovern, Michele. “Customers Want More: 5 New Expectations You Must Meet Now.” Customer Experience Insight. 30 July 2015. Web.

      McGinnis, Devon. “40 Customer Service Statistics to Move Your Business Forward.” Salesforce Blog. 1 May 2019. Web.

      Bibliography

      Reichheld, Fred. “Prescription for Cutting Costs”. Bain & Company. n.d. Web.

      Retail Congress Asia Pacific. “SAP – Burberry Makes Shopping Personal.” Retail Congress Asia Pacific. 2017. Web.

      Rouse, Margaret. “Omnichannel Definition.” TechTarget. Feb. 2014. Web.

      Salesforce Research. “Customer Expectations Hit All-Time High.” Salesforce Research. 2018. Web.

      Satell, Greg. “A Look Back at Why Blockbuster Really Failed and Why It Didn’t Have To.” Forbes. 5 Sept. 2014. Web.

      Social Centered Learning. “Social Media and Sales Quota: The Impact of Social Media on Sales Quota and Corporate Review.” Social Centered Learning. n.d. Web.

      Varner, Scott. “Economic Impact of Experience Management”. Qualtrics/Forrester. 16 Aug. 2017. Web.

      Wesson, Matt. “How to Use Your Customer Data Like Amazon.” Salesforce Pardot Blog. 27 Aug. 2012. Web.

      Winterberry Group. “Taking Cues From the Customer: ‘Omnichannel’ and the Drive For Audience Engagement.” Winterberry Group LLC. June 2013. Web.

      Wollan, Robert, and Saideep Raj. “How CIOs Can Support a More Agile Sales Organization.” The Wall Street Journal: The CIO Report. 25 July 2013. Web.

      Zendesk. “The Impact of Customer Service on Customer Lifetime Value 2013.” Z Library. n.d. Web.

      Develop an IT Asset Management Strategy

      • Buy Link or Shortcode: {j2store}295|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $52,211 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.

      Our Advice

      Critical Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Impact and Result

      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Develop an IT Asset Management Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop an IT Asset Management Strategy – A methodology to create a business-aligned, coherent, and durable approach to ITAM.

      This two-phase, step-by-step methodology will guide you through the activities to build a business-aligned, coherent, and durable approach to ITAM. Review the executive brief at the start of the slide deck for an overview of the methodology and the value it can provide to your organization.

      • Develop an IT Asset Management Strategy – Phases 1-2

      2. ITAM Strategy Template – A presentation-ready repository for the work done as you define your ITAM approach.

      Use this template to document your IT asset management strategy and approach.

      • ITAM Strategy Template

      3. IT Asset Estimations Tracker – A rough-and-ready inventory exercise to help you evaluate the work ahead of you.

      Use this tool to estimate key data points related to your IT asset estate, as well as your confidence in your estimates.

      • IT Asset Estimations Tracker

      Infographic

      Workshop: Develop an IT Asset Management Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify ITAM Priorities & Goals, Maturity, Metrics and KPIs

      The Purpose

      Align key stakeholders to the potential strategic value of the IT asset management practice.

      Ensure the ITAM practice is focused on business-aligned goals.

      Key Benefits Achieved

      Define a business-aligned direction and expected outcomes for your ITAM program.

      Activities

      1.1 Brainstorm ITAM opportunities and challenges.

      1.2 Conduct an executive alignment working session.

      1.3 Set ITAM priorities, goals and tactics.

      1.4 Identify target and current state ITAM maturity.

      Outputs

      ITAM opportunities and challenges

      Align executive priorities with ITAM opportunities.

      ITAM metrics and KPIs

      ITAM maturity

      2 Identify Your Approach to Support ITAM Priorities and Goals

      The Purpose

      Translate goals into specific and coherent actions to enable your ITAM practice to deliver business value.

      Key Benefits Achieved

      A business-aligned approach to ITAM, encompassing scope, structure, tools, audits, budgets, documentation and more.

      A high-level roadmap to achieve your vision for the ITAM practice.

      Activities

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Outputs

      Your ITAM approach

      ITAM roadmap and communication plan

      Further reading

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      Table of Contents

      4 Analyst Perspective

      5 Executive Summary

      17 Phase 1: Establish Business-Aligned ITAM Goals and Priorities

      59 Phase 2: Support ITAM Goals and Priorities

      116 Bibliography

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      EXECUTIVE BRIEF

      Analyst Perspective

      Track hardware and software. Seems easy, right?

      It’s often taken for granted that IT can easily and accurately provide definitive answers to questions like “how many laptops do we have at Site 1?” or “do we have the right number of SQL licenses?” or “how much do we need to budget for device replacements next year?” After all, don’t we know what we have?

      IT can’t easily provide these answers because to do so you must track hardware and software throughout its lifecycle – which is not easy. And unfortunately, you often need to respond to these questions on very short notice because of an audit or to support a budgeting exercise.

      IT Asset Management (ITAM) is the solution. It’s not a new solution – the discipline has been around for decades. But the key to success is to deploy the practice in a way that is sustainable, right-sized, and maximizes value.

      Use our practical methodology to develop and document your approach to ITAM that is aligned with the goals of your organization.

      Photo of Andrew Sharp, Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Andrew Sharp
      Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Realize the value of asset management

      Cost optimization, application rationalization and reduction of technical debt are all considered valuable to right-size spending and improve service outcomes. Without access to accurate data, these activities require significant investments of time and effort, starting with creation of point-in-time inventories, which lengthens the timeline to reaching project value and may still not be accurate.

      Cost optimization and reduction of technical debt should be part of your culture and technical roadmap rather than one-off projects. Why? Access to accurate information enables the organization to quickly make decisions and pivot plans as needed. Through asset management, ongoing harvest and redeployment of assets improves utilization-to-spend ratios. We would never see any organization saying, “We’ve closed our year end books, let’s fire the accountants,” but often see this valuable service relegated to the back burner. Similar to the philosophy that “the best time to plant a tree is 20 years ago and the next best time is now,” the sooner you can start to collect, validate, and analyze data, the sooner you will find value in it.

      Photo of Sandi Conrad, Principal Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Sandi Conrad
      Principal Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.
      Common Obstacles

      It is challenging to make needed changes because:

      • There’s cultural resistance to asset tracking, it’s seen as busywork that doesn’t clearly create value.
      • Decentralized IT teams aren’t generating the data required to track hardware and licenses.
      • ITAM can’t direct needed tool improvements because the admins don’t report to ITAM.
      • It’s hard to find time to improve processes given the day-to-day demands on your time.
      Info-Tech’s Approach
      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Info-Tech Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Unlock business value with IT asset management

      • IT asset management (ITAM) is the practice of maintaining accurate, accessible, and actionable data on the assets within the organization’s IT estate. Each IT asset will have a record that tracks it across its lifecycle from purchase to disposal.
      • ITAM’s value is realized through other processes and practice areas that can leverage ITAM data to manage risk, improve IT services, and control costs.
      • Develop an approach to ITAM that maximizes the value delivered to the business and IT. ITAM succeeds when its partners succeed at delivering business value, and it fails when it doesn’t show value to those partners.

      This blueprint will help you develop your approach for the management of IT hardware and software, including cloud services. Leverage other Info-Tech methodologies to dive directly into developing hardware asset management procedures, software asset management procedures, or to implement configuration management best practices.

      Info-Tech Members report significant savings from implementing our hardware and software asset management frameworks. In order to maximize value from the process-focused methodologies below, develop your ITAM strategy first.

      Implement Hardware Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.6/10

      $23k

      32

      Overall Impact Average $ Saved Average Days Saved
      Implement Software Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.0/10

      $12k

      5

      Overall Impact Average $ Saved Average Days Saved

      ITAM provides both early and ongoing value

      ITAM isn’t one-and-done. Properly supported, your ITAM practice will deliver up-front value that will help demonstrate the value ongoing ITAM can offer through the maintenance of an accurate, accessible, and actionable ITAM database.

      Example: Software Savings from ITAM



      This chart shows the money saved between the first quote and the final price for software and maintenance by a five-person ITAM team. Over a year and a half, they saved their organization a total of $7.5 million from a first quote total of $21 million over that period.

      This is a perfect example of the direct value that ITAM can provide on an ongoing basis to the organization, when properly supported and integrated with IT and the business.

      Examples of up-front value delivered in the first year of the ITAM practice:

      • Save money by reviewing and renegotiating critical, high-spend, and undermanaged software and service contracts.
      • Redeploy or dispose of clearly unused hardware and software.
      • Develop and enforce standards for basic hardware and software.
      • Improve ITAM data quality and build trust in the results.

      Examples of long-term value from ongoing governance, management, and operational ITAM activities:

      • Optimize spend: Reallocate unused hardware and software, end unneeded service agreements, and manage renewals and audits.
      • Reduce risk: Provide comprehensive asset data for security controls development and incident management; manage equipment disposal.
      • Improve IT service: Support incident, problem, request, and change management with ITAM data. Develop new solutions with an understanding of what you have already.

      Common obstacles

      The rulebook is available, but hard to follow
      • ITAM takes a village, but stakeholders aren’t aware of their role. ITAM processes rely on technicians to update asset records, vendors to supply asset data, administrators to manage tools, leadership to provide direction and support, and more.
      • Constant change in the IT and business environment undermines the accuracy of ITAM records (e.g. licensing and contract changes, technology changes that break discovery tools, personnel and organizational changes).
      • Improvement efforts are overwhelmed by day-to-day activities. One study found that 83% of SAM teams’ time is consumed by audit-related activities. (Flexera State of ITAM Report 2022) A lack of improvement becomes a vicious cycle when stakeholders who don’t see the value of ITAM decline to dedicate resources for improvement.
      • Stakeholders expect ITAM tools to be a cure-all, but even at their best, they can’t provide needed answers without some level of configuration, manual input, and supervision.
      • There’s often a struggle to connect ITAM to value. For example, respondents to Info-Tech’s Management & Governance Diagnostic consistently rank ITAM as less important than other processes that ITAM directly supports (e.g. budget management and budget optimization). (Info-Tech MGD Diagnostic (n=972 unique organizations))
      ITAM is a mature discipline with well-established standards, certifications, and tools, but we still struggle with it.
      • Only 28% of SAM teams track IaaS and PaaS spend, and only 35% of SAM teams track SaaS usage.
      • Increasing SAM maturity is a challenge for 76% of organizations.
      • 10% of organizations surveyed have spent more than $5 million in the last three years in audit penalties and true-ups.
      • Half of all of organizations lack a viable SAM tool.
      • Seventy percent of SAM teams have a shortfall of qualified resources.
      • (Flexera State of ITAM Report 2022)

      Info-Tech's IT Asset Management Framework (ITAM)

      Adopt, manage, and mature activities to enable business value thorugh actionable, accessible, and accurate ITAM data

      Logo for Info-Tech Research Group. Enable Business Value Logo for #iTRG.
      Business-Aligned Spend
      Optimization and Transparency
      Facilitate IT Services
      and Products
      Actionable, Accessible,
      and Accurate Data
      Context-Aware Risk Management
      and Security Controls

      Plan & Govern

      Business Goals, Risks, and Structure
      • ITAM Goals & Priorities
      • Roles, Accountability, Responsibilities
      • Scope
      Ongoing Management Commitment
      • Resourcing & Funding
      • Policies & Enforcement
      • Continuous Improvement
      Culture
      • ITAM Education, Awareness & Training
      • Organizational Change Management
      Section title 'Operate' with a cycle surrounding key components of Operate: 'Data Collection & Validation', 'Tool Administration', 'License Management', and 'Lease Management'. The cycle consists of 'Request', 'Procure', 'Receive', 'Deploy', 'Manage', 'Retire & Dispose', and back to 'Request'.

      Build & Manage

      Tools & Data
      • ITAM Tool Selection & Deployment
      • Configuration Management Synchronization
      • IT Service Management Integration
      Process
      • Process Management
      • Data & Process Audits
      • Document Management
      People, Policies, and Providers
      • Stakeholder Management
      • Technology Standardization
      • Vendor & Contract Management

      Info-Tech Insight

      ITAM is a foundational IT service that provides actionable, accessible, and accurate data on IT assets. But there's no value in data for data's sake. Use this methodology to enable collaboration between ITAM, the business, and IT to develop an approach to ITAM that maximizes the value the ITAM team can deliver as service providers.

      Key deliverable

      IT asset management requires ongoing practice – you can’t just implement it and walk away.

      Our methodology will help you build a business-aligned strategy and approach for your ITAM practice with the following outputs:

      • Business-aligned ITAM priorities, opportunities, and goals.
      • Current and target state ITAM maturity.
      • Metrics and KPIs.
      • Roles, responsibilities, and accountability.
      • Insourcing, outsourcing, and (de)centralization.
      • Tools and technology.
      • A documentation framework.
      • Initiatives, a roadmap, and a communication plan.
      Each step of this blueprint is designed to help you create your IT asset management strategy:
      Sample of Info-Tech's key deliverable 'IT Asset Management' blueprint.

      Info-Tech’s methodology to develop an IT asset management strategy

      1. Establish business-aligned ITAM goals and priorities 2. Identify your approach to support ITAM priorities and goals
      Phase Steps
      • 1.1 Define ITAM and brainstorm opportunities and challenges.
      • Executive Alignment Working Session:
      • 1.2 Review organizational priorities, strategy, and key initiatives.
      • 1.3 Align executive priorities with ITAM opportunities and priorities.
      • 1.4 Identify business-aligned ITAM goals and target maturity.
      • 1.5 Write mission and vision statements.
      • 1.6 Define ITAM metrics and KPIs.
      • 2.1 Define ITAM scope.
      • 2.2 Acquire ITAM services (outsourcing and contracting).
      • 2.3 Centralize or decentralize ITAM capabilities.
      • 2.4 Create a RACI for the ITAM practice.
      • 2.5 Align ITAM with other service management practices.
      • 2.6 Evaluate ITAM tools and integrations.
      • 2.7 Create a plan for internal and external audits.
      • 2.8 Improve your budget processes.
      • 2.9 Establish a documentation framework.
      • 2.10 Create a roadmap and communication plan.
      Phase Outcomes Defined, business-aligned goals and priorities for ITAM. Establish an approach to achieving ITAM goals and priorities including scope, structure, tools, service management integrations, documentation, and more.
      Project Outcomes Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.

      Insight Summary

      There’s no value in data for data’s sake

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an approach to ITAM that maximizes the value they can deliver as service providers.

      Service provider to a service provider

      ITAM is often viewed (when it’s viewed at all) as a low-value administrative task that doesn’t directly drive business value. This can make it challenging to build a case for funding and resources.

      Your ITAM strategy is a critical component to help you define how ITAM can best deliver value to your organization, and to stop creating data for the sake of data or just to fight the next fire.

      Collaboration over order-taking

      To align ITAM practices to deliver organizational value, you need a very clear understanding of the organization’s goals – both in the moment and as they change over time.

      Ensure your ITAM team has clear line of sight to business strategy, objectives, and decision-makers, so you can continue to deliver value as priorities change

      Embrace dotted lines

      ITAM teams rely heavily on staff, systems, and data beyond their direct area of control. Identify how you will influence key stakeholders, including technicians, administrators, and business partners.

      Help them understand how ITAM success relies on their support, and highlight how their contributions have created organizational value to encourage ongoing support.

      Project benefits

      Benefits for IT
      • Set a foundation and direction for an ITAM practice that will allow IT to manage risk, optimize spend, and enhance services in line with business requirements.
      • Establish accountability and responsibility for essential ITAM activities. Decide where to centralize or decentralize accountability and authority. Identify where outsourcing could add value.
      • Create a roadmap with concrete, practical next steps to develop an effective, right-sized ITAM practice.
      Stock image of a trophy. Benefits for the business
      • Plan and control technology spend with confidence based on trustworthy ITAM data.
      • Enhance IT’s ability to rapidly and effectively support new priorities and launch new projects. Effective ITAM can support more streamlined procurement, deployment, and management of assets.
      • Implement security controls that reflect your total technology footprint. Reduce the risk that a forgotten device or unmanaged software turns your organization into the next Colonial Pipeline.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI around 12 calls over the course of 6 months.

      What does a typical GI on this topic look like?

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Review business priorities.

      Call #3: Identify ITAM goals & target maturity.

      Call #4: Identify metrics and KPIs. Call #5: Define ITAM scope.

      Call #6: Acquire ITAM services.

      Call #7: ITAM structure and RACI.

      Call #8: ITAM and service management.

      Tools and integrations.

      Call #10: Internal and external audits.

      Call #11: Budgets & documentation

      Call #12: Roadmap, comms plan. Wrap-up.

      Phase 1 Phase 2

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889
      Day 1 Day 2 Day 3 Day 4 Day 5
      Identify ITAM priorities & goals, maturity, metrics and KPIs
      Identify your approach to support ITAM priorities and goals
      Next Steps and wrap-Up (offsite)
      Activities

      1.1 Define ITAM.

      1.2 Brainstorm ITAM opportunities and challenges.

      Conduct an executive alignment working session:

      1.3 Review organizational priorities, strategy, and key initiatives.

      1.4 Align executive priorities with ITAM opportunities.

      1.5 Set ITAM priorities.

      2.1 Translate opportunities into ITAM goals and tactics.

      2.2 Identify target and current state ITAM maturity.

      2.3 Create mission and vision statements.

      2.4 Identify key ITAM metrics and KPIs.

      3.1 Define ITAM scope.

      3.2 Acquire ITAM services (outsourcing and contracting)

      3.3 Centralize or decentralize ITAM capabilities.

      3.4 Create a RACI for the ITAM practice.

      3.5 Align ITAM with other service management practices.

      3.6 Evaluate ITAM tools and integrations.

      4.1 Create a plan for internal and external audits.

      4.2 Improve your budget processes.

      4.3 Establish a documentation framework and identify documentation gaps.

      4.4 Create a roadmap and communication plan.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. ITAM opportunities and challenges.
      2. Align executive priorities with ITAM opportunities.
      3. Set ITAM priorities.
      1. ITAM goals and tactics.
      2. Current and target ITAM maturity.
      3. Mission and vision statements.
      4. ITAM metrics and KPIs.
      1. Decisions that will shape your ITAM approach, including:
        1. What’s in scope (hardware, software, and cloud services).
        2. Where to centralize, decentralize, or outsource ITAM activities.
        3. Accountability, responsibility, and structure for ITAM activities.
        4. Service management alignment, tooling gaps, audit plans, budget processes, and required documentation.
      2. A roadmap and communication plan.
      1. Your completed ITAM strategy template.
      Develop an IT Asset Management Strategy

      Phase 1:

      Establish business-aligned ITAM goals and priorities

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Defined, business-aligned goals, priorities, and KPIs for ITAM. A concise vision and mission statement. The direction you need to establish a practical, right-sized, effective approach to ITAM for your organization.

      Before you get started

      Set yourself up for success with these three steps:
      • This methodology and the related slides are intended to be executed via intensive, collaborative working sessions using the rest of this slide deck.
      • Ensure the working sessions are a success by working through these steps before you start work on your IT asset management strategy.

      1. Identify participants

      Review recommended roles and identify who should participate in the development of your ITAM strategy.

      2. Estimate assets managed today

      Work through an initial assessment to establish ease of access to ITAM data and your level of trust in the data available to you.

      3. Create a working folder

      Create a repository to house your notes and any work in progress, including your copy of the ITAM Strategy Template.

      0.1 Identify participants

      30 minutes

      Output: List of key roles for the strategy exercises outlined in this methodology

      Participants: Project sponsor, Lead facilitator, ITAM manager and SMEs

      This methodology relies on having the right stakeholders in the room to identify ITAM goals, challenges, roles, structure, and more. On each activity slide in this deck, you’ll see an outline of the recommended participants. Use the table below to translate the recommended roles into specific people in your organization. Note that some people may fill multiple roles.

      Role Expectations People
      Project Sponsor Accountable for the overall success of the methodology. Ideally, participates in all exercises in this methodology. May be the asset manager or whoever they report to. Jake Long
      Lead Facilitator Leads, schedules, and manages all working sessions. Guides discussions and ensures activity outputs are completed. Owns and understands the methodology. Has a working knowledge of ITAM. Robert Loblaw
      Asset Manager(s) SME for the ITAM practice. Provides strategic direction to mature ITAM practices in line with organizational goals. Supports the facilitator. Eve Maldonado
      ITAM Team Hands-on ITAM professionals and SMEs. Includes the asset manager. Provide input on tactical ITAM opportunities and challenges. Bruce Wayne, Clark Kent
      IT Leaders & Managers Leaders of key stakeholder groups from across the IT department – the CIO and direct reports. Provide input on what IT needs from ITAM, and the role their teams should play in ITAM activities. May include delegates, particularly those familiar with day-to-day processes relevant to a particular discussion or exercise. Marcelina Hardy, Edmund Broughton
      ITAM Business Partners Non-IT business stakeholders for ITAM. This could include procurement, vendor management, accounting, and others. Zhang Jin, Effie Lamont
      Business Executives Organizational leaders and executives (CFO, COO, CEO, and others) or their delegates. Will participate in a mini-workshop to identify organizational goals and initiatives that can present opportunities for the ITAM practice. Jermaine Mandar, Miranda Kosuth

      0.2 Estimate asset numbers

      1 hour

      Output: Estimates of quantity and spend related to IT assets, Confidence/margin of error on estimates

      Participants: IT asset manager, ITAM team

      What do you know about your current IT environment, and how confident are you in that knowledge?

      This exercise will help you evaluate the size of the challenge ahead in terms of the raw number of assets in your environment, the spend on those assets, and the level of trust your organization has in the ITAM data.

      It is also a baseline snapshot your ability to relay key ITAM metrics quickly and confidently, so you can measure progress (in terms of greater confidence) over time.

      1. Download the estimation tracker below. Add any additional line items that are particularly important to the organization.
      2. Time-box this exercise to an hour. Use your own knowledge and existing data repositories to identify count/spend for each line item, then add a margin of error to your guess. Larger margins of error on larger counts will typically indicate larger risks.
      3. Track any assumptions, data sources used, or SMEs consulted in the comments.

      Download the IT Asset Estimation Tracker

      “Any time there is doubt about the data and it doesn’t get explained or fixed, then a new spreadsheet is born. Data validation and maintenance is critical to avoid the hidden costs of having bad data”

      Allison Kinnaird,
      Operations Practice Lead,
      Info-Tech Research Group

      0.3 Create a working folder

      15 minutes

      Output: A repository for templates and work in progress

      Participants: Lead facilitator

      Create a central repository for collaboration – it seems like an obvious step, but it’s one that gets forgotten about
      1. Download a copy of the ITAM Strategy Template.
        1. This will be the repository for all the work you do in the activities listed in this blueprint; take a moment to read it through and familiarize yourself with the contents.
      2. House the template in a shared repository that can house other related work in progress. Share this folder with participants so they can check in on your progress.
      3. You’ll see this callout box: Add your results to your copy of the ITAM Strategy Template as you work through activities in this blueprint. Copy the output to the appropriate slide in the ITAM Strategy Template.
      Stock image of a computer screen with a tiny person putting likes on things.

      Collect action items as you go

      Don’t wait until the end to write down your good ideas.
      • The last exercise in this methodology is to gather everything you’ve learned and build a roadmap to improve the ITAM practice.
      • The output of the exercises will inform the roadmap, as they will highlight areas with opportunities for improvement.
      • Write them down as you work through the exercises, or you risk forgetting valuable ideas.
      • Keep an “idea space” – a whiteboard with sticky notes or a shared document – to which any of your participants can post an idea for improvement and that you can review and consolidate later.
      • Encourage participants to add their ideas at any time during the exercises.
      Pad of sticky notes, the top of which reads 'Good ideas go here!'

      Step 1.1: Brainstorm ITAM opportunities and challenges

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Rally the working group around a collection of ideas that, when taken together, create a vision for the future ITAM practice.
      • Identify your organization’s current ITAM challenges.

      “ITAM is a cultural shift more than a technology shift.” (Rory Canavan, SAM Charter)

      What is an IT Asset?

      Any piece of technology can be considered an asset, but it doesn’t mean you need to track everything. Image of three people building a computer from the inside.
      Icon of a power button.

      According to the ISO 19770 standard on ITAM, an IT Asset is “[an] item, thing, or entity that can be used to acquire, process, store and distribute digital information and has potential or actual value to an organization.”
      These are all things that IT is expected to support and manage, or that have the potential to directly impact services that IT supports and manages.

      Icon of a half-full battery.

      IT assets are distinct from capital assets. Some IT assets will also be capital assets, but not all will be. And not all capital assets are IT assets, either.

      Icon of a microphone.

      IT assets are typically tracked by IT, not by finance or accounting.
      IT needs more from their IT asset tracking system than the typical finance department can deliver.
      This can include end-user devices, software, IT infrastructure, cloud-based resources, third-party managed IT services, Internet-of-Things devices, embedded electronics, SCADA equipment, “smart” devices, and more.

      Icon of a fingerprint.

      It’s important to track IT assets in a way that enables IT to deliver value to the business – and an important part of this is understanding what not to track. This list should be aligned to the needs of your organization.

      What is IT asset management?

      • IT asset management is the practice of maintaining accurate, accessible, and actionable data on IT hardware, software, and cloud assets from procurement to disposal.
      • Trustworthy data maintained by an IT asset management practice will help your business meet its goals by managing risk, controlling costs, and enabling IT services and products.
      • ITAM tends to focus on the asset itself – its technical, financial, contractual, lifecycle, and ownership attributes – rather than its interactions or connections to other IT assets, which tends to be part of configuration management.

      What IT Asset Management is NOT:

      Configuration Management: Configuration management databases (CMDBs) often draw from the same data pool as ITAM (many configuration items are assets, and vice versa), but they focus on the interaction, interconnection, and interoperation of configuration items within the IT estate.

      In practice, many configuration items will be IT assets (or parts of assets) and vice versa. Configuration and asset teams should work closely together as they develop different but complementary views of the IT environment. Use Info-Tech’s methodology to harness configuration management superpowers.

      Organizational Data Management: Leverage a different Info-Tech methodology to develop a digital and data asset management program within Info-Tech’s DAM framework.

      “Asset management’s job is not to save the organization money, it’s not to push back on software audits.

      It’s to keep the asset database as up-to-date and as trustworthy as possible. That’s it.” (Jeremy Boerger, Consultant & Author)

      “You can’t make any real decisions on CMDB data that’s only 60% accurate.

      You start extrapolating that out, you’re going to get into big problems.” (Mike Austin, Founder & CEO, MetrixData 360)

      What is an ITAM strategy?

      Our strategy document will outline a coherent, sustainable, business-aligned approach to ITAM.

      No single approach to ITAM fits all organizations. Nor will the same approach fit the same organization at different times. A world-leading research university, a state government, and a global manufacturer all have very different goals and priorities that will be best supported by different approaches to ITAM.

      This methodology will walk you through these critical decisions that will define your approach to ITAM:

      • Business-aligned priorities, opportunities, and goals: What pressing opportunities and challenges do we face as an organization? What opportunities does this create that ITAM can seize?
      • Current and future state maturity, challenges: What is the state of the practice today? Where do we need to improve to meet our goals? What challenges stand in the way of improvement?
      • Responsibility, accountability, sourcing and (de)centralization: Who does what? Who is accountable? Where is there value to outsourcing? What authority will be centralized or decentralized?
      • Tools, policies, and procedures: What technology do we need? What’s our documentation framework?
      • Initiatives, KPIs, communication plan, and roadmap: What do we need to do, in what order, to build the ITAM practice to where we need it to be? How long do we expect this to take? How will we measure success?

      “A good strategy has coherence, coordinating actions, policies, and resources so as to accomplish an important end. Most organizations, most of the time, don’t have this.

      Instead, they have multiple goals and initiatives that symbolize progress, but no coherent approach to accomplish that progress other than ‘spend more and try harder.’” (Good Strategy, Bad Strategy, Richard Rumelt)

      Enable business value with IT asset management

      If you’ve never experienced a mature ITAM program before, it is almost certainly more rewarding than you’d expect once it’s functioning as intended.

      Each of the below activities can benefit from accessible, actionable, and accurate ITAM data.

      • Which of the activities, practices, and initiatives below have value to your organization?
      • Which could benefit most from ITAM data?
      Manage Risk: Effective ITAM practices provide data and processes that help mitigate the likelihood and impact of potentially damaging IT risks.

      ITAM supports the following practices that help manage organizational risk:

      • Security Controls Development
      • Security Incident Response
      • Security Audit Reports
      • Regulatory Compliance Reports
      • IT Risk Management
      • Technical Debt Management
      • M&A Due Diligence
      Optimize Spend: Asset data is essential to maintaining oversight of IT spend, ensuring that scarce resources are allocated where they can have the most impact.

      ITAM supports these activities that help optimize spend:

      • Vendor Management & Negotiations
      • IT Budget Management & Variance Analysis
      • Asset Utilization Analysis
      • FinOps & Cloud Spend Optimization
      • Showback & Chargeback
      • Software Audit Defense
      • Application Rationalization
      • Contract Consolidation
      • License and Device Reallocation
      Improve IT Services: Asset data can help inform solutions development and can be used by service teams to enhance and improve IT service practices.

      Use ITAM to facilitate these IT services and initiatives:

      • Solution and Enterprise Architecture
      • Service Level Management
      • Technology Procurement
      • Technology Refresh Projects
      • Incident & Problem Management
      • Request Management
      • Change Management
      • Green IT

      1.1 Brainstorm ideas to create a vision for the ITAM practice

      30 minutes

      Input: Stakeholders with a vision of what ITAM could provide, if resourced and funded adequately

      Output: A collection of ideas that, when taken together, create a vision for the future ITAM practice

      Materials: ITAM strategy template, Whiteboard or virtual whiteboard

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      It can be easy to lose sight of long-term goals when you’re stuck in firefighting mode. Let’s get the working group into a forward-looking mindset with this exercise.

      Think about what ITAM could deliver with unlimited time, money, and technology.

      1. Provide three sticky notes to each participant.
      2. Add the headings to a whiteboard, or use a blank slide as a digital whiteboard
      3. On each sticky note, ask participants to outline a single idea as follows:
        1. We could: [idea]
        2. Which would help: [stakeholder]
        3. Because: [outcome]
      4. Ask participants to present their sticky notes and post them to the whiteboard. Ask later participants to group similar ideas together.

      As you hear your peers describe what they hope and expect to achieve with ITAM, a shared vision of what ITAM could be will start to emerge.

      1.1 Identify structural ITAM challenges

      30 minutes

      Input: The list of common challenges on the next slide, Your estimated visibility into IT assets from the previous exercise, The experience and knowledge of your participants

      Output: Identify current ITAM challenges

      Materials: Your working copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What’s standing in the way today of delivering the ITAM practices you want to achieve?

      Review the list of common challenges on the next slide as a group.

      1. Delete any challenges that don’t apply to your organization.
      2. Modify any challenges as required to reflect your organization.
      3. Add further challenges that aren’t on the list, as required.
      4. Highlight challenges that are particularly painful.

      Add your results to your copy of the ITAM Strategy Template

      “The problem – the reason why asset management initiatives keep falling on their face – is that people attack asset management as a problem to solve, instead of a practice and epistemological construct.” (Jeremy Boerger, Consultant & Author)

      1.1 Identify structural ITAM challenges

      Review and update the list of common challenges below to reflect your own organization.

      • Leadership and executives don’t understand the value of asset management and don’t fund or resource it.
      • Tools aren’t fit for purpose, don’t scale, or are broken.
      • There’s a cultural tendency to focus on tools over processes.
      • ITAM data is fragmented across multiple repositories.
      • ITAM data is widely viewed as untrustworthy.
      • Stakeholders respond to vendor audits before consulting ITAM, which leads to confusion and risks penalties.
      • No time for improvement; we’re always fighting fires.
      • We don’t audit our own ITAM data for accuracy.
      • End-user equipment is shared, re-assigned, or disposed without notifying or involving IT.
      • No dedicated resources.
      • Lack of clarity on roles and responsibilities.
      • Technicians don’t track assets consistently; ITAM is seen as administrative busywork.
      • Many ITAM tasks are manual and prone to error.
      • Inconsistent organizational policies and procedures.
      • We try to manage too many hardware types/software titles.
      • IT is not involved in the procurement process.
      • Request and procurement is seen as slow and excessively bureaucratic.
      • Hardware/software standards don’t exist or aren’t enforced.
      • Extensive rogue purchases/shadow IT are challenging to manage via ITAM tools and processes.
      What Else?

      Copy results to your copy of the ITAM Strategy Template

      Step 1.2: Review organizational priorities, strategy, initiatives

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives or their delegates

      Outcomes

      • Review organizational priorities and strategy.
      • Identify key initiatives.

      Enter the executives

      Deliver on leadership priorities

      • Your business’ major transformative projects and executive priorities might seem far removed from hardware and software tracking. Why would we start with business strategy and executive priorities as we’re setting goals for the ITAM program?
      • While business executives have (likely) no interest in how software and hardware is tracked, they are accountable for the outcomes ITAM can enable. They are the most likely to understand why and how ITAM can deliver value to the organization.
      • ITAM succeeds by enabling its stakeholders to achieve business outcomes. The next three activities are designed to help you identify how you can enable your stakeholders, and what outcomes are most important from their point of view. Specifically:
        • What are the business’ planned transformational initiatives?
        • What are your highest priority goals?
        • What should the priorities of the ITAM practice be?
      • The answers to these questions will shape your approach to ITAM. Direct input from your leadership and executives – or their delegates – will help ensure you’re setting a solid foundation for your ITAM practice.

      “What outcomes does the organization want from IT asset management? Often, senior managers have a clear vision for the organization and where IT needs to go, and the struggle is to communicate that down.” (Kylie Fowler, ITAM Intelligence)

      Stock image of many hands with different puzzle pieces.

      Executive Alignment Session Overview

      ITAM Strategy Working Sessions

      • Discover & Brainstorm
      • Executive Alignment Working Session
        • 1.2 Review organizational strategy, priorities, and key initiatives
        • 1.3 Align executive priorities with ITAM opportunities, set ITAM priorities
      • ITAM Practice Maturity, Vision & Mission, Metrics & KPIs
      • Scope, Outsourcing, (De)Centralization, RACI
      • Service Management Integration
      • ITAM Tools
      • Audits, Budgets, Documents
      • Roadmap & Comms Plan

      A note to the lead facilitator and project sponsor:
      Consider working through these exercises by yourself ahead of time. As you do so, you’ll develop your own ideas about where these discussions may go, which will help you guide the discussion and provide examples to participants.

      1.2 Review organizational strategy and priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Welcome your group to the working session and outline the next few exercises using the previous slide.

      Ask the most senior leader present to provide a summary of the following:

      1. What is the vision for the organization?
      2. What are our priorities and what must we absolutely get right?
      3. What do we expect the organization to look like in three years?

      The facilitator or a dedicated note-taker should record key points on a whiteboard or flipchart paper.

      1.2 Identify transformational initiatives

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Ask the most senior leader present to provide a summary of the following: What transformative business and IT initiatives are planned? When will they begin and end?

      Using one box per initiative, draw the initiatives in a timeline like the one below.

      Sample timeline for ITAM initiatives.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.3: Set business-aligned ITAM priorities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      1.3 Align executive priorities with ITAM opportunities

      45 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      In this exercise, we’ll use the table on the next slide to identify the top priorities of key business and IT stakeholders and connect them to opportunities for the ITAM practice.

      1. Ask your leadership or executive delegates – what are their goals? What are they trying to accomplish? List roles and related goals in the table.
      2. Brainstorm opportunities for IT asset management to support listed goals:
        1. Can ITAM provide an enhanced level of service, access, or insight?
        2. Can ITAM address an existing issue or mitigate an existing risk?

      Add your results to your copy of the ITAM Strategy Template

      1.3 Align executive priorities with ITAM opportunities (example)

      ITAM is for the… Who wants to… Which presents these ITAM opportunities
      CEO Deliver transformative business initiatives Acquire the right tech at the right time to support transformational initiatives.
      Establish a data-driven culture of stewardship Improve data to increase IT spend transparency.
      COO Improve organizational efficiency Increase asset use.
      Consolidate major software contracts to drive discounts.
      CFO Accurately forecast spending Track and anticipate IT asset spending.
      Control spending Improve data to increase IT spend transparency.
      Consolidate major software contracts to drive discounts.
      CIO Demonstrate IT value Use data to tell a story about value delivered by IT assets.
      Govern IT use Improve data to increase IT spend transparency.
      CISO Manage IT security and compliance risks Identify abandoned or out-of-spec IT assets.
      Provide IT asset data to support controls development.
      Respond to security incidents Support security incident teams with IT asset data.
      Apps Leader Build, integrate, and support applications Identify opportunities to retire applications with redundant functionality.
      Connect applications to relevant licensing and support agreements.
      IT Infra Leader Build and support IT infrastructure. Provide input on opportunities to standardize hardware and software.
      Provide IT asset data to technicians supporting end users.

      1.3 Categorize ITAM opportunities

      10-15 minutes

      Input: The outputs from the previous exercise

      Output: Executive priorities, sorted into the three categories at the right

      Materials: The table in this slide, The outputs from the previous exercise

      Participants: Lead facilitator

      Give your participants a quick break. Quickly sort the identified ITAM opportunities into the three main categories below as best you can.

      We’ll use this table as context for the next exercise.

      Example: Optimize Spend Enhance IT Services Manage Risk
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Consolidate major software contracts to drive discounts.
      • Increase asset utilization.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: Whiteboard, The template on the next slide, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      The objective of this exercise is to prioritize the outcomes your organization wants to achieve from its ITAM practice, given the context from the previous exercises.

      Review the image below. The three points of the triangle are the three core goals of ITAM: Enhance IT Service, Manage Risk, and Optimize Spend. This exercise was first developed by Kylie Fowler of ITAM Intelligence. It is an essential exercise to understand ITAM priorities and the tradeoffs associated with those priorities. These priorities aren’t set in stone and should be revisited periodically as technology and business priorities change.

      Draw the diagram on the next slide on a whiteboard. Have the most senior leader in the room place the dot on the triangle – the closer it is to any one of the goals, the more important that goal is to the organization. Note: The center of the triangle is off limits! It’s very rarely possible to deliver on all three at once.
      Track notes on what’s being prioritized – and why – in the template on the next slide.
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM Priorities

      The priorities of the ITAM practice are to:
      • Optimize Spend
      • Manage Risk
      Why?
      • We believe there is significant opportunity right now to rationalize spend by consolidating key software contracts.
      • Major acquisitions are anticipated in the near future. Effective ITAM processes are expected to mitigate acquisition risk by supporting due diligence and streamlined integration of acquired organizations.
      • Ransomware and supply chain security threats have increased demands for a comprehensive accounting of IT assets to support security controls development and security incident response.
      (Update this section with notes from your discussion.)
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'. There is a dot close to the 'Optimize Spend' corner, a legend labelling the dot as 'Our Target', and a note reading 'Move this dot to reflect your priorities'.

      Step 1.4: Identify ITAM goals, target maturity

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      “ITAM is really no different from the other ITIL practices: to succeed, you’ll need some ratio of time, treasure, and talent… and you can make up for less of one with more of the other two.” (Jeremy Boerger, Consultant and Author)

      1.4 Identify near- and medium-term goals

      15-30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Narrow down the list of opportunities to identify specific goals for the ITAM practice.

      1. Use one color to highlight opportunities you will seize in the next year.
      2. Use a second color to highlight opportunities you plan to address in the next three years.
      3. Leave blank anything you don’t intend to address in this timeframe.

      The highlighted opportunities are your near- and medium-term objectives.

      Optimize Spend Enhance IT Services Manage Risk
      Priority Critical Normal High
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      1.4 Connect ITAM goals to tactics

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Let’s dig down a little deeper. Connect the list of opportunities from earlier to specific ITAM tactics that allow the team to seize those opportunities.

      Add another row to the earlier table for ITAM tactics. Brainstorm tactics with your participants (e.g. sticky notes on a whiteboard) and align them with the priorities they’ll support.

      Optimize SpendEnhance IT ServicesManage Risk
      PriorityCriticalNormalHigh
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.
      ITAM Tactics to Seize Opportunities
      • Review and improve hardware budgeting exercises.
      • Reallocate unused licenses, hardware.
      • Ensure ELP reports are up to date.
      • Validate software usage.
      • Data to support software renewal negotiations.
      • Use info from ITAM for more efficient adds, moves, changes.
      • Integrate asset records with the ticket intake system, so that when someone calls the service desk, the list of their assigned equipment is immediately available.
      • Find and retire abandoned devices or services with access to the organization’s network.
      • Report on lost/stolen devices.
      • Develop reliable disposal processes.
      • Report on unpatched devices/software.

      Add your results to your copy of the ITAM Strategy Template

      1.4 Identify current and target state

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      We’ll use this exercise to identify the current and one-year target state of ITAM using Info-Tech’s ITAM maturity framework.

      1. Review the maturity framework on the next slide as a group.
      2. In one color, highlight statements that reflect your organization today. Summarize your current state. Are you in firefighter mode? Between “firefighter” and “trusted operator”?
      3. In a second color, highlight statements that reflect where you want to be one year from today, taking into consideration the goals and tactics identified in the last exercise.
      4. During a break, copy the highlighted statements to the table on the slide after next, then add this final slide to your working copy of the ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Establish current and target ITAM maturity

      IT maturity ladder with five color-coded levels. Innovator – Optimized Asset Management
      • All items from Business & Technology Partner, plus:
      • Business and IT stakeholders collaborate regularly with the ITAM team to identify new opportunities to leverage or deploy ITAM practices and data to mitigate risks, optimize spend, and improve service. The ITAM program scales with the business.
      Business & Technology Partner – Proactive Asset Management
      • All items from Trusted Operator, plus:
      • The ITAM data is integral to decisions related to budget, project planning, IT architecture, contract renewal, and vendor management. Software and cloud assets are reviewed as frequently as required to manage costs. ITAM data consumers have self-serve access to ITAM data.
      • Continuous improvement practices strengthen ITAM efficiency and effectiveness.
      • ITAM processes, standards, and related policies are regularly reviewed and updated. ITAM teams work closely with SMEs for key tools/systems integrated with ITAM (e.g. AD, ITSM, monitoring tools) to maximize the value and reliability of integrations.
      Trusted Operator – Controls Assets
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role. Teams responsible for ITAM data collection cooperate effectively. Policies and procedures are documented and enforced. Key licenses and contracts are available to the ITAM team. Discovery, tracking, and analysis tools support most important use cases.
      Firefighter – Reactive Asset Tracking
      • Data is often untrustworthy, may be fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation. Data tracking processes are extremely highly manual. Effective cooperation for ITAM data collection is challenging.
      • ITAM tools are in place, but additional configuration or tooling is needed.
      Unreliable - Struggles to Support
      • No data, or data is typically unusable.
      • No allocated staff, no cooperation between parties responsible for ITAM data collection.
      • No related policies or documentation.
      • Tools are non-existent or not fit-for-purpose.

      Current and target ITAM maturity

      Today:
      Firefighter
      • Data is often untrustworthy, is fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation.
      • Tools are non-existent.
      In One Year:
      Trusted Operator
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role.
      • Teams responsible for ITAM data collection cooperate effectively.
      • Discovery, tracking, and analysis tools support most important use cases.
      IT maturity ladder with five color-coded levels.

      Innovator – Optimized Asset Management

      Business & Technology Partner – Proactive Asset Management

      Trusted Operator – Controls Assets

      Firefighter – Reactive Asset Tracking

      Unreliable - Struggles to Support

      Step 1.5: Write mission and vision statements

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Write a mission statement that encapsulates the purpose and intentions of the ITAM practice today.
      • Write a vision statement that describes what the ITAM practice aspires to become and achieve.

      Write vision and mission statements

      Create two statements to summarize the role of the ITAM practice today – and where you want it to be in the future.

      Create two short, compelling statements that encapsulate:
      • The vision for what we want the ITAM practice to be in the future; and
      • The mission – the purpose and intentions – of the ITAM practice today.

      Why bother creating mission and vision statements? After all, isn’t it just rehashing or re-writing all the work we’ve just done? Isn’t that (at best) a waste of time?

      There are a few very important reasons to create mission and vision statements:

      • Create a compass that can guide work today and your roadmap for the future.
      • Focus on the few things you must do, rather than the many things you could do.
      • Concisely communicate a compelling vision for the ITAM practice to a larger audience who (let’s face it) probably won’t read the entire ITAM Strategy deck.

      “Brevity is the soul of wit.” (Hamlet, Act 2, Scene 2)

      “Writing is easy. All you have to do is cross out the wrong words.” (Mark Twain)

      1.5 Write an ITAM vision statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: A whiteboard, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT Leaders and managers

      Your vision statement describes the ITAM practice as it will be in the far future. It is a target to aspire to, beyond your ability to achieve in the near or medium term.

      Examples of ITAM vision statements:

      Develop the single accurate view of IT assets, available to anyone who needs it.

      Indispensable data brokers that support strategic decisions on the IT environment.

      Provide sticky notes to participants. Write out the three questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What’s the desired future state of the ITAM practice?
      2. What needs to be done to achieved this desired state?
      3. How do we want ITAM to be perceived in this desired state?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      1.5 Write an ITAM mission statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Your ITAM mission statement is an expression of what your IT asset management function brings to your organization today. It should be presented in straightforward language that is compelling, easy to understand, and sharply focused.

      Examples of ITAM mission statements:

      Maintain accurate, actionable, accessible on data on all IT assets.

      Support IT and the business with centralized and integrated asset data.

      Provide sticky notes to participants. Write out the questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What is our role as the asset management team?
      2. How do we support the IT and business strategies?
      3. What does our asset management function offer that no one else can?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.6: Define ITAM metrics and KPIs

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Identify metrics, data, or reports that may be of interest to different consumers of ITAM data.
      • Identify the key performance indicators (KPIs) for the ITAM practice, based on the goals and priorities established earlier.

      Navigate a universe of ITAM metrics

      When you have the data, how will you use it?

      • There’s a dizzying array of potential metrics you can develop and track across your ITAM environment.
      • Different stakeholders will need different data feeds, metrics, reports, and dashboards.
      • Different measures will be useful at different times. You will often need to filter or slice the data in different ways (by department, timeframe, equipment type, etc.)
      • We’ll use the next few exercises to identify the types of metrics that may be useful to different stakeholders and the KPIs to measure progress towards ITAM goals and priorities.

      ITAM Metrics

      • Quantity
        e.g. # of devices or licenses
      • Cost
        e.g. average laptop cost
      • Compliance
        e.g. effective license position reports
      • Progress
        e.g. ITAM roadmap items completed
      • Quality
        e.g. ITAM data accuracy rate
      • Time
        e.g. time to procure/ deploy

      Drill down by:

      • Vendor
      • Date
      • Dept.
      • Product
      • Location
      • Cost Center

      Develop different metrics for different teams

      A few examples:

      • CIOs — CIOs need asset data to govern technology use, align to business needs, and demonstrate IT value. What do we need to budget for hardware and software in the next year? Where can we find money to support urgent new initiatives? How many devices and software titles do we manage compared to last year? How has IT helped the business achieve key goals?
      • Asset Managers — Asset managers require data to help them oversee ITAM processes, technology, and staff, and to manage the fleet of IT assets they’re expected to track. What’s the accuracy rate of ITAM data? What’s the state of integrations between ITAM and other systems and processes? How many renewals are coming up in the next 90 days? How many laptops are in stock?
      • IT Leaders — IT managers need data that can support their teams and help them manage the technology within their mandate. What technology needs to be reviewed or retired? What do we actually manage?
      • Technicians — Service desk technicians need real-time access to data on IT assets to support service requests and incident management – for example, easy access to the list of equipment assigned to a particular user or installed in a particular location.
      • Business Managers and Executives — Business managers and executives need concise, readable dashboards to support business decisions about business use of IT assets. What’s our overall asset spend? What’s our forecasted spend? Where could we reallocate spend?

      1.6 Identify useful ITAM metrics and reports

      60 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Use this exercise to identify as many potentially useful ITAM metrics and reports as possible, and narrow them down to a few high-priority metrics. Leverage the list of example metrics on the next slide for your own exercise. If you have more than six participants, consider splitting into two or more groups, and divide the table between groups to minimize overlap.

      1. List potential consumers of ITAM data in the column on the left.
      2. What type of information do we think this role needs? What questions about IT assets do we get on a regular basis from this role or team?
      3. Review and consolidate the list as a group. Discuss and highlight any metrics the group thinks are a particularly high priority for tracking.
      Role Compliance Quality Quantity Cost Time Progress
      IT Asset Manager Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/ planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress
      Service Desk

      Add your results to your copy of the ITAM Strategy Template

      Examples of ITAM metrics

      Compliance Quality Quantity Cost Time/Duration/Age Progress
      Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress or completed
      Disposed devices without certificate of destruction Breakage rates (in and out of warranty) by vendor # of devices running software title X, # of licenses for software title X Spend on software (recent and future/planned) Average time, maximum time to deploy end user software Number of integrations between ITAM DB and other sources
      Discrepancies between licenses and install count, by software title RMAs by vendor, model, equipment type Number of requests by equipment model or software title Spend on cloud (recent and future/planned) Average & total time spent on software audit responses Number of records in ITAM database
      Compliance reports (e.g. tied to regulatory compliance or grant funding) Tickets by equipment type or software title Licenses issued from license pool in the last 30 days Value of licenses issued from license pool in the last 30 days (cost avoidance) Devices by age Software titles with an up-to-date ELP report
      Reports on lost and stolen devices, including last assigned, date reported stolen, actions taken User device satisfaction scores, CSAT scores Number of devices retired or donated in last year Number of IT-managed capital assets Number of hardware/software request tickets beyond time-to-fulfil targets Number of devices audited (by ITAM team via self-audit)
      Number of OS versions, unpatched systems Number of devices due for refresh in the next year Spend saved by harvesting unused software Number of software titles, software vendors managed by ITAM team
      Audit accuracy rate Equipment in stock Cost savings from negotiations
      # of users assigned more than one device Number of non-standard devices or requests Dollars charged during audit or true-up

      Differentiate between metrics and KPIs

      Key performance indicators (KPIs) are metrics with targets aligned to goals.

      Targets could include one or more of:

      • Target state (e.g. completed)
      • Target magnitude (e.g. number, percent, rate, dollar amount)
      • Target direction (e.g. trending up or down)

      You may track many metrics, but you should have only a few KPIs (typically 2-3 per objective).

      A breached KPI should be a trigger to investigate and remediate the root cause of the problem, to ensure progress towards goals and priorities can continue.

      Which KPIs you track will change over the life of the practice, as ITAM goals and priorities shift. For example, KPIs may initially track progress towards maturing ITAM practices. Once you’ve reached target maturity, KPIs may shift to track whether the key service targets are being met.

      1.6 Identify ITAM KPIs

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Good KPIs are a more objective measure of whether you’re succeeding in meeting the identified priorities for the ITAM practice.

      Identify metrics that can measure progress or success against the priorities and goals set earlier. Aim for around three metrics per goal. Identify targets for the metric you think are SMART (specific, measurable, achievable, relevant, and timebound). Track your work using the example table below.

      Goal Metric Target
      Consolidate major software contracts to drive discounts Amount spent on top 10 software contracts Decrease by 10% by next year
      Customer satisfaction scores with enterprise software Satisfaction is equal to or better than last year
      Value of licenses issued from license pool 30% greater than last year
      Identify abandoned or out-of-spec IT assets # of security incidents involving undiscovered assets Zero
      % devices with “Deployed” status in ITAM DB but not discovered for 30+ days ‹1% of all records in ITAM DB
      Provide IT asset data to technicians for service calls Customer satisfaction scores Satisfaction is equal to or better than last year
      % of end-user devices meeting minimum standards 97%

      Add your results to your copy of the ITAM Strategy Template

      Develop an IT Asset Management Strategy

      Phase 2:

      Identify your approach to support ITAM priorities and goals

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Establish an approach to achieving ITAM goals and priorities, including scope, structure, tools, service management integrations, documentation, and more.

      Create a roadmap that enables you to realize your approach.

      Step 2.1: Define ITAM Scope

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish what types of equipment and software you’ll track through the ITAM practice.
      • Establish which areas of the business will be in scope of the ITAM practice.

      Determine ITAM Scope

      Focus on what’s most important and then document it so everyone understands where they can provide the most value.

      Not all categories of assets require the same level of tracking, and some equipment and software should be excluded from the ITAM practice entirely.

      In some organizations, portions of the environment won’t be tracked by the asset management team at all. For example, some organizations will choose to delegate tracking multi-function printers (MFPs) or proprietary IoT devices to the department or vendor that manages them.

      Due to resourcing or technical limitations, you may decide that certain equipment or software is out of scope for the moment.

      What do other organizations typically track in detail?
      • Installs and entitlements for major software contracts that represent significant spend and/or are highly critical to business goals.
      • Equipment managed directly by IT that needs to be refreshed on a regular cycle:
        • End-user devices such as laptops, desktops, and tablets.
        • Server, network, and telecoms devices.
      • High value equipment that is not regularly refreshed may also be tracked, but in less detail – for example, you may not refresh large screen TVs, but you may need to track date of purchase, deployed location, vendor, and model for insurance or warranty purposes.

      2.1 Establish scope for ITAM

      45 minutes

      Input: Organizational strategy documents

      Output: ITAM scope, in terms of types of assets tracked and not tracked

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Establish the hardware and software that are within the scope of the ITAM program by updating the tables below to reflect your own environment. The “out of scope” category will include asset types that may be of value to track in the future but for which the capability or need don’t exist today.

      Hardware Software Out of Scope
      • End-user devices housing data or with a dollar value of more than $300, which will be replaced through lifecycle refresh.
      • Infrastructure devices, including network, telecom, video conferencing, servers and more
      • End-user software purchased under contract
      • Best efforts on single license purchases
      • Infrastructure software, including solutions used by IT to manage the infrastructure
      • Enterprise applications
      • Cloud (SaaS, IaaS, PaaS)
      • Departmental applications
      • Open-source applications
      • In-house developed applications
      • Freeware & shareware
      • IoT devices

      The following locations will be included in the ITAM program: All North and South America offices and retail locations.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.2: Acquire ITAM Services

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Define the type of work that may be more effectively or efficiently delivered by an outsourcer or contractor.

      “We would like our clients to come to us with an idea of where they want to get to. Why are you doing this? Is it for savings? Because you want to manage your security attack surface? Are there digital initiatives you want to move forward? What is the end goal?” (Mike Austin, MetrixData 360)

      Effectively acquire ITAM services

      Allow your team to focus on strategic, value-add activities by acquiring services that free them from commodity tasks.
      • When determining which asset capabilities and activities are best kept in-house and which ones are better handled by a supplier, it is imperative to keep the value to the business in mind.
      • Activities/capabilities that are challenging to standardize and are critical to enabling business goals are better kept in-house.
      • Activities/capabilities that are (or should be) standardized and automated are ideal candidates for outsourcing.
      • Outsourcing can be effective and successful with a narrow scope of engagement and an alignment to business outcomes.
      • Organizations that heavily weigh cost reduction as a significant driver for outsourcing are far less likely to realize the value they expected to receive.
      Business Enablement
      • Supports business-aligned ITAM opportunities & priorities
      • Highly specialized
      • Offers competitive advantages
      Map with axes 'Business Enablement' and 'Vendor's Performance Advantage' for determining whether or not to outsource.
      Vendor’s Performance Advantage
      • Talent or access to skills
      • Economies of scale
      • Access to technology
      • Does not require deep knowledge of your business

      Decide what to outsource

      It’s rarely all or nothing.

      Ask yourself:
      • How important is this activity or capability to ITAM, IT, and business priorities and goals?
      • Is it a non-commodity IT service that can improve customer satisfaction?
      • Is it a critical service to the business and the specialized knowledge must remain in-house?
      • Does the function require access to talent or skills not currently available in-house, and is cost-prohibitive to obtain?
      • Are there economies of scale that can help us meet growing demand?
      • Does the vendor provide access to best-of-breed tools and solutions that can handle the integration, management, maintenance and support of the complete system?

      You may ultimately choose to engage a single vendor or a combination of multiple vendors who can best meet your ITAM needs.

      Establishing effective vendor management processes, where you can maximize the amount of service you receive while relying on the vendor’s expertise and ability to scale, can help you make your asset management practice a net cost-saver.

      ITAM activities and capabilities
      • Contract review
      • Software audit management
      • Asset tagging
      • Asset disposal and recycling
      • Initial ITAM record creation
      • End-user device imaging
      • End-user device deployment
      • End-user software provisioning
      • End-user image management
      • ITAM database administration
      • ELP report creation
      • ITAM process management
      • ITAM report generation
      ITAM-adjacent activities and capabilities
      • Tier 1 support/service desk
      • Deskside/field support
      • Tier 3 support
      • IT Procurement
      • Device management/managed IT services
      • Budget development
      • Applications development, maintenance
      • Infrastructure hosting (e.g. cloud or colocation)
      • Infrastructure management and support
      • Discovery/monitoring tools management and support

      2.2 Identify outsourcing opportunities

      1-2 hours

      Input: Understanding of current ITAM processes and challenges

      Output: Understanding of potential outsourcing opportunities

      Materials: The table in this slide, and insight in previous slides, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      At a high level, discuss which functions of ITAM are good candidates for outsourcing.

      Start with the previous slide for examples of outsourcing activities or capabilities directly related to or adjacent to the ITAM practice. Categorize these activities as follows:

      Outsource Potentially Outsource Insource
      • Asset disposal/recycling
      • ELP report creation
      • ITAM process management

      Go through the list of activities to potentially or definitely outsource and confirm:

      1. Will outsourcing solve a resourcing need for an existing process, or can you deliver this adequately in-house?
      2. Will outsourcing improve the effectiveness and efficiency of current processes? Will it deliver more effective service channels or improved levels of reliability and performance consistency?
      3. Will outsourcing provide or enable enhanced service capabilities that your IT customers could use, and which you cannot deliver in-house due to lack of scale or capacity?

      Answering “no” to more than one of these questions suggests a need to further review options to ensure the goals are aligned with the potential value of the service offerings available.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.3: Centralize or decentralize ITAM capabilities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Outline where the team(s) responsible for ITAM sit across the organization, who they report to, and who they need to work with across IT and the business.

      Align ITAM with IT’s structure

      ITAM’s structure will typically align with the larger business and IT structure. The wrong structure will undermine your ability to meet ITAM goals and lead to frustration, missed work, inefficiency, and loss of value.

      Which of the four archetypes below reflects the structure you need?

      1. Centralized — ITAM is entirely centralized in a single function, which reports into a central IT department.
      2. Decentralized — Local IT groups are responsible and accountable for ITAM. They may coordinate informally but do not report to any central team.
      3. Hybrid-Shared Services — Local IT can opt in to shared services but must follow centrally set ITAM practices to do so, usually with support from a shared ITAM function.
      4. Hybrid-Federated — Local IT departments are free to develop their own approach to ITAM outside of core, centrally set requirements.

      Centralized ITAM

      Total coordination, control, and oversight

      • ITAM accountability, policies, tools, standards, and expertise – in this model, they’re all concentrated in a single, specialized IT asset management practice. Accountability, authority, and oversight are concentrated in the central function as well.
      • A central ITAM team will benefit from knowledge sharing and task specialization opportunities. They are a visible single point of contact for ITAM-related questions
      • The central ITAM team will coordinate ITAM activities across the organization to optimize spend, manage risk, and enhance service. Any local IT teams are supported by and directly answerable to the central ITAM team for ITAM activities.
      • There is a single, centrally managed ITAM database. Wherever possible, this database should be integrated with other tools to support cross-solution automation (e.g. integrate AD to automatically reflect user identity changes in the ITAM database).
      • This model drives cross-organization coordination and oversight, but it may not be responsive to specific and nuanced local requirements.
      Example: Centralized
      Example of a Centralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Decentralized ITAM

      Maximize choice

      • ITAM accountability and oversight are entirely devolved to local or regional IT and/or ITAM organizations, which are free to set their own priorities, goals, policies, and standards. This model maximizes the authority of local groups to build practices that meet local requirements.
      • It may be challenging to resource and mature local practices. ITAM maturity will vary from one local organization to the next.
      • It is more likely that ITAM managers are a part-time role, and sometimes even a non-IT role. Local ITAM teams or coordinators may coordinate and share knowledge informally, but specialization can be challenging to build or leverage effectively across the organization.
      • There is likely no central ITAM tool. Local tools may be acquired, implemented, and integrated by local IT departments to suit their own needs, which can make it very difficult to report on assets organization-wide – for example, to establish compliance on an enterprise software contract.
      Example: Decentralized


      Example of a Decentralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Hybrid: Federation

      Centralization with a light touch

      • A middle ground between centralized and decentralized ITAM, this model balances centralized decision making, specialization, and governance with local autonomy.
      • A central team will define organization-wide ITAM goals, develop capabilities, policies, and standards, and monitor compliance by local and central teams. All local teams must comply with centrally defined requirements, but they can also develop further capabilities to meet local goals.
      • For example, there will typically be a central ITAM database that must be used for at least a subset of assets, but other teams may build their own databases for day-to-day operations and export data to the central database as required.
      • There are often overlapping responsibilities in this model. A strong collaborative relationship between central and local ITAM teams is especially important here, particularly after major changes to requirements, processes, tools, or staffing when issues and breakdowns are more likely.
      Example: Federation


      Example of a Federation ITAM.

      Solid line. Direct reporting relationship

      Purple solid line. Oversight/governance

      Dotted line. Dotted line working or reporting relationship

      Hybrid: Shared Services

      Optional centralization

      • A special case of federated ITAM that balances central control and local autonomy, but with more power given to local IT to opt out of centralized shared services that come with centralized ITAM requirements.
      • ITAM requirements set by the shared services team will support management, allocation, and may have showback or chargeback implications. Following the ITAM requirements is a condition of service. If a local organization chooses to stop using shared services, they are (naturally) no longer required to adhere to the shared services ITAM requirements.
      • As with the federated model, local teams may develop further capabilities to meet local goals.
      Example: Shared Services


      Example of a Shared Services ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Structure data collection & analysis

      Consider the implications of structure on data.

      Why centralize?
      • There is a need to build reports that aggregate data on assets organization-wide, rather than just assets within a local environment.
      • Decentralized ITAM tracking isn’t producing accurate or usable data, even for local purposes.
      • Tracking tools have overlapping functionality. There’s an opportunity to rationalize spend, management and support for ITAM tools.
      • Contract centralization can optimize spend and manage risks, but only with the data required to manage those contracts.
      Why decentralize?
      • Tracking and reporting on local assets is sufficient to meet ITAM goals; there is limited or no need to track assets organization-wide.
      • Local teams have the skills to track and maintain asset data; subsidiaries have appropriate budgets and tools to support ITAM tracking.
      • Decentralized ITSM/ITAM tools are in place, populated, and accurate.
      • The effort to consolidate tools and processes may outweigh the benefits to data centralization.
      • Lots of variability in types of assets and the environment is stable.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Local teams must understand the why and how of centralized data tracking and be held accountable for assigned responsibilities.
      • The asset tool should offer both centralized and localized views of the data.
      Requirements for success:
      • Guidelines and expectations for reporting to centralized asset management team will be well defined and supported.
      • Local asset managers will have opportunity to collaborate with others in the role for knowledge transfer and asset trading, where appropriate.

      Structure budget and contract management

      Contract consolidation creates economies of scale for vendor management and license pooling that strengthen your negotiating position with vendors and optimize spend.

      Why centralize?
      • Budgeting, governance, and accountability are already centralized. Centralized ITAM practices can support the existing governance practices.
      • Centralizing contract management and negotiation can optimize spend and/or deliver access to better service.
      • Centralize management for contracts that cover most of the organization, are highly complex, involve large spend and/or higher risk, and will benefit from specialization of asset staff.
      Why decentralize?
      • Budgeting, governance, and accountability rest with local organizations.
      • There may be increased need for high levels of customer responsiveness and support.
      • Decentralize contract management for contracts used only by local groups (e.g. a few divisions, a few specialized functions), and that are smaller, low risk, and come with standard terms and conditions.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Contract terms must be harmonized across the organization.
      • Centralized fulfillment is as streamlined as possible. For example, software contracts should include the right to install at any time and pay through a true-up process.
      Requirements for success:
      • Any expectations for harmonization with the centralized asset management team will be well defined and supported.
      • Local asset managers can collaborate with other local ITAM leads to support knowledge transfer, asset swapping, etc.

      Structure technology management

      Are there opportunities to centralize or decentralize support functions?

      Why centralize?
      • Standard technologies are deployed organization-wide.
      • There are opportunities to improve service and optimize costs by consolidating knowledge, service contracts, and support functions.
      • Centralizing data on product supply allows for easier harvest and redeployment of assets by a central support team.
      • A stable, central support function can better support localized needs during seasonal staffing changes, mergers and acquisitions.
      Why decentralize?
      • Technology is unique to a local subset of users or customers.
      • Minimal opportunity for savings or better support by consolidating knowledge, service contracts, or support functions.
      • Refresh standards are set at a local level; new tech adoption may be impeded by a reliance on older technologies, local budget shortfalls, or other constraints.
      • Hardware may need to be managed locally if shipping costs and times can’t reasonably be met by a distant central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable centralized support.
      • Keep a central calendar of contract renewals, including reminders to start work on the renewal no less than 90 days prior. Prioritize contracts with high dollar value or high risk.
      • The central asset management solution should be configured to provide data that can enable the central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable decentralized support.
      • Decentralized support teams must understand and adhere to ITAM activities that are part of support work (e.g. data entry, data audits).
      • The central asset management solution should be configured to provide data that can enable the central support team, or decentralized asset solutions must be funded, and teams trained on their use.

      2.3 Review ITAM Structure

      1-2 hours

      Input: Understanding of current organizational structure, Understanding of challenges and opportunities related to the current structure

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Outline the current model for your organization and identify opportunities to centralize or decentralize ITAM-related activities.

      1. What model best describes how ITAM should be structured in your organization? Modify the slide outlining structure as a group to outline your own organization, as required.
      2. In the table below, outline opportunities to centralize or decentralize data tracking, budget and contract management, and technology management activities.
      Centralize Decentralize
      Data collection & analysis
      • Make better use of central ITAM database.
      • Support local IT departments building runbooks for data tracking during lifecycle activities (create templates, examples)
      Budget and contract management
      • Centralize Microsoft contracts.
      • Create a runbook to onboard new companies to MSFT contracts.
      • Create tools and data views to support local department budget exercises.
      Technology management
      • Ensure all end-user devices are visible to centrally managed InTune, ConfigMgr.
      • Enable direct shipping from vendor to local sites.
      • Establish disposal/pickup at local sites.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.4: Create a RACI

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Review the role of the IT asset manager.
      • Identify who’s responsible, accountable, consulted, and informed for key ITAM activities.

      Empower your asset manager

      The asset manager is the critical ITAM role. Ensure they’re positioned to succeed.

      There’s too much change in the technology and business environment to expect ITAM to be “a problem to solve.” It is a practice that requires care and feeding through regular iteration to achieve success. At the helm of this practice is your asset manager, whose approach and past experience will have a significant impact on how you approach ITAM.

      The asset manager role requires a variety of skills, knowledge, and abilities including:

      • Operations, process, and practice management.
      • An ability to communicate, influence, negotiate, and facilitate.
      • Organizational knowledge and relationship management.
      • Contract and license agreement analysis, attention to detail.
      • Natural curiosity and a willingness to learn.
      • A strong understanding of technologies in use by the organization, and how they fit into the asset management program.
      Where the asset manager sits in the organization will also have an impact on their focus and priorities. When the asset manager reports into a service team, their focus will often reflect their team’s focus: end-user devices and software, customer satisfaction, request fulfillment. Asset teams that report into a leadership or governance function will be more likely to focus on organization-wide assets, governance, budget management, and compliance.

      “Where your asset manager sits, and what past experience they have, is going to influence how they do asset management.” (Jeremy Boerger, Consultant & Author)

      “It can be annoying at times, but a good IT asset manager will poke their nose into activities that do not obviously concern them, such as programme and project approval boards and technical design committees. Their aim is to identify and mitigate ITAM risks BEFORE the technology is deployed as well as to ensure that projects and solutions ‘bake in’ the necessary processes and tools that ensure IT assets can be managed effectively throughout their lifecycle.” (Kylie Fowler, ITAM by Design, 2017)

      IT asset managers must have a range of skills and knowledge

      • ITAM Operations, Process, and Practice Management
        The asset manager is typically responsible for managing and improving the ITAM practice and related processes and tools. The asset manager may administer the ITAM tool, develop reports and dashboards, evaluate and implement new technologies or services to improve ITAM maturity, and more.
      • Organizational Knowledge
        An effective IT asset manager has a good understanding of your organization and its strategy, products, stakeholders, and culture.
      • Technology & Product Awareness
        An IT asset manager must learn about new and changing technologies and products adopted by the organization (e.g. IoT, cloud) and develop recommendations on how to track and manage them via the ITAM practice.
      A book surrounded by icons corresponding to the bullet points.
      • People Management
        Asset managers often manage a team directly and have dotted-line reports across IT and the business.
      • Communication
        Important in any role, but particularly critical where learning, listening, negotiation, and persuasion are so critical.
      • Finance & Budgeting
        A foundational knowledge of financial planning and budgeting practices is often helpful, where the asset manager is asked to contribute to these activities.
      • Contract Review & Analysis
        Analyze new and existing contracts to evaluate changes, identify compliance requirements, and optimize spend.

      Assign ITAM responsibilities and accountabilities

      Align authority and accountability.
      • A RACI exercise will help you discuss and document accountability and responsibility for critical ITAM activities.
      • When responsibility and accountability are not currently well documented, it’s often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your hardware and software asset management procedures.

      R

      Responsible: The person who actually gets the job done.

      Different roles may be responsible for different aspects of the activity relevant to their role.

      A

      Accountable: The one role accountable for the activity (in terms completion, quality, cost, etc.)

      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      C

      Consulted: Must have the opportunity to provide meaningful input at certain points in the activity.

      Typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you’ll add to a process.

      I

      Informed: Receives information regarding the task, but has no requirement to provide feedback.

      Information might relate to process execution, changes, or quality.

      2.4 Conduct a RACI Exercise

      1-2 hours

      Input: An understanding of key roles and activities in ITAM practices, An understanding of your organization, High-level structure of your ITAM program

      Output: A RACI diagram for IT asset management

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Let’s face it – RACI exercises can be dry. We’ve found that the approach below is more collaborative, engaging, and effective compared to filling out the table as a large group.

      1. Create a shared working copy of the RACI charts on the following slides (e.g. write it out on a whiteboard or provide a link to this document and work directly in it).
      2. Review the list of template roles and activities as a group. Add, change, or remove roles and activities from the table as needed.
      3. Divide into small groups. Assign each group a set of roles, and have them define whether that role is accountable, responsible, consulted, or informed for each activity in the chart. Refer to the previous slide for context on RACI. Give everyone 15 minutes to update their section of the chart.
      4. Come back together as a large group to review the chart. First, check for accountability – there should generally be just one role accountable for each activity. Then, have each small group walk through their section, and encourage participants to ask questions. Is there at least one role responsible for each task, and what are they responsible for? Does everyone listed as consulted or informed really need to be? Make any necessary adjustments.

      Add your results to your copy of the ITAM Strategy Template

      Define ITAM governance activities

      RACI Chart for ITAM governance activities. In the first column is a list of governance activities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Document asset management responsibilities and accountabilities

      RACI Chart for ITAM asset management responsibilities and accountabilities. In the first column is a list of responsibilities and accountabilities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Step 2.5: Align ITAM with other Service Management Practices

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Establish shared and separate responsibilities for asset and configuration management.
      • Identify how ITAM can support other practices, and how other practices can support ITAM.

      Asset vs. Configuration

      Asset and configuration management look at the same world through different lenses.
      • IT asset management tends to focus on each IT asset in its own right: assignment or ownership, its lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations to other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they tend use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.
      Asset and Configuration Management: An Example

      Configuration Management Database (CMDB)

      A database of uniquely identified configuration items (CIs). Each CI record may include information on:
      Service Attributes

      Supported Service(s)
      Service Description, Criticality, SLAs
      Service Owners
      Data Criticality/Sensitivity

      CI Relationships

      Physical Connections
      Logical Connections
      Dependencies

      Arrow connector.

      Discovery, Normalization, Dependency Mapping, Business Rules*

      Manual Data Entry

      Arrow connector.
      This shared information could be attached to asset records, CI records, or both, and it should be synchronized between the two databases where it’s tracked in both.
      Hardware Information

      Serial, Model and Specs
      Network Address
      Physical Location

      Software Installations

      Hypervisor & OS
      Middleware & Software
      Software Configurations

      Arrow connector.

      Asset Management Database (AMDB)

      A database of uniquely identified IT assets. Each asset record may include information on:
      Procurement/Purchasing

      Purchase Request/Purchase Order
      Invoice and Cost
      Cost Center
      Vendor
      Contracts and MSAs
      Support/Maintenance/Warranties

      Asset Attributes

      Model, Title, Product Info, License Key
      Assigned User
      Lifecycle Status
      Last ITAM Audit Date
      Certificate of Disposal

      Arrows connecting multiple fields.

      IT Security Systems

      Vulnerability Management
      Threat Management
      SIEM
      Endpoint Protection

      IT Service Management (ITSM) System

      Change Tickets
      Request Tickets
      Incident Tickets
      Problem Tickets
      Project Tickets
      Knowledgebase

      Financial System/ERP

      General Ledger
      Accounts Payable
      Accounts Receivable
      Enterprise Assets
      Enterprise Contract Database

      (*Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.)

      2.5 Integrate ITAM and configuration practices

      45 minutes

      Input: Knowledge of the organization’s configuration management processes

      Output: Define how ITAM and configuration management will support one another

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Configuration manager

      Work through the table below to identify how you will collaborate and synchronize data across ITAM and configuration management practices and tools.

      What are the goals (if any currently exist) for the configuration management practice? Connect configuration items to services to support service management.
      How will configuration and asset management teams collaborate? Weekly status updates. As-needed working sessions.
      Shared visibility on each others’ Kanban tracker.
      Create tickets to raise and track issues that require collaboration or attention from the other team.
      How can config leverage ITAM? Connect CIs to financial, contractual, and ownership data.
      How can ITAM leverage config? Connect assets to services, changes, incidents.
      What key fields will be primarily tracked/managed by ITAM? Serial number, unique ID, user, location, PO number, …
      What key fields will be primarily tracked/managed by configuration management? Supported service(s), dependencies, service description, service criticality, network address…

      Add your results to your copy of the ITAM Strategy Template

      ITAM supports service management

      Decoupling asset management from other service management practices can result in lost value. Establish how asset management can support other service management practices – and how those practices can support ITAM.

      Incident Management

      What broke?
      Was it under warranty?
      Is there a service contract?
      Was it licensed?
      Who was it assigned to?
      Is it end-of-life?

      ITAM
      Practice

      Request Management

      What can this user request or purchase?
      What are standard hardware and software offerings?
      What does the requester already have?
      Are there items in inventory to fulfil the request?
      Did we save money by reissuing equipment?
      Is this a standard request?
      What assets are being requested regularly?

      What IT assets are related to the known issue?
      What models and vendors are related to the issue?
      Are the assets covered by a service contract?
      Are other tickets related to this asset?
      What end-of-life assets have been tied to incidents recently?

      Problem Management

      What assets are related to the change?
      Is the software properly licensed?
      Has old equipment been properly retired and disposed?
      Have software licenses been returned to the pool?
      Is the vendor support on the change part of a service contract?

      Change Enablement

      2.5. Connect with other IT service practices

      45 minutes

      Input: Knowledge of existing organizational IT service management processes

      Output: Define how ITAM will help other service management processes, and how other service management processes will help ITAM

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Service leads

      Complete the table below to establish what ITAM can provide to other service management practices, and what other practices can provide to ITAM.

      Practice ITAM will help Will help ITAM
      Incident Management Provide context on assets involved in an incident (e.g. ownership, service contracts). Track when assets are involved in incidents (via incident tickets).
      Request Management Oversee request & procurement processes. Help develop asset standards. Enter new assets in ITAM database.
      Problem Management Collect information on assets related to known issues. Report back on models/titles that are generating known issues.
      Change Enablement Provide context on assets for change review. Ensure EOL assets are retired and licenses are returned during changes.
      Capacity Management Identify ownership, location for assets at capacity. Identify upcoming refreshes or purchases.
      Availability Management Connect uptime and reliability to assets. Identify assets that are causing availability issues.
      Monitoring and Event Management Provide context to events with asset data. Notify asset of unrecognized software and hardware.
      Financial Management Establish current and predict future spending. Identify upcoming purchases, renewals.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.6: Evaluate ITAM tools and integrations

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Create a list of the ITAM tools currently in use, how they’re used, and their current limitations.
      • Identify new tools that could provide value to the ITAM practice, and what needs to be done to acquire and implement them.

      “Everything is connected. Nothing is also connected.” (Dirk Gently’s Holistic Detective Agency)

      Establish current strengths and gaps in your ITAM toolset

      ITAM data quality relies on tools and integrations that are managed by individuals or teams who don’t report directly to the ITAM function.

      Without direct line of sight into tools management, the ITAM team must influence rather than direct improvement initiatives that are in some cases critical to the performance of the ITAM function. To more effectively influence improvement efforts, you must explicitly identify what you need, why you need it, from which tools, and from which stakeholders.

      Data Sources
      Procurement Tools
      Discovery Tools
      Active Directory
      Purchase Documents
      Spreadsheets
      Input To Asset System(s) of Record
      ITAM Database
      ITSM Tool
      CMDB
      Output To Asset Data Consumption
      ITFM Tools
      Security Tools
      TEM Tools
      Accounting Tools
      Spreadsheets
      “Active Directory plays a huge role in audit defense and self-assessment, but no-one really goes out there and looks at Active Directory.

      I was talking to one organization that has 1,600,000 AD records for 100,000 employees.” (Mike Austin, Founder, MetrixData 360)

      2.6 Evaluate ITAM existing technologies

      30 minutes

      Input: Knowledge of existing ITAM tools

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify the use, limitations, and next steps for existing ITAM tools, including those not directly managed by the ITAM team.

      1. What tools do we have today?
      2. What are they used for? What are their limitations?
      3. Who manages them?
      4. What actions could we take to maximize the value of the tools?
      Existing Tool Use Constraints Owner Proposed Action?
      ITAM Module
      • Track HW/SW
      • Connect assets to incident, request
      • Currently used for end-user devices only
      • Not all divisions have access
      • SAM capabilities are limited
      ITAM Team/Service Management
      • Add license for additional read/write access
      • Start tracking infra in this tool
      Active Directory
      • Store user IDs, organizational data
      Major data quality issues IT Operations
      • Work with AD team to identify issues creating data issues

      Add your results to your copy of the ITAM Strategy Template

      2.6 Identify potential new tools

      30 minutes

      Input: Knowledge of tooling gaps, An understanding of available tools that could remediate gaps

      Output: New tools that can improve ITAM capabilities, including expected value and proposed next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify tools that are required to support the identified goals of the ITAM practice.

      1. What types of tools do we need that we don’t have?
      2. What could these tools help us do?
      3. What needs to be done next to investigate or acquire the appropriate tool?
      New Tool Expected Value Proposed Next Steps
      SAM tool
      • Automatically calculate licensing entitlements from contract data.
      • Automatically calculate licensing requirements from discovery data.
      • Support gap analyses.
      • Further develop software requirements.
      • Identify vendors in the space and create a shortlist.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.7: Create a plan for internal and external audits

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish your approach to internal data audits.
      • Create a high-level response plan for external audits.

      Validate ITAM data via internal audits

      Data audits provide assurance that the records in the ITAM database are as accurate as possible. Consider these three approaches:

      Compare Tool Records

      Audit your data by comparing records in the ITAM system to other discovery sources.

      • Ideally, use three separate data sources (e.g. ITAM database, discovery tool, security tool). Use a common field, such as the host name, to compare across fields. (To learn more about discovery tool analysis, see Jeremy Boerger’s book, Rethinking IT Asset Management.)
      • Run reports to compare records and identify discrepancies. This could include assets missing from one system or metadata differences such as different users or installed software.
      • Over time, discrepancies between tools should be well understood and accepted; otherwise, they should be addressed and remediated.
      IT-led Audit

      Conduct a hands-on investigation led by ITAM staff and IT technicians.

      • In-person audits require significant effort and resources. Each audit should be scoped and planned ahead of time to focus on known problem areas.
      • Provide the audit team with exact instructions on what needs to be verified and recorded. Depending on the experience and attention to detail of the audit team, you may need to conduct spot checks to ensure you’re catching any issues in the audit process itself.
      • Automation should be used wherever possible (e.g. through barcodes, scanners, and tables for quick access to ITAM records).
      User-led audit

      Have users validate the IT assets assigned to them.

      • Even more than IT-led audits: don’t use this approach too frequently; keep the scope as narrow as possible and the process as simple as possible.
      • Ensure users have all the information and tools they’ll need readily available to complete this task, or the result will be ineffective and will only frustrate your users.
      • Consider a process integrated with your ITSM tool: once a year, when a user logs in to the portal, they will be asked to enter the asset code for their laptop (and provided with instructions on where to find that code). Investigate discrepancies between assignments and ITAM records.

      2.7 Set an approach to internal data audits

      30 minutes

      Input: An understanding of current data audit capabilities and needs

      Output: An outline of how you’ll approach data audits, including frequency, scope, required resources

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team

      Review the three internal data audit approaches outlined on the previous slide, and identify which of the three approaches you’ll use. For each approach, complete the fields in the table below.

      Audit Approach How often? What scope? Who’s involved? Comments
      Compare tool records Monthly Compare ITAM DB, Intune/ConfigMgr, and Vulnerability Scanner Data; focus on end-user devices to start Asset manager will lead at first.
      Work with tool admins to pull data and generate reports.
      IT-led audit Annual End-user devices at a subset of locations Asset manager will work with ITSM admins to generate reports. In-person audit to be conducted by local techs.
      User-led audit Annual Assigned personal devices (start with a pilot group) Asset coordinator to develop procedure with ITSM admin. Run pilot with power users first.

      Add your results to your copy of the ITAM Strategy Template

      Prepare for and respond to external audits and true-ups

      Are you ready when software vendors come knocking?

      • Vendor audits are expensive.
      • If you’re out of compliance, you will at minimum be required to pay the missing license fees. At their discretion, vendors may choose to add punitive fees and require you to cover the hourly cost of their audit teams. If you choose not to pay, the vendor could secure an injunction to cut off your service, which in many cases will be far more costly than the fines. And this is aside from the intangible costs of the disruption to your business and damaged relationships between IT, ITAM, your business, and other partners.
      • Having a plan to respond to an audit is critical to reducing audit risk. Preparation will help you coordinate your audit response, ensure the audit happens on the most favorable possible terms, and even prevent some audits from happening in the first place.
      • The best defense, as they say, is a good offense. Good ITAM and SAM processes will allow you to track acquisition, allocation, and disposal of software licenses; understand your licensing position; and ensure you remain compliant whenever possible. The vendor has no reason to audit you when there’s nothing to find.
      • Know when and where your audit risk is greatest, so you can focus your resources where they can deliver the most value.
      “If software audits are a big part of your asset operations, you have problems. You can reduce the time spent on audits and eliminate some audits by having a proactive ITAM practice.” (Sandi Conrad, Principal Research Director)

      Info-Tech Insight

      Audit defense starts long before you get audited. For an in-depth review of your audit approach, see Info-Tech’s Prepare and Defend Against a Software Audit.

      Identify areas of higher audit risk

      Watch for these warning signs
      • Your organization is visibly fighting fires. Signs of disorder may signal to vendors that there are opportunities to exploit via an audit. Past audit failures make future audits more likely.
      • You are looking for ways to decrease spend. Vendors may counter attempts to true-down licensing by launching an audit to try to find unlicensed software that provides them leverage to negotiate maintained or even increased spending.
      • Your license/contract terms with the vendor are particularly complex or highly customized. Very complex terms may make it harder to validate your own compliance, which may present opportunities to the vendor in an audit.
      • The vendor has earned a reputation for being particularly aggressive with audits. Some vendors include audits as a standard component of their business model to drive revenue. This may include acquiring smaller vendors or software titles that may not have been audit-driven in the past, and running audits on their new customer base.

      “The reality is, software vendors prey on confusion and complication. Where there’s confusion, there’s opportunity.” (Mike Austin, Founder, MetrixData 360)

      Develop an audit response plan

      You will be on the clock once the vendor sends you an audit request. Have a plan ready to go.
      • Don’t panic: Resist knee-jerk reactions. Follow the plan.
      • Form an audit response team and centralize your response: This team should be led by a member of the ITAM group, and it should include IT leadership, software SMEs, representatives from affected business areas, vendor management, contract management, and legal. You may also need to bring on a contractor with deep expertise with the vendor in question to supplement your internal capabilities. Establish clearly who will be the point of contact with the vendor during the audit.
      • Clarify the scope of the audit: Clearly establish what the audit will cover – what products, subsidiaries, contracts, time periods, geographic regions, etc. Manage the auditors to prevent scope creep.
      • Establish who covers audit costs: Vendors may demand the auditee cover the hourly cost of their audit team if you’re significantly out of compliance. Consider asking the vendor to pay for your team’s time if you’re found to be compliant.
      • Know your contract: Vendors’ contracts change over time, and it’s no guarantee that even your vendor’s licensing experts will be aware of the rights you have in your contract. You must know your entitlements to negotiate effectively.
      1. Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      2. Acknowledge receipt of audit notice.
      3. Negotiate timing and scope of the audit.
      4. Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      5. Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      6. Compare entitlements to installed software.
      7. Investigate any anomalies (e.g. unexpected or non-compliant software).
      8. Review results with the audit response team.

      2.7 Clarify your vendor audit response plan

      1 hour

      Input: Organizational knowledge on your current audit response procedures

      Output: Audit response team membership, High-level audit checklist, A list of things to start, stop, and continue doing as part of the audit response

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      1. Who’s on the audit response team, and what’s their role? Who will lead the team? Who will be the point of contact with the auditor?
      2. What are the high-level steps in our audit response workflow? Use the example checklist below as a starting point.
      3. What do we need to start, stop, and continue doing in response to audit requests?

      Example Audit Checklist

      • Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      • Acknowledge receipt of audit notice.
      • Negotiate timing and scope of the audit.
      • Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      • Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      • Compare entitlements to installed software.
      • Investigate any anomalies (e.g. unexpected or non-compliant software).
      • Review results with the audit response team.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.8: Improve budget processes

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Identify what you need to start, stop, and continue to do to support budgeting processes.

      Improve budgeting and forecasting

      Insert ITAM into budgeting processes to deliver significant value.

      Some examples of what ITAM can bring to the budgeting table:
      • Trustworthy data on deployed assets and spending obligations tied to those assets.
      • Projections of hardware due for replacement in terms of quantity and spend.
      • Knowledge of IT hardware and software contract terms and pricing.
      • Lists of unused or underused hardware and software that could be redeployed to avoid spend.
      • Comparisons of spend year-over-year.

      Being part of the budgeting process positions ITAM for success in other ways:

      • Helps demonstrate the strategic value of the ITAM practice.
      • Provides insight into business and IT strategic projects and priorities for the year.
      • Strengthens relationships with key stakeholders, and positions the ITAM team as trusted partners.

      “Knowing what you have [IT assets] is foundational to budgeting, managing, and optimizing IT spend.” (Dave Kish, Info-Tech, Practice Lead, IT Financial Management)

      Stock image of a calculator.

      2.8 Build better budgets

      20 minutes

      Input: Context on IT budgeting processes

      Output: A list of things to start, stop, and continue doing as part of budgeting exercises

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What should we start, stop, and continue doing to support organizational budgeting exercises?

      Start Stop Continue
      • Creating buckets of spend and allocating assets to those buckets.
      • Zero-based review on IaaS instances quarterly.
      • Develop dashboards plugged into asset data for department heads to view allocated assets and spend.
      • Create value reports to demonstrate hard savings as well as cost avoidance.
      • Waiting for business leaders to come to us for help (start reaching out with reports proactively, three months before budget cycle).
      • % increases on IT budgets without further review.
      • Monthly variance budget analysis.
      • What-if analysis for asset spend based on expected headcount increases.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.9: Establish a documentation framework

      Participants

      • Project sponsor and lead facilitator
      • ITAM team

      Outcomes

      • Identify key documentation and gaps in your documentation.
      • Establish where documentation should be stored, who should own it, who should have access, and what should trigger a review.

      Create ITAM documentation

      ITAM documentation will typically support governance or operations.

      Long-term planning and governance
      • ITAM policy and/or related policies (procurement policy, security awareness policy, acceptable use policy, etc.)
      • ITAM strategy document
      • ITAM roadmap or burndown list
      • Job descriptions
      • Functional requirements documents for ITAM tools

      Operational documentation

      • ITAM SOPs (hardware, software) and workflows
      • Detailed work instructions/knowledgebase articles
      • ITAM data/records
      • Contracts, purchase orders, invoices, MSAs, SOWs, etc.
      • Effective Licensing Position (ELP) reports
      • Training and communication materials
      • Tool and integration documentation
      • Asset management governance, operations, and tools typically generate a lot of documentation.
      • Don’t create documentation for the sake of documentation. Prioritize building and maintaining documentation that addresses major risks or presents opportunities to improve the consistency and reliability of key processes.
      • Maximize the value of ITAM documentation by ensuring it is as current, accessible, and usable as it needs to be.
      • Clearly identify where documentation is stored and who should have access to it.
      • Identify who is accountable for the creation and maintenance of key documentation, and establish triggers for reviews, updates, and changes.

      Consider ITAM policies

      Create policies that can and will be monitored and enforced.
      • Certain requirements of the ITAM practice may need to be backed up by corporate policies: formal statements of organizational expectations that must be recognized by staff, and which will lead to sanctions/penalties if breached.
      • Some organizations will choose to create one or more ITAM-specific policies. Others will include ITAM-related statements in other existing policies, such as acceptable use policies, security training and awareness policies, procurement policies, configuration policies, e-waste policies, and more.
      • Ensure that you are prepared to monitor compliance with policies and evenly enforce breaches of policy. Failing to consistently enforce your policies exposes you and your organization to claims of negligence or discriminatory conduct.
      • For a template for ITAM-specific policies, see Info-Tech’s policy templates for Hardware Asset Management and Software Asset Management.

      2.9 Establish documentation gaps

      15-30 minutes

      Input: An understanding of existing documentation gaps and risks

      Output: Documentation gaps, Identified owners, repositories, access rights, and review/update protocols

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, Optional: IT managers, ITAM business partners

      Discuss and record the following:

      • What planning/governance, operational, and tooling documentation do we still need to create? Who is accountable for the creation and maintenance of these documents?
      • Where will the documentation be stored? Who can access these documents?
      • What will trigger reviews or changes to the documents?
      Need to Create Owner Stored in Accessible by Trigger for review
      Hardware asset management SOP ITAM manager ITAM SharePoint site › Operating procedures folder
      • All IT staff
      • Annual review
      • As-needed for major tooling changes that require a documentation update

      Add your results to your copy of the ITAM Strategy Template

      Step 2.10: Create a roadmap and communication plan

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • A timeline of key ITAM initiatives.
      • Improvement ideas aligned to key initiatives.
      • A communication plan tailored to key stakeholders.
      • Your ITAM Strategy document.

      “Understand that this is a journey. This is not a 90-day project. And in some organizations, these journeys could be three or five years long.” (Mike Austin, MetrixData 360)

      2.10 Identify key ITAM initiatives

      30-45 minutes

      Input: Organizational strategy documents

      Output: A roadmap that outlines next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      1. Identify key initiatives that are critical to improving practice maturity and meeting business goals.
      2. There should only be a handful of really key initiatives. This is the work that will have the greatest impact on your ability to deliver value. Too many initiatives muddy the narrative and can distract from what really matters.
      3. Plot the target start and end dates for each initiative in the business and IT transformation timeline you created in Phase 1.
      4. Review the chart and consider – what new capabilities should the ITAM practice have once the identified initiatives are complete? What transformational initiatives will you be better positioned to support?

      Add your results to your copy of the ITAM Strategy Template

      Transformation Timeline

      Example transformation timeline with row headers 'Business Inititiaves', 'IT Initiatives', and 'ITAM Initiatives'. Each initiative is laid out along the timeline appropriately.

      2.10 Align improvement ideas to initiatives

      45 minutes

      Input: Key initiatives, Ideas for ITAM improvement collected over the course of previous exercises

      Output: Concrete action items to support each initiative

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      As you’ve been working through the previous exercises, you have been tracking ideas for improvement – now we’ll align them to your roadmap.

      1. Review the list of ideas for improvement you’ve produced over the working sessions. Consolidate the list – are there any ideas that overlap or complement each other? Record any new ideas. Frame each idea as an action item – something you can actually do.
      2. Connect the action items to initiatives. It may be that not every action item becomes part of a key initiative. (Don’t lose ideas that aren’t part of key initiatives – track them in a separate burndown list or backlog.)
      3. Identify a target completion date and owner for each action item that’s part of an initiative.

      Add your results to your copy of the ITAM Strategy Template

      Example ITAM initiatives

      Initiative 1: Develop hardware/software standards
      Task Target Completion Owner
      Laptop standards Q1-2023 ITAM manager
      Identify/eliminate contracts for unused software using scan tool Q2-2023 ITAM manager
      Review O365 license levels and standard service Q3-2023 ITAM manager

      Initiative 2: Improve ITAM data quality
      Task Target Completion Owner
      Implement scan agent on all field laptops Q3-2023 Desktop engineer
      Conduct in person audit on identified data discrepancies Q1-2024 ITAM team
      Develop and run user-led audit Q1-2024 Asset manager

      Initiative 3: Acquire & implement a new ITAM tool
      Task Target Completion Owner
      Select an ITAM tool Q3-2023 ITAM manager
      Implement ITAM tool, incl. existing data migration Q1-2024 ITAM manager
      Training on new tool Q1-2024 ITAM manager
      Build KPIs, executive dashboards in new tool Q2-2024 Data analyst
      Develop user-led audit functionality in new tool Q3-2024 ITAM coordinator

      2.10 Create a communication plan

      45 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      Develop clear, consistent, and targeted messages to key ITAM stakeholders.

      1. Modify the list of stakeholders in the first column.
      2. What benefits should those stakeholders realize from ITAM? What impact may the proposed improvements have on them? Refer back to exercises from Phase 1, where you identified key stakeholders, their priorities, and how ITAM could help them.
      3. Identify communication channels (in-person, email, all-hands meeting, etc.) and timing – when you’ll distribute the message. You may choose to use more than one channel, and you may need to convey the message more than once.
      Group ITAM Benefits Impact Channel(s) Timing
      CFO
      • More accurate IT spend predictions
      • Better equipment utilization and value for money
      • Sponsor integration project between ITAM DB and financial system
      • Support procurement procedures review
      Face-to-face – based on their availability Within the next month
      CIO
      • Better oversight into IT spend
      • Data to help demonstrate IT value
      • Resources required to support tool and ITAM process improvements
      Standing bi-monthly 1:1 meetings Review strategy at next meeting
      IT Managers
      Field Techs

      Add your results to your copy of the ITAM Strategy Template

      2.10 Put the final touches on your ITAM Strategy

      30 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      You’re almost done! Do a final check of your work before you send a copy to your participants.

      1. Summarize in three points the key findings from the activities you’ve worked through. What have you learned? What are your priorities? What key message do you need to get across? Add these to the appropriate slide near the start of the ITAM Strategy Template.
      2. What are your immediate next steps? Summarize no more than five and add them to the appropriate slide near the start of the ITAM Strategy Template.
        1. Are you asking for something? Approval for ITAM initiatives? Funding? Resources? Clearly identify the ask as part of your next steps.
      3. Are the KPIs identified in Phase 1 still valid? Will they help you monitor for success in the initiatives you’ve identified in Phase 2? Make any adjustments you think are required to the KPIs to reflect the additional completed work.

      Add your results to your copy of the ITAM Strategy Template

      Research Contributors and Experts

      Kylie Fowler
      Principal Consultant
      ITAM Intelligence

      Kylie is an experienced ITAM/FinOps consultant with a track record of creating superior IT asset management frameworks that enable large companies to optimize IT costs while maintaining governance and control.

      She has operated as an independent consultant since 2009, enabling organizations including Sainsbury's and DirectLine Insurance to leverage the benefits of IT asset management and FinOps to achieve critical business objectives. Recent key projects include defining an end-to-end SAM strategy, target operating model, policies and processes which when implemented provided a 300% ROI.

      She is passionate about supporting businesses of all sizes to drive continuous improvement, reduce risk, and achieve return on investment through the development of creative asset management and FinOps solutions.

      Rory Canavan
      Owner and Principal Consultant
      SAM Charter

      Rory is the founder, owner, and principal consultant of SAM Charter, an internationally recognized consultancy in enterprise-wide Software & IT Asset Management. As an industry leader, SAM Charter is uniquely poised to ensure your IT & SAM systems are aligned to your business requirements.

      With a technical background in business and systems analysis, Rory has a wide range of first-hand experience advising numerous companies and organizations on the best practices and principles pertaining to software asset management. This experience has been gained in both military and civil organizations, including the Royal Navy, Compaq, HP, the Federation Against Software Theft (FAST), and several software vendors.

      Research Contributors and Experts

      Jeremy Boerger
      Founder, Boerger Consulting
      Author of Rethinking IT Asset Management

      Jeremy started his career in ITAM fighting the Y2K bug at the turn of the 21st century. Since then, he has helped companies in manufacturing, healthcare, banking, and service industries build and rehabilitate hardware and software asset management practices.

      These experiences prompted him to create the Pragmatic ITAM method, which directly addresses and permanently resolves the fundamental flaws in current ITAM and SAM implementations.

      In 2016, he founded Boerger Consulting, LLC to help business leaders and decision makers fully realize the promises a properly functioning ITAM can deliver. In his off time, you will find him in Cincinnati, Ohio, with his wife and family.

      Mike Austin
      Founder and CEO
      MetrixData 360

      Mike Austin leads the delivery team at MetrixData 360. Mike brings more than 15 years of Microsoft licensing experience to his clients’ projects. He assists companies, from Fortune 500 to organizations with as few as 500 employees, with negotiations of Microsoft Enterprise Agreements (EA), Premier Support Contracts, and Select Agreements. In addition to helping negotiate contracts, he helps clients build and implement software asset management processes.

      Previously, Mike was employed by Microsoft for more than 8 years as a member of the global sales team. With Microsoft, Mike successfully negotiated more than a billion dollars in new and renewal EAs. Mike has also negotiated legal terms and conditions for all software agreements, developed Microsoft’s best practices for global account management, and was awarded Microsoft’s Gold Star Award in 2003 and Circle of Excellence in 2008 for his contributions.

      Bibliography

      “Asset Management.” SFIA v8. Accessed 17 March 2022.

      Boerger, Jeremy. Rethinking IT Asset Management. Business Expert Press, 2021.

      Canavan, Rory. “C-Suite Cheat Sheet.” SAM Charter, 2021. Accessed 17 March 2022.

      Fisher, Matt. “Metrics to Measure SAM Success.” Snow Software, 26 May 2015. Accessed 17 March 2022.

      Flexera (2021). “State of ITAM Report.” Flexera, 2021. Accessed 17 March 2022.

      Fowler, Kylie. “ITAM by design.” BCS, The Chartered Institute for IT, 2017. Accessed 17 March 2022.

      Fowler, Kylie. “Ch-ch-ch-changes… Is It Time for an ITAM Transformation?” ITAM Intelligence, 2021. Web. Accessed 17 March 2022.

      Fowler, Kylie. “Do you really need an ITAM policy?” ITAM Accelerate, 15 Oct. 2021. Accessed 17 March 2022.

      Hayes, Chris. “How to establish a successful, long-term ITAM program.” Anglepoint, Sept. 2021. Accessed 17 March 2022.

      ISO/IEC 19770-1-2017. IT Asset Management Systems – Requirements. Third edition. ISO, Dec 2017.

      Joret, Stephane. “IT Asset Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Jouravlev, Roman. “IT Service Financial Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Pagnozzi, Maurice, Edwin Davis, Sam Raco. “ITAM Vs. ITSM: Why They Should Be Separate.” KPMG, 2020. Accessed 17 March 2022.

      Rumelt, Richard. Good Strategy, Bad Strategy. Profile Books, 2013.

      Stone, Michael et al. “NIST SP 1800-5 IT Asset Management.” Sept, 2018. Accessed 17 March 2022.

      Stakeholder Relations

      • Buy Link or Shortcode: {j2store}25|cart{/j2store}
      • Related Products: {j2store}25|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: /strategy-and-governance

      The challenge

      • Stakeholders come in a wide variety, often with competing and conflicting demands.
      • Some stakeholders are hard to identify. Those hidden agendas may derail your efforts.
      • Understanding your stakeholders' relative importance allows you to prioritize your IT agenda according to the business needs.

      Our advice

      Insight

      • Stakeholder management is an essential factor in how successful you will be.
      • Stakeholder management is a continuous process. The landscape constantly shifts.
      • You must also update your stakeholder management plan and approach on an ongoing basis.

      Impact and results 

      • Use your stakeholder management process to identify, prioritize, and manage key stakeholders effectively.
      • Continue to build on strengthening your relationships with stakeholders. It will help to gain easier buy-in and support for your future initiatives. 

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Make the case

      Identify stakeholders

      • Stakeholder Management Analysis Tool (xls)

      Analyze your stakeholders

      Assess the stakeholder's influence, interest, standing, and support to determine priority for future actions 

      Manage your stakeholders

      Develop your stakeholder management and communication plans

      • Stakeholder Management Plan Template (doc)
      • Communication Plan Template (doc)

      Monitor your stakeholder management plan performance

      Measure and monitor the success of your stakeholder management process.

       

       

      Proactively Identify and Mitigate Vendor Risk

      • Buy Link or Shortcode: {j2store}227|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • IT priorities are focused on daily tasks, pushing risk management to secondary importance and diverging from a proactive environment.
      • IT leaders are relying on an increasing number of third-party technology vendors and outsourcing key functions to meet the rapid pace of change within IT.
      • Risk levels can fluctuate over the course of the partnership, requiring manual process checks and/or automated solutions.

      Our Advice

      Critical Insight

      • Every IT vendor carries risks that have business implications. These legal, financial, security, and operational risks could inhibit business continuity and IT can’t wait until an issue arises to act.
      • Making intelligent decisions about risks without knowing what their financial impact will be is difficult. Risk impact must be quantified.
      • You don’t know what you don’t know, and what you don’t know, can hurt you. To find hidden risks, you must use a structured risk identification method.

      Impact and Result

      • A thorough risk assessment in the selection phase is your first line of defense. If you follow the principles of vendor risk management, you can mitigate collateral losses following an adverse event.
      • Make a conscious decision whether to accept the risk based on time, priority, and impact. Spend the required time to correctly identify and enact defined vendor management processes that determine spend categories and appropriately evaluate potential and preferred suppliers. Ensure you accurately assess the partnership potential.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s most significant risks before they happen.

      Proactively Identify and Mitigate Vendor Risk Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to create a vendor risk management program that minimizes your organization’s vulnerability and mitigates adverse scenarios.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review vendor risk fundamentals and establish governance

      Review IT vendor risk fundamentals and establish a risk governance framework.

      • Proactively Identify and Mitigate Vendor Risk – Phase 1: Review Vendor Risk Fundamentals and Establish Governance
      • Vendor Risk Management Maturity Assessment Tool
      • Vendor Risk Management Program Manual
      • Risk Event Action Plan

      2. Assess vendor risk and define your response strategy

      Categorize, prioritize, and assess your vendor risks. Follow up with creating effective response strategies.

      • Proactively Identify and Mitigate Vendor Risk – Phase 2: Assess Vendor Risk and Define Your Response Strategy
      • Vendor Classification Model Tool
      • Vendor Risk Profile and Assessment Tool
      • Risk Costing Tool
      • Risk Register Tool

      3. Monitor, communicate, and improve IT vendor risk process

      Assign accountability and responsibilities to formalize ongoing risk monitoring. Communicate your findings to management and share the plan moving forward.

      • Proactively Identify and Mitigate Vendor Risk – Phase 3: Monitor, Communicate, and Improve IT Vendor Risk Process
      • Risk Report
      [infographic]

      Workshop: Proactively Identify and Mitigate Vendor Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare for the Workshop

      The Purpose

      To prepare the team for the workshop.

      Key Benefits Achieved

      Avoids delays and interruptions once the workshop is in progress.

      Activities

      1.1 Send workshop agenda to all participants.

      1.2 Prepare list of vendors and review any contracts provided by them.

      1.3 Review current risk management process.

      Outputs

      All necessary participants assembled

      List of vendors and vendor contracts

      Understanding of current risk management process

      2 Review Vendor Risk Fundamentals and Establish Governance

      The Purpose

      Review IT vendor risk fundamentals.

      Assess current maturity and set risk management program goals.

      Engage stakeholders and establish a risk governance framework.

      Key Benefits Achieved

      Understanding of organizational risk culture and the corresponding risk threshold.

      Obstacles to effective IT risk management identified.

      Attainable goals to increase maturity established.

      Understanding of the gap to achieve vendor risk readiness.

      Activities

      2.1 Brainstorm vendor-related risks.

      2.2 Assess current program maturity.

      2.3 Identify obstacles and pain points.

      2.4 Develop risk management goals.

      2.5 Develop key risk indicators (KRIs) and escalation protocols.

      2.6 Gain stakeholders’ perspective.

      Outputs

      Vendor risk management maturity assessment

      Goals for vendor risk management

      Stakeholders’ opinions

      3 Assess Vendor Risk and Define Your Response Strategy

      The Purpose

      Categorize vendors.

      Prioritize assessed risks.

      Key Benefits Achieved

      Risk events prioritized according to risk severity – as defined by the business.

      Activities

      3.1 Categorize vendors.

      3.2 Map vendor infrastructure.

      3.3 Prioritize vendors.

      3.4 Identify risk contributing factors.

      3.5 Assess risk exposure.

      3.6 Calculate expected cost.

      3.7 Identify risk events.

      3.8 Input risks into the Risk Register Tool.

      Outputs

      Vendors classified and prioritized

      Vendor risk exposure

      Expected cost calculation

      4 Assess Vendor Risk and Define Your Response Strategy (continued)

      The Purpose

      Determine risk threshold and contract clause relating to risk prevention.

      Identify and assess risk response actions.

      Key Benefits Achieved

      Thorough analysis has been conducted on the value and effectiveness of risk responses for high-severity risk events.

      Risk response strategies have been identified for all key risks.

      Authoritative risk response recommendations can be made to senior leadership.

      Activities

      4.1 Determine the threshold for (un)acceptable risk.

      4.2 Match elements of the contract to related vendor risks.

      4.3 Identify and assess risk responses.

      Outputs

      Thresholds for (un)acceptable risk

      Risk responses

      5 Monitor, Communicate, and Improve IT Vendor Risk Process

      The Purpose

      Communicate top risks to management.

      Assign accountabilities and responsibilities for risk management process.

      Establish monitoring schedule.

      Key Benefits Achieved

      Risk monitoring responsibilities are established.

      Transparent accountabilities and established ongoing improvement of the vendor risk management program.

      Activities

      5.1 Create a stakeholder map.

      5.2 Complete RACI chart.

      5.3 Establish the reporting schedule.

      5.4 Finalize the vendor risk management program.

      Outputs

      Stakeholder map

      Assigned accountability for risk management

      Established monitoring schedule

      Risk report

      Vendor Risk Management Program Manual

      Skills Development on the Mainframe Platform

      • Buy Link or Shortcode: {j2store}336|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      Mainframes remain a critical part of an organization’s infrastructure and will need to support these platforms for the foreseeable future. Despite the importance, it can be a challenge for organizations to find qualified resources to support them. Meanwhile, companies are unsure of where to find help to train and develop their teams on mainframe technologies and are at risk of a skills gap within their teams.

      Our Advice

      Critical Insight

      • Mainframes continue to have wide usage, particularly in enterprise organizations. The complexity of moving or replatforming many of these applications means these platforms will be around for a long time still.
      • Companies need to be proactive about developing their teams to support their mainframe systems.

      Impact and Result

      • Companies can protect their assets by cultivating a pipeline of qualified resources to support their mainframe infrastructure.
      • There is a robust training ecosystem headed by large, reputable organizations to help develop and support companies' resources. You don’t have to do it alone.

      Skills Development on the Mainframe Platform Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Skills Development on the Mainframe Platform Storyboard – An overview of the solutions available to support your mainframe training and skills development needs.

      Your mainframes are not going to disappear overnight. These systems often support the most critical operations in your organization. You need to ensure you have the right qualified resources to support your platforms.

      • Skills Development on the Mainframe Platform Storyboard
      [infographic]

      Quality Management

      • Buy Link or Shortcode: {j2store}45|cart{/j2store}
      • Related Products: {j2store}45|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture
      Drive efficiency and agility with right-sized quality management

      Drive Customer Convenience by Enabling Text-Based Customer Support

      • Buy Link or Shortcode: {j2store}531|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Text messaging services and applications (such as SMS, iMessage, WhatsApp, and Facebook Messenger) have seen explosive growth over the last decade. They are an entrenched part of consumers’ daily lives. For many demographics, text messaging rather than audio calls is the preferred medium of communication via smartphone.
      • Despite the popularity of text messaging services and applications with consumers, organizations have been slow to adequately incorporate these channels into their customer service strategy.
      • The result is a major disconnect between the channel preferences of consumers and the customer service options being offered by businesses.

      Our Advice

      Critical Insight

      • IT must work with their counterparts in customer service to build a technology roadmap that incorporates text messaging services and apps as a core channel for customer interaction. Doing so will increase IT’s stature as an innovator in the eyes of the business, while allowing the broader organization to leapfrog competitors that have not yet added text-based support to their repertoire of service channels. Incorporating text messaging as a customer service channel will increase customer satisfaction, improve retention, and reduce cost-to-serve.
      • A prudent strategy for text-based customer service begins with defining the value proposition and creating objectives: is there a strong fit with the organization’s customers and service use cases? Next, organizations must create a technology enablement roadmap for text-based support that incorporates the right tools and applications to deliver it. Finally, the strategy must address best practices for text-based customer service workflows and appropriate resourcing.

      Impact and Result

      • Understand the value and use cases for text-based customer support.
      • Create a framework for enabling technologies that will support scalable text-based customer service.
      • Improve underlying business metrics such as customer satisfaction, retention, and time to resolution by having a plan for text-based support.
      • Better align IT with customer service and support needs.

      Drive Customer Convenience by Enabling Text-Based Customer Support Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should be leveraging text-based services for customer support, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create the business case for text-based customer support

      Understand the use cases and benefits of using text-based services for customer support, and establish how they align to the organization’s current service strategy.

      • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 1: Create the Business Case for Text-Based Customer Support
      • Text-Based Customer Support Strategic Summary Template
      • Text-Based Customer Support Project Charter Template
      • Text-Based Customer Support Business Case Assessment

      2. Create a technology enablement framework for text-based customer support

      Identify the right applications that will be needed to adequately support a text-based support strategy.

      • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 2: Create a Technology Enablement Framework for Text-Based Customer Support
      • Text-Based Customer Support Requirements Traceability Matrix

      3. Create customer service workflows for text-based support

      Create repeatable workflows and escalation policies for text-centric support.

      • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 3: Create Customer Service Workflows for Text-Based Support
      • Text-Based Customer Support TCO Tool
      • Text-Based Customer Support Acceptable Use Policy
      [infographic]

      Workshop: Drive Customer Convenience by Enabling Text-Based Customer Support

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Create the Business Case for Text-Based Support

      The Purpose

      Create the business case for text-based support.

      Key Benefits Achieved

      A clear direction on the drivers and value proposition of text-based customer support for your organization.

      Activities

      1.1 Identify customer personas.

      1.2 Define business and IT drivers.

      Outputs

      Identification of IT and business drivers.

      Project framework and guiding principles for the project.

      2 Create a Technology Enablement Framework for Text-Based Support

      The Purpose

      Create a technology enablement framework for text-based support.

      Key Benefits Achieved

      Prioritized requirements for text-based support and a vetted shortlist of the technologies needed to enable it.

      Activities

      2.1 Determine the correct migration strategy based on the current version of Exchange.

      2.2 Plan the user groups for a gradual deployment.

      Outputs

      Exchange migration strategy.

      User group organization by priority of migration.

      3 Create Service Workflows for Text-Based Support

      The Purpose

      Create service workflows for text-based support.

      Key Benefits Achieved

      Customer service workflows and escalation policies, as well as risk mitigation considerations.

      Present final deliverable to key stakeholders.

      Activities

      3.1 Review the text channel matrix.

      3.2 Build the inventory of customer service applications that are needed to support text-based service.

      Outputs

      Extract requirements for text-based customer support.

      4 Finalize Your Text Service Strategy

      The Purpose

      Finalize the text service strategy.

      Key Benefits Achieved

      Resource and risk mitigation plan.

      Activities

      4.1 Build core customer service workflows for text-based support.

      4.2 Identify text-centric risks and create a mitigation plan.

      4.3 Identify metrics for text-based support.

      Outputs

      Business process models assigned to text-based support.

      Formulation of risk mitigation plan.

      Key metrics for text-based support.

      Avoid Project Management Pitfalls

      • Buy Link or Shortcode: {j2store}374|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Program & Project Management
      • Parent Category Link: /program-and-project-management
      • IT organizations seem to do everything in projects, yet fewer than 15% successfully complete all deliverables on time and on budget.
      • Project managers seem to succumb to the relentless pressure from stakeholders to deliver more, more quickly, with fewer resources, and with less support than is ideal.
      • To achieve greater likelihood that your project will stay on track, watch out for the four big pitfalls: scope creep, failure to obtain stakeholder commitment, inability to assemble a team, and failure to plan.

      Our Advice

      Critical Insight

      • While many project managers worry about proper planning as the key to project success, skilled management of the political factors around a project has a much greater impact on success.
      • Alone, combating scope creep can improve your likelihood of success by a factor of 2x.
      • A strong project sponsor will be key to fighting the inevitable battles to control scope and obtain resources.

      Impact and Result

      • Take steps to avoid falling into common project pitfalls.
      • Assess which pitfalls threaten your project in its current state and take appropriate steps to avoid falling into them.
      • Avoiding pitfalls will allow you to deliver value on time and on budget, creating the perception of success in users’ and managers’ eyes.

      Avoid Project Management Pitfalls Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Learn about common PM pitfalls and the strategies to avoid them

      Consistently meet project goals through enhanced PM knowledge and awareness.

      • Storyboard: Avoid Project Management Pitfalls
      • None

      2. Detect project pitfalls

      Take action and mitigate a pitfall before it becomes a problem.

      • Project Pitfall Detection & Mitigation Tool

      3. Document and report PM issues

      Learn from issues encountered to help map PM strategies for future projects.

      • Project Management Pitfalls Issue Log
      [infographic]

      Pandemic Preparation – The People Playbook

      • Buy Link or Shortcode: {j2store}513|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Lead
      • Parent Category Link: /lead
      • Keeping employees safe – limiting exposure of employees to the virus and supporting them in the event they become ill.
      • Reducing potential disruption to business operations through employee absenteeism and travel restrictions.

      Our Advice

      Critical Insight

      • Communication of facts and definitive action plans from credible leaders is the key to maintaining some stability during a time of uncertainty.
      • Remote work is no longer a remote possibility – implementing alternative temporary work arrangements that keep large groups of employees from congregating reduce risk of employee exposure and operational downtime.
      • Pandemic travel protocols are necessary to support staff and their continuation of work while traveling for business and/or if stuck in a high-risk, restricted area.

      Impact and Result

      • Assign accountability of key planning decisions to members of a pandemic response team.
      • Craft key messages in preparation for communicating to employees.
      • Cascade communications from credible sources in a way that will establish pandemic travel protocols.

      Pandemic Preparation – The People Playbook Research & Tools

      Start here. Read the Pandemic Preparation: The People Playbook

      Read our concise Playbook to find out how you can immediately prepare for the people side of pandemic planning.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Pandemic Preparation: The People Playbook
      [infographic]

      Understand the Difference Between Backups and Archives

      • Buy Link or Shortcode: {j2store}506|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Storage & Backup Optimization
      • Parent Category Link: /storage-and-backup-optimization
      • You don’t understand the difference between a backup and an archive or when to use one or the other.
      • Data is not constant. It is ever-changing and growing. How do you protect it?
      • You just replaced an application that was in use since day one, and even though you have a fully functional replacement, you would like to archive that original application just in case.
      • You want to save money, so you use your backup solution to archive data, but you know that is not ideal. What is the correct solution?

      Our Advice

      Critical Insight

      Keep in mind that backups are for recovery while archives are for discovery. Backups and archives are often confused but understanding the differences can result in significant savings of time and money. Backing up and archiving may be considered IT tasks, but recovery and discovery are capabilities the business wants and is willing to pay for.

      Impact and Result

      Archives and backups are not the same, and there is a use case for each. Sometimes minor adjustments may be required to make the use case work. Understanding the basics of backups and archives can lead to significant savings at a monetary and effort level.

      Understand the Difference Between Backups and Archives Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the Difference Between Backups and Archives

      What is the difference between a backup and a data archive? When should I use one over the other? They are not the same and confusing the two concepts could be expensive.

      • Understand the Difference Between Backups and Archives Storyboard
      [infographic]

      Further reading

      Understand the Difference Between Backups and Archives

      They are not the same, and confusing the two concepts could be expensive

      Analyst Perspective

      Backups and archives are not interchangeable, but they can complement each other.

      Photo of P.J. Ryan, Research Director, Infrastructure & Operations, Info-Tech Research Group.

      Backups and archives are two very different operations that are quite often confused or misplaced. IT and business leaders are tasked with protecting corporate data from a variety of threats. They also must conform to industry, geographical, and legal compliance regulations. Backup solutions keep the data safe from destruction. If you have a backup, why do you also need an archive? Archive solutions hold data for a long period of time and can be searched. If you have an archive, why do you also need a backup solution? Backups and archives used to be the same. Remember when you would keep the DAT tape in the same room as the argon gas fire suppression system for seven years? Now that's just not feasible. Some situations require a creative approach or a combination of backups and archives.

      Understand the difference between archives and backups and you will understand why the two solutions are necessary and beneficial to the business.

      P.J. Ryan
      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • You don’t understand the difference between a backup and an archive or when to use one over the other.
      • Data is not constant. It is ever-changing and growing. How do you protect it?
      • You just replaced an application that had been in use since day one, and even though you have a fully functional replacement, you would like to archive that original application just in case.
      • You want to save money, so you use your backup solution to archive data, but you know that is not ideal. What is the correct solution?
      Common Obstacles
      • Storage costs can be expensive, as can some backup and archiving solutions.
      • Unclear requirements definition to decide between backups or archives.
      • Historically, people referred to archiving as tossing something into a box and storing it away indefinitely. Data archiving has a different meaning.
      • Executives want retired applications preserved but do not provide reasons or requirements.
      Info-Tech’s Approach
      • Spend wisely. Why spend money on an archive solution when a backup will suffice? Don’t leave money on the table.
      • Be creative and assess each backup or archive situation carefully. A custom solution may be required.
      • Backup your production data for the purpose of restoring it and adhere to the 3-2-1 rule of backups (Naviko.com).
      • Archive your older data to an alternate storge platform to save space, allow for searchability, and provide retention parameters.

      Info-Tech Insight

      Keep in mind that backups are for recovery while archives are for discovery. Backups and archives are often confused but understanding the differences can result in significant savings of time and money. Backing up and archiving may be considered IT tasks but recovery and discovery are capabilities the business wants and is willing to pay for.

      Archive

      What it IS

      A data archive is an alternate location for your older, infrequently accessed production data. It is indexed and searchable based on keywords. Archives are deleted after a specified period based on your retention policy or compliance directives.

      What it IS NOT

      Archives are not an emergency copy of your production data. They are not any type of copy of your production data. Archives will not help you if you lose your data or accidentally delete a file. Archives are not multiple copies of production data from various recovery points.

      Why use it

      Archives move older data to an alternate location. This frees up storage space for your current data. Archives are indexed and can be searched for historical purposes, compliance reasons, or in the event of a legal matter where specific data must be provided to a legal team.

      Tips & Tricks – Archiving

      • Archiving will move older data to an alternate location. This will free up storage space in the production environment.
      • Archiving solutions index the data to allow for easier searchability. This will aid in common business searches as well as assist with any potential legal searches.
      • Archiving allows companies to hold onto data for historical purposes as well as for specific retention periods in compliance with industry and regional regulations such as SOX, GDPR, FISMA, as well as others (msp360.com).

      Backup

      What it IS

      A backup is a copy of your data from a specific day and time. It is primarily used for recovery or restoration if something happens to the production copy of data. The restore will return the file or folder to the state it was in at the time of the backup.

      Backups occur frequently to ensure the most recent version of data is copied to a safe location.

      A typical backup plan makes a copy of the data every day, once a week, and once a month. The data is stored on tapes, disk, or using cloud storage.

      What it IS NOT

      Backups are not designed for searching or discovery. If you backup your email and must go to that backup in search of all email pertaining to a specific topic, you must restore the full backup and then search for that specific topic or sender. If you kept all the monthly backups for seven years, that will mean repeating that process 84 times to have a conclusive search, assuming you have adequate storage space to restore the email database 84 times.

      Backups do not free up space.

      Why use it

      Backups protect your data in the event of disaster, deletion, or accidental damage. A good backup strategy will include multiple backups on different media and offsite storage of at least one copy.

      Tips & Tricks – Backups

      • Production data should be backed up on a regular basis, ideally once a day or more frequently if possible.
      • Backups are intended to restore data when it gets deleted, over-written, or otherwise compromised. Most restore requests are from the last 24 to 48 hours, so it may be advantageous to keep a backup readily available on disk for a quick restore when needed.
      • Some vendors and industry subject matter experts advocate the use of a 3-2-1 rule when it comes to backups:
        • Keep three copies of your production data
        • In at least two separate locations (some advocate two different formats), and
        • One copy should be offsite (nakivo.com)

      Cold Storage

      • Cold storage refers to a storage option offered by some cloud vendors. In the context of the discussion between backups and archives, it can be an option for a dedicated backup solution for a specific period. Cost is low and the data is protected from destruction.
      • If an app has been replaced and all data transferred to the replacement solution but for some reason the company wishes to hold onto the data, you want a backup, not an archive. Extract the data, convert it into MongoDB or a similar solution, and drop it into cheap cloud storage (cold storage) for less than $5 per TB/month.

      Case Study

      Understanding the difference between archives and backups could save you a lot of time and money

      INDUSTRY: Manufacturing | SOURCE: Info-Tech Research

      Understanding the difference between an archive and a backup was the first step in solving their challenge.

      A leading manufacturing company found themselves in a position where they had to decide between archiving or doing nothing.

      The company had completed several acquisitions and ended up with multiple legacy applications that had been merged or migrated into replacement solutions. These legacy applications were very important to the original companies and although the data they held had been migrated to a replacement solution, executives felt they should hold onto these applications for a period of time, just in case.

      Some of the larger applications were archived using a modern archiving solution, but when it came to the smaller applications, the cost to add them to the archiving solution greatly exceeded the cost to just keep them running and maintain the associated infrastructure.

      A research advisor from Info-Tech Research Group joined a call with the manufacturing company and discussed their situation. The difference between archives and backups was explained and through the course of the conversation it was discovered that the solution was a modified backup. The application data had already been preserved through the migration, so data could be accessed in the production environment. The requirement to keep the legacy application up and running was not necessary but in compliance with the request to keep the information, the data could be exported from the legacy application into a non-sequential database, compressed, and stored in cloud-based cold storage for less than five dollars per terabyte per month. The manufacturing company’s staff realized that they could apply this same approach to several of their legacy applications and save tens of thousands of dollars in the process.

      Understand the Difference Between Backups and Archives

      Backups

      Backups are for recovery. A backup is a snapshot copy of production data at a specific point in time. If the production data is lost, destroyed, or somehow compromised, the data can be restored from the backup.

      Archives

      Archives are for discovery. It is production data that is moved to an alternate location to free up storage space, allow the data to be searchable, and still hold onto the data for historical or compliance purposes.

      Info-Tech Insight

      Archives and backups are not the same, and there is a use case for each. Sometimes minor adjustments may be required to make the use case work. Understanding the basics of backups and archives can lead to significant savings at a monetary and effort level.

      Additional Guidance

      Production data should be backed up.

      The specific backup solution is up to the business.

      Production data that is not frequently accessed should be archived.

      The specific solution to perform and manage the archiving of the data is up to the business

      • Archived data should also be backed up at least once.
      If the app has been replaced and all data transferred, you want a backup not an archive if you want to keep the data.
      • Short term – fence it off.
      • Long term – extract into Mongo then drop it into cheap cloud storage.

      Case Study

      Using tape backups as an archive solution could result in an expensive discovery and retrieval exercise.

      INDUSTRY: Healthcare | SOURCE: Zasio Enterprises Inc.

      “Do not commingle archive data with backup or disaster recovery tapes.”

      A court case in the United States District Court for the District of Nevada involving Guardiola and Renown Health in 2015 is a good example of why using a backup solution to solve an archiving challenge is a bad idea.

      Renown Health used a retention policy that declared any email older than six months of age as inactive and moved that email to a backup tape. Renown Health was ordered by the court to produce emails from a period of time in the past. Renown estimated that it would cost at least $248,000 to produce those emails, based on the effort involved to restore data from each tape and search for the email in question. Renown Health argued that this long and expensive process would result in undue costs.

      The court reviewed the situation and ruled against Renown Health and ordered them to comply with the request (Zasio.com).

      A proper archiving solution would have provided a quick and low-cost method to retrieve the emails in question.

      Backups and archives are complementary to each other

      • Archives are still production data, but the data does not change. A backup is recommended for the archived data, but the frequency of the backups can be lowered.
      • Backups protect you if a disaster strikes by providing a copy of the production data that was compromised or damaged. Archives allow you to access older data that may have just been forgotten, not destroyed or compromised. Archives could also protect you in a legal court case by providing data that is older but may prove your argument in court.

      Archives and backups are not the same.

      Backups copy your data. Archives move your data. Backups facilitate recovery. Archives facilitate discovery.

      Archive Backup
      Definition Move rarely accessed (but still production) data to separate media. Store a copy of frequently used data on a separate media to ensure timely operational recovery.
      Use Case Legal discovery, primary storage reduction, compliance requirements, and audits. Accidental deletion and/or corruption of data, hardware/software failures.
      Method Disk, cloud storage, appliance. Disk, backup appliance, snapshots, cloud.
      Data Older, rarely accessed production data. Current production data.

      Is it a backup or archive?

      • You want to preserve older data for legal and compliance reasons, so you put extra effort into keeping your tape backups safe and secure for seven years. That’s a big mistake that may cost you time and money. You want an archive solution.
      • You replace your older application and migrate all data to the new system, but you want to hold onto the old data, just in case. That’s a backup, not an archive.
      • A long serving senior executive recently left the company. You want to preserve the contents of the executive's laptop in case it is needed in the future. That’s a backup.

      Considerations When Choosing Between Solutions

      1

      Backup or archive?

      2

      What are you protecting?

      3

      Why are you protecting data?

      4

      Solution

      Backup

      Backup and/or archive.
      Additional information required.
      Column 3 may help

      Archive

      Device

      Data

      Application

      Operational Environment

      Operational recovery

      Disaster recovery

      Just in case

      Production storage space reduction

      Retention and preservation

      Governance, risk & compliance

      Backup

      Archive

      Related Info-Tech Research

      Stock image of light grids and flares. Establish an Effective Data Protection Plan

      Give data the attention it deserves by building a strategy that goes beyond backup.

      Stock image of old fuse box switches. Modernize Enterprise Storage

      Current and emerging storage technologies are disrupting the status quo – prepare your infrastructure for the exponential rise in data and its storage requirements.

      Logo for 'Software Reviews' and their information on 'Compare and Evaluate: Data Archiving.'
      Sample of Info-Tech's 'Data Archiving Policy'. Data Archiving Policy

      Bibliography

      “Backup vs. archiving: Know the difference.” Open-E. Accessed 05 Mar 2022.Web.

      G, Denis. “How to build retention policy.” MSP360, Jan 3, 2020. Accessed 10 Mar 2022.

      Ipsen, Adam. “Archive vs Backup: What’s the Difference? A Definition Guide.” BackupAssist, 28 Mar 2017. Accessed 04 Mar 2022.

      Kang, Soo. “Mitigating the expense of E-discovery; Recognizing the difference between back-ups and archived data.” Zasio Enterprises, 08 Oct 2015. Accessed 3 Mar 2022.

      Mayer, Alex. “The 3-2-1 Backup Rule – An Efficient Data Protection Strategy.” Naviko. Accessed 12 Mar 2022.

      “What is Data-Archiving?” Proofpoint. Accessed 07 Mar 2022.

      Build a Value Measurement Framework

      • Buy Link or Shortcode: {j2store}182|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $82,374 Average $ Saved
      • member rating average days saved: 35 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Rapid changes in today’s market require rapid, value-based decisions, and organizations that lack a shared definition of value fail to maintain their competitive advantage.
      • Different parts of an organization have different value drivers that must be given balanced consideration.
      • Focusing solely on revenue ignores the full extent of value creation in your organization and does not necessarily result in the right outcomes.

      Our Advice

      Critical Insight

      • Business is the authority on business value. While IT can identify some sources of value, business stakeholders must participate in the creation of a definition that is meaningful to the whole organization.
      • It’s about more than profit. Organizations must have a definition that encompasses all of the sources of value or they risk making short-term decisions with long-term negative impacts.
      • Technology creates business value. Treating IT as a cost center makes for short-sighted decisions in a world where every business process is enabled by technology.

      Impact and Result

      • Standardize your definition of business value. Work with your business partners to define the different sources of business value that are created through technology-enabled products and services.
      • Weigh your value drivers. Ensure that business and IT understand the relative weight and priority of the different sources of business value you have identified.
      • Use a balanced scorecard to understand value. Use the different value drivers to understand and prioritize different products, applications, projects, initiatives, and enhancements.

      Build a Value Measurement Framework Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why building a consistent and aligned framework to measure the value of your products and services is vital for setting priorities and getting the business on board.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your value drivers

      This phase will help you define and weigh value drivers based on overarching organizational priorities and goals.

      • Build a Value Measurement Framework – Phase 1: Define Your Value Drivers
      • Value Calculator

      2. Measure value

      This phase will help you analyze the value sources of your products and services and their alignment to value drivers to produce a value score that you can use for prioritization.

      • Build a Value Measurement Framework – Phase 2: Measure Value
      [infographic]

      Further reading

      Build a Value Measurement Framework

      Focus product delivery on business value–driven outcomes.

      ANALYST PERSPECTIVE

      "A meaningful measurable definition of value is the key to effectively managing the intake, prioritization, and delivery of technology-enabled products and services."

      Cole Cioran,

      Senior Director, Research – Application Development and Portfolio Management

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs who need to understand the value IT creates
      • Application leaders who need to make good decisions on what work to prioritize and deliver
      • Application and project portfolio managers who need to ensure the portfolio creates business value
      • Product owners who are accountable for delivering value

      This Research Will Help You:

      • Define quality in your organization’s context from both business and IT perspectives.
      • Define a repeatable process to understand the value of a product, application, project, initiative, or enhancement.
      • Define value sources and metrics.
      • Create a tool to make it easier to balance different sources of value.

      This Research Will Also Assist:

      • Product and application delivery teams who want to make better decisions about what they deliver
      • Business analysts who need to make better decisions about how to prioritize their requirements

      This Research Will Help Them:

      • Create a meaningful relationship with business partners around what creates value for the organization.
      • Enable better understanding of your customers and their needs.

      Executive summary

      Situation

      • Measuring the business value provided by IT is critical for improving the relationship between business and IT.
      • Rapid changes in today’s market require rapid, value-based decisions.
      • Every organization has unique drivers that make it difficult to see the benefits based on time and impact approaches to prioritization.

      Complication

      • An organization’s lack of a shared definition of value leads to politics and decision making that does not have a firm, quantitative basis.
      • Different parts of an organization have different value drivers that must be given balanced consideration.
      • Focusing solely on revenue does not necessarily result in the right outcomes.

      Resolution

      • Standardize your definition of business value. Work with your business partners to define the different sources of business value that are created through technology-enabled products and services.
      • Weigh your value drivers. Ensure business and IT understand the relative weight and priority of the different sources of business value you have identified.
      • Use a balanced scorecard to understand value. Use the different value drivers to understand and prioritize different products, applications, projects, initiatives, and enhancements.

      Info-Tech Insight

      1. Business is the authority on business value. While IT can identify some sources of value, business stakeholders must participate in the creation of a definition that is meaningful to the whole organization.
      2. It’s about more than profit. Organizations must have a definition that encompasses all of the sources of value, or they risk making short-term decisions with long-term negative impacts.
      3. Technology creates business value. Treating IT as a cost center makes for short-sighted decisions in a world where every business process is enabled by technology.

      Software is not currently creating the right outcomes

      Software products are taking more and more out of IT budgets.

      38% of spend on IT employees goes to software roles.

      Source: Info-Tech’s Staffing Survey

      18% of opex is spent on software licenses.

      Source: SoftwareReviews.com

      33% of capex is spent on new software.

      However, the reception and value of software products do not justify the money invested.

      Only 34% of software is rated as both important and effective by users.

      Source: Info-Tech’s CIO Business Vision

      IT benchmarks do not help or matter to the business. Focus on the metrics that represent business outcomes.

      A pie chart is shown as an example to show how benchmarks do not help the business.

      IT departments have a tendency to measure only their own role-based activities and deliverables, which only prove useful for selling practice improvement services. Technology doesn’t exist for technology's sake. It’s in place to generate specific outcomes. IT and the business need to be aligned toward a common goal of enabling business outcomes, and that’s the important measurement.

      "In today’s connected world, IT and business must not speak different languages. "

      – Cognizant, 2017

      CxOs stress the importance of value as the most critical area for IT to improve reporting

      A bar graph is shown to demonstrate the CxOs importance of value. Business value metrics are 32% of significant improvement necessary, and 51% where some improvement is necessary.

      N=469 CxOs from Info-Tech’s CEO/CIO Alignment Diagnostic

      Key stakeholders want to know how you and your products or services help them realize their goals.

      While the basics of value are clear, few take the time to reach a common definition and means to measure and apply value

      Often, IT misses the opportunity to become a strategic partner because it doesn’t understand how to communicate and measure its value to the business.

      "Price is what you pay. Value is what you get."

      – Warren Buffett

      Being able to understand the value context will allow IT to articulate where IT spend supports business value and how it enables business goal achievement.

      Value is...

      Derived from business context

    • What is our business context?
    • Enabled through governance and strategy

    • Who sees the strategy through?
    • The underlying context for decision making

    • How is value applied to support decisions?
    • A measure of achievement

    • How do I measure?
    • Determine your business context by assessing the goals and defining the unique value drivers in your organization

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by the benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      A business value matrix is shown. It shows the relationship between reading customers, increase revenue, reduce costs, and enhance services.

      Financial Benefits vs. Improved Capabilities

      Financial Benefits refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible. Human Benefits refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduction of overhead. They typically are less related to broad strategic vision or goals and more simply limit expenses that would occur had the product or service not been put in place.

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      See your strategy through by involving both IT and the business

      Buy-in for your IT strategy comes from the ability to showcase value. IT needs to ensure it has an aligned understanding of what is valuable to the organization.

      Business value needs to first be established by the business. After that, IT can build a partnership with the business to determine what that value means in the context of IT products and services.

      The Business

      What the Business and IT have in common

      IT

      Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the products along with those most familiar with the capabilities or processes enabled by technology.

      Business Value of Products and Services

      Technical subject matter experts of the products and services they deliver and maintain. Each IT function works together to ensure quality products and services are delivered up to stakeholder expectations.

      Measure your product or services with Info-Tech’s Value Measurement Framework (VMF) and value scores

      The VMF provides a consistent and less subjective approach to generating a value score for an application, product, service, or individual feature, by using business-defined value drivers and product-specific value metrics.

      Info-Tech's Value Measurement Framework is shown.

      A consistent set of established value drivers, sources, and metrics gives more accurate comparisons of relative value

      Value Drivers

      Value Sources

      Value Fulfillment Metrics

      Broad categories of values, weighed and prioritized based on overarching goals

      Instances of created value expressed as a “business outcome” of a particular function

      Units of measurement and estimated targets linked to a value source

      Reach Customers

      Customer Satisfaction

      Net Promoter Score

      Customer Loyalty

      # of Repeat Visits

      Create Revenue Streams

      Data Monetization

      Dollars Derived From Data Sales

      Leads Generation

      Leads Conversation Rate

      Operational Efficiency

      Operational Efficiency

      Number of Interactions

      Workflow Management

      Cycle Time

      Adhere to regulations & compliance

      Number of Policy Exceptions

      A balanced and weighted scorecard allows you to measure the various ways products generate value to the business

      The Info-Tech approach to measuring value applies the balanced value scorecard approach.

      Importance of value source

      X

      Impact of value source

      = Value Score

      Which is based on…

      Which is based on…

      Alignment to value driver

      Realistic targets for the KPI

      Which is weighed by…

      Which is estimated by…

      A 1-5 scale of the relative importance of the value driver to the organization

      A 1-5 scale of the application or feature’s ability to fulfill that value source

      +

      Importance of Value Source

      X

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      =

      Balanced Business Value Score

      Value Score1 + VS2 + … + VSN = Overall Balance Value Score

      Value scores help support decisions. This blueprint looks specifically at four use cases for value scores.

      A value score is an input to the following activities:

      1. Prioritize Your Product Backlog
      2. Estimate the relative value of different product backlog items (i.e. epics, features, etc.) to ensure the highest value items are completed first.

        This blueprint can be used as an input into Info-Tech’s Build a Better Backlog.

      3. Prioritize Your Project Backlog
      4. Estimate the relative value of proposed new applications or major changes or enhancements to existing applications to ensure the right projects are selected and completed first.

        This blueprint can be used as an input into Info-Tech’s Optimize Project Intake, Approval, and Prioritization.

      5. Rationalize Your Applications
      6. Gauge the relative value from the current use of your applications to support strategic decision making such as retirement, consolidation, and further investments.

        This blueprint can be used as an input into Info-Tech’s Visualize Your Application Portfolio Strategy With a Business Value-Driven Roadmap.

      7. Categorize Application Tiers
      8. Gauge the relative value of your existing applications to distinguish your most to least important systems and build tailored support structures that limit the downtime of key value sources.

        This blueprint can be used as an input into Info-Tech’s Streamline Application Maintenance.

      The priorities, metrics, and a common understanding of value in your VMF carry over to many other Info-Tech blueprints

      Transition to Product Delivery

      Build a Product Roadmap

      Modernize Your SDLC

      Build a Strong Foundation for Quality

      Implement Agile Practices That Work

      Use Info-Tech’s Value Calculator

      The Value Calculator facilitates the activities surrounding defining and measuring the business value of your products and services.

      Use this tool to:

      • Weigh the importance of each Value Driver based on established organizational priorities.
      • Create a repository for Value Sources to provide consistency throughout each measurement.
      • Produce an Overall Balanced Value Score for a specific item.

      Info-Tech Deliverable

      A screenshot of Info-Tech's Value Calculator is shown.

      Populate the Value Calculator as you complete the activities and steps on the following slides.

      Limitations of the Value Measurement Framework

      "All models are wrong, but some are useful."

      – George E.P. Box, 1979

      Value is tricky: Value can be intangible, ambiguous, and cause all sorts of confusion, with the multiple, and often conflicting, priorities any organization is sure to have. You won’t likely come to a unified understanding of value or an agreement on whether one thing is more valuable than something else. However, this doesn’t mean you shouldn’t try. The VMF provides a means to organize various priorities in a meaningful way and to assess the relative value of a product or service to guide managers and decision makers on the right track and keep alignment with the rest of the organization.

      Relative value vs. ROI: This assessment produces a score to determine the value of a product or service relative to other products or services. Its primary function is to prioritize similar items (projects, epics, requirements, etc.) as opposed to producing a monetary value that can directly justify cost and make the case for a positive ROI.

      Apply caution with metrics: We live in a metric-crazed era, where everything is believed to be measurable. While there is little debate over recent advances in data, analytics, and our ability to trace business activity, some goals are still quite intangible, and managers stumble trying to link these goals to a quantifiable data source.

      In applying the VMF Info-Tech urges you to remember that metrics are not a magical solution. They should be treated as a tool in your toolbox and are sometimes no more than a rough gauge of performance. Carefully assign metrics to your products and services and do not disregard the informed subjective perspective when SMART metrics are unavailable.

      "One of the deadly diseases of management is running a company on visible figures alone."

      – William Edwards Deming, 1982

      Info-Tech’s Build a Value Measurement Framework glossary of terms

      This blueprint discusses value in a variety of ways. Use our glossary of terms to understand our specific focus.

      Value Measurement Framework (VMF)

      A method of measuring relative value for a product or service, or the various components within a product or service, through the use of metrics and weighted organizational priorities.

      Value Driver

      A board organizational goal that acts as a category for many value sources.

      Value Source

      A specific business goal or outcome that business and product or service capabilities are designed to fulfill.

      Value Fulfillment

      The degree to which a product or service impacts a business outcome, ideally linked to a metric.

      Value Score

      A measurement of the value fulfillment factored by the weight of the corresponding value driver.

      Overall Balanced Value Score

      The combined value scores of all value sources linked to a product or service.

      Relative Value

      A comparison of value between two similar items (i.e. applications to applications, projects to projects, feature to feature).

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Value Measurement Framework – project overview

      1. Define Your Value Drivers

      2. Measure Value

      Best-Practice Toolkit

      1.1 Identify your business value authorities.

      2.1 Define your value drivers.

      2.2 Weigh your value drivers.

      • Identify your product or service SMEs.
      • List your products or services items and components.
      • Identify your value sources.
      • Align to a value driver.
      • Assign metrics and gauge value fulfillment.

      Guided Implementations

      Identify the stakeholders who should be the authority on business value.

      Identify, define, and weigh the value drivers that will be used in your VMF and all proceeding value measurements.

      Identify the stakeholders who are the subject matter experts for your products or services.

      Measure the value of your products and services with value sources, fulfillment, and drivers.

      Outcome:

      • Value drivers and weights

      Outcome:

      • An initial list of reusable value sources and metrics
      • Value scores for your products or services

      Phase 1

      Define Your Value Drivers

      First determine your value drivers and add them to your VMF

      One of the main aspects of the VMF is to apply consistent and business-aligned weights to the products or services you will evaluate.

      This is why we establish your value drivers first:

      • Get the right executive-level “value authorities” to establish the overarching weights.
      • Build these into the backbone of the VMF to consistently apply to all your future measurements.
      An image of the Value Measure Framework is shown.

      Step 1.1: Identify Value Authorities

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your authorities on business value.

      This step involves the following participants:

      • Owners of your value measurement framework

      Outcomes of this step

      • Your list of targeted individuals to include in Step 2.1

      Business value is best defined and measured by the combined effort and perspective of both IT and the business

      Buy-in for your IT strategy comes from the ability to showcase value. IT needs to ensure it has an aligned understanding of what is valuable to the organization. First, priorities need to be established by the business. Second, IT can build a partnership with the business to determine what that value means in the context of IT products and services.

      The Business

      What the Business and IT have in common

      IT

      Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the products along with those most familiar with the capabilities or processes enabled by technology.

      Business Value of Products and Services

      Technical subject matter experts of the products and services they deliver and maintain. Each IT function works together to ensure quality products and services are delivered up to stakeholder expectations.

      Engage key stakeholders to reach a consensus on organizational priorities and value drivers

      Engage these key players to create your value drivers:

      CEO: Who better holds the vision or mandate of the organization than its leader? Ideally, they are front and center for this discussion.

      CIO: IT must ensure that technical/practical considerations are taken into account when determining value.

      CFO: The CFO or designated representative will ensure that estimated costs and benefits can be used to manage the budgets.

      VPs: Application delivery and mgmt. is designed to generate value for the business. Senior management from business units must help define what that value is.

      Evaluators (PMO, PO, APM, etc.): Those primarily responsible for applying the VMF should be present and active in identifying and carefully defining your organization’s value drivers.

      Steering Committee: This established body, responsible for the strategic direction of the organization, is really the primary audience.

      Identify your authorities of business value to identify, define, and weigh value drivers

      1.1 Estimated Time: 15 minutes

      The objective of this exercise is to identify key business stakeholders involved in strategic decision making at an organizational level.

      1. Review your organization’s governance structure and any related materials.
      2. Identify your key business stakeholders. These individuals are the critical business strategic partners.
        1. Target those who represent the business at an organizational level and often comprise the organization’s governing bodies.
        2. Prioritize a product backlog – include product owners and product managers who are in tune with the specific value drivers of the product in question.

      INFO-TECH TIP

      If your organization does not have a formal governance structure, your stakeholders would be the key players in devising business strategy. For example:

      • CEO
      • CFO
      • BRMs
      • VPs

      Leverage your organizational chart, governing charter, and senior management knowledge to better identify key stakeholders.

      INPUT

      • Key decision maker roles

      OUTPUT

      • Targeted individuals to define and weigh value drivers

      Materials

      • N/A

      Participants

      • Owner of the value measurement framework

      Step 1.2: Define Value Drivers

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Define your value drivers.
      • Weigh your value drivers.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Authorities of business value

      Outcomes of this step

      • A list of your defined and weighted value drivers

      Value is based on business needs and vision

      Value is subjective. It is defined through the organization’s past achievement and its future objectives.

      Purpose & Mission

      Past Achievement & Current State

      Vision & Future State

      Culture & Leadership

      There must be a consensus view of what is valuable within the organization, and these values need to be shared across the enterprise. Instead of maintaining siloed views and fighting for priorities, all departments must have the same value and purpose in mind. These factors – purpose and mission, past achievement and current state, vision and future state, and culture and leadership – impact what is valuable to the organization.

      Value derives from the mission and vision of an organization; therefore, value is unique to each organization

      Business value represents what the business needs to do to achieve its target state. Establishing the mission and vision helps identify that target state.

      Mission

      Vision

      Business Value

      Why does the company exist?

      • Specify the company’s purpose, or reason for being, and use it to guide each day’s activities and decisions.

      What does the organization see itself becoming?

      • Identify the desired future state of the organization. The vision articulates the role the organization strives to play and the way it wants to be perceived by the customer.
      • State the ends, rather than the means, to get to the future state.

      What critical factors fulfill the mission and vision?

      • Articulate the important capabilities the business should have in order to achieve its objectives. All business activities must enable business value.
      • Communicate the means to achieve the mission and vision.

      Understand the many types of value your products or services produce

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of value sources. Dissecting value by the benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      A business value matrix is shown. It shows the relationship between reading customers, increase revenue, reduce costs, and enhance services.

      Financial Benefits vs. Improved Capabilities

      Financial Benefits refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible. Human Benefits refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations. Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduction of overhead. They typically are less related to broad strategic vision or goals and more simply limit expenses that would occur had the product or service not been put in place.

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      Expand past Info-Tech’s high-level value quadrants and identify the value drivers specific to your organization

      Different industries have a wide range of value drivers. Consider the difference between public and private entities with respect to generating revenue or reaching their customers or other external stakeholders. Even organizations in the same industry may have different values. For example, a mature, well-established manufacturer may view reputation and innovation as its highest-priority values, whereas a struggling manufacturer will see revenue or market share growth as its main drivers.

      Value Drivers

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      • Revenue growth
      • Data monetization
      • Cost optimization
      • Labor reduction
      • Collaboration
      • Risk and compliance
      • Customer experience
      • Trust and reputation

      You do not need to dissect each quadrant into an exhaustive list of value drivers. Info-Tech recommends defining distinct value drivers only for the areas you’ve identified as critical to your organization’s core goals and objectives.

      Understand value drivers that enable revenue growth

      Direct Revenue

      This value driver is the ability of a product or service to directly produce revenue through core revenue streams.

      Can be derived from:

      • Creating revenue
      • Improving the revenue generation of an existing service
      • Preventing the loss of a revenue stream

      Be aware of the differences between your products and services that enable a revenue source and those that facilitate the flow of capital.

      Funding

      This value driver is the ability of a product or service to enable other types of funding unrelated to core revenue streams.

      Can be derived from:

      • Tax revenue
      • Fees, fines, and ticketing programs
      • Participating in government subsidy or grant programs

      Be aware of the difference between your products and services that enable a revenue source and those that facilitate the flow of capital.

      Scale & Growth

      In essence, this driver can be viewed as the potential for growth in market share or new developing revenue sources.

      Does the product or service:

      • Increase your market share
      • Help you maintain your market share

      Be cautious of which items you identify here, as many innovative activities may have some potential to generate future revenue. Stick to those with a strong connection to future revenue and don’t qualify for other value driver categories.

      Monetization of Assets

      This value driver is the ability of your products and services to generate additional assets.

      Can be derived from:

      • Sale of data
      • Sale of market or customer reports or analysis
      • Sale of IP

      This value source is often overlooked. If given the right attention, it can lead to a big win for IT’s role in the business.

      Understand value drivers that reduce costs

      Cost Reduction

      A cost reduction is a “hard” cost saving that is reflected as a tangible decrease to the bottom line.

      This can be derived from reduction of expenses such as:

      • Salaries and wages
      • Hardware/software maintenance
      • Infrastructure

      Cost reduction plays a critical role in an application’s ability to increase efficiency.

      Cost Avoidance

      A cost avoidance is a “soft” cost saving, typically achieved by preventing a cost from occurring in the first place (i.e. risk mitigation). Cost avoidance indirectly impacts the bottom line.

      This can be derived from prevention of expenses by:

      • Mitigating a business outage
      • Mitigating another risk event
      • Delaying a price increase

      Understand the value drivers that enhance your services

      Enable Core Operations

      Some applications are in place to facilitate and support the structure of the organization. These vary depending on the capabilities of your organization but should be assessed in relation to the organization’s culture and structure.

      • Enables a foundational capability
      • Enables a niche capability

      This example is intentionally broad, as “core operations” should be further dissected to define different capabilities with ranging priority.

      Compliance

      A product or service may be required in order to meet a regulatory requirement. In these cases, you need to be aware of the organizational risk of NOT implementing or maintaining a service in relation to those risks.

      In this case, the product or service is required in order to:

      • Prevent fines
      • Allow the organization to operate within a specific jurisdiction
      • Remediate audit gaps
      • Provide information required to validate compliance

      Internal Improvement

      An application’s ability to create value outside of its core operations and facilitate the transfer of information, insights, and knowledge.

      Value can be derived by:

      • Data analytics
      • Collaboration
      • Knowledge transfer
      • Organizational learning

      Innovation

      Innovation is typically an ill-defined value driver, as it refers to the ability of your products and services to explore new value streams.

      Consider:

      • Exploration into new markets and products
      • New methods of organizing resources and processes

      Innovation is one of the more divisive value drivers, as some organizations will strive to be cutting edge and others will want no part in taking such risks.

      Understand business value drivers that connect the business to your customers

      Policy

      Products and services can also be assessed in relation to whether they enable and support policies of the organization. Policies identify and reinforce required processes, organizational culture, and core values.

      Policy value can be derived from:

      • The service or initiative will produce outcomes in line with our core organizational values.
      • Products that enable sustainability and corporate social responsibility

      Experience

      Applications are often designed to improve the interaction between customer and product. This value type is most closely linked to product quality and user experience. Customers, in this sense, can also include any stakeholders who consume core offerings.

      Customer experience value can be derived from:

      • Improving customer satisfaction
      • Ease of use
      • Resolving a customer issue or identified pain point
      • Providing a competitive advantage for your customers

      Customer Information

      Understanding demand and customer trends is a core driver for all organizations. Data provided through understanding the ways, times, and reasons that consumers use your services is a key driver for growth and stability.

      Customer information value can be achieved when an app:

      • Addresses strategic opportunities or threats identified through analyzing trends
      • Prevents failures due to lack of capacity to meet demand
      • Connects resources to external sources to enable learning and growth within the organization

      Trust & Reputation

      Products and services are designed to enable goals of digital ethics and are highly linked to your organization’s brand strategy.

      Trust and reputation can also be described as:

      • Customer loyalty and sustainability
      • Customer privacy and digital ethics

      Prioritizing this value source is critical, as traditional priorities can often come at the expense of trust and reputation.

      Define your value drivers

      1.2 Estimated Time: 1.5 hours

      The objective of this exercise is to establish a common understanding of the different values of the organization.

      1. Place your business value authorities at the center of this exercise.
      2. Collect all the documents your organization has on the mission and vision, strategy, governance, and target state, which may be defined by enterprise architecture.
      3. Identify the company mission and vision. Simply transfer the information from the mission and vision document into the appropriate spaces in the business value statement.
      4. Determine the organization’s business value drivers. Use the mission and vision, as well as the information from the collected documents, to formulate your own idea of business values.
      5. Use value driver template on the next slide to define the value driver, including:
      • Value Driver Name
      • Description
      • Related Business Capabilities – If available, review business architecture materials, such as business capability maps.
      • Established KPI and Targets – If available, include any organization-wide established KPIs related to your value driver. These KPIs will likely be used or influence the metrics eventually assigned to your applications.

      INPUT

      • Mission, vision, value statements

      OUTPUT

      • List and description of value drivers

      Materials

      • Whiteboard
      • Markers

      Participants

      • Business value authorities
      • Owner of value measurement framework

      Example Value Driver

      Value Driver Name

      Reach Customers

      Value Driver Description

      Our organization’s ability to provide quality products and experience to our core customers

      Value Driver Weight

      10/10

      Related Business Capabilities

      • Customer Services
      • Marketing
        • Customer Segmentation
        • Customer Journey Mapping
      • Product Delivery
        • User Experience Design
        • User Acceptance Testing

      Key Business Outcomes, KPIs, and Targets

      • Improved Customer Satisfaction
        • Net Promotor Score: 80%
      • Improved Loyalty
        • Repeat Sales: 30%
        • Customer Retention: 25%
        • Customer Lifetime Value: $2,500
      • Improved Interaction
        • Repeat Visits: 50%
        • Account Conversation Rates: 40%

      Weigh your value drivers

      1.3 Estimated Time: 30 minutes

      The objective of this exercise is to prioritize your value drivers based on their relative importance to the business.

      1. Again, place the business value authorities at the center of this exercise.
      2. In order to determine priority, divide 100% among your value drivers, allocating a percentage to each based on its relative importance to the organization.
      3. Normalize those percentages on to a scale of 1 to 10, which will act as the weights for your value drivers.

      INPUT

      • Mission, vision, value statements

      OUTPUT

      • Weights for value drivers

      Materials

      • Whiteboard
      • Markers

      Participants

      • Business value authorities
      • Owner of value measurement framework

      Weigh your value drivers

      1.3 Estimated Time: 30 minutes

      Value Driver

      Percentage Allocation

      1 to 10 Weight

      Revenue and other funding

      24%

      9

      Cost reduction

      8%

      3

      Compliance

      5%

      2

      Customer value

      30%

      10

      Operations

      13%

      7

      Innovation

      5%

      2

      Sustainability and social responsibility

      2%

      1

      Internal learning and development

      3%

      1

      Future growth

      10%

      5

      Total

      100%

      Carry results over to the Value Calculator

      1.3

      Document results of this activity in the “Value Drivers” tab of the Value Calculator.

      A screenshot of Info-Tech's Value Calculator is shown.

      List your value drivers.

      Define or describe your value drivers.

      Use this tool to create a repository for value sources to reuse and maintain consistency across your measurements.

      Enter the weight of each value driver in terms of importance to the organization.

      Phase 2

      Measure Value

      Step 2.1: Identify Product or Service SMEs

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your product or service SMEs.
      • List your product or services items and components.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Product or service SMEs

      Outcomes of this step

      • Your list of targeted individuals to include in Step 2.2

      Identify the products and services you are evaluating and break down their various components for the VMF

      In order to get a full evaluation of a product or service you need to understand its multiple facets, functions, features capabilities, requirements, or any language you use to describe its various components.

      An image of the value measure framework is shown.

      Decompose a product or service:

      • Get the right subject matter experts in place who know the business and technical aspects of the product or service.
      • Decompose the product or service to capture all necessary components.

      Before beginning, consider how your use case will impact your value measurement approach

      This table looks at how the different use cases of the VMF call for variations of this analysis, is directed at different roles, and relies on participation from different subject matter experts to provide business context.

      Use Case (uses of the VMF applied in this blueprint)

      Value (current vs. future value)

      Item (the singular entity you are producing a value score for)

      Components (the various facets of that entity that need to be considered)

      Scope (# of systems undergoing analysis)

      Evaluator (typical role responsible for applying the VMF)

      Cadence (when and why do you apply the VMF)

      Information Sources (what documents, tools, etc., do you need to leverage)

      SMEs (who needs to participate to define and measure value)

      1. Prioritize Your Product Backlog

      You are estimating future value of proposed changes to an application.

      Product backlog items (epic, feature, etc.) in your product backlog

      • Features
      • User stories
      • Enablers

      A product

      Product owner

      Continuously apply the VMF to prioritize new and changing product backlog items.

      • Epic hypothesis, documentation
      • Lean business case

      Product manager

      ????

      2. Prioritize Your Project Backlog

      Proposed projects in your project backlog

      • Benefits
      • Outcomes
      • Requirements

      Multiple existing and/or new applications

      Project portfolio manager

      Apply the VMF during your project intake process as new projects are proposed.

      • Completed project request forms
      • Completed business case forms
      • Project charters
      • Business requirements documents

      Project manager

      Product owners

      Business analysts

      3. Application Rationalization

      You are measuring current value of existing applications and their features.

      An application in your portfolio

      The uses of the application (features, function, capabilities)

      A subset of applications or the full portfolio

      Application portfolio manager

      During an application rationalization initiative:

      • Iteratively collect information and perform value measurements.
      • Structure your iterations based on functional areas to target the specific SMEs who can speak to a particular subset of applications.
      • Business capability maps

      Business process owners

      Business unit representatives

      Business architects

      Application architects

      Application SMEs

      4. Application Categorization

      The full portfolio

      Application maintenance or operations manager

      • SLAs
      • Business capability maps

      Identify your product or service SMEs

      2.1 Estimated Time: 15 minutes

      The objective of this exercise is to identify specific business stakeholders who can speak to the business outcomes of your applications at a functional level.

      1. Review your related materials that reference the stakeholders for the scoped products and services (i.e. capability maps, org charts, stakeholder maps).
      2. Identify your specific business stakeholders and application SMEs. These individuals represent the business at a functional level and are in tune with the business outcomes of their operations and the applications that support their operations.
        1. Use Case 1 – Product Owner, Product Manager
        2. Use Case 2 – Project Portfolio Manager, Project Manager, Product Owners, Business Process Owners, Appropriate Business Unit Representatives
        3. Use Case 3 – Application Portfolio Manager, Product Owners, Business Analysts, Application SMEs, Business Process Owners, Appropriate Business Unit Representatives
        4. Use Case 4 – Application Maintenance Manager, Operations Managers, Application Portfolio Manager, Product Owners, Application SMEs, Business Process Owners, Appropriate Business Unit Representatives

      INPUT

      • Specific product or service knowledge

      OUTPUT

      • Targeted individuals to measure specific products or services

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework

      Use Case 1: Collect and review all of the product backlog items

      Prioritizing your product backlog (epics, features, etc.) requires a consistent method of measuring the value of your product backlog items (PBIs) to continuously compare their value relative to one another. This should be treated as an ongoing initiative as new items are added and existing items change, but an initial introduction of the VMF will require you to collect and analyze all of the items in your backlog.

      Regardless of producing a value score for an epic, feature, or user story, your focus should be on identifying their various value sources. Review your product’s artifact documentation, toolsets, or other information sources to extract the business outcomes, impact, benefits, KPIs, or any other description of a value source.

      High

      Epics

      Carefully valuated with input from multiple stakeholders, using metrics and consistent scoring

      Level of valuation effort per PBI

      User Stories

      Collaboratively valuated by the product owner and teams based on alignment and traceability to corresponding epic or feature

      Low

      Raw Ideas

      Intuitively valuated by the product owner based on alignment to product vision and organization value drivers

      What’s in your backlog?

      You may need to create standards for defining and measuring your different PBIs. Traceability can be critical here, as defined business outcomes for features or user stories may be documented at an epic level.

      Additional Research

      Build a Better Backlog helps you define and organize your product backlog items.

      Use Case 2: Review the scope and requirements of the project to determine all of the business outcomes

      Depending on where your project is in your intake process, there should be some degree of stated business outcomes or benefits. This may be a less refined description in the form of a project request or business case document, or it could be more defined in a project charter, business requirements document/toolset, or work breakdown structure (WBS). Regardless of the information source, to make proper use of the VMF you need a clear understanding of the various business outcomes to establish the new or improved value sources for the proposed project.

      Project

      User Requirements

      Business Requirements

      System Requirements

      1

      1

      1

      2

      2

      2

      3

      3

      4

      Set Metrics Early

      Good project intake documentation begins the discussion of KPIs early on. This alerts teams to the intended value and gives your PMO the ability to integrate it into the workload of other proposed or approved projects.

      Additional Research

      Optimize Project Intake, Approval, and Prioritization provides templates to define proposed project benefits and outcomes.

      Use Cases 3 & 4: Ensure you’ve listed all of each application’s uses (functions, features, capabilities, etc.) and user groups

      An application can enable multiple capabilities, perform a variety of functions, and have a range of different user groups. Therefore, a single application can produce multiple value sources, which range in type, impact, and significance to the business’ overarching priorities. In order to effectively measure the overall value of an application you need to determine all of the ways in which that application is used and apply a business-downward view of your applications.

      Business Capability

      • Sub-capability
      • Process
      • Task

      Application

      • Module
      • Feature
      • Function

      Aim for Business Use

      Simply listing the business capabilities of an app can be too high level. Regardless of your organization’s terminology, you need to establish all of the different uses and users of an application to properly measure all of the facets of its value.

      Additional Research

      Discover Your Applications helps you identify and define the business use and features of your applications.

      List your product or services items and components

      2.2 Estimated Time: 15 minutes

      The objective of this exercise is to produce a list of the different items that you are scoring and ensure you have considered all relevant components.

      1. List each item you intend to produce a value score for:
        1. Use Case 1 – This may be the epics in your product backlog.
        2. Use Case 2 – This may be the projects in your project backlog.
        3. Use Cases 3 & 4 – This may be the applications in your portfolio. For this approach Info-Tech strongly recommends iteratively assessing the portfolio to produce a list of a subset of applications.
      2. For each item list its various components:
        1. Use Case 1 – This may be the features or user stories of an epic.
        2. Use Case 2 – This may be the business requirements of a project.
        3. Use Cases 3 & 4 – This may be the modules, features, functions, capabilities, or subsystems of an application.

      Item

      Components

      Add Customer Portal (Epic)

      User story #1: As a sales team member I need to process customer info.

      User story #2: As a customer I want access to…

      Transition to the Cloud (Project)

      Requirement #1: Build Checkout Cart

      NFR – Build integration with data store

      CRM (Application)

      Order Processing (module), Returns & Claims (module), Analytics & Reporting (Feature)

      INPUT

      • Product or service knowledge

      OUTPUT

      • Detailed list of items and components

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Use Cases 3 & 4: Create a functional view of your applications (optional)

      2.3 Estimated Time: 1 hour

      The objective of this exercise is to establish the different use cases of an application.

      1. Recall the functional requirements and business capabilities for your applications.
      2. List the various actors who will be interacting with your applications and list the consumers who will be receiving the information from the applications.
      3. Based on your functional requirements, list the use cases that the actors will perform to deliver the necessary information to consumers. Each use case serves as a core function of the application. See the diagram below for an example.
      4. Sometimes several use cases are completed before information is sent to consumers. Use arrows to demonstrate the flow of information from one use case to another.

      Example: Ordering Products Online

      Actors

      Order Customer

      Order Online

      Search Products

      Consumers

      Submit Delivery Information

      Order Customer

      Pay Order

      Bank

      INPUT

      • Product or service knowledge

      OUTPUT

      • Product or service function

      Materials

      • Whiteboard
      • Markers

      Participants

      • Application architect
      • Enterprise architect
      • Business and IT stakeholders
      • Business analyst
      • Development teams

      Use Cases 3 & 4: Create a functional view of your applications (optional) (cont’d.)

      2.3 Estimated Time: 1 hour

      5. Align your application’s use cases to the appropriate business capabilities and stakeholder objectives.

      Example:

      Stakeholder Objective: Automate Client Creation Processes

      Business Capability: Account Management

      Function: Create Client Profile

      Function: Search Client Profiles

      Business Capability: Sales Transaction Management

      Function: Order Online

      Function: Search Products Function: Search Products

      Function: Submit Delivery Information

      Function: Pay Order

      Step 2.2: Measure Value

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your value sources.
      • Align to a value driver.
      • Assign metrics and gauge value fulfillment.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Product or service SMEs

      Outcomes of this step

      • An initial list of reusable value sources and metrics
      • Value scores for your products or services

      Use your VMF and a repeatable process to produce value scores for all of your items

      With your products or services broken down, you can then determine a list of value sources, as well as their alignment to a value driver and a gauge of their value fulfillment, which in turn indicate the importance and impact of a value source respectively.

      A image of the value measure framework is shown.

      Lastly, we produce a value score for all items:

      • Determine business outcomes and value sources.
      • Align to the appropriate value driver.
      • Use metrics as the gauge of value fulfillment.
      • Collect your score.
      • Repeat.

      The business outcome is the impact the product or service has on the intended business activity

      Business outcomes are the business-oriented results produced by organization’s capabilities and the applications that support those capabilities. The value source is, in essence, “How does the application impact the outcome?” and this can be either qualitative or quantitative.

      Quantitative

      Qualitative

      Key Words

      Examples

      Key Words

      Examples

      Faster, cheaper

      Deliver faster

      Better

      Better user experience

      More, less

      More registrations per week

      Private

      Enhanced privacy

      Increase, decrease

      Decrease clerical errors

      Easier

      Easier to input data

      Can, cannot

      Can access their own records

      Improved

      Improved screen flow

      Do not have to

      Do not have to print form

      Enjoyable

      Enjoyable user experience

      Compliant

      Complies with regulation 12

      Transparent

      Transparent progress

      Consistent

      Standardized information gathered

      Richer

      Richer data availability

      Adapted from Agile Coach Journal.

      Measure value – Identify your value sources

      2.4 Estimated Time: 30 minutes

      The objective of this exercise is to establish the different value sources of a product or service.

      1. List the items you are producing an overall balance value score for. These can be products, services, projects, applications, product backlog items, epics, etc.
      2. For each item, list its various business outcomes in the form of a description that includes:
        1. The item being measured
        2. Business capability or activity
        3. How the item impacts said capability or activity

      Consider applying the user story format for future value sources or a variation for current value sources.

      As a (user), I want to (activity) so that I get (impact)

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • List of value sources

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Measure value – Align to a value driver

      2.5 Estimated Time: 30 minutes

      The objective of this exercise is to determine the value driver for each value source.

      1. Align each value source to a value driver. Choose between options A and B.
        1. Using a whiteboard, draw out a 2 x 2 business value matrix or an adapted version based on your own organizational value drivers. Place each value source in the appropriate quadrant.
          1. Increase Revenue
          2. Reduce Costs
          3. Enhance Services
          4. Reach Customers
        2. Using a whiteboard or large sticky pads, create a section for each value driver. Place each value source with the appropriate value driver.

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • Value driver weight

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Brainstorm the different sources of business value (cont’d.)

      2.5

      Example:

      An example of activity 2.5 is shown.

      Carry results over to the Value Calculator

      2.5

      Document results of this activity in the Value Calculator in the Item {#} tab.

      A screenshot of the Value Calculator is shown.

      List your Value Sources

      Your Value Driver weights will auto-populate

      Aim, but do not reach, for SMART metrics

      Creating meaningful metrics

      S pecific

      M easureable

      A chievable

      R ealisitic

      T ime-based

      Follow the SMART framework when adding metrics to the VMF.

      The intention of SMART goals and metrics is to make sure you have chosen a gauge that will:

      • Reflect the actual business outcome or value source you are measuring.
      • Ensure all relevant stakeholders understand the goals or value you are driving towards.
      • Ensure you actually have the means to capture the performance.

      Info-Tech Insight

      Metrics are NOT a magical solution. They should be treated as a tool in your toolbox and are sometimes no more than a rough gauge of performance. Carefully assign metrics to your products and services and do not disregard the informed subjective perspective when SMART metrics are unavailable.

      Info-Tech Best Practice

      One last critical consideration here is the degree of effort required to collect the metric compared to the value of the analysis you are performing. Assessing whether or not to invest in a project should apply the rigor of carefully selecting and measuring value. However, performing a rationalization of the full app portfolio will likely lead to analysis paralysis. Taking an informed subjective perspective may be the better route.

      Measure value – Assign metrics and gauge value fulfillment

      2.6 30-60 minutes

      The objective of this exercise is to determine an appropriate metric for each value source.

      1. For each value source assign a metric that will be the unit of measurement to gauge the value fulfilment of the application.
      2. Review the product or services performance with the metric
        1. Use case 1&2 (Proposed Applications and/or Features) - You will need to estimate the degree of impact the product or services will have on your selected metric.
        2. Use case 3&4 (Existing Applications and/or Features) – You can review historically how the product or service has performed with your selected metric
      3. Determine a value fulfillment on a scale of 1 – 10.
      4. 10 = The product or service far exceeds expectations and targets on the metric.

        5 = the product or service meets expectations on this metric.

        1 = the product or service underperforms on this metric.

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • Value driver weight

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Carry results over to the Value Calculator

      2.6

      Document results of this activity in the Value Calculator in the Item {#} tab.

      A screenshot of Info-Tech's Value Calculator is shown.

      Assign Metrics.

      Consider using current or estimated performance and targets.

      Assess the impact on the value source with the value fulfillment.

      Collect your Overall Balanced Value Score

      Appendix

      Bibliography

      Brown, Alex. “Calculating Business Value.” Agile 2014 Orlando – July 13, 2014. Scrum Inc. 2014. Web. 20 Nov. 2017.

      Brown, Roger. “Defining Business Value.” Scrum Gathering San Diego 2017. Agile Coach Journal. Web.

      Curtis, Bill. “The Business Value of Application Internal Quality.” CAST. 6 April 2009. Web. 20 Nov. 2017.

      Fleet, Neville, Joan Lasselle, and Paul Zimmerman. “Using a Balance Scorecard to Measure the Productivity and Value of Technical Documentation Organizations.” CIDM. April 2008. Web. 20 Nov. 2017.

      Harris, Michael. “Measuring the Business Value of IT.” David Consulting Group. 20 Nov. 2017.

      Intrafocus. “What is a Balanced Scorecard?” Intrafocus. Web. 20 Nov. 2017

      Kerzner, Harold. Project Management: A Systems Approach to Planning, Scheduling, and Controlling. 12th ed., Wiley, 2017.

      Lankhorst, Marc., et al. “Architecture-Based IT Valuation.” Via Nova Architectura. 31 March 2010. Web. 20 Nov. 2017.

      Rachlin, Sue, and John Marshall. “Value Measuring Methodology.” Federal CIO Council, Best Practices Committee. October 2002. Web. April 2019.

      Thiagarajan, Srinivasan. “Bridging the Gap: Enabling IT to Deliver Better Business Outcomes.” Cognizant. July 2017. Web. April 2019.

      Develop and Implement a Security Incident Management Program

      • Buy Link or Shortcode: {j2store}316|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $105,346 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
      • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being re-victimized by the same vector.
      • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

      Our Advice

      Critical Insight

      • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
      • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

      Impact and Result

      • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
      • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

      Develop and Implement a Security Incident Management Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop and implement a security incident management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare

      Equip your organization for incident response with formal documentation of policies and processes.

      • Develop and Implement a Security Incident Management Program – Phase 1: Prepare
      • Security Incident Management Maturity Checklist ‒ Preliminary
      • Information Security Requirements Gathering Tool
      • Incident Response Maturity Assessment Tool
      • Security Incident Management Charter Template
      • Security Incident Management Policy Template
      • Security Incident Management RACI Tool

      2. Operate

      Act with efficiency and effectiveness as new incidents are handled.

      • Develop and Implement a Security Incident Management Program – Phase 2: Operate
      • Security Incident Management Plan
      • Security Incident Runbook Prioritization Tool
      • Security Incident Management Runbook: Credential Compromise
      • Security Incident Management Workflow: Credential Compromise (Visio)
      • Security Incident Management Workflow: Credential Compromise (PDF)
      • Security Incident Management Runbook: Distributed Denial of Service
      • Security Incident Management Workflow: Distributed Denial of Service (Visio)
      • Security Incident Management Workflow: Distributed Denial of Service (PDF)
      • Security Incident Management Runbook: Malware
      • Security Incident Management Workflow: Malware (Visio)
      • Security Incident Management Workflow: Malware (PDF)
      • Security Incident Management Runbook: Malicious Email
      • Security Incident Management Workflow: Malicious Email (Visio)
      • Security Incident Management Workflow: Malicious Email (PDF)
      • Security Incident Management Runbook: Ransomware
      • Security Incident Management Workflow: Ransomware (Visio)
      • Security Incident Management Workflow: Ransomware (PDF)
      • Security Incident Management Runbook: Data Breach
      • Security Incident Management Workflow: Data Breach (Visio)
      • Security Incident Management Workflow: Data Breach (PDF)
      • Data Breach Reporting Requirements Summary
      • Security Incident Management Runbook: Third-Party Incident
      • Security Incident Management Workflow: Third-Party Incident (Visio)
      • Security Incident Management Workflow: Third-Party Incident (PDF)
      • Security Incident Management Runbook: Blank Template

      3. Maintain and optimize

      Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.

      • Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize
      • Security Incident Metrics Tool
      • Post-Incident Review Questions Tracking Tool
      • Root-Cause Analysis Template
      • Security Incident Report Template
      [infographic]

      Workshop: Develop and Implement a Security Incident Management Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare Your Incident Response Program

      The Purpose

      Understand the purpose of incident response.

      Formalize the program.

      Identify key players and escalation points.

      Key Benefits Achieved

      Common understanding of the importance of incident response.

      Various business units becoming aware of their roles in the incident management program.

      Formalized documentation.

      Activities

      1.1 Assess the current process, obligations, scope, and boundaries of the incident management program.

      1.2 Identify key players for the response team and for escalation points.

      1.3 Formalize documentation.

      1.4 Prioritize incidents requiring preparation.

      Outputs

      Understanding of the incident landscape

      An identified incident response team

      A security incident management charter

      A security incident management policy

      A list of top-priority incidents

      A general security incident management plan

      A security incident response RACI chart

      2 Develop Incident-Specific Runbooks

      The Purpose

      Document the clear response procedures for top-priority incidents.

      Key Benefits Achieved

      As incidents occur, clear response procedures are documented for efficient and effective recovery.

      Activities

      2.1 For each top-priority incident, document the workflow from detection through analysis, containment, eradication, recovery, and post-incident analysis.

      Outputs

      Up to five incident-specific runbooks

      3 Maintain and Optimize the Program

      The Purpose

      Ensure the response procedures are realistic and effective.

      Identify key metrics to measure the success of the program.

      Key Benefits Achieved

      Real-time run-through of security incidents to ensure roles and responsibilities are known.

      Understanding of how to measure the success of the program.

      Activities

      3.1 Limited scope tabletop exercise.

      3.2 Discuss key metrics.

      Outputs

      Completed tabletop exercise

      Key success metrics identified

      Further reading

      Develop and Implement a Security Incident Management Program

      Create a scalable incident response program without breaking the bank.

      ANALYST PERSPECTIVE

      Security incidents are going to happen whether you’re prepared or not. Ransomware and data breaches are just a few top-of-mind threats that all organizations deal with. Taking time upfront to formalize response plans can save you significantly more time and effort down the road. When an incident strikes, don’t waste time deciding how to remediate. Rather, proactively identify your response team, optimize your response procedures, and track metrics so you can be prepared to jump to action.

      Céline Gravelines,
      Senior Research Analyst
      Security, Risk & Compliance Info-Tech Research Group

      Picture of Céline Gravelines

      Céline Gravelines,
      Senior Research Analyst
      Security, Risk & Compliance Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For

      • A CISO who is dealing with the following:
        • Inefficient use of time and money when retroactively responding to incidents, negatively affecting business revenue and workflow.
        • Resistance from management to adequately develop a formal incident response plan.
        • Lack of closure of incidents, resulting in being re-victimized by the same vector.

      This Research Will Help You

      • Develop a consistent, scalable, and usable incident response program that is not resource intensive.
      • Track and communicate incident response in a formal manner.
      • Reduce the overall impact of incidents over time.
      • Learn from past incidents to improve future response processes.

      This Research Will Also Assist

      • Business stakeholders who are responsible for the following:
      • Improving workflow and managing operations in the event of security incidents to reduce any adverse business impacts.
      • Ensuring that incident response compliance requirements are being adhered to.

      This Research Will Help Them

      • Efficiently allocate resources to improve incident response in terms of incident frequency, response time, and cost.
      • Effectively communicate expectations and responsibilities to users.

      Executive Summary

      Situation

      • Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including workflow, revenue generation, and public image.
      • The incident response of most organizations is ad hoc at best. A formal management plan is rarely developed or adhered to, resulting in ineffective firefighting responses and inefficient allocation of resources.

      Complication

      • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
      • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being revictimized by the same vector.
      • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

      Resolution

      • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
      • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

      Info-Tech Insight

      • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
      • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

      Data breaches are resulting in major costs across industries

      Per capita cost by industry classification of benchmarked companies (measured in USD)

      This is a bar graph showing the per capita cost by industry classification of benchmarked companies(measured in USD). the companies are, in decreasing order of cost: Health; Financial; Services; Pharmaceutical; Technology; Energy; Education; Industrial; Entertainment; Consumer; Media; Transportation; Hospitality; Retail; Research; Public

      Average data breach costs per compromised record hit an all-time high of $148 (in 2018).
      (Source: IBM, “2018 Cost of Data Breach Study)”

      % of systems impacted by a data breach
      1%
      No Impact
      19%
      1-10% impacted
      41%
      11-30% impacted
      24%
      31-50% impacted
      15%
      > 50% impacted
      % of customers lost from a data breach
      61% Lost
      < 20%
      21% Lost 20-40% 8% Lost
      40-60%
      6% Lost
      60-80%
      4% Lost
      80-100%
      % of customers lost from a data breach
      58% Lost
      <20%
      25% Lost
      20-40%
      9% Lost
      40-60%
      5% Lost
      60-80%
      4% Lost
      80-100%

      Source: Cisco, “Cisco 2017 Annual Cybersecurity Report”

      Defining what is security incident management

      IT Incident

      Any event not a part of the standard operation of a service which causes, or may cause, the interruption to, or a reduction in, the quality of that service.

      Security Event:

      A security event is anything that happens that could potentially have information security implications.

      • A spam email is a security event because it may contain links to malware.
      • Organizations may be hit with thousands or perhaps millions of identifiable security events each day.
      • These are typically handled by automated tools or are simply logged.

      Security Incident:

      A security incident is a security event that results in damage such as lost data.

      • Incidents can also include events that don't involve damage but are viable risks.
      • For example, an employee clicking on a link in a spam email that made it through filters may be viewed as an incident.

      It’s not a matter of if you have a security incident, but when

      The increasing complexity and prevalence of threats have finally caught the attention of corporate leaders. Prepare for the inevitable with an incident response program.

      1. A formalized incident response program reduced the average cost of a data breach (per capita) from $148 to $134, while third-party involvement increased costs by $13.40.
      2. US organizations lost an average of $7.91 million per data breach as a result of increased customer attrition and diminished goodwill. Canada and the UK follow suit at $1.57 and $1.39 million, respectively.
      3. 73% of breaches are perpetrated by outsiders, 50% are the work of criminal groups, and 28% involve internal actors.
      4. 55% of companies have to manage fallout, such as reputational damage after a data breach.
      5. The average cost of a data breach increases by $1 million if left undetected for > 100 days.

      (Sources: IBM, “2018 Cost of Data Breach Study”; Verizon, “2017 Data Breach Investigations Report”; Cisco, “Cisco 2018 Annual Cybersecurity Report”)

      Threat Actor Examples

      The proliferation of hacking techniques and commoditization of hacking tools has enabled more people to become threat actors. Examples include:
      • Organized Crime Groups
      • Lone Cyber Criminals
      • Competitors
      • Nation States
      • Hacktivists
      • Terrorists
      • Former Employees
      • Domestic Intelligence Services
      • Current Employees (malicious and accidental)

      Benefits of an incident management program

      Effective incident management will help you do the following:

      Improve efficacy
      Develop structured processes to increase process consistency across the incident response team and the program as a whole. Expose operational weak points and transition teams from firefighting to innovating.

      Improve threat detection, prevention, analysis, and response
      Enhance your pressure posture through a structured and intelligence-driven incident handling and remediation framework.

      Improve visibility and information sharing
      Promote both internal and external information sharing to enable good decision making.

      Create and clarify accountability and responsibility
      Establish a clear level of accountability throughout the incident response program, and ensure role responsibility for all tasks and processes involved in service delivery.

      Control security costs
      Effective incident management operations will provide visibility into your remediation processes, enabling cost savings from misdiagnosed issues and incident reduction.

      Identify opportunities for continuous improvement
      Increase visibility into current performance levels and accurately identify opportunities for continuous improvement with a holistic measurement program.

      Impact

      Short term:
      • Streamlined security incident management program.
      • Formalized and structured response process.
      • Comprehensive list of operational gaps and initiatives.
      • Detailed response runbooks that predefine necessary operational protocol.
      • Compliance and audit adherence.
      Long term:
      • Reduced incident costs and remediation time.
      • Increased operational collaboration between prevention, detection, analysis, and response efforts.
      • Enhanced security pressure posture.
      • Improved communication with executives about relevant security risks to the business.
      • Preserved reputation and brand equity.

      Incident management is essential for organizations of any size

      Your incidents may differ, but a standard response ensures practical security.

      Certain regulations and laws require incident response to be a mandatory process in organizations.

      Compliance Standard Examples Description
      Federal Information Security Modernization Act (FISMA)
      • Organizations must have “procedures for detecting, reporting, and responding to security incidents” (2002).
      • They must also “inform operators of agency information systems about current and potential information security threats and vulnerabilities.”
      Federal Information Processing Standards (FIPS)
      • “Organizations must: (i) establish an operational incident handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.”
      Payment Card Industry Data Security Standard (PCI DSS v3)
      • 12.5.3: “Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations.”
      Health Insurance Portability and Accountability Act (HIPAA)
      • 164.308: Response and Reporting – “Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.”

      Security incident management is applicable to all verticals

      Examples:
      • Finance
      • Insurance
      • Healthcare
      • Public administration
      • Education services
      • Professional services
      • Scientific and technical services

      Maintain a holistic security operations program

      Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization.

      Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operation, and technology infrastructure on a daily basis.

      Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs.
      Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort.

      Info-Tech’s incident response blueprint is one of four security operations initiatives

      Design and Implement a Vulnerability Management Program Vulnerability Management
      Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
      • Vulnerability Tracking Tool
      • Vulnerability Scanning Tool RFP Template
      • Penetration Test RFP Template
      • Vulnerability Mitigation Process Template
      Integrate Threat Intelligence Into Your Security Operations Vulnerability Management
      Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
      • Threat Intelligence Maturity Assessment Tool
      • Threat Intelligence RACI Tool
      • Threat Intelligence Management Plan Template
      • Threat Intelligence Policy Template
      • Threat Intelligence Alert Template
      • Threat Intelligence Alert and Briefing Cadence Schedule Template
      Develop Foundational Security Operations Processes Operations
      Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. These analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations.
      • Security Operations Maturity Assessment Tool
      • Security Operations Event Prioritization Tool
      • Security Operations Efficiency Calculator
      • Security Operations Policy
      • In-House vs. Outsourcing Decision-Making Tool
      • Seccrimewareurity Operations RACI Tool
      • Security Operations TCO & ROI Comparison Calculator
      Develop and Implement a Security Incident Management Program Incident Response (IR)
      Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. Incident response teams coordinate root cause and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns.
      Security Incident Management Policy
      • Security Incident Management Plan
      • Incident Response Maturity Assessment Tool
      • Security Incident Runbook Prioritization Tool
      • Security Incident Management RACI Tool
      • Various Incident Management Runbooks

      Understand how incident response ties into related processes

      Info-Tech Resources:
      Business Continuity Plan Develop a Business Continuity Plan
      Disaster Recovery Plan Create a Right-Sized Disaster Recovery Plan
      Security Incident Management Develop and Implement a Security Incident Management Program
      Incident Management Incident and Problem Management
      Service Desk Standardize the Service Desk

      Develop and Implement a Security Incident Management Program – project overview

      1. Prepare 2. Operate 3. Maintain and Optimize
      Best-Practice Toolkit 1.1 Establish the Drivers, Challenges, and Benefits.

      1.2 Examine the Security Incident Landscape and Trends.

      1.3 Understand Your Security Obligations, Scope, and Boundaries.

      1.4 Gauge Your Current Process to Identify Gaps.

      1.5 Formalize the Security Incident Management Charter.

      1.6 Identify Key Players and Develop a Call Escalation Tree.

      1.7 Develop a Security Incident Management Policy.

      2.1 Understand the Incident Response Framework.

      2.2 Understand the Purpose of Runbooks.

      2.3 Prioritize the Development of Incident-Specific Runbooks.

      2.4 Develop Top-Priority Runbooks.

      2.5 Fill Out the Root-Cause Analysis Template.

      2.6 Customize the Post-Incident Review Questions Tracking Tool to Standardize Useful Questions for Lessons-Learned Meetings.

      2.7 Complete the Security Incident Report Template.

      3.1 Conduct Tabletop Exercises.

      3.2 Initialize a Security Incident Management Metrics Program.

      3.3 Leverage Best Practices for Continuous Improvement.

      Guided Implementations Understand the incident response process, and define your security obligations, scope, and boundaries.

      Formalize the incident management charter, RACI, and incident management policy.
      Use the framework to develop a general incident management plan.

      Prioritize and develop top-priority runbooks.
      Develop and facilitate tabletop exercises.

      Create an incident management metrics program, and assess the success of the incident management program.
      Onsite Workshop Module 1:
      Prepare for Incident Response
      Module 2:
      Handle Incidents
      Module 3:
      Review and Communicate Security Incidents
      Phase 1 Outcome:
    • Formalized stakeholder support
    • Security Incident Management Policy
    • Security Incident Management Charter
    • Call Escalation Tree
    • Phase 2 Outcome:
      • A generalized incident management plan
      • A prioritized list of incidents
      • Detailed runbooks for top-priority incidents
      Phase 3 Outcome:
      • A formalized tracking system for benchmarking security incident metrics.
      • Recommendations for optimizing your security incident management processes.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities
      • Kick off and introductions.
      • High-level overview of weekly activities and outcomes.
      • Understand the benefits of security incident response management.
      • Formalize stakeholder support.
      • Assess your current process, obligations, and scope.
      • Develop RACI chart.
      • Define impact and scope.
      • Identify key players for the threat escalation protocol.
      • Develop a security incident response policy.
      • Develop a general security incident response plan.
      • Prioritize incident-specific runbook development.
      • Understand the incident response process.
      • Develop general and incident-specific call escalation trees.
      • Develop specific runbooks for your top-priority incidents (e.g. ransomware).
        • Detect the incident.
        • Analyze the incident.
        • Contain the incident.
        • Eradicate the root cause.
        • Recover from the incident.
        • Conduct post-incident analysis and communication.
      • Develop specific runbooks for your next top-priority incidents:
        • Detect the incident.
        • Analyze the incident.
        • Contain the incident.
        • Eradicate the root cause.
        • Recover from the incident.
        • Conduct post-incident analysis and communication.
      • Determine key metrics to track and report.
      • Develop post-incident activity documentation.
      • Understand best practices for both internal and external communication.
      • Finalize key deliverables created during the workshop.
      • Present the security incident response program to key stakeholders.
      • Workshop executive presentation and debrief.
      • Finalize main deliverables.
      • Schedule subsequent Analyst Calls.
      • Schedule feedback call.
      Deliverables
      • Security Incident Management Maturity Checklist ‒ Preliminary
      • Security Incident Management RACI Tool
      • Security Incident Management Policy
      • General incident management plan
      • Security Incident Management Runbook
      • Development prioritization
      • Prioritized list of runbooks
      • Understanding of incident handling process
      • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
      • Discussion points for review with response team
      • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
      • Discussion points for review with response team
      • Security Incident Metrics Tool
      • Post-Incident Review Questions Tracking Tool
      • Post-Incident Report Analysis Template
      • Root Cause Analysis Template
      • Post-Incident Review Questions Tracking Tool
      • Communication plans
      • Workshop summary documentation
    • All final deliverables
    • Measured value for Guided Implementations

      Engaging in GIs doesn’t just offer valuable project advice – it also results in significant cost savings.

      GI Purpose Measured Value
      Section 1: Prepare

      Understand the need for an incident response program.
      Develop your incident response policy and plan.
      Develop classifications around incidents.
      Establish your program implementation roadmap.

      Time, value, and resources saved using our classification guidance and templates: 2 FTEs*2 days*$80,000/year = $1,280
      Time, value, and resources saved using our classification guidance and templates:
      2 FTEs*5 days*$80,000/year = $3,200

      Section 2: Operate

      Prioritize runbooks and develop the processes to create your own incident response program:

    • Detect
    • Analyze
    • Contain
    • Eradicate
    • Recover
    • Post-Incident Activity
    • Time, value, and resources saved using our guidance:
      4 FTEs*10 days*$80,000/year = $12,800 (if done internally)

      Time, value, and resources saved using our guidance:
      1 consultant*15 days*$2,000/day = $30,000 (if done by third party)
      Section 3: Maintain and Optimize Develop methods of proper reporting and create templates for communicating incident response to key parties. Time, value, and resources saved using our guidance, templates, and tabletop exercises:
      2 FTEs*3 days*$80,000/year = $1,920
      Total Costs To just get an incident response program off the ground. $49,200

      Insurance company put incident response aside; executives were unhappy

      Organization implemented ITIL, but formal program design became less of a priority and turned more ad hoc.

      Situation

      • Ad hoc processes created management dissatisfaction around the organization’s ineffective responses to data breaches.
      • Because of the lack of formal process, an entirely new security team needed to be developed, costing people their positions.

      Challenges

      • Lack of criteria to categorize and classify security incidents.
      • Need to overhaul the long-standing but ineffective program means attempting to change mindsets, which can be time consuming.
      • Help desk is not very knowledgeable on security.
      • New incident response program needs to be in alignment with data classification policy and business continuity.
      • Lack of integration with MSSP’s ticketing system.

      Next steps:

      • Need to get stakeholder buy-in for a new program.
      • Begin to establish classification/reporting procedures.

      Follow this case study to Phase 1

      Phase 1

      Prepare

      Develop and Implement a Security Incident Management Program

      Phase 1: Prepare

      PHASE 1 PHASE 2 PHASE 3
      Prepare Operate Optimize

      This phase walks you through the following activities:

      1.1 Establish the drivers, challenges, and benefits.
      1.2 Examine the security incident landscape and trends.
      1.3 Understand your security obligations, scope, and boundaries.
      1.4 Gauge your current process to identify gaps.
      1.5 Formalize a security incident management charter.
      1.6 Identify key players and develop a call escalation tree.
      1.7 Develop a security incident management policy.

      This phase involves the following participants:

      • CISO
      • Security team
      • IT staff
      • Business leaders

      Outcomes of this phase

      • Formalized stakeholder support.
      • Security incident management policy.
      • Security incident management charter.
      • Call escalation tree.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Prepare for Incident Response
      Proposed Time to Completion: 3 Weeks
      Step 1.1-1.3 Understand Incident Response Step 1.4-1.7 Begin Developing Your Program
      Start with an analyst kick-off call:
    • Discuss your current incident management status.
    • Review findings with analyst:
    • Review documents.
    • Then complete these activities…
      • Establish your security obligations, scope, and boundaries.
      • Identify the drivers, challenges, and benefits of formalized incident response.
      • Review any existing documentation.
      Then complete these activities…
      • Discuss further incident response requirements.
      • Identify key players for escalation and notifications.
      • Develop the policy.
      • Develop the plan.

      With these tools & templates:
      Security Incident Management Maturity Checklist ‒ Preliminary Information Security Requirements Gathering Tool

      With these tools & templates:
      Security Incident Management Policy
      Security Incident Management Plan
      Phase 1 Results & Insights:

      Ready-made incident response solutions often contain too much coverage: too many irrelevant cases that are not applicable to the organization are accounted for, making it difficult to sift through all the incidents to find the ones you care about. Develop specific incident use cases that correspond with relevant incidents to quickly identify the response process and eliminate ambiguity when handled by different individuals.

      Ice breaker: What is a security incident for your organization?

      1.1 Whiteboard Exercise – 60 minutes

      How do you classify various incident types between service desk, IT/infrastructure, and security?

      • Populate sticky notes with various incidents and assign them to the appropriate team.
        • Who owns the remediation? When are other groups involved? What is the triage/escalation process?
        • What other groups need to be notified (e.g. cyber insurance, Legal, HR, PR)?
        • Are there dependencies among incidents?
        • What are we covering in the scope of this project?

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      • Buy Link or Shortcode: {j2store}563|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Organizations are unaware of the capabilities of web analytics tools and unsure how to leverage these new technologies to enhance their web experience.
      • Traditional solutions offer only information and data about the activity on the website. It is difficult for organizations to understand the customer motivations and behavioral patterns using the data.
      • In addition, there is an overwhelming number of vendors offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.

      Our Advice

      Critical Insight

      • Understanding organizational goals and business objectives is essential in effectively leveraging web analytics.
      • It is easy to get lost in a sea of expensive web analytical tools. Choosing tools that align with the business objectives will keep the costs of customer acquisition and retention to a minimum.
      • Beyond selection and implementation, leveraging web analytic tools requires commitment from the organization to continuously monitor key KPIs to ensure good customer web experience.

      Impact and Result

      • Understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help understand user behavior.
      • Discover top vendors in the market space and some of the top-level features they offer.
      • Understand how to use the metrics to gather critical insights about the website’s use and key initiatives for successful implementation.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Research & Tools

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard – A deck outlining the importance of web analytic tools and how they can be leveraged to meet your business needs.

      This research offers insight into web analytic tools, key trends in the market space, and an introduction to advanced web analytics techniques. Follow our five-step initiative to successfully select and implement web analytics tools and identify which baseline metrics to measure and continuously monitor for best results.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard
      [infographic]

      Further reading

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      Web analytics tools are the gateway to understanding customer behavior.

      EXECUTIVE BRIEF

      Analyst Perspective

      In today’s world, users want to consume concise content and information quickly. Websites have a limited time to prove their usefulness to a new user. Content needs to be as few clicks away from the user as possible. Analyzing user behavior using advanced analytics techniques can help website designers better understand their audience.

      Organizations need to implement sophisticated analytics tools to track user data from their website. However, simply extracting data is not enough to understand the user motivation. A successful implementation of a web analytics tool will comprise both understanding what a customer does on the website and why the customer does what they do.

      This research will introduce some fundamental and advanced analytics tools and provide insight into some of the vendors in the market space.

      Photo of Sai Krishna Rajaramagopalan, Research Specialist, Applications − Enterprise Applications, Info-Tech Research Group. Sai Krishna Rajaramagopalan
      Research Specialist, Applications − Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Web analytics solutions have emerged as applications that provide extensive information and data about users visiting your webpage. However, many organizations are unaware of the capabilities of these tools and unsure how to leverage these new technologies to enhance user experience.
      Common Obstacles
      • Traditional solutions offer information and data about customers’ activity on the website but no insight into their motivations and behavioral patterns.
      • In addition, an overwhelming number of vendors are offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.
      Info-Tech’s Approach
      • This research is aimed to help you understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help you understand user behavior. Discover top vendors in the market space and some of the high-level features offered.
      • This research also explains techniques and metrics to gather critical insights about your website’s use and will aid in understanding users’ motivations and patterns and better predict their behavior on the website.

      Info-Tech Insight

      It is easy to get lost in a sea of expensive web analytics tools. Choose tools that align with your business objectives to keep the costs of customer acquisition and retention to a minimum.

      Ensure the success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      Web Analytics Introduction

      Understand traditional and advanced tools and their capabilities.

      Understanding web analytics

      • Web analytics is the branch of analytics that deals with the collection, reporting, and analysis of data generated by users visiting and interacting with a website.
      • The purpose of web analytics is to measure user behavior, optimize the website’s user experience and flow, and gain insights that help meet business objectives like increasing conversions and sales.
      • Web analytics allows you to see how your website is performing and how people are acting while on your website. What’s important is what you can do with this knowledge.
      • Data collected through web analytics may include traffic sources, referring sites, page views, paths taken, and conversion rates. The compiled data often forms a part of customer relationship management analytics to facilitate and streamline better business decisions.
      • Having strong web analytics is important in understanding customer behavior and fine-tuning marketing and product development approaches accordingly.
      Example of a web analytics dashboard.

      Why you should leverage web analytics

      Leveraging web analytics allows organizations to better understand their customers and achieve their business goals.

      The global web analytics market size is projected to reach US$5,156.3 million by 2026, from US$2,564 million in 2019, at a CAGR of 10.4% during 2021-2026. (Source: 360 Research Reports, 2021) Of the top 1 million websites with the highest traffic, there are over 3 million analytics technologies used. Google Analytics has the highest market share, with 50.3%. (Source: “Top 1 Million Sites,” BuiltWith, 2022)
      Of the 200 million active websites, 57.3% employ some form of web analytics tool. This trend is expected to grow as more sophisticated tools are readily available at a cheaper cost. (Source: “On the Entire Internet,” BuiltWith, 2022; Siteefy, 2022) A three-month study by Contentsquare showed a 6.9% increase in traffic, 11.8% increase in page views, 12.4% increase in transactions, and 3.6% increase in conversion rates through leveraging web analytics. (Source: Mordor Intelligence, 2022)

      Case Study

      Logo for Ryanair.
      INDUSTRY
      Aviation
      SOURCE
      AT Internet
      Web analytics

      Ryanair is a low-fare airline in Europe that receives nearly all of its bookings via its website. Unhappy with its current web analytics platform, which was difficult to understand and use, Ryanair was looking for a solution that could adapt to its requirements and provide continuous support and long-term collaboration.

      Ryanair chose AT Internet for its intuitive user interface that could effectively and easily manage all the online activity. AT was the ideal partner to work closely with the airline to strengthen strategic decision making over the long term, increase conversions in an increasingly competitive market, and increase transactions on the website.

      Results

      By using AT Internet Web Analytics to improve email campaigns and understand the behavior of website visitors, Ryanair was able to triple click-through rates, increase visitor traffic by 16%, and decrease bounce rate by 18%.

      Arrows denoting increases or decreases in certain metrics: '3x increase in click-through rates', '16% increase in visitor traffic', '18% decrease in bounce rate'.

      Use traditional web analytics tools to understand your consumer

      What does the customer do?
      • Traditional web analytics allows organizations to understand what is happening on their website and what customers are doing. These tools deliver hard data to measure the performance of a website. Some of the data measured through traditional web analytics are:
      • Visit count: The number of visits received by a webpage.
      • Bounce rate: The percentage of visitors that leave the website after only viewing the first page compared to total visitors.
      • Referrer: The previous website that sent the user traffic to a specific website.
      • CTA clicks: The number of times a user clicks on a call to action (CTA) button.
      • Conversion rate: Proportion of users that reach the final outcome of the website.
      Example of a traditional web analytics dashboard.

      Use advanced web analytics techniques to understand your consumer

      Why does the customer do what they do?
      • Traditional web analytic tools fail to explain the motivation of users. Advanced analytic techniques help organizations understand user behavior and measure user satisfaction. The techniques help answer questions like: Why did a user come to a webpage? Why did they leave? Did they find what they were looking for? Some of the advanced tools include:
      • Heatmapping: A visual representation of where the users click, scroll, and move on a webpage.
      • Recordings: A recording of the mouse movement and clicks for the entire duration of a user’s visit.
      • Feedback forms and surveys: Voice of the customer tools allowing users to give direct feedback about websites.
      • Funnel exploration: The ability to visualize the steps users take to complete tasks on your site or app.
      Example of an advanced web analytics dashboard.

      Apply industry-leading techniques to leverage web analytics

      Heatmapping
      • Heatmaps are used to visualize where users move their mouse, click, and scroll in a webpage.
      • Website heatmaps use a warm-to-cold color scheme to indicate user activity, with the warmest color indicating the highest visitor engagement and the coolest indicating the lowest visitor engagement.
      • Organizations can use this tool to evaluate the elements of the website that attract users and identify which sections require improvement to increase user engagement.
      • Website designers can make changes and compare the difference in user interaction to measure the effectiveness of the changes.
      • Scrollmaps help designers understand what the most popular scroll-depth of your webpage is – and that’s usually a prime spot for an important call to action.
      Example of a website with heatmapping overlaid.
      (Source: An example of a heatmap layered with a scrollmap from Crazy Egg, 2020)

      Apply industry-leading techniques to leverage web analytics

      Funneling

      • Funnels are graphical representations of a customer’s journey while navigating through the website.
      • Funnels help organizations identify which webpage users land on and where users drop off.
      • Organizations can capture every user step to find the unique challenges between entry and completion. Identifying what friction stands between browsing product grids and completing a transaction allows web designers to then eliminate it.
      • Designers can use A/B testing to experiment with different design philosophies to compare conversion statistics.
      • Funneling can be expanded to cross-channel analytics by incorporating referral data, cookies, and social media analytics.
      Example of a bar chart created through funneling.

      Apply industry-leading techniques to leverage web analytics

      Session recordings

      • Session recordings are playbacks of users’ interaction with the website on a single session. User interaction can vary between mouse clicks, keyboard input, and mouse scroll.
      • Recordings help organizations understand user motivation and help identify why users undertake certain tasks or actions on the webpage.
      • Playbacks can also be used to see if users are confused anywhere between the landing page and final transaction phase. This way, playbacks further help ensure visitors complete the funneling seamlessly.
      Example of a session recording featuring a line created by the mouse's journey.

      Apply industry-leading techniques to leverage web analytics

      Feedback and microsurveys

      • Feedback can be received directly from end users to help organizations improve the website.
      • Receiving feedback from users can be difficult, since not every user is willing to spend time to submit constructive and detailed feedback. Microsurveys are an excellent alternative.
      • Users can submit short feedback forms consisting of a single line or emojis or thumbs up or down.
      • Users can directly highlight sections of the page about which to submit feedback. This allows designers to quickly pinpoint areas for improvement. Additionally, web designers can play back recordings when feedback is submitted to get a clear idea about the challenges users face.
      Example of a website with a microsurvey in the corner.

      Market Overview

      Choose vendors and tools that best match your business needs.

      Top-level traditional features

      Feature Name

      Description

      Visitor Count Tracking Counts the number of visits received by a website or webpage.
      Geographic Analytics Uses location information to enable the organization to provide location-based services for various demographics.
      Conversion Tracking Measures the proportion of users that complete a certain task compared to total number of users.
      Device and Browser Analytics Captures and summarizes device and browser information.
      Bounce and Exit Tracking Calculates exit rate and bounce rate on a webpage.
      CTA Tracking Measures the number of times users click on a call to action (CTA) button.
      Audience Demographics Captures, analyzes, and displays customer demographic/firmographic data from different channels.
      Aggregate Traffic Reporting Works backward from a conversion or other key event to analyze the differences, trends, or patterns in the paths users took to get there.
      Social Media Analytics Captures information on social signals from popular services (Twitter, Facebook, LinkedIn, etc.).

      Top-level advanced features

      Feature Name

      Description

      HeatmappingShows where users have clicked on a page and how far they have scrolled down a page or displays the results of eye-tracking tests through the graphical representation of heatmaps.
      Funnel ExplorationVisualizes the steps users take to complete tasks on your site or app.
      A/B TestingEnables you to test the success of various website features.
      Customer Journey ModellingEffectively models and displays customer behaviors or journeys through multiple channels and touchpoints.
      Audience SegmentationCreates and analyzes discrete customer audience segments based on user-defined criteria or variables.
      Feedback and SurveysEnables users to give feedback and share their satisfaction and experience with website designers.
      Paid Search IntegrationIntegrates with popular search advertising services (i.e. AdWords) and can make predictive recommendations around areas like keywords.
      Search Engine OptimizationProvides targeted recommendations for improving and optimizing a page for organic search rankings (i.e. via A/B testing or multivariate testing).
      Session RecordingRecords playbacks of users scrolling, moving, u-turning, and rage clicking on your site.

      Evaluate software category leaders using SoftwareReviews’ vendor rankings and awards

      Logo for SoftwareReviews.
      Sample of SoftwareReviews' The Data Quadrant. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' The Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      Logo for SoftwareReviews.
      Fact-based reviews of business software from IT professionals. Top-tier data quality backed by a rigorous quality assurance process. CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Product and category reports with state-of-the-art data visualization. User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      Top vendors in the web analytics space

      Logo for Google Analytics. Google Analytics provides comprehensive traditional analytics tools, free of charge, to understand the customer journey and improve marketing ROI. Twenty-four percent of all web analytical tools used on the internet are provided by Google analytics.
      Logo for Hotjar. Hotjar is a behavior analytics and product experience insights service that helps you empathize with and understand your users through their feedback via tools like heatmaps, session recordings, and surveys. Hotjar complements the data and insights you get from traditional web analytics tools like Google Analytics.
      Logo for Crazy Egg. Crazy Egg is a website analytics tool that helps you optimize your site to make it more user-friendly, more engaging, and more conversion-oriented. It does this through heatmaps and A/B testing, which allow you to see how people are interacting with your site.
      Logo for Amplitude Analytics. Amplitude Analytics provides intelligent insight into customer behavior. It offers basic functionalities like measuring conversion rate and engagement metrics and also provides more advanced tools like customer journey maps and predictive analytics capabilities through AI.

      Case Study

      Logo for Miller & Smith.
      INDUSTRY
      Real Estate
      SOURCE
      Crazy Egg

      Heatmaps and playback recordings

      Challenge

      Miller & Smith had just redesigned their website, but the organization wanted to make sure it was user-friendly as well as visually appealing. They needed an analytics platform that could provide information about where visitors were coming from and measure the effectiveness of the marketing campaigns.

      Solution

      Miller & Smith turned to Crazy Egg to obtain visual insights and track user behavior. They used heatmaps and playback recordings to see user activity within webpages and pinpoint any issues with user interface. In just a few weeks, Miller & Smith gained valuable data to work with: the session recordings helped them understand how users were navigating the site, and the heatmaps allowed them to see where users were clicking – and what they were skipping.

      Results

      Detailed reports generated by the solution allowed Miller & Smith team to convince key stakeholders and implement the changes easily. They were able to pinpoint what changes needed to be made and why these changes would improve their experience.

      Within few weeks, the bounce rate improved by 7.5% and goal conversion increased by 8.5% over a similar period the previous year.

      Operationalizing Web Analytics Tools

      Execute initiatives for successful implementation.

      Ensure success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      1.1 Understand your organization’s goals

      30 minutes

      Output: Organization’s goal list

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key organizational goals for both the short term and the long term.
      2. Arrange the goals in descending order of priority.

      Example table of goals ranked by priority and labeled short or long term.

      1.2 Align business objectives with organizational goals

      30 minutes

      Output: Business objectives

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key business objectives that help attain organization goals.
      2. Match each business objective with the corresponding organizational goals it helps achieve.
      3. Arrange the objectives in descending order of priority.

      Example table of business objectives ranked by priority and which organization goal they're linked to.

      Establish baseline metrics

      Baseline metrics will be improved through:

      1. Efficiently using website elements and CTA button placement
      2. Reducing friction between the landing page and end point
      3. Leveraging direct feedback from users to continuously improve customer experience

      1.3 Establish baseline metrics that you intend to improve via your web analytics tools

      30 minutes

      Example table with metrics, each with a current state and goal state.

      Accelerate your software selection project

      Vendor selection projects often demand extensive and unnecessary documentation.

      Software Selection Insight

      Balance the effort-to-information ratio required for a business impact assessment to keep stakeholders engaged. Use documentation that captures the key data points and critical requirements without taking days to complete. Stakeholders are more receptive to formal selection processes that are friction free.

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      Sample of the Software Selection Workbook deliverable.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      Sample of the Vendor Evaluation Workbook deliverable.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      Sample of the Guide to Software Selection: A Business Stakeholder Manual deliverable.

      Revisit the metrics you identified and revise your goals

      Track the post-deployment results, compare the metrics, and set new targets for the next fiscal year.

      Example table of 'Baseline Website Performance Metrics' with the column 'Revised Target' highlighted.

      Related Info-Tech Research

      Stock image of two people going over a contract. Modernize Your Corporate Website to Drive Business Value

      Drive higher user satisfaction and value through UX-driven websites.

      Stock image of a person using the cloud on their smartphone. Select and Implement a Web Experience Management Solution

      Your website is your company’s face to the world: select a best-of-breed platform to ensure you make a rock-star impression with your prospects and customers!

      Stock image of people studying analytics. Create an Effective Web Redesign Strategy

      Ninety percent of web redesign projects, executed without an effective strategy, fail to accomplish their goals.

      Bibliography

      "11 Essential Website Data Factors and What They Mean." CivicPlus, n.d. Accessed 26 July 2022.

      “Analytics Usage Distribution in the Top 1 Million Sites.” BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      "Analytics Usage Distribution on the Entire Internet." BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      Bell, Erica. “How Miller and Smith Used Crazy Egg to Create an Actionable Plan to Improve Website Usability.” Crazy Egg, n.d. Accessed 26 July 2022.

      Brannon, Jordan. "User Behavior Analytics | Enhance The Customer Journey." Coalition Technologies, 8 Nov 2021. Accessed 26 July 2022.

      Cardona, Mercedes. "7 Consumer Trends That Will Define The Digital Economy In 2021." Adobe Blog, 7 Dec 2020. Accessed 26 July 2022.

      “The Finer Points.“ Analytics Features. Google Marketing Platform, 2022. Accessed 26 July 2022.

      Fitzgerald, Anna. "A Beginner’s Guide to Web Analytics." HubSpot, 21 Sept 2022. Accessed 26 July 2022.

      "Form Abandonment: How to Avoid It and Increase Your Conversion Rates." Fullstory Blog, 7 April 2022. Accessed 26 July 2022.

      Fries, Dan. "Plug Sales Funnel Gaps by Identifying and Tracking Micro-Conversions." Clicky Blog, 9 Dec 2019. Accessed 7 July 2022.

      "Funnel Metrics in Saas: What to Track and How to Improve Them?" Userpilot Blog, 23 May 2022. Accessed 26 July 2022.

      Garg, Neha. "Digital Experimentation: 3 Key Steps to Building a Culture of Testing." Contentsquare, 21 June 2021. Accessed 26 July 2022.

      “Global Web Analytics Market Size, Status and Forecast 2021-2027.” 360 Research Reports, 25 Jan. 2021. Web.

      Hamilton, Stephanie. "5 Components of Successful Web Analytics." The Daily Egg, 2011. Accessed 26 July 2022.

      "Hammond, Patrick. "Step-by-Step Guide to Cohort Analysis & Reducing Churn Rate." Amplitude, 15 July 2022. Accessed 26 July 2022.

      Hawes, Carry. "What Is Session Replay? Discover User Pain Points With Session Recordings." Dynatrace, 20 Dec 2021. Accessed 26 July 2022.

      Huss, Nick. “How Many Websites Are There in the World?” Siteefy, 8 Oct. 2022. Web.

      Nelson, Hunter. "Establish Web Analytics and Conversion Tracking Foundations Using the Google Marketing Platform.” Tortoise & Hare Software, 29 Oct 2022. Accessed 26 July 2022.

      "Product Analytics Vs Product Experience Insights: What’s the Difference?" Hotjar, 14 Sept 2021. Accessed 26 July 2022.

      “Record and watch everything your visitors do." Inspectlet, n.d. Accessed 26 July 2022.

      “Ryanair: Using Web Analytics to Manage the Site’s Performance More Effectively and Improve Profitability." AT Internet, 1 April 2020. Accessed 26 July 2022.

      Sibor, Vojtech. "Introducing Cross-Platform Analytics.” Smartlook Blog, 5 Nov 2022. Accessed 26 July 2022.

      "Visualize Visitor Journeys Through Funnels.” VWO, n.d. Accessed 26 July 2022.

      "Web Analytics Market Share – Growth, Trends, COVID-19 Impact, and Forecasts (2022-2027)." Mordor Intelligence, 2022. Accessed 26 July 2022.

      “What is the Best Heatmap Tool for Real Results?” Crazy Egg, 27 April 2020. Web.

      "What Is Visitor Behavior Analysis?" VWO, 2022. Accessed 26 July 2022.

      Zheng, Jack G., and Svetlana Peltsverger. “Web Analytics Overview.” IGI Global, 2015. Accessed 26 July 2022.

      Define Your Cloud Vision

      • Buy Link or Shortcode: {j2store}448|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $182,333 Average $ Saved
      • member rating average days saved: 28 Average Days Saved
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy

      The cloud permeates the enterprise technology discussion. It can be difficult to separate the hype from the value. Should everything go to the cloud, or is that sentiment stoked by vendors looking to boost their bottom lines? Not everything should go to the cloud, but coming up with a systematic way to determine what belongs where is increasingly difficult as offerings get more complex.

      Our Advice

      Critical Insight

      Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud-first isn’t always the way to go.

      Impact and Result

      • Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non-migration) path based on the value of cloud characteristics.
      • Codify risks tied to workloads’ cloud suitability and plan mitigations.
      • Build a roadmap of initiatives for actions by workload and risk mitigation.
      • Define a cloud vision to share with stakeholders.

      Define Your Cloud Vision Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define Your Cloud Vision – A step-by-step guide to generating, validating, and formalizing your cloud vision.

      The cloud vision storyboard walks readers through the process of generating, validating and formalizing a cloud vision, providing a framework and tools to assess workloads for their cloud suitability and risk.

      • Define Your Cloud Vision – Phases 1-4

      2. Cloud Vision Executive Presentation – A document that captures the results of the exercises, articulating use cases for cloud/non-cloud, risks, challenges, and high-level initiative items.

      The executive summary captures the results of the vision exercise, including decision criteria for moving to the cloud, risks, roadblocks, and mitigations.

      • Cloud Vision Executive Presentation

      3. Cloud Vision Workbook – A tool that facilitates the assessment of workloads for appropriate service model, delivery model, support model, and risks and roadblocks.

      The cloud vision workbook comprises several assessments that will help you understand what service model, delivery model, support model, and risks and roadblocks you can expect to encounter at the workload level.

      • Cloud Vision Workbook
      [infographic]

      Workshop: Define Your Cloud Vision

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Cloud

      The Purpose

      Align organizational goals to cloud characteristics.

      Key Benefits Achieved

      An understanding of how the characteristics particular to cloud can support organizational goals.

      Activities

      1.1 Generate corporate goals and cloud drivers.

      1.2 Identify success indicators.

      1.3 Explore cloud characteristics.

      1.4 Explore cloud service and delivery models.

      1.5 Define cloud support models and strategy components.

      1.6 Create state summaries for the different service and delivery models.

      1.7 Select workloads for further analysis.

      Outputs

      Corporate cloud goals and drivers

      Success indicators

      Current state summaries

      List of workloads for further analysis

      2 Assess Workloads

      The Purpose

      Evaluate workloads for cloud value and action plan.

      Key Benefits Achieved

      Action plan for each workload.

      Activities

      2.1 Conduct workload assessment using the Cloud Strategy Workbook tool.

      2.2 Discuss assessments and make preliminary determinations about the workloads.

      Outputs

      Completed workload assessments

      Workload summary statements

      3 Identify and Mitigate Risks

      The Purpose

      Identify and plan to mitigate potential risks in the cloud project.

      Key Benefits Achieved

      A list of potential risks and plans to mitigate them.

      Activities

      3.1 Generate a list of risks and potential roadblocks associated with the cloud.

      3.2 Sort risks and roadblocks and define categories.

      3.3 Identify mitigations for each identified risk and roadblock

      3.4 Generate initiatives from the mitigations.

      Outputs

      List of risks and roadblocks, categorized

      List of mitigations

      List of initiatives

      4 Bridge the Gap and Create the Strategy

      The Purpose

      Clarify your vision of how the organization can best make use of cloud and build a project roadmap.

      Key Benefits Achieved

      A clear vision and a concrete action plan to move forward with the project.

      Activities

      4.1 Review and assign work items.

      4.2 Finalize the decision framework for each of the following areas: service model, delivery model, and support model.

      4.3 Create a cloud vision statement

      Outputs

      Cloud roadmap

      Finalized task list

      Formal cloud decision rubric

      Cloud vision statement

      5 Next Steps and Wrap-Up

      The Purpose

      Complete your cloud vision by building a compelling executive-facing presentation.

      Key Benefits Achieved

      Simple, straightforward communication of your cloud vision to key stakeholders.

      Activities

      5.1 Build the Cloud Vision Executive Presentation

      Outputs

      Completed cloud strategy executive presentation

      Completed Cloud Vision Workbook.

      Further reading

      Define Your Cloud Vision

      Define your cloud vision before it defines you

      Analyst perspective

      Use the cloud’s strengths. Mitigate its weaknesses.

      The cloud isn’t magic. It’s not necessarily cheaper, better, or even available for the thing you want it to do. It’s not mysterious or a cure-all, and it does take a bit of effort to systematize your approach and make consistent, defensible decisions about your cloud services. That’s where this blueprint comes in.

      Your cloud vision is the culmination of this effort all boiled down into a single statement: “This is how we want to use the cloud.” That simple statement should, of course, be representative of – and built from – a broader, contextual strategy discussion that answers the following questions: What should go to the cloud? What kind of cloud makes sense? Should the cloud deployment be public, private, or hybrid? What does a migration look like? What risks and roadblocks need to be considered when exploring your cloud migration options? What are the “day 2” activities that you will need to undertake after you’ve gotten the ball rolling?

      Taken as a whole, answering these questions is difficult task. But with the framework provided here, it’s as easy as – well, let’s just say it’s easier.

      Jeremy Roberts

      Research Director, Infrastructure and Operations

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • You are both extrinsically motivated to move to the cloud (e.g. by vendors) and intrinsically motivated by internal digital transformation initiatives.
      • You need to define the cloud’s true value proposition for your organization without assuming it is an outsourcing opportunity or will save you money.
      • Your industry, once cloud-averse, is now normalizing the use of cloud services, but you have not established a basic cloud vision from which to develop a strategy at a later point.

      Common Obstacles

      • Organizations jump to the cloud before defining their cloud vision and without any clear plan for realizing the cloud’s benefits.
      • Many organizations have a foot in the cloud already, but these decisions have been made in an ad hoc rather than systematic fashion.
      • You lack a consistent framework to assess your workloads’ suitability for the cloud.

      Info-Tech's Approach

      • Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non-migration) path based on the value of cloud characteristics.
      • Codify risks tied to workloads’ cloud suitability and plan mitigations.
      • Build a roadmap of initiatives for actions by workload and risk mitigation.
      • Define a cloud vision to share with stakeholders.

      Info-Tech Insight: 1) Base migration decisions on cloud characteristics. If your justification for the migration is simply getting your workload out of the data center, think again. 2) Address the risks up front in your migration plan. 3) The cloud changes roles and calls for different skill sets, but Ops is here to stay.

      Your challenge

      This research is designed to help organizations who need to:

      • Identify workloads that are good candidates for the cloud.
      • Develop a consistent, cost-effective approach to cloud services.
      • Outline and mitigate risks.
      • Define your organization’s cloud archetype.
      • Map initiatives on a roadmap.
      • Communicate your cloud vision to stakeholders so they can understand the reasons behind a cloud decision and differentiate between different cloud service and deployment models.
      • Understand the risks, roadblocks, and limitations of the cloud.

      “We’re moving from a world where companies like Oracle and Microsoft and HP and Dell were all critically important to a world where Microsoft is still important, but Amazon is now really important, and Google also matters. The technology has changed, but most of the major vendors they’re betting their business on have also changed. And that’s super hard for people..” –David Chappell, Author and Speaker

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • Organizations jump to the cloud before defining their cloud vision and without any clear plan for realizing the cloud’s benefits.
      • Many organizations already have a foot in the cloud, but the choice to explore these solutions was made in an ad hoc rather than systematic fashion. The cloud just sort of happened.
      • The lack of a consistent assessment framework means that some workloads that probably belong in the cloud are kept on premises or with hosted services providers – and vice versa.
      • Securing cloud expertise is remarkably difficult – especially in a labor market roiled by the global pandemic and the increasing importance of cloud services.

      Standard cloud challenges

      30% of all cloud spend is self-reported as waste. Many workloads that end up in the cloud don’t belong there. Many workloads that do belong in the cloud aren’t properly migrated. (Flexera, 2021)

      44% of respondents report themselves as under-skilled in the cloud management space. (Pluralsight, 2021)

      Info-Tech’s approach

      Goals and drivers

      • Service model
        • What type of cloud makes the most sense for workload archetypes? When does it make sense to pick SaaS over IaaS, for example?
      • Delivery model
        • Will services be delivered over the public cloud, a private cloud, or a hybrid cloud? What challenges accompany this decision?
      • Migration Path
        • What does the migration path look like? What does the transition to the cloud look like, and how much effort will be required? Amazon’s 6Rs framework captures migration options: rehosting, repurchasing, replatforming, and refactoring, along with retaining and retiring. Each workload should be assessed for its suitability for one or more of these paths.
      • Support model
        • How will services be provided? Will staff be trained, new staff hired, a service provider retained for ongoing operations, or will a consultant with cloud expertise be brought on board for a defined period? The appropriate support model is highly dependent on goals along with expected outcomes for different workloads.

      Highlight risks and roadblocks

      Formalize cloud vision

      Document your cloud strategy

      The Info-Tech difference:

      1. Determine the hypothesized value of cloud for your organization.
      2. Evaluate workloads with 6Rs framework.
      3. Identify and mitigate risks.
      4. Identify cloud archetype.
      5. Plot initiatives on a roadmap.
      6. Write action plan statement and goal statement.

      What is the cloud, how is it deployed, and how is service provided?

      Cloud Characteristics

      1. On-demand self-service: the ability to access reosurces instantly without vendor interaction
      2. Broad network access: all services delivered over the network
      3. Resource pooling: multi-tenant environment (shared)
      4. Rapid elasticity: the ability to expand and retract capabilities as needed
      5. Measured service: transparent metering

      Service Model:

      1. Software-as-a-Service: all but the most minor configuration is done by the vendor
      2. Platform-as-a-Service: customer builds the application using tools provided by the provider
      3. Infrastructure-as-a-Service: the customer manages OS, storage, and the application

      Delivery Model

      1. Public cloud: accessible to anyone over the internet; multi-tenant environment
      2. Private cloud: provisioned for a single organization with multiple units
      3. Hybrid cloud: two or more connected clouds; data is portage across them
      4. Community cloud: provisioned for a specific group of organizations

      (National Institute of Standards and Technology)

      A workload-first approach will allow you to take full advantage of the cloud’s strengths

      • Under all but the most exceptional circumstances, good cloud strategies will incorporate different service models. Very few organizations are “IaaS shops” or “SaaS shops,” even if they lean heavily in one direction.
      • These different service models (including non-cloud options like colocation and on-premises infrastructure) each have different strengths. Part of your cloud strategy should involve determining which of the services makes the most sense for you.
      • Own the cloud by understanding which cloud (or non-cloud!) offering makes the most sense for you given your unique context.

      Migration paths

      In a 2016 blog post, Amazon introduced a framework for understanding cloud migration strategies. The framework presented here is slightly modified – including a “relocate” component rather than a “retire” component – but otherwise hews close to the standard.

      These migration paths reflect organizational capabilities and desired outcomes in terms of service models – cloud or otherwise. Retention means keeping the workload where it is, in a datacenter or a colocation service, or relocating to a colocation or hosted software environment. These represent the “non-cloud” migration paths.

      In the graphic on the right, the paths within the red box lead to the cloud. Rehosting means lifting and shifting to an infrastructure environment. Migrating a virtual machine from your VMware environment on premises to Azure Virtual machines is a quick way to realize some benefits from the cloud. Migrating from SQL Server on premises to a cloud-based SQL solution looks a bit more like changing platforms (replatforming). It involves basic infrastructure modification without a substantial architectural component.

      Refactoring is the most expensive of the options and involves engaging the software development lifecycle to build a custom solution, fundamentally rewriting the solution to be cloud native and take advantage of cloud-native architectures. This can result in a PaaS or an IaaS solution.

      Finally, repurchasing means simply going to market and procuring a new solution. This may involve migrating data, but it does not require the migration of components.

      Migration Paths

      Retain (Revisit)

      • Keep the application in its current form, at least for now. This doesn’t preclude revisiting it in the future.

      Relocate

      • Move the workload between datacenters or to a hosted software/colocation provider.

      Rehost

      • Move the application to the cloud (IaaS) and continue to run it in more or less the same form as it currently runs.

      Replatform

      • Move the application to the cloud and perform a few changes for cloud optimizations.

      Refactor

      • Rewrite the application, taking advantage of cloud-native architectures.

      Repurchase

      • Replace with an alternative, cloud-native application and migrate the data.

      Support model

      Support models by characteristic

      Duration of engagement Specialization Flexibility
      Internal IT Indefinite Varies based on nature of business Fixed, permanent staff
      Managed Service Provider Contractually defined General, some specialization Standard offering
      Consultant Project-based Specific, domain-based Entirely negotiable

      IT services, including cloud services, can be delivered and managed in multiple ways depending on the nature of the workload and the organization’s intended path forward. Three high-level options are presented here and may be more or less valuable based on the duration of the expected engagement with the service (temporary or permanent), the skills specialization required, and the flexibility necessary to complete the job.

      By way of example, a highly technical, short-term project with significant flexibility requirements might be a good fit for an expensive consultant, whereas post-implementation maintenance of a cloud email system requires relatively little specialization and flexibility and would therefore be a better fit for internal management.

      There is no universally applicable rule here, but there are some workloads that are generally a good fit for the cloud and others that are not as effective, with that fit being conditional on the appropriate support model being employed.

      Risks, roadblocks, and strategy components

      No two cloud strategies are exactly alike, but all should address 14 key areas. A key step in defining your cloud vision is an assessment of these strategy components. Lower maturity does not preclude an aggressive cloud strategy, but it does indicate that higher effort will be required to make the transition.

      Component Description Component Description
      Monitoring What will system owners/administrators need visibility into? How will they achieve this? Vendor Management What practices must change to ensure effective management of cloud vendors?
      Provisioning Who will be responsible for deploying cloud workloads? What governance will this process be subject to? Finance Management How will costs be managed with the transition away from capital expenditure?
      Migration How will cloud migrations be conducted? What best practices/standards must be employed? Security What steps must be taken to ensure that cloud services meet security requirements?
      Operations management What is the process for managing operations as they change in the cloud? Data Controls How will data residency, compliance, and protection requirements be met in the cloud?
      Architecture What general principles must apply in the cloud environment? Skills and roles What skills become necessary in the cloud? What steps must be taken to acquire those skills?
      Integration and interoperability How will services be integrated? What standards must apply? Culture and adoption Is there a cultural aversion to the cloud? What steps must be taken to ensure broad cloud acceptance?
      Portfolio Management Who will be responsible for managing the growth of the cloud portfolio? Governing bodies What formal governance must be put in place? Who will be responsible for setting standards?

      Cloud archetypes – a cloud vision component

      Once you understand the value of the cloud, your workloads’ general suitability for cloud, and your proposed risks and mitigations, the next step is to define your cloud archetype.

      Your organization’s cloud archetype is the strategic posture that IT adopts to best support the organization’s goals. Info-Tech’s model recognizes seven archetypes, divided into three high-level archetypes.

      After consultation with your stakeholders, and based on the results of the suitability and risk assessment activities, define your archetype. The archetype feeds into the overall cloud vision and provides simple insight into the cloud future state for all stakeholders.

      The cloud vision itself is captured in a “vision statement,” a short summary of the overall approach that includes the overall cloud archetype.

      We can best support the organization's goals by:

      More Cloud

      Less Cloud

      Cloud Focused Cloud-Centric Providing all workloads through cloud delivery.
      Cloud-First Using the cloud as our default deployment model. For each workload, we should ask “why NOT cloud?”
      Cloud Opportunistic Hybrid Enabling the ability to transition seamlessly between on-premises and cloud resources for many workloads.
      Integrated Combining cloud and traditional infrastructure resources, integrating data and applications through APIs or middleware.
      Split Using the cloud for some workloads and traditional infrastructure resources for others.
      Cloud Averse Cloud-Light Using traditional infrastructure resources and limiting our use of the cloud to when it is absolutely necessary.
      Anti-Cloud Using traditional infrastructure resources and avoiding use of the cloud wherever possible.

      Info-Tech’s methodology for defining your cloud vision

      1. Understand the Cloud 2. Assess Workloads 3. Identify and Mitigate Risks 4. Bridge the Gap and Create the Vision
      Phase Steps
      1. Generate goals and drivers
      2. Explore cloud characteristics
      3. Create a current state summary
      4. Select workloads for analysis
      1. Conduct workload assessments
      2. Determine workload future state
      1. Generate risks and roadblocks
      2. Mitigate risks and roadblocks
      3. Define roadmap initiatives
      1. Review and assign work items
      2. Finalize cloud decision framework
      3. Create cloud vision
      Phase Outcomes
      1. List of goals and drivers
      2. Shared understanding of cloud terms
      3. Current state of cloud in the organization
      4. List of workloads to be assessed
      1. Completed workload assessments
      2. Defined workload future state
      1. List of risks and roadblocks
      2. List of mitigations
      3. Defined roadmap initiatives
      1. Cloud roadmap
      2. Cloud decision framework
      3. Completed Cloud Vision Executive Presentation

      Insight summary

      The cloud may not be right for you – and that’s okay!

      Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud first isn’t always the way to go.

      Not all clouds are equal

      It’s not “should I go to the cloud?” but “what service and delivery models make sense based on my needs and risk tolerance?” Thinking about the cloud as a binary can force workloads into the cloud that don’t belong (and vice versa).

      Bottom-up is best

      A workload assessment is the only way to truly understand the cloud’s value. Work from the bottom up, not the top down, understand what characteristics make a workload cloud suitable, and strategize on that basis.

      Your accountability doesn’t change

      You are still accountable for maintaining available, secure, functional applications and services. Cloud providers share some responsibility, but the buck stops where it always has: with you.

      Don’t customize for the sake of customization

      SaaS providers make money selling the same thing to everyone. When migrating a workload to SaaS, work with stakeholders to pursue standardization around a selected platform and avoid customization where possible.

      Best of both worlds, worst of both worlds

      Hybrid clouds are in fashion, but true hybridity comes with additional cost, administration, and other constraints. A convoy moves at the speed of its slowest member.

      The journey matters as much as the destination

      How you get there is as important as what “there” actually is. Any strategy that focuses solely on the destination misses out on a key part of the value conversation: the migration strategy.

      Blueprint benefits

      Cloud Vision Executive Presentation

      This presentation captures the results of the exercises and presents a complete vision to stakeholders including a desired target state, a rubric for decision making, the results of the workload assessments, and an overall risk profile.

      Cloud Vision Workbook

      This workbook includes the standard cloud workload assessment questionnaire along with the results of the assessment. It also includes the milestone timeline for the implementation of the cloud vision.

      Blueprint benefits

      IT Benefits

      • A consistent approach to the cloud takes the guesswork out of deployment decisions and makes it easier for IT to move on to the execution stage.
      • When properly incorporated, cloud services come with many benefits, including automation, elasticity, and alternative architectures (micro-services, containers). The cloud vision project will help IT readers articulate expected benefits and work towards achieving them.
      • A clear framework for incorporating organizational goals into cloud plans.

      Business benefits

      • Simple, well-governed access to high-quality IT resources.
      • Access to the latest and greatest in technology to facilitate remote work.
      • Framework for cost management in the cloud that incorporates OpEx and chargebacks/showbacks. A clear understanding of expected changes to cost modeling is also a benefit of a cloud vision.
      • Clarity for stakeholders about IT’s response (and contribution to) IT strategic initiatives.

      Measure the value of this blueprint

      Don’t take our word for it:

      • The cloud vision material in various forms has been offered for several years, and members have generally benefited substantially, both from cloud vision workshops and from guided implementations led by analysts.
      • After each engagement, we send a survey that asks members how they benefited from the experience. Of 30 responses, the cloud vision research has received an average score of 9.8/10. Real members have found significant value in the process.
      • Additionally, members reported saving between 2 and 120 days (for an average of 17), and financial savings ranged from $1,920 all the way up to $1.27 million, for an average of $170,577.90! If we drop outliers on both ends, the average reported value of a cloud vision engagement is $37, 613.
      • Measure the value by calculating the time saved from using Info-Tech’s framework vs. a home-brewed cloud strategy alternative and by comparing the overall cost of a guided implementation or workshop with the equivalent offering from another firm. We’re confident you’ll come out ahead.

      9.8/10 Average reported satisfaction

      17 Days Average reported time savings

      $37, 613 Average cost savings (adj.)

      Executive Brief Case Study

      Industry: Financial

      Source: Info-Tech workshop

      Anonymous financial institution

      A small East Coast financial institution was required to develop a cloud strategy. This strategy had to meet several important requirements, including alignment with strategic priorities and best practices, along with regulatory compliance, including with the Office of the Comptroller of the Currency.

      The bank already had a significant cloud footprint and was looking to organize and formalize the strategy going forward.

      Leadership needed a comprehensive strategy that touched on key areas including the delivery model, service models, individual workload assessments, cost management, risk management and governance. The output had to be consumable by a variety of audiences with varying levels of technical expertise and had to speak to IT’s role in the broader strategic goals articulated earlier in the year.

      Results

      The bank engaged Info-Tech for a cloud vision workshop and worked through four days of exercises with various IT team members. The bank ultimately decided on a multi-cloud strategy that prioritized SaaS while also allowing for PaaS and IaaS solutions, along with some non-cloud hosted solutions, based on organizational circumstances.

      Bank cloud vision

      [Bank] will provide innovative financial and related services by taking advantage of the multiplicity of best-of-breed solutions available in the cloud. These solutions make it possible to benefit from industry-level innovations, while ensuring efficiency, redundancy, and enhanced security.

      Bank cloud decision workflow

      • SaaS
        • Platform?
          • Yes
            • PaaS
          • No
            • Hosted
          • IaaS
            • Other

      Non-cloud

      Cloud

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this crticial project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off imediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge the take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Phase 1

      • Call #1: Discuss current state, challenges, etc.
      • Call #2: Goals, drivers, and current state.

      Phase 2

      • Call #3: Conduct cloud suitability assessment for selected workloads.

      Phase 3

      • Call #4: Generate and categorize risks.
      • Call #5: Begin the risk mitigation conversation.

      Phase 4

      • Call #6: Complete the risk mitigation process
      • Call #7: Finalize vision statement and cloud decision framework.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Offsite day
      Understand the cloud Assess workloads Identify and mitigate risks Bridge the gap and create the strategy Next steps and wrap-up (offsite)
      Activities

      1.1 Introduction

      1.2 Generate corporate goals and cloud drivers

      1.3 Identify success indicators

      1.4 Explore cloud characteristics

      1.5 Explore cloud service and delivery models

      1.6 Define cloud support models and strategy components

      1.7 Create current state summaries for the different service and delivery models

      1.8 Select workloads for further analysis

      2.1 Conduct workload assessments using the cloud strategy workbook tool

      2.2 Discuss assessments and make preliminary determinations about workloads

      3.1 Generate a list of risks and potential roadblocks associated with the cloud

      3.2 Sort risks and roadblocks and define categories

      3.3 Identify mitigations for each identified risk and roadblock

      3.4 Generate initiatives from the mitigations

      4.1 Review and assign work items

      4.2 Finalize the decision framework for each of the following areas:

      • Service model
      • Delivery model
      • Support model

      4.3 Create a cloud vision statement

      5.1 Build the Cloud Vision Executive Presentation
      Deliverables
      1. Corporate goals and cloud drivers
      2. Success indicators
      3. Current state summaries
      4. List of workloads for further analysis
      1. Completed workload assessments
      2. Workload summary statements
      1. List of risks and roadblocks, categorized
      2. List of mitigations
      3. List of initiatives
      1. Finalized task list
      2. Formal cloud decision rubric
      3. Cloud vision statement
      1. Completed cloud strategy executive presentation
      2. Completed cloud vision workbook

      Understand the cloud

      Build the foundations of your cloud vision

      Phase 1

      Phase 1

      Understand the Cloud

      Phase 1

      1.1 Generate goals and drivers

      1.2 Explore cloud characteristics

      1.3 Create a current state summary

      1.4 Select workloads for analysis

      Phase 2

      2.1 Conduct workload assessments

      2.2 Determine workload future states

      Phase 3

      3.1 Generate risks and roadblocks

      3.2 Mitigate risks and roadblocks

      3.3 Define roadmap initiatives

      Phase 4

      4.1 Review and assign work items

      4.2 Finalize cloud decision framework

      4.3 Create cloud vision

      This phase will walk you through the following activities:

      1.1.1 Generate organizational goals

      1.1.2 Define cloud drivers

      1.1.3 Define success indicators

      1.3.1 Record your current state

      1.4.1 Select workloads for further assessment

      This phase involves the following participants:

      IT management, the core working group, security, infrastructure, operations, architecture, engineering, applications, non-IT stakeholders.

      It starts with shared understanding

      Stakeholders must agree on overall goals and what “cloud” means

      The cloud is a nebulous term that can reasonably describe services ranging from infrastructure as a service as delivered by providers like Amazon Web Services and Microsoft through its Azure platform, right up to software as a service solutions like Jira or Salesforce. These solutions solve different problems – just because your CRM would be a good fit for a migration to Salesforce doesn’t mean the same system would make sense in Azure or AWS.

      This is important because the language we use to talk about the cloud can color our approach to cloud services. A “cloud-first” strategy will mean something different to a CEO with a concept of the cloud rooted in Salesforce than it will to a system administrator who interprets it to mean a transition to cloud-hosted virtual machines.

      Add to this the fact that not all cloud services are hosted externally by providers (public clouds) and the fact that multiple delivery models can be engaged at once through hybrid or multi-cloud approaches, and it’s apparent that a shared understanding of the cloud is necessary for a coherent strategy to take form.

      This phase proceeds in four steps, each governed by the principle of shared understanding. The first requires a shared understanding of corporate goals and drivers. Step 2 involves coming to a shared understanding of the cloud’s unique characteristics. Step 3 requires a review of the current state. Finally, in Step 4, participants will identify workloads that are suitable for analysis as candidates for the cloud.

      Step 1.1

      Generate goals and drivers

      Activities

      1.1.1 Define organizational goals

      1.1.2 Define cloud drivers

      1.1.3 Define success indicators

      Generate goals and drivers

      Explore cloud characteristics

      Create a current state summary

      Select workloads for analysis

      This step involves the following participants:

      • IT management
      • Core working group
      • Security
      • Applications
      • Infrastructure
      • Service management
      • Leadership

      Outcomes of this step

      • List of organizational goals
      • List of cloud drivers
      • Defined success indicators

      What can the cloud do for you?

      The cloud is not valuable for its own sake, and not all users derive the same value

      • The cloud is characterized by on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Any or all of those characteristics might be enough to make the cloud appealing, but in most cases, there is an overriding driver.
      • Multiple paths may lead to the cloud. Consider an organization with a need to control costs by showing back to business units, or perhaps by reducing capital expenditure – the cloud may be the most appropriate way to effect these changes. Conversely, an organization expanding rapidly and with a need to access the latest and greatest technology might benefit from the elasticity and pooled resources that major cloud providers can offer.
      • In these cases, the destination might be the same (a cloud solution) but the delivery model – public, private, or hybrid – and the decisions made around the key strategy components, including architecture, provisioning, and cost management, will almost certainly be different.
      • Defining goals, understanding cloud drivers, and – crucially – understanding what success means, are all therefore essential elements of the cloud vision process.

      1.1.1 Generate organizational goals

      1-3 hours

      Input

      • Strategy documentation

      Output

      • Organizational goals

      Materials

      • Whiteboard (digital/physical)

      Participants

      • IT leadership
      • Infrastructure
      • Applications
      • Security
      1. As a group, brainstorm organizational goals, ideally based on existing documentation
        • Review relevant corporate and IT strategies.
        • If you do not have access to internal documentation, review the standard goals on the next slide and select those that are most relevant for you.
      2. Record the most important business goals in the Cloud Vision Executive Presentation. Include descriptions where possible to ensure wide readability.
      3. Make note of these goals. They should inform the answers to prompts offered in the Cloud Vision Workbook and should be a consistent presence in the remainder of the visioning exercise. If you’re conducting the session in person, leave the goals up on a whiteboard and make reference to them throughout the workshop.

      Cloud Vision Executive Presentation

      Standard COBIT 19 enterprise goals

      1. Portfolio of competitive products and services
      2. Managed business risk
      3. Compliance with external laws and regulations
      4. Quality of financial information
      5. Customer-oriented service culture
      6. Business service continuity and availability
      7. Quality of management information
      8. Optimization of internal business process functionality
      9. Optimization of business process costs
      10. Staff skills, motivation, and productivity
      11. Compliance with internal policies
      12. Managed digital transformation programs
      13. Product and business innovation

      1.1.2 Define cloud drivers

      30-60 minutes

      Input

      • Organizational goals
      • Strategy documentation
      • Management/staff perspective

      Output

      • List of cloud drivers

      Materials

      • Sticky notes
      • Whiteboard
      • Markers

      Participants

      • IT leadership
      • Infrastructure
      • Applications
      • Security
      1. Cloud drivers sit at a level of abstraction below organizational goals. Keeping your organizational goals in mind, have each participant in the session write down how they expect to benefit from the cloud on a sticky note.
      2. Solicit input one at a time and group similar responses. Encourage participants to bring forward their cloud goals even if similar goals have been mentioned previously. The number of mentions is a useful way to gauge the relative weight of the drivers.
      3. Once this is done, you should have a few groups of similar drivers. Work with the group to name each category. This name will be the driver reported in the documentation.
      4. Input the results of the exercise into the Cloud Vision Executive Presentation, and include descriptions based on the constituent drivers. For example, if a driver is titled “do more valuable work,” the constituent drivers might be “build cloud skills,” “focus on core products,” and “avoid administration work where possible.” The description would be based on these components.

      Cloud Vision Executive Presentation

      1.1.3 Define success indicators

      1 hour

      Input

      • Cloud drivers
      • Organizational goals

      Output

      • List of cloud driver success indicators

      Materials

      • Whiteboard
      • Markers

      Participants

      • IT leadership
      • Infrastructure
      • Applications
      • Security
      1. On a whiteboard, draw a table with each of the cloud drivers (identified in 1.1.2) across the top.
      2. Work collectively to generate success indicators for each cloud driver. In this case, a success indicator is some way you can report your progress with the stated driver. It is a real-world proxy for the sometimes abstract phenomena that make up your drivers. Think about what would be true if your driver was realized.
        1. For example, if your driver is “faster access to resources,” you might consider indicators like developer satisfaction, project completion time, average time to provision, etc.
      3. Once you are satisfied with your list of indicators, populate the slide in the Cloud Vision Executive Presentation for validation from stakeholders.

      Cloud Vision Executive Presentation

      Step 1.2

      Explore cloud characteristics

      Activities

      Understand the value of the cloud:

      • Review delivery models
      • Review support models
      • Review service models
      • Review migration paths

      Understand the Cloud

      Generate goals and drivers

      Explore cloud characteristics

      Create a current state summary

      Select workloads for analysis

      This step involves the following participants:

      • Core working group
      • Architecture
      • Engineering
      • Security

      Outcomes of this step

      • Understanding of cloud service models and value

      Defining the cloud

      Per NIST, the cloud has five fundamental characteristics. All clouds have these characteristics, even if they are executed in somewhat different ways between delivery models, service models, and even individual providers.

      Cloud characteristics

      On-demand self-service

      Cloud customers are capable of provisioning cloud resources without human interaction (e.g. contacting sales), generally through a web console.

      Broad network access

      Capabilities are designed to be delivered over a network and are generally intended for access by a wide variety of platform types (cloud services are generally device-agnostic).

      Resource pooling

      Multiple customers (internal, in the case of private clouds) make use of a highly abstracted shared infrastructure managed by the cloud provider.

      Rapid elasticity

      Customers are capable of provisioning additional resources as required, pulling from a functionally infinite pool of capacity. Cloud resources can be spun-down when no longer needed.

      Measured service

      Consumption is metered based on an appropriate unit of analysis (number of licenses, storage used, compute cycles, etc.) and billing is transparent and granular.

      Cloud delivery models

      The NIST definition of cloud computing outlines four cloud delivery models: public, private, hybrid, and community clouds. A community cloud is like a private cloud, but it is provisioned for the exclusive use of a like-minded group of organizations, usually in a mutually beneficial, non-competitive arrangement. Universities and hospitals are examples of organizations that can pool their resources in this way without impacting competitiveness. The Info-Tech model covers three key delivery models – public, private, and hybrid, and an overarching model (multi-cloud) that can comprise more than one of the other models – public + public, public + hybrid, etc.

      Public

      The cloud service is provisioned for access by the general public (customers).

      Private

      A private cloud has the five key characteristics, but is provisioned for use by a single entity, like a company or organization.

      Hybrid

      Hybridity essentially refers to interoperability between multiple cloud delivery models (public +private).

      Multi

      A multi-cloud deployment requires only that multiple clouds are used without any necessary interoperability (Nutanix, 2019).

      Public cloud

      This is what people generally think about when they talk about cloud

      • The public cloud is, well, public! Anyone can make use of its resources, and in the case of the major providers, capacity is functionally unlimited. Need to store exabytes of data in the cloud? No problem! Amazon will drive a modified shipping container to your datacenter, load it up, and “migrate” it to a datacenter.
      • Public clouds offer significant variety on the infrastructure side. Major IaaS providers, like Microsoft and Amazon, offer dozens of services across many different categories including compute, networking, and storage, but also identity, containers, machine learning, virtual desktops, and much, much more. (See a list from Microsoft here, and Amazon here)
      • There are undoubtedly strengths to the public cloud model. Providers offer the “latest and greatest” and customers need not worry about the details, including managing infrastructure and physical locations. Providers offer built-in redundancy, multi-regional deployments, automation tools, management and governance solutions, and a variety of leading-edge technologies that would not be feasible for organizations to run in-house, like high performance compute, blockchain, or quantum computing.
      • Of course, the public cloud is not all sunshine and rainbows – there are downsides as well. It can be expensive; it can introduce regulatory complications to have to trust another entity with your key information. Additionally, there can be performance hiccups, and with SaaS products, it can be difficult to monitor at the appropriate (per-transaction) level.

      Prominent examples include:

      AWS

      Microsoft

      Azure

      Salesforce.com

      Workday

      SAP

      Private cloud

      A lower-risk cloud for cloud-averse customers?

      • A cloud is a cloud, no matter how small. Some IT shops deploy private clouds that make use of the five key cloud characteristics but provisioned for the exclusive use of a single entity, like a corporation.
      • Private clouds have numerous benefits. Some potential cloud customers might be uncomfortable with the shared responsibility that is inherent in the public cloud. Private clouds allow customers to deliver flexible, measured services without having to surrender control, but they require significant overhead, capital expenditure, administrative effort, and technical expertise.
      • According to the 2021 State of the Cloud Report, private cloud use is common, and the most frequently cited toolset is VMware vSphere, followed by Azure Stack, OpenStack, and AWS Outposts. Private cloud deployments are more common in larger organizations, which makes sense given the overhead required to manage such an environment.

      Private cloud adoption

      The images shows a graph titled Private Cloud Adoption for Enterprises. It is a horizontal bar graph, with three segments in each bar: dark blue marking currently use; mid blue marking experimenting; and light blue marking plan to use.

      VMware and Microsoft lead the pack among private cloud customers, with Amazon and Red Hat also substantially present across private cloud environments.

      Hybrid cloud

      The best of both worlds?

      Hybrid cloud architectures combine multiple cloud delivery models and facilitate some level of interoperability. NIST suggests bursting and load balancing as examples of hybrid cloud use cases. Note: it is not sufficient to simply have multiple clouds running in parallel – there must be a toolset that allows for an element of cross-cloud functionality.

      This delivery model is attractive because it allows users to take advantage of the strengths of multiple service models using a single management pane. Bursting across clouds to take advantage of additional capacity or disaster recovery capabilities are two obvious use cases that appeal to hybrid cloud users.

      But while hybridity is all the rage (especially given the impact Covid-19 has had on the workplace), the reality is that any hybrid cloud user must take the good with the bad. Multiple clouds and a management layer can be technically complex, expensive, and require maintaining a physical infrastructure that is not especially valuable (“I thought we were moving to the cloud to get out of the datacenter!”).

      Before selecting a hybrid approach through services like VMware Cloud on AWS or Microsoft’s Azure Stack, consider the cost, complexity, and actual expected benefit.

      Amazon, Microsoft, and Google dominate public cloud IaaS, but IBM is betting big on hybrid cloud:

      The image is a screencap of a tweet from IBM News. The tweet reads: IBM CEO Ginni Rometty: Hybrid cloud is a trillion dollar market and we'll be number one #Think2019.

      With its acquisition of Red Hat in 2019 for $34 billion, Big Blue put its money where its mouth is and acquired a substantial hybrid cloud business. At the time of the acquisition, Red Hat’s CEO, Jim Whitehurst, spoke about the benefit IBM expected to receive:

      “Joining forces with IBM gives Red Hat the opportunity to bring more open source innovation to an even broader range of organizations and will enable us to scale to meet the need for hybrid cloud solutions that deliver true choice and agility” (Red Hat, 2019).

      Multi-cloud

      For most organizations, the multi-cloud is the most realistic option.

      Multi-cloud is popular!

      The image shows a graph titled Multi-Cloud Architectures Used, % of all Respondents. The largest percentage is Apps siloed on different clouds, followed by DAta integration between clouds.

      Multi-cloud solutions exist at a different layer of abstraction from public, private, and even hybrid cloud delivery models. A multi-cloud architecture, as the name suggests, requires the user to be a customer of more than one cloud provider, and it can certainly include a hybrid cloud deployment, but it is not bound by the same rules of interoperability.

      Many organizations – especially those with fewer resources or a lack of a use case for a private cloud – rely on a multi-cloud architecture to build applications where they belong, and they manage each environment separately (or occasionally with the help of cloud management platforms).

      If your data team wants to work in AWS and your enterprise services run on basic virtual machines in Azure, that might be the most effective architecture. As the Flexera 2021 State of the Cloud Report suggests, this architecture is far more common than the more complicated bursting or brokering architectures characteristic of hybrid clouds.

      NIST cloud service models

      Software as a service

      SaaS has exploded in popularity with consumers who wish to avail themselves of the cloud’s benefits without having to manage underlying infrastructure components. SaaS is simple, generally billed per-user per-month, and is almost entirely provider-managed.

      Platform as a service

      PaaS providers offer a toolset for their customers to run custom applications and services without the requirement to manage underlying infrastructure components. This service model is ideal for custom applications/services that don’t benefit from highly granular infrastructure control.

      Infrastructure as a service

      IaaS represents the sale of components. Instead of a service, IaaS providers sell access to components, like compute, storage, and networking, allowing for customers to build anything they want on top of the providers’ infrastructure.

      Cloud service models

      • This research focuses on five key service models, each of which has its own strengths and weaknesses. Moving right from “on-prem,” customers gradually give up more control over their environments to cloud service providers.
      • An entirely premises-based environment means that the customer is responsible for everything ranging from the dirt under the datacenter to application-level configurations. Conversely, in a SaaS environment, the provider is responsible for everything but those top-level application configurations.
      • A managed service provider or other third party can manage any or of the components of the infrastructure stack. A service provider may, for example, build a SaaS solution on top of another provider’s IaaS, or might offer configuration assistance with a commercially available SaaS.

      Info-Tech Insight

      Not all workloads fit well in the cloud. Many environments will mix service models (e.g. SaaS for some workloads, some in IaaS, some on-premises), and this can be perfectly effective. It must be consistent and intentional, however.

      On-prem Co-Lo IaaS PaaS SaaS
      Application Application Application Application Application
      Database Database Database Database Database
      Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware
      OS OS OS OS OS
      Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor
      Server Network Storage Server Network Storage Server Network Storage Server Network Storage Server Network Storage
      Facilities Facilities Facilities Facilities Facilities

      Organization has control

      Organization or vendor may control

      Vendor has control

      Analytics folly

      SaaS is good, but it’s not a panacea

      Industry: Healthcare

      Source: Info-Tech workshop

      Situation

      A healthcare analytics provider had already moved a significant number of “non-core workloads” to the cloud, including email, HRIS, and related services.

      The company CEO was satisfied with the reduced effort required by IT to manage SaaS-based workloads and sought to extend the same benefits to the core analytics platform where there was an opportunity to reduce overhead.

      Complication

      Many components of the health analytics service were designed to run specifically in a datacenter and were not ready to be migrated to the cloud without significant effort/refactoring. SaaS was not an option because this was a core platform – a SaaS provider would have been the competition.

      That left IaaS, which was expensive and would not bring the expected benefits (reduced overhead).

      Results

      The organization determined that there were no short-term gains from migrating to the cloud. Due to the nature of the application (its extensive customization, the fact that it was a core product sold by the company) any steps to reduce operational overhead were not feasible.

      The CEO recognized that the analytics platform was not a good candidate for the cloud and what distinguished the analytics platform from more suitable workloads.

      Migration paths

      In a 2016 blog post, Amazon Web Services articulated a framework for cloud migration that incorporates elements of the journey as well as the destination. If workload owners do not choose to retain or retire their workloads, there are four alternatives. These alternatives all stack up differently along five key dimensions:

      1. Value: does the workload stand to benefit from unique cloud characteristics? To what degree?
      2. Effort: how much work would be required to make the transition?
      3. Cost: how much money is the migration expected to cost?
      4. Time: how long will the migration take?
      5. Skills: what skills must be brought to bear to complete the migration?

      Not all migration paths can lead to all destinations. Rehosting generally means IaaS, while repurchasing leads to SaaS. Refactoring and replatforming have some variety of outcomes, and it becomes possible to take advantage of new IaaS architectures or migrate workloads over fully to SaaS.

      As part of the workload assessment process, use the five dimensions (expanded upon on the next slide) to determine what migration path makes sense. Preferred migration paths form an important part of the overall cloud vision process.

      Retain (Revisit)

      • Keep the application in its current form, at least for now. This doesn’t preclude revisiting it in the future.

      Retire

      • Get rid of the application completely.

      Rehost

      • Move the application to the cloud (IaaS) and continue to run it in more or less the same form as it currently runs.

      Replatform

      • Move the application to the cloud and perform a few changes for cloud optimizations.

      Refactor

      • Rewrite the application, taking advantage of cloud native architectures.

      Repurchase

      • Replace with an alternative, cloud-native application and migrate the data.

      Migration paths – relative value

      Migration path Value Effort Cost Time Skills
      Retain No real change in the absolute value of the workload if it is retained. No effort beyond ongoing workload maintenance. No immediate hard dollar costs, but opportunity costs and technical debt abound. No time required! (At least not right away…) Retaining requires the same skills it has always required (which may be more difficult to acquire in the future).
      Rehire A retired workload can provide no value, but it is not a drain! Spinning a service down requires engaging that part of the lifecycle. N/A Retiring the service may be simple or complicated depending on its current role. N/A
      Rehost Some value comes with rehosting, but generally components stay the same (VM here vs. a VM there). Minimal effort required, especially with automated tools. The effort will depend on the environment being migrated. Relatively cheap compared to other options. Rehosting infrastructure is the simplest cloud migration path and is useful for anyone in a hurry. Rehosting is the simplest cloud migration path for most workloads, but it does require basic familiarity with cloud IaaS.

      Replatform

      Replatformed workloads can take advantage of cloud-native services (SQL vs. SQLaaS). Replatforming is more effortful than rehosting, but less effortful than refactoring. Moderate cost – does not require fundamental rearchitecture, just some tweaking. Relatively more complicated than a simple rehost, but less demanding than a refactor. Platform and workload expertise is required; more substantial than a simple rehost.
      Refactor A fully formed, customized cloud-based workload that can take advantage of cloud-native architectures is generally quite valuable. Significant effort required based on the requirement to engage the full SDLC. Significant cost required to engage SDLC and rebuild the application/service. The most complicated and time-consuming. The most complicated and time-consuming.
      Repurchase Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Configuration – especially for massive projects – can be time consuming, but in general repurchasing can be quite fast. Buying software does require knowledge of requirements and integrations, but is otherwise quite simple.

      Where should you get your cloud skills?

      Cloud skills are certainly top of mind right now. With the great upheaval in both work patterns and in the labor market more generally, expertise in cloud-related areas is simultaneously more valuable and more difficult to procure. According to Pluralsight’s 2021 “State of Upskilling” report, 44% of respondents report themselves under-skilled in the cloud management area, making cloud management the most significant skill gap reported on the survey.

      Everyone left the office. Work as we know it is fundamentally altered for a generation or more. Cloud services shot up in popularity by enabling the transition. And yet there is a gap – a prominent gap – in skilling up for this critically important future. What is the cloud manager to do?

      Per the framework presented here, that manager has three essential options. They may take somewhat different forms depending on specific requirements and the quirks of the local market, but the options are:

      1. Train or hire internal resources: This might be easier said than done, especially for more niche skills, but makes sense for workloads that are critical to operations for the long term.
      2. Engage a managed service provider: MSPs are often engaged to manage services where internal IT lacks bandwidth or expertise.
      3. Hire a consultant: Consultants are great for time-bound implementation projects where highly specific expertise is required, such as a migration or implementation project.

      Each model makes sense to some degree. When evaluating individual workloads for cloud suitability, it is critical to consider the support model – both immediate and long term. What makes sense from a value perspective?

      Cloud decisions – summary

      A key component of the Info-Tech cloud vision model is that it is multi-layered. Not every decision must be made at every level. At the workload level, it makes sense to select service models that make sense, but each workload does not need its own defined vision. Workload-level decisions should be guided by an overall strategy but applied tactically, based on individual workload characteristics and circumstances.

      Conversely, some decisions will inevitably be applied at the environment level. With some exceptions, it is unlikely that cloud customers will build an entire private/hybrid cloud environment around a single solution; instead, they will define a broader strategy and fit individual workloads into that strategy.

      Some considerations exist at both the workload and environment levels. Risks and roadblocks, as well as the preferred support model, are concerns that exist at both the environment level and at the workload level.

      The image is a Venn diagram, with the left side titled Workload level, and the right side titled Environment Level. In the left section are: service model and migration path. On the right section are: Overall vision and Delivery model. In the centre section are: support model and Risks and roadblocks.

      Step 1.3

      Create a current state summary

      Activities

      1.3.1 Record your current state

      Understand the Cloud

      Generate goals and drivers

      Explore cloud characteristics

      Create a current state summary

      Select workloads for analysis

      This step involves the following participants: Core working group

      Outcomes of this step

      • Current state summary of cloud solutions

      1.3.1 Record your current state

      30 minutes

      Input

      • Knowledge of existing cloud workloads

      Output

      • Current state cloud summary for service, delivery, and support models

      Materials

      • Whiteboard

      Participants

      • Core working group
      • Infrastructure team
      • Service owners
      1. On a whiteboard (real or virtual) draw a table with each of the cloud service models across the top. Leave a cell below each to list examples.
      2. Under each service model, record examples present in your environment. The purpose of the exercise is to illustrate the existence of cloud services in your environment or the lack thereof, so there is no need to be exhaustive. Complete this in turn for each service model until you are satisfied that you have created an effective picture of your current cloud SaaS state, IaaS state, etc.
      3. Input the results into their own slide titled “current state summary” in the Cloud Vision Executive Presentation.
      4. Repeat for the cloud delivery models and support models and include the results of those exercises as well.
      5. Create a short summary statement (“We are primarily a public cloud consumer with a large SaaS footprint and minimal presence in PaaS and IaaS. We retain an MSP to manage our hosted telephony solution; otherwise, everything is handled in house.”

      Cloud Vision Executive Presentation

      Step 1.4

      Select workloads for current analysis

      Activities

      1.4.1 Select workloads for assessment

      This step involves the following participants:

      • Core working group

      Outcomes of this step

      • List of workloads for assessment

      Understand the cloud

      Generate goals and drivers

      Explore cloud characteristics

      Create a current state summary

      Select workloads for analysis

      1.4.1 Select workloads for assessment

      30 minutes

      Input

      • Knowledge of existing cloud workloads

      Output

      • List of workloads to be assessed

      Materials

      • Whiteboard
      • Cloud Vision Workbook

      Participants

      • Core working group
      • IT management
      1. In many cases, the cloud project is inspired by a desire to move a particular workload or set of workloads. Solicit feedback from the core working group about what these workloads might be. Ask everyone in the meeting to suggest a workload and record each one on a sticky note or white board (virtual or physical).
      2. Discuss the results with the group and begin grouping similar workloads together. They will be subject to the assessments in the Cloud Vision Workbook, so try to avoid selecting too many workloads that will produce similar answers. It might not be obvious, but try to think about workloads that have similar usage patterns, risk levels, and performance requirements, and select a representative group.
      3. You should embrace counterintuition by selecting a workload that you think is unlikely to be a good fit for the cloud if you can and subjecting it to the assessment as well for validation purposes.
      4. When you have a list of 4-6 workloads, record them on tab 2 of the Cloud Vision Workbook.

      Cloud Vision Workbook

      Assess your cloud workloads

      Build the foundations of your cloud vision

      Phase 2

      Phase 2

      Evaluate Cloud Workloads

      Phase 1

      1.1 Generate goals and drivers

      1.2 Explore cloud characteristics

      1.3 Create a current state summary

      1.4 Select workloads for analysis

      Phase 2

      2.1 Conduct workload assessments

      2.2 Determine workload future states

      Phase 3

      3.1 Generate risks and roadblocks

      3.2 Mitigate risks and roadblocks

      3.3 Define roadmap initiatives

      Phase 4

      4.1 Review and assign work items

      4.2 Finalize cloud decision framework

      4.3 Create cloud vision

      This phase will walk you through the following activities:

      • Conduct workload assessments
      • Determine workload future state

      This phase involves the following participants:

      • Subject matter experts
      • Core working group
      • IT management

      Define Your Cloud Vision

      Work from the bottom up and assess your workloads

      A workload-first approach will help you create a realistic vision.

      The concept of a cloud vision should unquestionably be informed by the nature of the workloads that IT is expected to provide for the wider organization. The overall cloud vision is no greater than the sum of its parts. You cannot migrate to the cloud in the abstract. Workloads need to go – and not all workloads are equally suitable for the transition.

      It is therefore imperative to understand which workloads are a good fit for the cloud, which cloud service models make the most sense, how to execute the migration, what support should look like, and what risks and roadblocks you are likely to encounter as part of the process.

      That’s where the Cloud Vision Workbook comes into play. You can use this tool to assess as many workloads as you’d like – most people get the idea after about four – and by the end of the exercise, you should have a pretty good idea about where your workloads belong, and you’ll have a tool to assess any net new or previously unconsidered workloads.

      It’s not so much about the results of the assessment – though these are undeniably important – but about the learnings gleaned from the collaborative assessment exercise. While you can certainly fill out the assessment without any additional input, this exercise is most effective when completed as part of a group.

      Introducing the Cloud Vision Workbook

      • The Cloud Vision Workbook is an Excel tool that answers the age old question: “What should I do with my workloads?”
      • It is divided into eight tabs, each of which offers unique value. Start by reading the introduction and inputting your list of workloads. Work your way through tabs 3-6, completing the suitability, migration, management, and risk and roadblock assessments, and review the results on tab 7.
      • If you choose to go through the full battery of assessments for each workload, expect to answer and weight 111 unique questions across the four assessments. This is an intensive exercise, so carefully consider which assessments are valuable to you, and what workloads you have time to assess.
      • Tab 8 hosts the milestone timeline and captures the results of the phase 3 risk and mitigation exercise.

      Understand Cloud Vision Workbook outputs

      The image shows a graphic with several graphs and lists on it, with sections highlighted with notes. At the top, there's the title Database with the note Workload title (populated from tab 2). Below that, there is a graph with the note Relative suitability of the five service models. The Risks and roadblocks section includes the note: The strategy components – the risks and roadblocks – are captured relative to one another to highlight key focus areas. To the left of that, there is a Notes section with the note Notes populated based on post-assessment discussion. At the bottom, there is a section titled Where should skills be procured?, with the note The radar diagram captures the recommended support model relative to the others (MSP, consultant, internal IT). To the right of that, there is a section titled Migration path, with the note that Ordered list of migration paths. Note: a disconnect here with the suggested service model may indicate an unrealistic goal state.

      Step 2.1

      Conduct workload assessments

      Activities

      2.1.1 Conduct workload assessments

      2.1.2 Interpret your results

      Phase Title

      Conduct workload assessments

      Determine workload future state

      This step involves the following participants:

      • Core working group
      • Workload subject matter experts

      Outcomes of this step

      • Completed workload assessments

      2.1.1 Conduct workload assessments

      2 hours per workload

      Input

      • List of workloads to be assessed

      Output

      • Completed cloud vision assessments

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      • Service owners/workload SMEs
      1. The Cloud Vision Workbook is your one stop shop for all things workload assessment. Open the tool to tab 2 and review the workloads you identified at the end of phase 1. Ensure that these are correct. Once satisfied, project the tool (virtually, if necessary) so that all participants can see the assessment questions.
      2. Work through tabs 3-6, answering the questions and assigning a multiplier for each one. A higher multiplier increases the relative weight of the question, giving it a greater impact on the overall outcome.
      3. Do your best to induce participants to offer opinions. Consensus is not absolutely necessary, but it is a good goal. Ask your participants if they agree with initial responses and occasionally take the opposite position (“I’m surprised you said agree – I would have thought we didn’t care about CapEx vs. OpEx”). Stimulate discussion.
      4. Highlight any questions that you will need to return to or run by someone not present. Include a placeholder answer, as the tool requires all cells to be filled for computation.

      Cloud Vision Workbook

      2.1.2 Interpret your results

      10 minutes

      Input

      • Completed cloud vision assessments

      Output

      • Shared understanding of implications

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      • Service owners/workload SMEs
      1. Once you’ve completed all 111 questions for each workload, you can review your results on tab 7. On tab 7, you will see four populated graphics: cloud suitability, migration path, “where should skills be procured?”, and risks and roadblocks. These represent the components of the overall cloud vision that you will present to stakeholders.
      2. The “cloud suitability” chart captures the service model that the assessment judges to be most suitable for the workload. Ask those present if any are surprised by the output. If there is any disagreement, discuss the source of the surprise and what a more realistic outcome would be. Revisit the assessment if necessary.
      3. Conduct a similar exercise with each of the other outputs. Does it make sense to refactor the workload based on its cloud suitability? Does the fact that we scored so highly on the “consultant” support model indicate something about how we handle upskilling internally? Does the profile of risks and roadblocks identified here align with expectations? What should be ranked higher? What about lower?
      4. Once everyone is generally satisfied with the results, close the tool and take a break! You’ve earned it.

      Cloud Vision Workbook

      Understand the cloud strategy components

      Each cloud strategy will take a slightly different form, but all should contain echoes of each of these components. This process will help you define your vision and direction, but you will need to take steps to execute on that vision. The remainder of the cloud strategy, covered in the related blueprint Document Your Cloud Strategy comprises these fourteen topics divided across three categories: people, governance, and technology. The workload assessment covers these under risks and roadblocks and highlights areas that may require specific additional attention. When interpreting the results, think of these areas as comprising things that you will need to do to make your vision a reality.

      People

      • Skills and roles
      • Culture and adoption
      • Governing bodies

      Governance

      • Architecture
      • Integration and interoperability
      • Operations management
      • Cloud portfolio management
      • Cloud vendor management
      • Finance management
      • Security
      • Data controls

      Technology

      • Monitoring
      • Provisioning
      • Migration

      Strategy component: People

      People form the core of any good strategy. As part of your cloud vision, you will need to understand the implications a cloud transition will have on your staff and users, whether those users are internal or external.

      Component Description Challenges
      Skills and roles The move to the cloud will require staff to learn how to handle new technology and new operational processes. The cloud is a different way of procuring IT resources and may require the definition of new roles to handle things like cost management and provisioning. Staff may not have the necessary experience to migrate to a cloud environment or to effectively manage resources once the cloud transition is made. Cloud skills are difficult to hire for, and with the ever-changing nature of the platforms themselves, this shows no sign of abating. Redefining roles can also be politically challenging and should be done with due care and consideration.
      Culture and adoption If you build it, they will come…right? It is not always the case that a new service immediately attracts users. Ensuring that organizational culture aligns with the cloud vision is a critical success factor. Equally important is ensuring that cloud resources are used as intended. Those unfamiliar with cloud resources may be less willing to learn to use them. If alternatives exist (e.g. a legacy service that has not been shut down), or if those detractors are influential, this resistance may impede your cloud execution. Also, if the cloud transition involves significant effort or a fundamental rework (e.g. a DevOps transition) this role redefinition could cause some internal turmoil.
      Governing bodies A large-scale cloud deployment requires formal governance. Formal governance requires a governing body that is ultimately responsible for designing the said governance. This could take the form of a “center of excellence” or may rest with a single cloud architect in a smaller, less complicated environment. Governance is difficult. Defining responsibilities in a way that includes all relevant stakeholders without paralyzing the decision-making process is difficult. Implementing suggestions is a challenge. Navigating the changing nature of service provision (who can provision their own instances or assign licenses?) can be difficult as well. All these concerns must be addressed in a cloud strategy.

      Strategy component: Governance

      Without guardrails, the cloud deployment will grow organically. This has strengths (people tend to adopt solutions that they select and deploy themselves), but these are more than balanced out by the drawbacks that come with inconsistency, poor administration, duplication of services, suboptimal costing, and any number of other unique challenges. The solution is to develop and deploy governance. The following list captures some of the necessary governance-related components of a cloud strategy.

      Component Description Challenges
      Architecture Enterprise architecture is an important function in any environment with more than one interacting workload component (read: any environment). The cloud strategy should include an approach to defining and implementing a standard cloud architecture and should assign responsibility to an individual or group. Sometimes the cloud transition is inspired by the desire to rearchitect. The necessary skills and knowledge may not be readily available to design and transition to a microservices-based environment, for example, vs. a traditional monolithic application architecture. The appropriateness of a serverless environment may not be well understood, and it may be the case that architects are unfamiliar with cloud best practices and reference architectures.
      Integration and interoperability Many services are only highly functional when integrated with other services. What is a database without its front-end? What is an analytics platform without its data lake? For the cloud vision to be properly implemented, a strategy for handling integration and interoperability must be developed. It may be as simple as “all SaaS apps must be compatible with Okta” but it must be there. Migration to the cloud may require a fundamentally new approach to integration, moving away from a point-to-point integrations and towards an ESB or data lake. In many cases, this is easier said than done. Centralization of management may be appealing, but legacy applications – or those acquired informally in a one-off fashion – might not be so easy to integrate into a central management platform.
      Operations management Service management (ITIL processes) must be aligned with your overall cloud strategy. Migrating to the cloud (where applicable) will require refining these processes, including incident, problem, request, change, and configuration management, to make them more suitable for the cloud environment. Operations management doesn’t go away in the cloud, but it does change in line with the transition to shared responsibility. Responding to incidents may be more difficult on the cloud when troubleshooting is a vendor’s responsibility. Change management in a SaaS environment may be more receptive than staff are used to as cloud providers push changes out that cannot be rolled back.

      Strategy component: Governance (cont.)

      Component Description Challenges
      Cloud portfolio management This component refers to the act of managing the portfolio of cloud services that is available to IT and to business users. What requirements must a SaaS service meet to be onboarded into the environment? How do we account for exceptions to our IaaS policy? What about services that are only available from a certain provider? Rationalizing services offers administrative benefits, but may make some tasks more difficult for end users who have learned things a certain way or rely on niche toolsets. Managing access through a service catalog can also be challenging based on buy-in and ongoing administration. It is necessary to develop and implement policy.
      Cloud vendor management Who owns the vendor management function, and what do their duties entail? What contract language must be standard? What does due diligence look like? How should negotiations be conducted? What does a severing of the relationship look like? Cloud service models are generally different from traditional hosted software and even from each other (e.g. SaaS vs. PaaS). There is a bit of a learning curve when it comes to dealing with vendors. Also relevant: the skills that it takes to build and maintain a system are not necessarily the same as those required to coherently interact with a cloud vendor.
      Finance management Cloud services are, by definition, subject to a kind of granular, operational billing that many shops might not be used to. Someone will need to accurately project and allocate costs, while ensuring that services are monitored for cost abnormalities. Cloud cost challenges often relate to overall expense (“the cloud is more expensive than an alternative solution”), expense variability (“I don’t know what my budget needs to be this quarter”), and cost complexity (“I don’t understand what I’m paying for – what’s an Elastic Beanstalk?”).
      Security The cloud is not inherently more or less secure than a premises-based alternative, though the risk profile can be different. Applying appropriate security governance to ensure workloads are compliant with security requirements is an essential component of the strategy.

      Technical security architecture can be a challenge, as well as navigating the shared responsibility that comes with a cloud transition. There are also a plethora of cloud-specific security tools like cloud access security brokers (CASBs), cloud security posture management (CSPM) solutions, and even secure access services edge (SASE) technology.

      Data controls Data residency, classification, quality, and protection are important considerations for any cloud strategy. With cloud providers taking on outsized responsibility, understanding and governing data is essential. Cloud providers like to abstract away from the end user, and while some may be able to guarantee residency, others may not. Additionally, regulations may prevent some data from going to the cloud, and you may need to develop a new organizational backup strategy to account for the cloud.

      Strategy component: Technology

      Good technology will never replace good people and effective process, but it remains important in its own right. A migration that neglects the undeniable technical components of a solid cloud strategy is doomed to mediocrity at best and failure at worst. Understanding the technical implications of the cloud vision – particularly in terms of monitoring, provisioning, and migration – makes all the difference. You can interpret the results of the cloud workload assessments by reviewing the details presented here.

      Component Description Challenges
      Monitoring The cloud must be monitored in line with performance requirements. Staff must ensure that appropriate tools are in place to properly monitor cloud workloads and that they are capturing adequate and relevant data. Defining requirements for monitoring a potentially unfamiliar environment can be difficult, as can consolidating on a monitoring solution that both meets requirements and covers all relevant areas. There may be some upskilling and integration work required to ensure that monitoring works as required.
      Provisioning How will provisioning be done? Who will be responsible for ensuring the right people have access to the right resources? What tooling must be deployed to support provisioning goals? What technical steps must be taken to ensure that the provisioning is as seamless as possible? There is the inevitable challenge of assigning responsibility and accountability in a changing infrastructure and operations environment, especially if the changes are substantial (e.g. a fundamental operating model shift, reoriented around the cloud). Staff may also need to familiarize themselves with cloud-based provisioning tools like Ansible, Terraform, or even CloudFormation.
      Migration The act of migrating is important as well. In some cases, the migration is as simple as configuring the new environment and turning it up (e.g. with a net new SaaS service). In other cases, the migration itself can be a substantial undertaking, involving large amounts of data, a complicated replatforming/refactoring, and/or a significant configuration exercise.

      Not all migration journeys are created equal, and challenges include a general lack of understanding of the requirements of a migration, the techniques that might be necessary to migrate to a particular cloud (there are many) and the disruption/risk associated with moving large amounts of data. All of these challenges must be considered as part of the overall cloud strategy, whether in terms of architectural principles or skill acquisition (or both!).

      Step 2.2

      Determine workload future state

      Activities

      2.2.1 Determine workload future state

      Conduct workload assessments

      Determine workload future state

      This step involves the following participants:

      • IT management
      • Core working group

      Outcomes of this step

      • Completed workload assessments
      • Defined workload future state

      2.2.1 Determine workload future state

      1-3 hours

      Input

      • Completed workload assessments

      Output

      • Preliminary future state outputs

      Materials

      • Cloud Vision Workbook
      • Cloud Vision Executive Presentation

      Participants

      • Core working group
      • Service owners
      • IT management
      1. After you’ve had a chance to validate your results, refer to tab 7 of the tool, where you will find a blank notes section.
      2. With the working group, capture your answers to each of the following questions:
        1. What service model is the most suitable for the workload? Why?
        2. How will we conduct the migration? Which of the six models makes the most sense? Do we have a backup plan if our primary plan doesn’t work out?
        3. What should the support model look like?
        4. What are some workload-specific risks and considerations that must be taken into account for the workload?
      3. Once you’ve got answers to each of these questions for each of the workloads, include your summary in the “notes” section of tab 7.

      Cloud Vision Executive Presentation

      Paste the output into the Cloud Vision Executive Presentation

      • The Cloud Vision Workbook output is a compact, consumable summary of each workload’s planned future state. Paste each assessment in as necessary.
      • There is no absolutely correct way to present the information, but the output is a good place to start. Do note that, while the presentation is designed to lead with the vision statement, because the process is workload-first, the assessments are populated prior to the overall vision in a bottom-up manner.
      • Be sure to anticipate the questions you are likely to receive from any stakeholders. You may consider preparing for questions like: “What other workloads fit this profile?” “What do we expect the impact on the budget to be?” “How long will this take?” Keep these and other questions in mind as you progress through the vision definition process.

      The image shows the Cloud Vision Workbook output, which was described in an annotated version in an earlier section.

      Info-Tech Insight

      Keep your audience in mind. You may want to include some additional context in the presentation if the results are going to be presented to non-technical stakeholders or those who are not familiar with the terms or how to interpret the outputs.

      Identify and Mitigate Risks

      Build the foundations of your cloud vision

      PHASE 3

      Phase 3

      Identify and Mitigate Risks

      Phase 1

      1.1 Generate goals and drivers

      1.2 Explore cloud characteristics

      1.3 Create a current state summary

      1.4 Select workloads for analysis

      Phase 2

      2.1 Conduct workload assessments

      2.2 Determine workload future states

      Phase 3

      3.1 Generate risks and roadblocks

      3.2 Mitigate risks and roadblocks

      3.3 Define roadmap initiatives

      Phase 4

      4.1 Review and assign work items

      4.2 Finalize cloud decision framework

      4.3 Create cloud vision

      This phase will walk you through the following activities:

      • Generate risks and roadblocks
      • Mitigate risks and roadblocks
      • Define roadmap initiatives

      This phase involves the following participants:

      • Core working group
      • Workload subject matter experts

      You know what you want to do, but what do you have to do?

      What questions remain unanswered?

      There are workload-level risks and roadblocks, and there are environment-level risks. This phase is focused primarily on environment-level risks and roadblocks, or those that are likely to span multiple workloads (but this is not hard and fast rule – anything that you deem worth discussing is worth discussing). The framework here calls for an open forum where all stakeholders – technical and non-technical, pro-cloud and anti-cloud, management and individual contributor – have an opportunity to articulate their concerns, however specific or general, and receive feedback and possible mitigation.

      Start by soliciting feedback. You can do this over time or in a single session. Encourage anyone with an opinion to share it. Focus on those who are likely to have a perspective that will become relevant at some point during the creation of the cloud strategy and the execution of any migration. Explain the preliminary direction; highlight any major changes that you foresee. Remind participants that you are not looking for solutions (yet), but that you want to make sure you hear any and every concern as early as possible. You will get feedback and it will all be valuable.

      Before cutting your participants loose, remind them that, as with all business decisions, the cloud comes with trade-offs. Not everyone will have every wish fulfilled, and in some cases, significant effort may be needed to get around a roadblock, risks may need to be accepted, and workloads that looked like promising candidates for one service model or another may not be able to realize that potential. This is a normal and expected part of the cloud vision process.

      Once the risks and roadblocks conversation is complete, it is the core working group’s job to propose and validate mitigations. Not every risk can be completely resolved, but the cloud has been around for decades – chances are someone else has faced a similar challenge and made it through relatively unscathed. That work will inevitably result in initiatives for immediate execution. Those initiatives will form the core of the initiative roadmap that accompanies the completed Cloud Vision Executive Presentation.

      Step 3.1

      Generate risks and roadblocks

      Activities

      3.1.1 Generate risks and roadblocks

      3.1.2 Generate mitigations

      Identify and mitigate risks

      Generate risks and roadblocks

      Mitigate risks and roadblocks

      Define roadmap initiatives

      This step involves the following participants:

      • Core working group
      • IT management
      • Infrastructure
      • Applications
      • Security
      • Architecture

      Outcomes of this step

      • List of risks and roadblocks

      Understand risks and roadblocks

      Risk

      • Something that could potentially go wrong.
      • You can respond to risks by mitigating them:
        • Eliminate: take action to prevent the risk from causing issues.
        • Reduce: take action to minimize the likelihood/severity of the risk.
        • Transfer: shift responsibility for the risk away from IT, towards another division of the company.
        • Accept: where the likelihood or severity is low, it may be prudent to accept that the risk could come to fruition.

      Roadblock

      • There are things that aren’t “risks” that we care about when migrating to the cloud.
      • We know, for example, that a complicated integration situation will create work items for any migration – this is not an “unknown.”
      • We respond to roadblocks by generating work items.

      3.1.1 Generate risks and roadblocks

      1.5 hours

      Input

      • Completed cloud vision assessments

      Output

      • List of risks and roadblocks

      Materials

      • Whiteboard
      • Sticky notes

      Participants

      • Core working group
      • Service owners/workload SMEs
      • Anyone with concerns about the cloud
      1. Gather your core working group – and really anyone with an intelligent opinion on the cloud – into a single meeting space. Give the group 5-10 minutes to list anything they think could present a difficulty in transitioning workloads to the cloud. Write each risk/roadblock on its own sticky note. You will never be 100% exhaustive, but don’t let anything your users care about go unaddressed.
      2. Once everyone has had time to write down their risks and roadblocks, have everyone share one by one. Make sure you get them all. Overlap in risks and roadblocks is okay! Group similar concerns together to give a sort of heat map of what your participants are concerned about. (This is called “affinity diagramming.”)
      3. Assign names to these categories. Many of these categories will align with the strategy components discussed in the previous phase (governance, security, etc.) but some will be specific whether by nature or by degree.
      4. Sort each of the individual risks into its respective category, collapsing any exact duplicates, and leaving room for notes and mitigations (see the next slide for a visual).

      Understand risks and roadblocks

      The image is two columns--on the left, the column is titled Affinity Diagramming. Below the title, there are many colored blocks, randomly arranged. There is an arrow pointing right, to the same coloured blocks, now sorted by colour. In the right column--titled Categorization--each colour has been assigned a category, with subcategories.

      Step 3.2

      Mitigate risks and roadblocks

      Activities

      3.2.1 Generate mitigations

      Identify and mitigate risks

      Generate risks and roadblocks

      Mitigate risks and roadblocks

      Define roadmap initiatives

      This step involves the following participants:

      • Core working group

      Outcomes of this step

      • List of mitigations

      Is the public cloud less secure?

      This is the key risk-related question that most cloud customers will have to answer at some point: does migrating to the cloud for some services increase their exposure and create a security problem?

      As with all good questions, the answer is “it depends.” But what does it depend on? Consider these cloud risks and potential mitigations:

      1. Misconfiguration: An error grants access to unauthorized parties (as happened to Capital One in 2019). This can be mitigated by careful configuration management and third-party tooling.
      2. Unauthorized access by cloud provider/partner employees: Though rare, it is possible that a cloud provider or partner can be a vector for a breach. Careful contract language, choosing to own your own encryption keys, and a hybrid approach (storing data on-premises) are some possible ways to address this problem.
      3. Unauthorized access to systems: Cloud services are designed to be accessed from anywhere and may be accessed by malicious actors. Possible mitigations include risk-based conditional access, careful identity access management, and logging and detection.

      “The cloud is definitely more secure in that you have much more control, you have much more security tooling, much more visibility, and much more automation. So it is more secure. The caveat is that there is more risk. It is easier to accidentally expose data in the cloud than it is on-premises, but, especially for security, the amount of tooling and visibility you get in cloud is much more than anything we’ve had in our careers on-premises, and that’s why I think cloud in general is more secure.” –Abdul Kittana, Founder, ASecureCloud

      Breach bests bank

      No cloud provider can protect against every misconfiguration

      Industry: Finance

      Source: The New York Times, CNET

      Background

      Capital One is a major Amazon Web Services customer and is even featured on Amazon’s site as a case study. That case study emphasizes the bank’s commitment to the cloud and highlights how central security and compliance were. From the CTO: “Before we moved a single workload, we engaged groups from across the company to build a risk framework for the cloud that met the same high bar for security and compliance that we meet in our on-premises environments. AWS worked with us every step of the way.”

      Complication

      The cloud migration was humming along until July 2019, when the bank suffered a serious breach at the hands of a hacker. That hacker was able to steal millions of credit card applications and hundreds of thousands of Social Security numbers, bank account numbers, and Canadian social insurance numbers.

      According to investigators and to AWS, the breach was caused by an open reverse proxy attack against a misconfigured web app firewall, not by an underlying vulnerability in the cloud infrastructure.

      Results

      Capital One reported that the breach was expected to cost it $150 million, and AWS fervently denied any blame. The US Senate got involved, as did national media, and Capital One’s CEO issued a public apology, writing, “I sincerely apologize for the understandable worry this incident must be causing those affected, and I am committed to making it right.”

      It was a bad few months for IT at Capital One.

      3.2.1 Generate mitigations

      3-4.5 hours

      Input

      • Completed cloud vision assessments

      Output

      • List of risks and roadblocks

      Materials

      • Whiteboard
      • Sticky notes

      Participants

      • Core working group
      • Service owners/workload SMEs
      • Anyone with concerns about the cloud
      1. Recall the four mitigation strategies: eliminate, reduce, transfer, or accept. Keep these in mind as you work through the list of risks and roadblocks with the core working group. For every individual risk or roadblock raised in the initial generation session, suggest a specific mitigation. If the concern is “SaaS providers having access to confidential information,” a mitigation might be encryption, specific contract language, or proof of certifications (or all the above).
      2. Work through this for each of the risks and roadblocks, identifying the steps you need to take that would satisfy your requirements as you understand them.
      3. Once you have gone through the whole list – ideally with input from SMEs in particular areas like security, engineering, and compliance/legal – populate the Cloud Vision Workbook (tab 8) with the risks, roadblocks, and mitigations (sorted by category). Review tab 8 for an example of the output of this exercise.

      Cloud Vision Workbook

      Cloud Vision Workbook – mitigations

      The image shows a large chart titled Risks, roadblocks, and mitigations, which has been annotated with notes.

      Step 3.3

      Define roadmap initiatives

      Activities

      3.3.1 Generate roadmap initiatives

      Identify and mitigate risks

      Generate risks and roadblocks

      Mitigate risks and roadblocks

      Define roadmap initiatives

      This step involves the following participants:

      • Core working group

      Outcomes of this step

      • Defined roadmap initiatives

      3.3.1 Generate roadmap initiatives

      1 hour

      Input

      • List of risk and roadblock mitigations

      Output

      • List of cloud initiatives

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      1. Executing on your cloud vision will likely require you to undertake some key initiatives, many of which have already been identified as part of your mitigation exercise. On tab 8 of the Cloud Vision Workbook, review the mitigations you created in response to the risks and roadblocks identified. Initiatives should generally be assignable to a party and should have a defined scope/duration. For example, “assess all net new applications for cloud suitability” might not be counted as an initiative, but “design a cloud application assessment” would likely be.
      2. Design a timeline appropriate for your specific needs. Generally short-term (less than 3 months), medium-term (3-6 months), and long-term (greater than 6 months) will work, but this is entirely based on preference.
      3. Review and validate the parameters with the working group. Consider creating additional color-coding (highlighting certain tasks that might be dependent on a decision or have ongoing components).

      Cloud Vision Workbook

      Bridge the gap and create the vision

      Build the foundations of your cloud vision

      Phase 4

      Phase 4

      Bridge the Gap and Create the Vision

      Phase 1

      1.1 Generate goals and drivers

      1.2 Explore cloud characteristics

      1.3 Create a current state summary

      1.4 Select workloads for analysis

      Phase 2

      2.1 Conduct workload assessments

      2.2 Determine workload future states

      Phase 3

      3.1 Generate risks and roadblocks

      3.2 Mitigate risks and roadblocks

      3.3 Define roadmap initiatives

      Phase 4

      4.1 Review and assign work items

      4.2 Finalize cloud decision framework

      4.3 Create cloud vision

      This phase will walk you through the following activities:

      • Assign initiatives and propose timelines
      • Build a delivery model rubric
      • Build a service model rubric
      • Built a support model rubric
      • Create a cloud vision statement
      • Map cloud workloads
      • Complete the Cloud Vision presentation

      This phase involves the following participants:

      • IT management, the core working group, security, infrastructure, operations, architecture, engineering, applications, non-IT stakeholders

      Step 4.1

      Review and assign work items

      Activities

      4.1.1 Assign initiatives and propose timelines

      Bridge the gap and create the vision

      Review and assign work items

      Finalize cloud decision framework

      Create cloud vision

      This step involves the following participants:

      • Core working group
      • IT management

      Outcomes of this step

      • Populated cloud vision roadmap

      4.1.1 Assign initiatives and propose timelines

      1 hour

      Input

      • List of cloud initiatives

      Output

      • Initiatives assigned by responsibility and timeline

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      1. Once the list is populated, begin assigning responsibility for execution. This is not a RACI exercise, so focus on the functional responsibility. Once you have determined who is responsible, assign a timeline and include any notes. This will form the basis of a more formal project plan.
      2. To assign the initiative to a party, consider 1) who will be responsible for execution and 2) if that responsibility will be shared. Be as specific as possible, but be sure to be consistent to make it easier for you to sort responsibility later on.
      3. When assigning timelines, we suggest including the end date (when you expect the project to be complete) rather than the start date, though whatever you choose, be sure to be consistent. Make use of the notes column to record anything that you think any other readers will need to be aware of in the future, or details that may not be possible to commit to memory.

      Cloud Vision Workbook

      Step 4.2

      Finalize cloud decision framework

      Activities

      4.2.1 Build a delivery model rubric

      4.2.2 Build a service model rubric

      4.2.3 Build a support model rubric

      Bridge the gap and create the vision

      Review and assign work items

      Finalize cloud decision framework

      Create cloud vision

      This step involves the following participants:

      • Core working group

      Outcomes of this step

      • Cloud decision framework

      4.2.1 Build a delivery model rubric

      1 hour

      Input

      • List of cloud initiatives

      Output

      • Initiatives assigned by responsibility and timeline

      Materials

      Participants

      • Core working group
      1. Now that we have a good understanding of the cloud’s key characteristics, the relative suitability of different workloads for the cloud, and a good understanding of some of the risks and roadblocks that may need to be overcome if a cloud transition is to take place, it is time to formalize a delivery model rubric. Start by listing the delivery models on a white board vertically – public, private, hybrid, and multi-cloud. Include a community cloud option as well if that is feasible for you. Strike any models that do not figure into your vision.
      2. Create a table style rubric for each delivery model. Confer with the working group to determine what characteristics best define workloads suitable for each model. If you have a hybrid cloud option, you may consider workloads that are highly dynamic; a private cloud hosted on-premises may be more suitable for workloads that have extensive regulatory requirements.
      3. Once the table is complete, include it in the Cloud Vision Executive Presentation.

      Cloud Vision Executive Presentation

      Vision for the cloud future state (example)

      Delivery model Decision criteria
      Public cloud
      • Public cloud is the primary destination for all workloads as the goal is to eliminate facilities and infrastructure management
      • Offers features, broad accessibility, and managed updates along with provider-managed facilities and hardware
      Legacy datacenter
      • Any workload that is not a good fit for the public cloud
      • Dependency (like a USB key for license validation)
      • Performance requirements (e.g. workloads highly sensitive to transaction thresholds)
      • Local infrastructure components (firewall, switches, NVR)

      Summary statement: Everything must go! Public cloud is a top priority. Anything that is not compatible (for whatever reason) with a public cloud deployment will be retained in a premises-based server closet (downgraded from a full datacenter). The private cloud does not align with the overall organizational vision, nor does a hybrid solution.

      4.2.2 Build a service model rubric

      1 hour

      Input

      • Output of workload assessments
      • Output of risk and mitigation exercise

      Output

      • Service model rubric

      Materials

      • Whiteboard
      • Cloud Vision Executive Presentation

      Participants

      • Core working group
      1. This next activity is like the delivery model activity, but covers the relevant cloud service models. On a whiteboard, make a vertical list of the cloud service models (SaaS, PaaS, IaaS, etc.) that will be considered for workloads. If you have an order of preference, place your most preferred at the top, your least preferred at the bottom.
      2. Describe the circumstances under which you would select each service model. Do your best to focus on differentiators. If a decision criterion appears for multiple service models, consider refining or excluding it. (For additional information, check out Info-Tech’s Reimagine IT Operations for a Cloud-First World blueprint.)
      3. Create a summary statement to capture your overall service model position. See the next slide for an example. Note: this can be incorporated into your cloud vision statement, so be sure that it reflects your genuine cloud preferences.
      4. Record the results in the Cloud Vision Executive Presentation.

      Cloud Vision Executive Presentation

      Vision for the cloud future state (example)

      Service model Decision criteria
      SaaS

      SaaS first; opt for SaaS when:

      • A SaaS option exists that meets all key business requirements
      • There is a strong desire to have someone else (the vendor) manage infrastructure components/the platform
      • Not particularly sensitive to performance thresholds
      • The goal is to transition management of the workload outside of IT
      • SaaS is the only feasible way to consume the desired service
      PaaS
      • Highly customized service/workload – SaaS not feasible
      • Still preferable to offload as much management as possible to third parties
      • Customization required, but not at the platform level
      • The workload is built using a standard framework
      • We have the time/resources to replatform
      IaaS
      • Service needs to be lifted and shifted out of the datacenter quickly
      • Customization is required at the platform level/there is value in managing components
      • There is no need to manage facilities
      • Performance is not impacted by hosting the workload offsite
      • There is value in right-sizing the workload over time
      On-premises Anything that does not fit in the cloud for performance or other reasons (e.g. licensing key)

      Summary statement: SaaS will be the primary service model. All workloads will migrate to the public cloud where possible. Anything that cannot be migrated to SaaS will be migrated to PaaS. IaaS is a transitory step.

      4.2.3 Build a support model rubric

      1 hour

      Input

      • Results of the cloud workload assessments

      Output

      • Support model rubric

      Materials

      • Whiteboard
      • Cloud Vision Executive Presentation

      Participants

      • Core working group
      1. The final rubric covered here is that for the support model. Where will you procure the skills necessary to ensure the vision’s proper execution? Much like the other rubric activities, write the three support models vertically (in order of preference, if you have one) on a whiteboard.
      2. Next to each model, describe the circumstances under which you would select each support model. Focus on the dimensions: the duration of the engagement, specialization required, and flexibility required. If you have existing rules/practices around hiring consultants/MSPs, consider those as well.
      3. Once you have a good list of decision criteria, form a summary statement. This should encapsulate your position on support models and should mention any notable criteria that will contribute to most decisions.
      4. Record the results in the Cloud Vision Executive Presentation.

      Cloud Vision Executive Presentation

      Vision for the cloud future state (example)

      Support model Decision criteria
      Internal IT

      The primary support model will be internal IT going forward

      • Chosen where the primary work required is administrative
      • Where existing staff can manage the service in the cloud easily and effectively
      • Where the chosen solution fits the SaaS service model
      Consultant
      • Where the work required is time-bound (e.g. a migration/refactoring exercise)
      • Where the skills do not exist in house, and where the skills cannot easily be procured (specific technical expertise required in areas of the cloud unfamiliar to staff)
      • Where opportunities for staff to learn from consultant SMEs are valuable
      • Where ongoing management and maintenance can be handled in house
      MSP
      • Where an ongoing relationship is valued
      • Where ongoing administration and maintenance are disproportionately burdensome on IT staff (or where this administration and maintenance is likely to be burdensome)
      • Where the managed services model has already been proven out
      • Where specific expertise in an area of technology is required but this does not rise to the need to hire an FTE (e.g. telephony)

      Summary statement: Most workloads will be managed in house. A consultant will be employed to facilitate the transition to micro-services in a cloud container environment, but this will be transitioned to in-house staff. An MSP will continue to manage backups and telephony.

      Step 4.3

      Create cloud vision

      Activities

      4.3.1 Create a cloud vision statement

      4.3.2 Map cloud workloads

      4.3.3 Complete the Cloud Vision Presentation

      Review and assign work items

      Finalize cloud decision framework

      Create cloud vision

      This step involves the following participants:

      • Core working group
      • IT management

      Outcomes of this step

      Completed Cloud Vision Executive Presentation

      4.3.1 Create a cloud vision statement

      1 hour

      Input

      • List of cloud initiatives

      Output

      • Initiatives assigned by responsibility and timeline

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      1. Now that you know what service models are appropriate, it’s time to summarize your cloud vision in a succinct, consumable way. A good vision statement should have three components:
        • Scope: Which parts of the organization will the strategy impact?
        • Goal: What is the strategy intended to accomplish?
        • Key differentiator: What makes the new strategy special?
      2. On a whiteboard, make a chart with three columns (one column for each of the features of a good mission statement). Have the group generate a list of words to describe each of the categories. Ideally, the group will produce multiple answers for each category.
      3. Once you’ve gathered a few different responses for each category, have the team put their heads down and generate pithy mission statements that capture the sentiments underlying each category.
      4. Have participants read their vision statements in front of the group. Use the rest of the session to produce a final statement. Record the results in the Cloud Strategy Executive Presentation.

      Example vision statement outputs

      “IT at ACME Corp. hereby commits to providing clients and end users with an unparalleled, productivity-enabling technology experience, leveraging, insofar as it is possible and practical, cloud-based services.”

      “At ACME Corp. our employees and customers are our first priority. Using new, agile cloud services, IT is devoted to eliminating inefficiency, providing cutting-edge solutions for a fast-paced world, and making a positive difference in the lives of our colleagues and the people we serve.”

      As a global leader in technology, ACME Corp. is committed to taking full advantage of new cloud services, looking first to agile cloud options to optimize internal processes wherever efficiency gaps exist. Improved efficiency will allow associates to spend more time on ACME’s core mission: providing an unrivalled customer experience.”

      Scope

      Goal

      Key differentiator

      4.3.2 Map cloud workloads

      1 hour

      Input

      • List of workloads
      • List of acceptable service models
      • List of acceptable migration paths

      Output

      • Workloads mapped by service model/migration path

      Materials

      • Whiteboard
      • Sticky notes

      Participants

      • Core working group
      1. Now that you have defined your overall cloud vision as well as your service model options, consider aligning your service model preferences with your migration path preferences. Draw a table with your expected migration strategies across the top (retain, retire, rehost, replatform, refactor, repurchase, or some of these) and your expected service models across the side.
      2. On individual sticky notes, write a list of workloads in your environment. In a smaller environment, this list can be exhaustive. Otherwise take advantage of the list you created as part of phase 1 along with any additional workloads that warrant discussion.
      3. As a group, go through the list, placing the sticky notes first in the appropriate row based on their characteristics and the decision criteria that have already been defined, and then in the appropriate column based on the appropriate migration path. (See the next slide for an example of what this looks like.)
      4. Record the results in the Cloud Vision Executive Presentation. Note: not every cell will be filled; some migration path/service model combinations are impossible or otherwise undesirable.

      Cloud Vision Executive Presentation

      Example cloud workload map

      Repurchase Replatform Rehost Retain
      SaaS

      Office suite

      AD

      PaaS SQL Database
      IaaS File Storage DR environment
      Other

      CCTV

      Door access

      4.3.3 Complete the Cloud Vision Presentation

      1 hour

      Input

      • List of cloud initiatives

      Output

      • Initiatives assigned by responsibility and timeline

      Materials

      • Cloud Vision Workbook

      Participants

      • Core working group
      1. Open the Cloud Vision Executive Presentation to the second slide and review the templated executive brief. This comprises several sections (see the next slide). Populate each one:
        • Summary of the exercise
        • The cloud vision statement
        • Key cloud drivers
        • Risks and roadblocks
        • Top initiatives and next steps
      2. Review the remainder of the presentation. Be sure to elaborate on any significant initiatives and changes (where applicable) and to delete any slides that you no longer require.

      Cloud Vision Workbook

      Sample cloud vision executive summary

      • From [date to date], a cross-functional group representing IT and its constituents met to discuss the cloud.
      • Over the course of the week, the group identified drivers for cloud computing and developed a shared vision, evaluated several workloads through an assessment framework, identified risks, roadblocks, and mitigations, and finally generated initiatives and next steps.
      • From the process, the group produced a summary and a cloud suitability assessment framework that can be applied at the level of the workload.

      Cloud Vision Statement

      [Organization] will leverage public cloud solutions and retire existing datacenter and colocation facilities. This transition will simplify infrastructure administration, support, and security, while modernizing legacy infrastructure and reducing the need for additional capital expenditure.

      Cloud Drivers Retire the datacenter Do more valuable work
      Right-size the environment Reduce CapEx
      Facilitate ease of mgmt. Work from anywhere
      Reduce capital expenditure Take advantage of elasticity
      Performance and availability Governance Risks and roadblocks
      Security Rationalization
      Cost Skills
      Migration Remaining premises resources
      BC, backup, and DR Control

      Initiatives and next steps

      • Close the datacenter and colocation site in favor of a SaaS-first cloud approach.
      • Some workloads will migrate to infrastructure-as-a-service in the short term with the assistance of third-party consultants.

      Document your cloud strategy

      You did it!

      Congratulations! If you’ve made it this far, you’ve successfully articulated a cloud vision, assessed workloads, developed an understanding (shared with your team and stakeholders) of cloud concepts, and mitigated risks and roadblocks that you may encounter along your cloud journey. From this exercise, you should understand your mission and vision, how your cloud plans will interact with any other relevant strategic plans, and what successful execution looks like, as well as developing a good understanding of overall guiding principles. These are several components of your overall strategy, but they do not comprise the strategy in its entirety.

      How do you fix this?

      First, validate the results of the vision exercise with your stakeholders. Socialize it and collect feedback. Make changes where you think changes should be made. This will become a key foundational piece. The next step is to formally document your cloud strategy. This is a separate project and is covered in the Info-Tech blueprint Document Your Cloud Strategy.

      The vision exercise tells you where you want to go and offers some clues as to how to get there. The formal strategy exercise is a formal documentation of the target state, but also captures in detail the steps you’ll need to take, the processes you’ll need to refine, and the people you’ll need to hire.

      A cloud strategy should comprise your organizational stance on how the cloud will change your approach to people and human resources, technology, and governance. Once you are confident that you can make and enforce decisions in these areas, you should consider moving on to Document Your Cloud Strategy. This blueprint, Define Your Cloud Vision, often serves as a prerequisite for the strategy documentation conversation(s).

      Appendix

      Summary of Accomplishment

      Additional Support

      Research Contributors

      Related Info-Tech Research

      Vendor Resources

      Bibliography

      Summary of Accomplishment

      Problem Solved

      You have now documented what you want from the cloud, what you mean when you say “cloud,” and some preliminary steps you can take to make your vision a reality.

      You now have at your disposal a framework for identifying and evaluating candidates for their cloud suitability, as well as a series of techniques for generating risks and mitigations associated with your cloud journey. The next step is to formalize your cloud strategy using the takeaways from this exercise. You’re well on your way to a completed cloud strategy!

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Generate drivers for cloud adoption

      Work with stakeholders to understand the expected benefits of the cloud migration and how these drivers will impact the overall vision.

      Conduct workload assessments

      Assess your individual cloud workloads for their suitability as candidates for the cloud migration.

      Bibliography

      “2021 State of the Cloud Report.” Flexera, 2021. Web.

      “2021 State of Upskilling Report.” Pluralsight, 2021. Web.

      “AWS Snowmobile.” Amazon Web Services, n.d. Web.

      “Azure products.” Microsoft, n.d. Web.

      “Azure Migrate Documentation.” Microsoft, n.d. Web.

      Bell, Harold. “Multi-Cloud vs. Hybrid Cloud: What’s the Difference?” Nutanix, 2019. Web.

      “Cloud Products.” Amazon Web Services, n.d. Web.

      “COBIT 2019 Framework: Introduction and Methodology.” ISACA, 2019. Web.

      Edmead, Mark T. “Using COBIT 2019 to Plan and Execute an Organization’s Transformation Strategy.” ISACA, 2020. Web.

      Flitter, Emily, and Karen Weise. “Capital One Data Breach Compromises Data of Over 100 Million.” The New York Times, 29 July 2019. Web.

      Gillis, Alexander S. “Cloud Security Posture Management (CSPM).” TechTarget, 2021. Web.

      “’How to Cloud’ with Capital One.” Amazon Web Services, n.d. Web.

      “IBM Closes Landmark Acquisition of Red Hat for $34 Billion; Defines Open, Hybrid Cloud Future.” Red Hat, 9 July 2019. Web.

      Mell, Peter, and Timothy Grance. “The NIST Definition of Cloud Computing.” National Institute of Standards and Technology, Sept. 2011. Web.

      Ng, Alfred. “Amazon Tells Senators it Isn't to Blame for Capital One Breach.” CNET, 2019. Web.

      Orban, Stephen. “6 Strategies for Migrating Applications to the Cloud.” Amazon Web Services, 2016. Web.

      Sullivan, Dan. “Cloud Access Security Broker (CASB).” TechTarget, 2021. Web.

      “What Is Secure Access Service Edge (SASE)?” Cisco, n.d. Web.

      Standardize the Service Desk

      • Buy Link or Shortcode: {j2store}477|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $24,155 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Not everyone embraces their role in service support. Specialists would rather work on projects than provide service support.
      • The Service Desk lacks processes and workflows to provide consistent service. Service desk managers struggle to set and meet service-level expectations, which further compromises end-user satisfaction.

      Our Advice

      Critical Insight

      • Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution. Establish a single service-support team across the IT group and enforce it with a cooperative, customer-focused culture.
      • Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology.

      Impact and Result

      • Create a consistent customer service experience for service desk patrons, and increase efficiency, first-call resolution, and end-user satisfaction with the Service Desk.
      • Decrease time and cost to resolve service desk tickets.
      • Understand and address reporting needs to address root causes and measure success and build a solid foundation for future IT service improvements.

      Standardize the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Standardize the Service Desk Research – A step-by-step document that helps you improve customer service by driving consistency in your support approach and meet SLAs.

      Use this blueprint to standardize your service desk by assessing your current capability and laying the foundations for your service desk, design an effective incident management workflow, design a request fulfillment process, and apply the discussions and activities to make an actionable plan for improving your service desk.

      • Standardize the Service Desk – Phases 1-4

      2. Service Desk Maturity Assessment – An assessment tool to help guide process improvement efforts and track progress.

      This tool is designed to assess your service desk process maturity, identify gaps, guide improvement efforts, and measure your progress.

      • Service Desk Maturity Assessment

      3. Service Desk Project Summary – A template to help you organize process improvement initiatives using examples.

      Use this template to organize information about the service desk challenges that the organization is facing, make the case to build a right-sized service desk to address those challenges, and outline the recommended process changes.

      • Service Desk Project Summary

      4. Service Desk Roles and Responsibilities Guide – An analysis tool to determine the right roles and build ownership.

      Use the RACI template to determine roles for your service desk initiatives and to build ownership around them. Use the template and replace it with your organization's information.

      • Service Desk Roles and Responsibilities Guide

      5. Incident Management and Service Desk Standard Operating Procedure – A template designed to help service managers kick-start the standardization of service desk processes.

      The template will help you identify service desk roles and responsibilities, build ticket management processes, put in place sustainable knowledgebase practices, document ticket prioritization scheme and SLO, and document ticket workflows.

      • Incident Management and Service Desk SOP

      6. Ticket and Call Quality Assessment Tool – An assessment tool to check in on ticket and call quality quarterly and improve the quality of service desk data.

      Use this tool to help review the quality of tickets handled by agents and discuss each technician's technical capabilities to handle tickets.

      • Ticket and Call Quality Assessment Tool

      7. Workflow Library – A repository of typical workflows.

      The Workflow Library provides examples of typical workflows that make up the bulk of the incident management and request fulfillment processes at the service desk.

      • Incident Management and Service Desk Workflows (Visio)
      • Incident Management and Service Desk Workflows (PDF)

      8. Service Desk Ticket Categorization Schemes – A repository of ticket categories.

      The Ticket Categorization Schemes provide examples of ticket categories to organize the data in the service desk tool and produce reports that help managers manage the service desk and meet business requirements.

      • Service Desk Ticket Categorization Schemes

      9. Knowledge Manager – A job description template that includes a detailed explication of the responsibilities and expectations of a Knowledge Manager role.

      The Knowledge Manager's role is to collect, synthesize, organize, and manage corporate information in support of business units across the enterprise.

      • Knowledge Manager

      10. Knowledgebase Article Template – A comprehensive record of the incident management process.

      An accurate and comprehensive record of the incident management process, including a description of the incident, any workarounds identified, the root cause (if available), and the profile of the incident's source, will improve incident resolution time.

      • Knowledgebase Article Template

      11. Sample Communication Plan – A sample template to guide your communications around the integration and implementation of your overall service desk improvement initiatives.

      Use this template to develop a communication plan that outlines what stakeholders can expect as the process improvements recommended in the Standardize the Service Desk blueprint are implemented.

      • Sample Communication Plan

      12. Service Desk Roadmap – A structured roadmap tool to help build your service desk initiatives timeline.

      The Service Desk Roadmap helps track outstanding implementation activities from your service desk standardization project. Use the roadmap tool to define service desk project tasks, their owners, priorities, and timeline.

      • Service Desk Roadmap
      [infographic]

      Workshop: Standardize the Service Desk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Service Desk Foundations

      The Purpose

      Discover your challenges and understand what roles, metrics, and ticket handling procedures are needed to tackle the challenges.

      Key Benefits Achieved

      Set a clear understanding about the importance of service desk to your organization and service desk best practices.

      Activities

      1.1 Assess current state of the service desk.

      1.2 Review service desk and shift-left strategy.

      1.3 Identify service desk metrics and reports.

      1.4 Identify ticket handling procedures

      Outputs

      Current state assessment

      Shift-left strategy and implications

      Service desk metrics and reports

      Ticket handling procedures

      2 Design Incident Management

      The Purpose

      Build workflows for incident and critical incident tickets.

      Key Benefits Achieved

      Distinguish incidents from service requests.

      Ticket categorization facilitates ticket. routing and reporting.

      Develop an SLA for your service desk team for a consistent service delivery.

      Activities

      2.1 Build incident and critical incident management workflows.

      2.2 Design ticket categorization scheme and proper ticket handling guidelines.

      2.3 Design incident escalation and prioritization guidelines.

      Outputs

      Incident and critical incident management workflows

      Ticket categorization scheme

      Ticket escalation and prioritization guidelines

      3 Design Request Fulfilment

      The Purpose

      Build service request workflows and prepare self-service portal.

      Key Benefits Achieved

      Standardize request fulfilment processes.

      Prepare for better knowledge management and leverage self-service portal to facilitate shift-left strategy.

      Activities

      3.1 Build service request workflows.

      3.2 Build a targeted knowledgebase.

      3.3 Prepare for a self-serve portal project.

      Outputs

      Distinguishing criteria for requests and projects

      Service request workflows and SLAs

      Knowledgebase article template, processes, and workflows

      4 Build Project Implementation Plan

      The Purpose

      Now that you have laid the foundation of your service desk, put all the initiatives into an action plan.

      Key Benefits Achieved

      Discuss priorities, set timeline, and identify effort for your service desk.

      Identify the benefits and impacts of communicating service desk initiatives to stakeholders and define channels to communicate service desk changes.

      Activities

      4.1 Build an implementation roadmap.

      4.2 Build a communication plan

      Outputs

      Project implementation and task list with associated owners

      Project communication plan and workshop summary presentation

      Further reading

      Analyst Perspective

      "Customer service issues are rarely based on personality but are almost always a symptom of poor and inconsistent process. When service desk managers are looking to hire to resolve customer service issues and executives are pushing back, it’s time to look at improving process and the support strategy to make the best use of technicians’ time, tools, and knowledge sharing. Once improvements have been made, it’s easier to make the case to add people or introduce automation.

      Replacing service desk solutions will also highlight issues around poor process. Without fixing the baseline services, the new solution will simply wrap your issues in a prettier package.

      Ultimately, the service desk needs to be the entry point for users to get help and the rest of IT needs to provide the appropriate support to ensure the first line of interaction has the knowledge and tools they need to resolve quickly and preferably on first contact. If your plans include optimization to self-serve or automation, you’ll have a hard time getting there without standardizing first."

      Sandi Conrad

      Principal Research Director, Infrastructure & Operations Practice

      Info-Tech Research Group

      A method for getting your service desk out of firefighter mode

      This Research Is Designed For:

      • The CIO and senior IT management who need to increase service desk effectiveness and timeliness and improve end-user satisfaction.
      • The service desk manager who wants to lead the team from firefighting mode to providing consistent and proactive support.

      This Research Will Also Assist:

      • Service desk teams who want to increase their own effectiveness and move from a help desk to a service desk.
      • Infrastructure and applications managers who want to decrease reactive support activities and increase strategic project productivity by shifting repetitive and low-value work left.

      This Research Will Help You:

      • Create a consistent customer service experience for service desk patrons.
      • Increase efficiency, first-call resolution, and end-user satisfaction with the Service Desk.
      • Decrease time and cost to resolve service desk tickets.
      • Understand and address reporting needs to address root causes and measure success.
      • Build a solid foundation for future IT service improvements.

      Executive Summary

      Situation

      • The CIO and senior IT management who need to increase service desk effectiveness and timeliness and improve end-user satisfaction.
      • If only the phone could stop ringing, the Service Desk could become proactive, address service levels, and improve end-user IT satisfaction.

      Complication

      • Not everyone embraces their role in service support. Specialists would rather work on projects than provide service support.
      • The Service Desk lacks processes and workflows to provide consistent service. Service desk managers struggle to set and meet service-level expectations, which further compromises end-user satisfaction.

      Resolution

      • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving service desk maturity. Use diagnostic tools to assess the current state of the Service Desk. Identify service support challenges and draw on best-practice frameworks intelligently to build a structured response to those challenges.
      • An effective service desk must be built on the right foundations. Understand how:
        • Service desk structure affects cost and ticket volume capacity.
        • Incident management workflows can improve ticket handling, prioritization, and escalation.
        • Request fulfillment processes create opportunities for streamlining and automating services.
        • Knowledge sharing supports the processes and workflows essential to effective service support.

      Info-Tech Insight

      Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution. Establish a single service-support team across the IT group and enforce it with a cooperative, customer-focused culture. Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology

      Directors and executives understand the importance of the service desk and believe IT can do better

      A double bar graph is depicted. The blue bars represent Effectiveness and the green bars represent Importance in terms of service desk at different seniority levels, which include frontline, manager, director, and executive.

      Source: Info-Tech, 2019 Responses (N=189 organizations)

      Service Desk Importance Scores

        No Importance: 1.0-6.9
        Limited Importance: 7.0-7.9
        Significant Importance: 8.0-8.9
        Critical Importance: 9.0-10.0

      Service Desk Effectiveness Scores

        Not in Place: N/A
        Not Effective: 0.0-4.9
        Somewhat Ineffective: 5.0-5.9
        Somewhat Effective: 6.0-6.9
        Very Effective: 7.0-10.0

      Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.

      Business stakeholders consistently rank the service desk as one of the top five most important services that IT provides

      Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.

      Business stakeholders ranked the following 12 core IT services in terms of importance:

      Learn more about the CIO Business Vision Program.
      *Note: IT Security was added to CIO Business Vision 2.0 in 2019

      Top IT Services for Business Stakeholders

      1. Network Infrastructure
      2. IT Security*
      3. Data Quality
      4. Service Desk
      5. Business Applications
      6. Devices
      7. Client-Facing Technology
      8. Analytical Capability
      9. IT Innovation Leadership
      10. Projects
      11. Work Orders
      12. IT Policies
      13. Requirements Gathering
      Source: Info-Tech Research Group, 2019 (N=224 organizations)

      Having an effective and timely service desk correlates with higher end-user satisfaction with all other IT services

      A double bar graph is depicted. The blue bar represents dissatisfied ender user, and the green bar represents satisfied end user. The bars show the average of dissatisfied and satisfied end users for service desk effectiveness and service desk timeliness.

      On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.

      Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.
      “Satisfied” organizations had average scores =8.“Dissatisfied" organizations had average scores “Dissatisfied" organizations had average scores =6. Source: Info-Tech Research Group, 2019 (N=18,500+ respondents from 75 organizations)

      Standardize the service desk the Info-Tech way to get measurable results

      More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.

      Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.

      "The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"

      - Rod Gula, IT Director

      American Realty Advisors

      Three circles are depicted. The top circle shows the sum of measured value dollar impact which is US$1,659,493.37. The middle circle shows the average measured value dollar impact which is US$19,755.87. The bottom circle shows the average measured value time saved which is 27 days.

      Info-Tech’s approach to service desk standardization focuses on building service management essentials

      This image depicts all of the phases and steps in this blueprint.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      This image depicts research that can be used to improve IT processes. Service Desk is circled to demonstrate which research is being used.

      The service desk is the foundation of all other service management processes.

      The image shows how the service desk is a foundation for other service management processes.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Standardize the Service Desk – project overview

      This image shows the project overview of this blueprint.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Project Summary

      Image of template.

      Service Desk Standard Operating Procedures

      Image of tool.

      Service Desk Maturity Assessment Tool

      Image of tool.

      Service Desk Implementation Roadmap

      Image of tool Incident, knowledge, and request management workflows

      Incident, knowledge, and request management workflows

      The project’s key deliverable is a service desk standard operating procedure

      Benefits of documented SOPs:

      Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).

      IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.

      Compliance: Compliance audits are more manageable because the documentation is already in place.

      Transparency: Visually documented processes answer the common business question of “why does that take so long?”

      Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.

      Impact of undocumented/undefined SOPs:

      Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff

      IT automation built on poorly defined, unoptimized processes leads to inconsistent results.

      Documenting SOPs to prepare for an audit becomes a major time-intensive project.

      Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.

      Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.

      Workshop Overview

      Image depicts workshop overview occurring over four days.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Phase 1

      Lay Service Desk Foundations

      Step 1.1:Assess current state

      Image shows the steps in phase 1. Highlight is on step 1.1

      This step will walk you through the following activities:

      • 1.1.1 Outline service desk challenges
      • 1.1.2 Assess the service desk maturity

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.

      Deliverables

      • Service Desk Maturity Assessment

      Standardizing the service desk benefits the whole business

      The image depicts 3 circles to represent the service desk foundations.

      Embrace standardization

      • Standardization prevents wasted energy on reinventing solutions to recurring issues.
      • Standardized processes are scalable so that process maturity increases with the size of your organization.

      Increase business satisfaction

      • Improve confidence that the service desk can meet service levels.
      • Create a single point of contact for incidents and requests and escalate quickly.
      • Analyze trends to forecast and meet shifting business requirements.

      Reduce recurring issues

      • Create tickets for every task and categorize them accurately.
      • Generate reliable data to support root-cause analysis.

      Increase efficiency and lower operating costs

      • Empower end users and technicians with a targeted knowledgebase (KB).
      • Cross-train to improve service consistency.

      Case Study: The CIO of Westminster College took stock of existing processes before moving to empower the “helpless desk”

      Scott Lowe helped a small staff of eight IT professionals formalize service desk processes and increase the amount of time available for projects.

      When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:

      • An unreliable network
      • Aging server replacements and no replacement plan
      • IT was the “department of no”
      • A help desk known as the “helpless desk”
      • A lack of wireless connectivity
      • Internet connection speed that was much too slow

      As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.

      The project load of IT staff increased, with new projects coming in every day.

      With a long project list, it became increasingly important to improve the transparency of project request and prioritization.

      Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.

      He addressed the infrastructure challenges in part by analyzing IT’s routine processes.

      Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.

      They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.

      Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.

      Common challenges experienced by service desk teams

      Unresolved issues

      • Tickets are not created for all incidents.
      • Tickets are lost or escalated to the wrong technicians.
      • Poor data impedes root-cause analysis of incidents.

      Lost resources/accountability

      • Lack of cross-training and knowledge sharing.
      • Lack of skills coverage for critical applications and services.
      • Time is wasted troubleshooting recurring issues.
      • Reports unavailable due to lack of data and poor categorization.

      High cost to resolve

      • Tier 2/3 resolve issues that should be resolved at tier 1.
      • Tier 2/3 often interrupt projects to focus on service support.

      Poor planning

      • Lack of data for effective trend analysis leads to poor demand planning.
      • Lack of data leads to lost opportunities for templating and automation.

      Low business satisfaction

      • Users are unable to get assistance with IT services quickly.
      • Users go to their favorite technician instead of using the service desk.

      Outline the organization’s service desk challenges

      1.1.1 Brainstorm service desk challenges

      Estimated Time: 45 minutes

      A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.

      B. Think about the following:

      • What have you heard from users? (e.g. slow response time)
      • What have you heard from executives? (e.g. poor communication)
      • What should you start doing? (e.g. documenting processes)
      • What should you stop doing? (e.g. work that is not being entered as tickets)

      C. Document challenges in the Service Desk Project Summary.

      Participants:

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Assess current service desk maturity to establish a baseline and create a plan for service desk improvement

      A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:

      1. Determine the current state of the service desk.
      2. Determine the desired state of the service desk.
      3. Build a practical path from current to desired state.
      Image depicts 2 circles and a box. The circle on the 1. left has assess current state. The circle on the right has 2. assess target state. The box has 3. build a roadmap.

      Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:

      1. Identify service desk pain points.
      2. Map each pain point to business services.
      3. Assign a broad business value to the resolution of each pain point.
      4. Map each pain point to a process.

      Expert Insight

      Image of expert.

      “How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”

      Rob England

      IT Consultant & Commentator

      Owner Two Hills

      Also known as The IT Skeptic

      Assess the process maturity of the service desk to determine which project phase and steps will bring the most value

      1.1.2 Measure which activity will have the greatest impact

      The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Project Summary.

      The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.

      Where do I find the data?

      Consult:

      • Service Manager
      • Service Desk Tools
      Image is the service desk tools.

      Step 1.2:Review service support best practices

      Image shows the steps in phase 1. Highlight is on step 1.2.

      This step will walk you through the following activities:

      1. 1.2.1 Identify roles and responsibilities in your organization
      2. 1.2.2 Map out the current and target structure of the service desk

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.

      Deliverables

      • Roles & responsibilities guide
      • Service desk structure

      Everyone in IT contributes to the success of service support

      Regardless of the service desk structure chosen to meet an organization’s service support requirements, IT staff should not doubt the role they play in service support.

      If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.

      Service Support Engagement Plan

      • Identify who is accountable for different service support processes.
      • Outline the different responsibilities of service desk agents at tier 1, tier 2, and tier 3 in meeting service-level agreements for service support.
      • Draft operational-level agreements between specialty groups and the service desk to improve accountability.
      • Configure the service desk tool to ensure ticket visibility and ownership across queues.
      • Engage tier 2 and tier 3 resources in building workflows for incident management, request fulfilment, and writing knowledgebase articles.
      • Emphasize the benefits of cooperation across IT silos:
        • Better customer service and end-user satisfaction.
        • Shorter time to resolve incidents and implement requests.
        • A higher tier 1 resolution rate, more efficient escalations, and fewer interruptions from project work.

      Info-Tech Insight

      Specialists tend to distance themselves from service support as they progress through their career to focus on projects.

      However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.

      Clear project complications by leveraging roles and responsibilities

      R

      Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.

      A

      Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.

      C

      Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.

      I

      Informed: People who receive information about process execution and quality and need to stay informed regarding the task.

      A RACI analysis is helpful with the following:

      • Workload Balancing: Allowing responsibilities to be distributed effectively between functional teams and individuals.
      • Change Management: Ensuring key functions and processes are not overlooked during organizational changes.
      • Onboarding: New employees can identify their own roles and responsibilities.

      A RACI chart outlines which positions are Responsible, Accountable, Consulted, and Informed

      Image shows example of RACI chart

      Create a list of roles and responsibilities in your organization

      1.2.1 Create RACI matrix to define responsibilities

      1. Use the Service Desk Roles and Responsibilities Guidefor a better understanding of the roles and responsibilities of different service desk tiers.
      2. In the RACI chart, replace the top row with specific roles in your organization.
      3. Modify or expand the process tasks, as needed, in the left column.
      4. For each role, identify the responsibility values that the person brings to the service desk. Fill out each column.
      5. Document in the Service Desk SOP. Schedule a time to share the results with organization leads.
      6. Distribute the chart between all teams in your organization.

      Notes:

      • Assign one Accountable for each task.
      • Have at least one Responsible for each task.
      • Avoid generic responsibilities, such as “team meetings.”
      • Keep your RACI definitions in your documents, as they are sometimes tough to remember.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Roles and Responsibilities Guide
      • Flip Chart
      • Whiteboard

      Build a single point of contact for the service desk

      Regardless of the service desk structure chosen to meet your service support requirements, end users should be in no doubt about how to access the service.

      Provide end users with:

      • A single phone number.
      • A single email address.
      • A single web portal for all incidents and requests.

      A single point of contact will ensure:

      • An agent is available to field incidents and requests.
      • Incidents and requests are prioritized according to impact and urgency.
      • Work is tracked to completion.

      This prevents ad hoc ticket channels such as shoulder grabs or direct emails, chats, or calls to a technician from interrupting work.

      A single point of contact does not mean the service desk is only accessible through one intake channel, but rather all tickets are directed to the service desk (i.e. tier 1) to be resolved or redirected appropriately.

      Image depicts 2 boxes. The smaller box labelled users and the larger box labelled Service Desk Tier 1. There are four double-sided arrows. The top is labelled email, the second is walk-in, the third is phone, the fourth is web portal.

      Directors and executives understand the importance of the service desk and believe IT can do better

      A double bar graph is depicted. The blue bars represent Effectiveness and the green bars represent Importance in terms of service desk at different seniority levels, which include frontline, manager, director, and executive.

      Source: Info-Tech, 2019 Responses (N=189 organizations)

      Service Desk Importance Scores

        No Importance: 1.0-6.9
        Limited Importance: 7.0-7.9
        Significant Importance: 8.0-8.9
        Critical Importance: 9.0-10.0

      Service Desk Effectiveness Scores

        Not in Place: N/A
        Not Effective: 0.0-4.9
        Somewhat Ineffective: 5.0-5.9
        Somewhat Effective: 6.0-6.9
        Very Effective: 7.0-10.0

      Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.

      Business stakeholders consistently rank the service desk as one of the top five most important services that IT provides

      Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.

      Business stakeholders ranked the following 12 core IT services in terms of importance:

      Learn more about the CIO Business Vision Program.
      *Note: IT Security was added to CIO Business Vision 2.0 in 2019

      Top IT Services for Business Stakeholders

      1. Network Infrastructure
      2. IT Security*
      3. Data Quality
      4. Service Desk
      5. Business Applications
      6. Devices
      7. Client-Facing Technology
      8. Analytical Capability
      9. IT Innovation Leadership
      10. Projects
      11. Work Orders
      12. IT Policies
      13. Requirements Gathering
      Source: Info-Tech Research Group, 2019 (N=224 organizations)

      Having an effective and timely service desk correlates with higher end-user satisfaction with all other IT services

      A double bar graph is depicted. The blue bar represents dissatisfied ender user, and the green bar represents satisfied end user. The bars show the average of dissatisfied and satisfied end users for service desk effectiveness and service desk timeliness.

      On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.

      Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.
      “Satisfied” organizations had average scores =8.“Dissatisfied" organizations had average scores “Dissatisfied" organizations had average scores =6. Source: Info-Tech Research Group, 2019 (N=18,500+ respondents from 75 organizations)

      Standardize the service desk the Info-Tech way to get measurable results

      More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.

      Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.

      "The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"

      - Rod Gula, IT Director

      American Realty Advisors

      Three circles are depicted. The top circle shows the sum of measured value dollar impact which is US$1,659,493.37. The middle circle shows the average measured value dollar impact which is US$19,755.87. The bottom circle shows the average measured value time saved which is 27 days.

      Info-Tech’s approach to service desk standardization focuses on building service management essentials

      This image depicts all of the phases and steps in this blueprint.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      This image depicts research that can be used to improve IT processes. Service Desk is circled to demonstrate which research is being used.

      The service desk is the foundation of all other service management processes.

      The image shows how the service desk is a foundation for other service management processes.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Standardize the Service Desk – project overview

      This image shows the project overview of this blueprint.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Project Summary

      Image of template.

      Service Desk Standard Operating Procedures

      Image of tool.

      Service Desk Maturity Assessment Tool

      Image of tool.

      Service Desk Implementation Roadmap

      Image of tool Incident, knowledge, and request management workflows

      Incident, knowledge, and request management workflows

      The project’s key deliverable is a service desk standard operating procedure

      Benefits of documented SOPs:

      Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).

      IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.

      Compliance: Compliance audits are more manageable because the documentation is already in place.

      Transparency: Visually documented processes answer the common business question of “why does that take so long?”

      Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.

      Impact of undocumented/undefined SOPs:

      Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff

      IT automation built on poorly defined, unoptimized processes leads to inconsistent results.

      Documenting SOPs to prepare for an audit becomes a major time-intensive project.

      Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.

      Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.

      Workshop Overview

      Image depicts workshop overview occurring over four days.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Phase 1

      Lay Service Desk Foundations

      Step 1.1:Assess current state

      Image shows the steps in phase 1. Highlight is on step 1.1

      This step will walk you through the following activities:

      • 1.1.1 Outline service desk challenges
      • 1.1.2 Assess the service desk maturity

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.

      Deliverables

      • Service Desk Maturity Assessment

      Standardizing the service desk benefits the whole business

      The image depicts 3 circles to represent the service desk foundations.

      Embrace standardization

      • Standardization prevents wasted energy on reinventing solutions to recurring issues.
      • Standardized processes are scalable so that process maturity increases with the size of your organization.

      Increase business satisfaction

      • Improve confidence that the service desk can meet service levels.
      • Create a single point of contact for incidents and requests and escalate quickly.
      • Analyze trends to forecast and meet shifting business requirements.

      Reduce recurring issues

      • Create tickets for every task and categorize them accurately.
      • Generate reliable data to support root-cause analysis.

      Increase efficiency and lower operating costs

      • Empower end users and technicians with a targeted knowledgebase (KB).
      • Cross-train to improve service consistency.

      Case Study: The CIO of Westminster College took stock of existing processes before moving to empower the “helpless desk”

      Scott Lowe helped a small staff of eight IT professionals formalize service desk processes and increase the amount of time available for projects.

      When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:

      • An unreliable network
      • Aging server replacements and no replacement plan
      • IT was the “department of no”
      • A help desk known as the “helpless desk”
      • A lack of wireless connectivity
      • Internet connection speed that was much too slow

      As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.

      The project load of IT staff increased, with new projects coming in every day.

      With a long project list, it became increasingly important to improve the transparency of project request and prioritization.

      Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.

      He addressed the infrastructure challenges in part by analyzing IT’s routine processes.

      Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.

      They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.

      Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.

      Common challenges experienced by service desk teams

      Unresolved issues

      • Tickets are not created for all incidents.
      • Tickets are lost or escalated to the wrong technicians.
      • Poor data impedes root-cause analysis of incidents.

      Lost resources/accountability

      • Lack of cross-training and knowledge sharing.
      • Lack of skills coverage for critical applications and services.
      • Time is wasted troubleshooting recurring issues.
      • Reports unavailable due to lack of data and poor categorization.

      High cost to resolve

      • Tier 2/3 resolve issues that should be resolved at tier 1.
      • Tier 2/3 often interrupt projects to focus on service support.

      Poor planning

      • Lack of data for effective trend analysis leads to poor demand planning.
      • Lack of data leads to lost opportunities for templating and automation.

      Low business satisfaction

      • Users are unable to get assistance with IT services quickly.
      • Users go to their favorite technician instead of using the service desk.

      Outline the organization’s service desk challenges

      1.1.1 Brainstorm service desk challenges

      Estimated Time: 45 minutes

      A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.

      B. Think about the following:

      • What have you heard from users? (e.g. slow response time)
      • What have you heard from executives? (e.g. poor communication)
      • What should you start doing? (e.g. documenting processes)
      • What should you stop doing? (e.g. work that is not being entered as tickets)

      C. Document challenges in the Service Desk Project Summary.

      Participants:

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Assess current service desk maturity to establish a baseline and create a plan for service desk improvement

      A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:

      1. Determine the current state of the service desk.
      2. Determine the desired state of the service desk.
      3. Build a practical path from current to desired state.
      Image depicts 2 circles and a box. The circle on the 1. left has assess current state. The circle on the right has 2. assess target state. The box has 3. build a roadmap.

      Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:

      1. Identify service desk pain points.
      2. Map each pain point to business services.
      3. Assign a broad business value to the resolution of each pain point.
      4. Map each pain point to a process.

      Expert Insight

      Image of expert.

      “How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”

      Rob England

      IT Consultant & Commentator

      Owner Two Hills

      Also known as The IT Skeptic

      Assess the process maturity of the service desk to determine which project phase and steps will bring the most value

      1.1.2 Measure which activity will have the greatest impact

      The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Project Summary.

      The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.

      Where do I find the data?

      Consult:

      • Service Manager
      • Service Desk Tools
      Image is the service desk tools.

      Step 1.2:Review service support best practices

      Image shows the steps in phase 1. Highlight is on step 1.2.

      This step will walk you through the following activities:

      1. 1.2.1 Identify roles and responsibilities in your organization
      2. 1.2.2 Map out the current and target structure of the service desk

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.

      Deliverables

      • Roles & responsibilities guide
      • Service desk structure

      Everyone in IT contributes to the success of service support

      Regardless of the service desk structure chosen to meet an organization’s service support requirements, IT staff should not doubt the role they play in service support.

      If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.

      Service Support Engagement Plan

      • Identify who is accountable for different service support processes.
      • Outline the different responsibilities of service desk agents at tier 1, tier 2, and tier 3 in meeting service-level agreements for service support.
      • Draft operational-level agreements between specialty groups and the service desk to improve accountability.
      • Configure the service desk tool to ensure ticket visibility and ownership across queues.
      • Engage tier 2 and tier 3 resources in building workflows for incident management, request fulfilment, and writing knowledgebase articles.
      • Emphasize the benefits of cooperation across IT silos:
        • Better customer service and end-user satisfaction.
        • Shorter time to resolve incidents and implement requests.
        • A higher tier 1 resolution rate, more efficient escalations, and fewer interruptions from project work.

      Info-Tech Insight

      Specialists tend to distance themselves from service support as they progress through their career to focus on projects.

      However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.

      Clear project complications by leveraging roles and responsibilities

      R

      Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.

      A

      Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.

      C

      Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.

      I

      Informed: People who receive information about process execution and quality and need to stay informed regarding the task.

      A RACI analysis is helpful with the following:

      • Workload Balancing: Allowing responsibilities to be distributed effectively between functional teams and individuals.
      • Change Management: Ensuring key functions and processes are not overlooked during organizational changes.
      • Onboarding: New employees can identify their own roles and responsibilities.

      A RACI chart outlines which positions are Responsible, Accountable, Consulted, and Informed

      Image shows example of RACI chart

      Create a list of roles and responsibilities in your organization

      1.2.1 Create RACI matrix to define responsibilities

      1. Use the Service Desk Roles and Responsibilities Guidefor a better understanding of the roles and responsibilities of different service desk tiers.
      2. In the RACI chart, replace the top row with specific roles in your organization.
      3. Modify or expand the process tasks, as needed, in the left column.
      4. For each role, identify the responsibility values that the person brings to the service desk. Fill out each column.
      5. Document in the Service Desk SOP. Schedule a time to share the results with organization leads.
      6. Distribute the chart between all teams in your organization.

      Notes:

      • Assign one Accountable for each task.
      • Have at least one Responsible for each task.
      • Avoid generic responsibilities, such as “team meetings.”
      • Keep your RACI definitions in your documents, as they are sometimes tough to remember.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Roles and Responsibilities Guide
      • Flip Chart
      • Whiteboard

      Build a tiered generalist service desk to optimize costs

      A tiered generalist service desk with a first-tier resolution rate greater than 60% has the best operating cost and customer satisfaction of all competing service desk structural models.

      Image depicts a tiered generalist service desk example. It shows a flow from users to tier 1 and to tiers 2 and 3.

      The success of a tiered generalist model depends on standardized, defined processes

      Image lists the processes and benefits of a successful tiered generalist service desk.

      Define the structure of the service desk

      1.2.2 Map out the current and target structure of the service desk

      Estimated Time: 45 minutes

      Instructions:

      1. Using the model from the previous slides as a guide, discuss how closely it matches the current service desk structure.
      2. Map out a similar diagram of your existing service desk structure, intake channels, and escalation paths.
      3. Review the structure and discuss any changes that could be made to improve efficiency. Revise as needed.
      4. Document the outcome in the Service Desk Project Summary.

      Image depicts a tiered generalist service desk example. It shows a flow from users to tier 1 and to tiers 2 and 3.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Use a shift-left strategy to lower service support costs, reduce time to resolve, and improve end-user satisfaction

      Shift-left strategy:

      • Shift service support tasks from specialists to generalists.
      • Implement self-service.
      • Automate incident resolution.
      Image shows the incident and service request resolution in a graph. It includes metrics of cost per ticket, average time to resolve, and end-user satisfaction.

      Work through the implications of adopting a shift-left strategy

      Overview:

      Identify process gaps that you need to fill to support the shift-left strategy and discuss how you could adopt or improve the shift-left strategy, using the discussion questions below as a guide.

      Which process gaps do you need to fill to identify ticket trends?

      • What are your most common incidents and service requests?
      • Which tickets could be resolved at tier 1?
      • Which tickets could be resolved as self-service tickets?
      • Which tickets could be automated?

      Which processes do you most need to improve to support a shift-left strategy?

      • Which incident and request processes are well documented?
      • Do you have recurring tickets that could be automated?
      • What is the state of your knowledgebase maintenance process?
      • Which articles do you most need to support tier 1 resolution?
      • What is the state of your web portal? How could it be improved to support self-service?

      Document in the Project Summary

      Step 1.3: Identify service desk metrics and reports

      Image shows the steps in phase 1. Highlight is on step 1.3.

      This step will walk you through the following activities:

      • 1.3 Create a list of required reports to identify relevant metrics

      This step involves the following participants:

      • Project Sponsor
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Managers and analysts will have service desk metrics and reports that help set expectations and communicate service desk performance.

      Deliverables

      • A list of service desk performance metrics and reports

      Engage business unit leaders with data to appreciate needs

      Service desk reports are an opportunity to communicate the story of IT and collect stakeholder feedback. Interview business unit leaders and look for opportunities to improve IT services.

      Start with the following questions:

      • What are you hearing from your team about working with IT?
      • What are the issues that are contributing to productivity losses?
      • What are the workarounds your team does because something isn’t working?
      • Are you able to access the information you need?

      Work with business unit leaders to develop an action plan.

      Remember to communicate what you do to address stakeholder grievances.

      The service recovery paradox is a situation in which end users think more highly of IT after the organization has corrected a problem with their service compared to how they would regard the company if the service had not been faulty in the first place.

      The point is that addressing issues (and being seen to address issues) will significantly improve end-user satisfaction. Communicate that you’re listening and acting, and you should see satisfaction improve.

      Info-Tech Insight

      Presentation is everything:

      If you are presenting outside of IT, or using operational metrics to create strategic information, be prepared to:

      • Discuss trends.
      • Identify organizational and departmental impacts.
      • Assess IT costs and productivity.

      For example, “Number of incidents with ERP system has decreased by 5% after our last patch release. We are working on the next set of changes and expect the issues to continue to decrease.”

      Engage technicians to ensure they input quality data in the service desk tool

      You need better data to address problems. Communicate to the technical team what you need from them and how their efforts contribute to the usefulness of reports.

      Tickets MUST:

      • Be created for all incidents and service requests.
      • Be categorized correctly, and categories updated when the ticket is resolved.
      • Be closed after the incidents and service requests are resolved or implemented.

      Emphasize that reports are analyzed regularly and used to manage costs, improve services, and request more resources.

      Info-Tech Insight

      Service Desk Manager: Technical staff can help themselves analyze the backlog and improve service metrics if they’re looking at the right information. Ensure their service desk dashboards are helping them identify high-priority and quick-win tickets and anticipate potential SLA breaches.

      Produce service desk reports targeted to improve IT services

      Use metrics and reports to tell the story of IT.

      Metrics should be tied to business requirements and show how well IT is meeting those requirements and where obstacles exist.

      Tailor metrics and reports to specific stakeholders.

      Technicians require mostly real-time information in the form of a dashboard, providing visibility into a prioritized list of tickets for which they are responsible.

      Supervisors need tactical information to manage the team and set client expectations as well as track and meet strategic goals.

      Managers and executives need summary information that supports strategic goals. Start by looking at executive goals for the support team and then working through some of the more tactical data that will help support those goals.

      One metric doesn’t give you the whole picture

      • Don’t put too much emphasis on a single metric. At best, it will give you a distorted picture of your service desk performance. At worst, it will distort the behavior of your agents as they may adopt poor practices to meet the metric.
      • The solution is to use tension metrics: metrics that work together to give you a better sense of the state of operations.
      • Tension metrics ensure a balanced focus toward shared goals.

      Example:

      First-call resolution (FCR), end-user satisfaction, and number of tickets reopened all work together to give you a complete picture. As FCR goes up, so should end-user satisfaction, as number of tickets re-opened stays steady or declines. If the three metrics are heading in different directions, then you know you have a problem.

      Rely on internal metrics to measure and improve performance

      External metrics provide useful context, but they represent broad generalizations across different industries and organizations of different sizes. Internal metrics measured annually are more reliable.

      Internal metrics provide you with information about your actual performance. With the right continual improvement process, you can improve those metrics year over year, which is a better measure of the performance of your service desk.

      Whether a given metric is the right one for your service desk will depend on several different factors, not the least of which include:

      • The maturity of your service desk processes.
      • Your ticket volume.
      • The complexity of your tickets.
      • The degree to which your end users are comfortable with self-service.

      Info-Tech Insight

      Take external metrics with a grain of salt. Most benchmarks represent what service desks do across different industries, not what they should do. There also might be significant differences between different industries in terms of the kinds of tickets they deal with, differences which the overall average obscures.

      Use key service desk metrics to build a business case for service support improvements

      The right metrics can tell the business how hard IT works and how many resources it needs to perform:

      1. End-User Satisfactions:
        • The most important metric for measuring the perceived value of the service desk. Determine this based on a robust annual satisfaction survey of end users and transactional satisfaction surveys sent with a percentage of tickets.
      2. Ticket Volume and Cost per Ticket:
        • A key indicator of service desk efficiency, computed as the monthly operating expense divided by the average ticket volume per month.
      3. First-Contact Resolution Rate:
        • The biggest driver of end-user satisfaction. Depending on the kind of tickets you deal with, you can measure first-contact, first-tier, or first-day resolution.
      4. Average Time to Resolve (Incident) or Fulfill (Service Requests):
        • An assessment of the service desk's ability to resolve tickets effectively, measuring the time elapsed between the moment the ticket status is set to “open” and the moment it is set to “resolved.”

      Info-Tech Insight

      Metrics should be tied to business requirements. They tell the story of how well IT is meeting those requirements and help identify when obstacles get in the way. The latter can be done by pointing to discrepancies between the internal metrics you expected to reach but didn’t and external metrics you trust.

      Use service desk metrics to track progress toward strategic, operational, and tactical goals

      Image depicts a chart to show the various metrics in terms of strategic goals, tactical goals, and operational goals.

      Cost per ticket and customer satisfaction are the foundation metrics of service support

      Ultimately, everything boils down to cost containment (measured by cost per ticket) and quality of service (measured by customer satisfaction).

      Cost per ticket is a measure of the efficiency of service support:

      • A higher than average cost per ticket is not necessarily a bad thing, particularly if accompanied by higher-than-average quality levels.
      • Conversely, a low cost per ticket is not necessarily good, particularly if the low cost is achieved by sacrificing quality of service.

      Cost per ticket is the total monthly operating expense of the service desk divided by the monthly ticket volume. Operating expense includes the following components:

      • Salaries and benefits for desktop support technicians
      • Salaries and benefits for indirect personnel (team leads, supervisors, workforce schedulers, dispatchers, QA/QC personnel, trainers, and managers)
      • Technology expense (e.g. computers, software licensing fees)
      • Telecommunications expenses
      • Facilities expenses (e.g. office space, utilities, insurance)
      • Travel, training, and office supplies
      Image displays a pie chart that shows the various service desk costs.

      Create a list of required reports to identify metrics to track

      1.3.1 Start by identifying the reports you need, then identify the metrics that produce them

      1. Answer the following questions to determine the data your reports require:
        • What strategic initiatives do you need to track?
          • Example: reducing mean time to resolve, meeting SLAs
        • What operational areas need attention?
          • Example: recurring issues that need a permanent resolution
        • What kind of issues do you want to solve?
          • Example: automate tasks such as password reset or software distribution
        • What decisions or processes are held up due to lack of information?
          • Example: need to build a business case to justify infrastructure upgrades
        • How can the data be used to improve services to the business?
          • Example: recurring issues by department
      2. Document report and metrics requirements in Service Desk SOP.
      3. Provide the list to your tool administrator to create reports with auto-distribution.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Step 1.4: Review ticket handling procedures

      Image shows the steps in phase 1. Highlight is on step 1.4.

      This step will walk you through the following activities:

      • 1.4.1 Review ticket handling practices
      • 1.4.2 Identify opportunities to automate ticket creation and reduce recurring tickets

      This step involves the following participants:

      • Project Sponsor
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Managers and analysts will have best practices for ticket handling and troubleshooting to support ITSM data quality and improve first-tier resolution.

      DELIVERABLES

      • List of ticket templates and recurring tickets
      • Ticket and Call QA Template and ticket handling best practices

      Start by reviewing the incident intake process to find opportunities for improvement

      If end users are avoiding your service desk, you may have an intake problem. Create alternative ways for users to seek help to manage the volume; keep in mind not every request is an emergency.

      Image shows the various intake channels and the recommendation.

      Identify opportunities for improvement in your ticket channels

      The two most efficient intake channels should be encouraged for the majority of tickets.

      • Build a self-service portal.
        • Do users know where to find the portal?
        • How many tickets are created through the portal?
        • Is the interface easy to use?
      • Deal efficiently with email.
        • How quickly are messages picked up?
        • Are they manually transferred to a ticket or does the service desk tool automatically create a ticket?

      The two most traditional and fastest methods to get help must deal with emergencies and escalation effectively.

      • Phone should be the fastest way to get help for emergencies.
        • Are enough agents answering calls?
        • Are voicemails picked up on time?
        • Are the automated call routing prompts clear and concise?
      • Are walk-ins permitted and formalized?
        • Do you always have someone at the desk?
        • Is your equipment secure?
        • Are walk-ins common because no one picks up the phone or is the traffic as you’d expect?

      Ensure technicians create tickets for all incidents and requests

      Why Collect Ticket Data?

      If many tickets are missing, help service support staff understand the need to collect the data. Reports will be inaccurate and meaningless if quality data isn’t entered into the ticketing system.

      Image shows example of ticket data

      Set ticket handling expectations to drive a consistent process

      Set expectations:

      • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
      • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along to the next technician.
      • Update user of ETA if issue cannot be resolved quickly.
      • Ticket templates for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
      • Update categories to reflect the actual issue and resolution.
      • Reference or link to the knowledgebase article as the documented steps taken to resolve the incident.
      • Validate incident is resolved with client; automate this process with ticket closure after a certain time.
      • Close or resolve the ticket on time.

      Use the Ticket and Call Quality Assessment Tool to improve the quality of service desk data

      Build a process to check-in on ticket and call quality monthly

      Better data leads to better decisions. Use the Ticket and Call Quality Assessment Toolto check-in on the ticket and call quality monthly for each technician and improve service desk data quality.

      1. Fill tab 1 with technician’s name.
      2. Use either tab 2 (auto-scoring) or tab 3 (manual scoring) to score the agent. The assessment includes ticket evaluation, call evaluation, and overall metric.
      3. Record the results of each review in the score summary of tab 1.
      Image shows tool.

      Use ticket templates to make ticket creation, updating, and resolution more efficient

      A screenshot of the Ticket and Call Quality Assessment Tool

      Implement measures to improve ticket handling and identify ticket template candidates

      1.4.1 Identify opportunities to automate ticket creation

      1. Poll the team and discuss.
        • How many members of the team are not creating tickets? Why?
        • How can we address those barriers?
        • What are the expectations of management?
      2. Brainstorm five to ten good candidates for ticket templates.
        • What data can auto-fill?
        • What will help process the ticket faster?
        • What automations can we build to ensure a fast, consistent service?
        • Note:
          • Ticket template name
          • Information that will auto-fill from AD and other applications
          • Categories and resolution codes
          • Automated routing and email responses
      3. Document ticket template candidates in the Service Desk Roadmap to capture the actions.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You'll Needs

      • Flip Chart
      • Whiteboard

      Phase 2

      Design Incident Management Processes

      Step 2.1: Build incident management workflows

      Image shows the steps in phase 2. Highlight is on step 2.1.

      This step will walk you through the following activities:

      • 2.1.1 Review incident management challenges
      • 2.1.2 Define the incident management workflow
      • 2.1.3 Define the critical incident management workflow
      • 2.1.4 Design critical incident communication plan

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Workflows for incident management and critical incident management will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.

      DELIVERABLES

      • Incident management workflows
      • Critical incident management workflows
      • Critical incident communication plan

      Communicate the great incident resolution work that you do to improve end-user satisfaction

      End users think more highly of IT after the organization has corrected a problem with their service than they would have had the service not been faulty in the first place.

      Image displays a graph to show the service recovery paradox

      Info-Tech Insight

      Use the service recovery paradox to your advantage. Address service desk challenges explicitly, develop incident management processes that get services back online quickly, and communicate the changes.

      If you show that the service desk recovered well from the challenges end users raised, you will get greater loyalty from them.

      Assign incident roles and responsibilities to promote accountability

      The role of an incident coordinator or manager can be assigned to anyone inside the service desk that has a strong knowledge of incident resolution, attention to detail, and knows how to herd cats.

      In organizations with high ticket volumes, a separate role may be necessary.

      Everyone must recognize that incident management is a cross-IT organization process and it does not have to be a unique service desk process.

      An incident coordinator is responsible for:

      • Improving incident management processes.
      • Tracking metrics and producing reports.
      • Developing and maintaining the incident management system.
      • Developing and maintaining critical incident processes.
      • Ensuring the service support team follows the incident management process.
      • Gathering post-mortem information from the various technical resources on root cause for critical or severity 1 incidents.

      The Director of IT Services invested in incident management to improve responsiveness and set end-user expectations

      Practitioner Insight

      Ben Rodrigues developed a progressive plan to create a responsive, service-oriented culture for the service support organization.

      "When I joined the organization, there wasn’t a service desk. People just phoned, emailed, maybe left [sticky] notes for who they thought in IT would resolve it. There wasn’t a lot of investment in developing clear processes. It was ‘Let’s call somebody in IT.’

      I set up the service desk to clarify what we would do for end users and to establish some SLAs.

      I didn’t commit to service levels right away. I needed to see how many resources and what skill sets I would need. I started by drafting some SLA targets and plugging them into our tracking application. I then monitored how we did on certain things and established if we needed other skill sets. Then I communicated those SOPs to the business, so that ‘if you have an issue, this is where you go, and this is how you do it,’ and then shared those KPIs with them.

      I had monthly meetings with different function heads to say, ‘this is what I see your guys calling me about,’ and we worked on something together to make some of the pain disappear."

      -Ben Rodrigues

      Director, IT Services

      Gamma Dynacare

      Sketch out incident management challenges to focus improvements

      Common Incident Management Challenges

      End Users

      • No faith in the service desk beyond speaking with their favorite technician.
      • No expectations for response or resolution time.
      • Non-IT staff are disrupted as people ask their colleagues for IT advice.

      Technicians

      • No one manages and escalates incidents.
      • Incidents are unnecessarily urgent and more likely to have a greater impact.
      • Agents are flooded with requests to do routine tasks during desk visits.
      • Specialist support staff are subject to constant interruptions.
      • Tickets are lost, incomplete, or escalated incorrectly.
      • Incidents are resolved from scratch rather than referring to existing solutions.

      Managers

      • Tickets are incomplete or lack historical information to address complaints.
      • Tickets in system don’t match the perceived workload.
      • Unable to gather data for budgeting or business analysis.

      Info-Tech Insight

      Consistent incident management processes will improve end-user satisfaction with all other IT services.

      However, be prepared to overcome these common obstacles as you put the process in place, including:

      • Absence of management or staff commitment.
      • Lack of clarity on organizational needs.
      • Outdated work practices.
      • Poorly defined service desk goals and responsibilities.
      • Lack of a reliable knowledgebase.
      • Inadequate training.
      • Resistance to change.

      Prepare to implement or improve incident management

      2.1.1 Review incident management challenges and metrics

      1. Review your incident management challenges and the benefits of addressing them.
      2. Review the level of service you are providing with the current resources. Define clear goals and deliverables for the improvement initiative.
      3. Decide how the incident management process will interface with the service desk. Who will take on the responsibility for resolving incidents? Specifically, who will:
        • Log incidents.
        • Perform initial incident troubleshooting.
        • Own and monitor tickets.
        • Communicate with end users.
        • Update records with the resolution.
        • Close incidents.
        • Implement next steps (e.g. initiate problem management).
      4. Document recommendations and the incident management process requirements in the Service Desk SOP.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Distinguish between different kinds of tickets for better SLAs

      Different ticket types are associated with radically different prioritization, routing, and service levels. For instance, most incidents are resolved within a business day, but requests take longer to implement.

      If you fail to distinguish between ticket types, your metrics will obscure service desk performance.

      Common Service Desk Tickets

      • Incidents
        • An unanticipated interruption of a service.
          • The goal of incident management is to restore the service as soon as possible, even if the resolution involves a workaround.
      • Problems
        • The root cause of several incidents.
          • The goal of problem management is to detect the root cause and provide long-term resolution and prevention.
      • Requests
        • A generic description for small changes or service access
          • Requests are small, frequent, and low risk. They are best handled by a process distinct from incident, change, and project management.
      • Changes
        • Modification or removal of anything that could influence IT services.
          • The scope includes significant changes to architectures, processes, tools, metrics, and documentation.

      Info-Tech Insight

      Organizations sometimes mistakenly classify small projects as service requests, which can compromise your data, resulting in a negative impact to the perceived value of the service desk.

      Separate incidents and service requests for increased customer service and better-defined SLAs

      Defining the differences between service requests and incidents is not just for reporting purposes. It also has a major impact on how service is delivered.

      Incidents are unexpected disruptions to normal business processes and require attempts to restore services as soon as possible (e.g. the printer is not working).

      Service requests are tasks that don’t involve something that is broken or has an immediate impact on services. They do not require immediate resolution and can typically be scheduled (e.g. new software).

      Image shows a chart on incidents and service requests.

      Focus on the big picture first to capture and streamline how your organization resolves incidents

      Image displays a flow chart to show how to organize resolving incidents.

      Document your incident management workflow to identify opportunities for improvement

      Image shows a flow cart on how to organize incident management.

      Workflow should include:

      • Ticket creation and closure
      • Triage
      • Troubleshooting
      • Escalations
      • Communications
      • Change management
      • Documentation
      • Vendor escalations

      Notes:

      • Notification and alerts should be used to set or reset expectations on delivery or resolution
      • Identify all the steps where a customer is informed and ensure we are not over or under communicating

      Collaborate to define each step of the incident management workflow

      2.1.2 Define the incident management workflow

      Estimated Time: 60 minutes

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Engage the team in refining the process workflow.
      4. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the Service Desk SOP.

      Participants

      • Service Manager
      • Service Desk Support
      • Applications or Infrastructure Support

      What You’ll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP
      • Project Summary

      Formalize the process for critical incident management to reduce organizational impact

      Discuss these elements to see how the organization will handle them.

      • Communication plan:
        • Who communicates with end users?
        • Who communicates with the executive team?
      • It’s important to separate the role of the technician trying to solve a problem with the need to communicate progress.
      • Change management:
      • Define a separate process for regular and emergency change management to ensure changes are timely and appropriate.
      • Business continuity plan:
      • Identify criteria to decide when a business continuity plan (BCP) must be implemented during a critical incident to minimize the business impact of the incident.
      • Post-mortems:
      • Formalize the process of discussing and documenting lessons learned, understanding outstanding issues, and addressing the root cause of incidents.
      • Source of incident notification:
      • Does the process change if users notify the service desk of an issue or if the systems management tools alert technicians?

      Critical incidents are high-impact, high-urgency events that put the effectiveness and timeliness of the service desk center stage.

      Build a workflow that focuses on quickly bringing together the right people to resolve the incident and reduces the chances of recurrence.

      Document your critical incident management workflow to identify opportunities for improvement

      Image shows a flow cart on how to organize critical incident management.

      Workflow should include:

      • Ticket creation and closure
      • Triage
      • Troubleshooting
      • Escalations
      • Communications plan
      • Change management
      • Disaster recovery or business continuity plan
      • Documentation
      • Vendor escalations
      • Post-mortem

      Collaborate to define each step of the critical incident management workflow

      2.1.3 Define the critical incident management workflow

      Estimated Time: 60 minutes

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Engage the team in refining the process workflow.
      4. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the Service Desk SOP.

      Participants

      • Service Manager
      • Service Desk Support
      • Applications or Infrastructure Support

      What You’ll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP

      Establish a critical incident management communication plan

      When it comes to communicating during major incidents, it’s important to get the information just right. Users don’t want too little, they don’t want too much, they just want what’s relevant to them, and they want that information at the right time.

      As an IT professional, you may not have a background in communications, but it becomes an important part of your job. Broad guidelines for good communication during a critical incident are:

      1. Communicate as broadly as the impact of your incident requires.
      2. Communicate as much detail as a specific audience requires, but no more than necessary.
      3. Communicate as far ahead of impact as possible.

      Why does communication matter?

      Sending the wrong message, at the wrong time, to the wrong stakeholders, can result in:

      • Drop in customer satisfaction.
      • Wasted time and resources from multiple customers contacting you with the same issue.
      • Dissatisfied executives kept in the dark.
      • Increased resolution time if the relevant providers and IT staff are not informed soon enough to help.

      Info-Tech Insight

      End users understand that sometimes things break. What’s important to them is that (1) you don’t repeatedly have the same problem, (2) you keep them informed, and (3) you give them enough notice when their systems will be impacted and when service will be returned.

      Automate communication to save time and deliver consistent messaging to the right stakeholders

      In the middle of resolving a critical incident, the last thing you have time for is worrying about crafting a good message. Create a series of templates to save time by providing automated, tailored messages for each stage of the process that can be quickly altered and sent out to the right stakeholders.

      Once templates are in place, when the incident occurs, it’s simply a matter of:

      1. Choosing the relevant template.
      2. Updating recipients and messaging if necessary.
      3. Adding specific, relevant data and fields.
      4. Sending the message.

      When to communicate?

      Tell users the information they need to know when they need to know it. If a user is directly impacted, tell them that. If the incident does not directly affect the user, the communication may lead to decreased customer satisfaction or failure to pay attention to future relevant messaging.

      What to say?

      • Keep messaging short and to the point.
      • Only say what you know for sure.
      • Provide only the details the audience needs to know to take any necessary action or steps on their side and no more. There’s no need to provide details on the reason for the failure before it’s resolved, though this can be done after resolution and restoration of service.

      You’ll need distinct messages for distinct audiences. For example:

      • To incident resolvers: “Servers X through Y in ABC Location are failing intermittently. Please test the servers and all the connections to determine the exact cause so we can take corrective action ASAP.”
      • To the IT department head: “Servers X through Y in ABC Location are failing intermittently. We are beginning tests. We will let you know when we have determined the exact cause and can give you an estimated completion time.”
      • To executives: “We’re having an issue with some servers at ABC Location. We are testing to determine the cause and will let you know the estimated completion time as soon as possible.”
      • To end users: “We are experience some service issues. We are working on a resolution diligently and will restore service as soon as possible.”

      Map out who will need to be contacted in the event of a critical incident

      2.1.4 Design the critical incident communication plan

      • Identify critical incidents that require communication.
      • Identify stakeholders who will need to be informed about each incident.
      • For each audience, determine:
        1. Frequency of communication
        2. Content of communication
      Use the sample template to the right as an example.

      Some questions to assist you:

      • Whose work will be interrupted, either by their services going down or by their workers having to drop everything to solve the incident?
      • What would happen if we didn’t notify this person?
      • What level of detail do they need?
      • How often would they want to be updated?
      Document outcomes in the Service Desk SOP. Image shows template of unplanned service outage.

      Measure and improve customer satisfaction with the use of relationship and transactional surveys

      Customer experience programs with a combination of relationship and transactional surveys tend to be more effective. Merging the two will give a wholistic picture of the customer experience.

      Relationship Surveys

      Relationship surveys focus on obtaining feedback on the overall customer experience.

      • Inform how well you are doing or where you need improvement in the broad services provided.
      • Provide a high-level perspective on the relationship between the business and IT.
      • Help with strategic improvement decisions.
      • Should be sent over a duration of time and to the entire customer base after they’ve had time to experience all the services provided by the service desk. This can be done as frequently as per quarter or on a yearly basis.
      • E.g. An annual satisfaction survey such as Info-Tech’s End User Satisfaction Diagnostic.

      Transactional Surveys

      Transactional surveys are tied to a specific interaction or transaction your end users have with a specific product or service.

      • Help with tactical improvement decisions.
      • Questions should point to a specific interaction.
      • Usually only a few questions that are quick and easy to complete following the transaction.
      • Since transactional surveys allow you to improve individual relationships, they should be sent shortly after the interaction with the service desk has occurred.
      • E.g. How satisfied are you with the way your ticket was resolved?

      Add transactional end-user surveys at ticket close to escalate unsatisfactory results

      A simple quantitative survey at the closing of a ticket can inform the service desk manager of any issues that were not resolved to the end user’s satisfaction. Take advantage of workflows to escalate poor results immediately for quick follow-up.

      Image shows example of survey question with rating.

      If a more complex survey is required, you may wish to include some of these questions:

      Please rate your overall satisfaction with the way your issue was handled (1=unsatisfactory, 5=fantastic)

      • The professionalism of the analyst.
      • The technical skills or knowledge of the analyst.
      • The timeliness of the service provided.
      • The overall service experience.

      Add an open-ended, qualitative question to put the number in context, and solicit critical feedback:

      What could the service desk have done to improve your experience?

      Define a process to respond to both negative and positive feedback

      Successful customer satisfaction programs respond effectively to both positive and negative outcomes. Late or lack of responses to negative comments may increase customer frustration, while not responding at all to the positive comments may give the perception of indifference. If customers are taking the time to fill out the survey, good or bad, they should be followed up with

      Take these steps to handle survey feedback:

      1. Assign resources to receive, read, and track responses. The entire team doesn’t need to receive every response, while a single resource may not have capacity to respond in a timely manner. Decide what makes the most sense in your environment.
      2. Respond to negative feedback: It may not be possible to respond to every customer that fills out a survey. Set guidelines for responding to negative surveys with no details on the issue; don’t spend time guessing why they were upset, simply ask the user why they were unsatisfied. The critical piece of taking advantage of the service recovery paradox is in the follow-up to the customer.
      3. Investigate and improve: Make sure you investigate the issue to ensure that it is a justified complaint or whether the issue is a symptom of another issue’s root cause. Identify remediation steps to ensure the issue does not repeat itself, and then communicate to the customer the action you have taken to improve.
      4. Act on positive feedback as well: If it’s easy for customers to provide feedback, then make room in your process for handling the positive results. Appreciate the time and effort your customers take to give kudos and use it as a tool to build a long-term relationship with that user. Saying thank you goes a long way and when customers know their time matters, they will be encouraged to fill out those surveys. This is also a good way to show what a great job the service desk team did with the interaction.

      Analyze survey feedback month over month to complement and justify metric results already in place

      When you combine the tracking and analysis of relationship and transactional survey data you will be able to dive into specific issues, identify trends and patterns, assess impact to users, and build a plan to make improvements.

      Once the survey data is centralized, categorized, and available you can start to focus on metrics. At a minimum, for transactional surveys, consider tracking:

      • Breakdown of satisfaction scores with trends over time
      • Unsatisfactory surveys that are related to incidents and service requests
      • Total surveys that have been actioned vs pending

      For relationship surveys, consider tracking:

      • Satisfaction scores by department and seniority level
      • Satisfaction with IT services, applications, and communication
      • Satisfaction with IT’s business enablement

      Scores of overall satisfaction with IT

      Image Source: Info-Tech End User Satisfaction Report

      Prioritize company-wide improvement initiatives by those that have the biggest impact to the entire customer base first and then communicate the plan to the organization using a variety of communication channels that will draw your customers in, e.g. dashboards, newsletters, email alerts.

      Info-Tech Insight

      Consider automating or using your ITSM notification system as a direct communication method to inform the service desk manager of negative survey results.

      Step 2.2: Design ticket categorization

      Image shows the steps in phase 2. Highlight is on step 2.2

      This step will walk you through the following activities:

      • 2.2.1 Assess ticket categorization
      • 2.2.2 Enhance ticket categories with resolution and status codes

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The reviewed ticket categorization scheme will be easier to use and deploy more consistently, which will improve the categorization of data and the reliability of reports.

      DELIVERABLES

      • Optimized ticket categorization

      Design a ticket classification scheme to produce useful reports

      Reliable reports depend on an effective categorization scheme.

      Too many options cause confusion; too few options provide little value. As you build the classification scheme over the next few slides, let call routing and reporting requirements be your guide.

      Effective classification schemes are concise, easy to use correctly, and easy to maintain.

      Image shows example of a ticket classification scheme.

      Keep these guidelines in mind:

      • A good categorization scheme is exhaustive and mutually exclusive: there’s a place for every ticket and every ticket fits in only one place.
      • As you build your classification scheme, ensure the categories describe the actual asset or service involved based on final resolution, not how it was reported initially.
      • Pre-populate ticket templates with relevant categories to dramatically improve reporting and routing accuracy.
      • Use a tiered system to make the categories easier to navigate. Three tiers with 6-8 categories per tier provides up to 512 sub-categories, which should be enough for the most ambitious team.
      • Track only what you will use for reporting purposes. If you don’t need a report on individual kinds of laptops, don’t create a category beyond “laptops.”
      • Avoid “miscellaneous” categories. A large portion of your tickets will eventually end up there.

      Info-Tech Insight

      Don’t do it alone! Collaborate with managers in the specialized IT groups responsible for root-cause analysis to develop a categorization scheme that makes sense for them.

      The first approach to categorization breaks down the IT portfolio into asset types

      WHY SHOULD I START WITH ASSETS?

      Start with asset types if asset management and configuration management processes figure prominently in your practice or on your service management implementation roadmap.

      Image displays example of asset types and how to categorize them.

      Building the Categories

      Ask these questions:

      • Type: What kind of asset am I working on?
      • Category: What general asset group am I working on?
      • Subcategory: What particular asset am I working on?

      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.

      Info-Tech Insight

      Think about how you will use the data to determine which components need to be included in reports. If components won’t be used for reporting, routing, or warranty, reporting down to the component level adds little value.

      The second approach to categorization breaks down the IT portfolio into types of services

      WHY SHOULD I START WITH SERVICES?

      Start with asset services if service management generally figures prominently in your practice, especially service catalog management.

      Image displays example of service types and how to categorize them.

      Building the Categories

      Ask these questions:

      • Type: What kind of service am I working on?
      • Category: What general service group am I working on?
      • Subcategory: What particular service am I working on?

      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.

      Info-Tech Insight

      Remember, ticket categories are not your only source of reports. Enhance the classification scheme with resolution and status codes for more granular reporting.

      Improve the categorization scheme to enhance routing and reporting

      2.2.1 Assess whether the service desk can improve its ticket categorization

      1. As a group, review existing categories, looking for duplicates and designations that won’t affect ticket routing. Reconcile duplicates and remove non-essential categories.
      2. As a group, re-do the categories, ensuring that the new categorization scheme will meet the reporting requirements outlined earlier.
        • Are categories exhaustive and mutually exclusive?
        • Is the tier simple and easy to use (i.e. 3 tiers x 8 categories)?
      3. Test against recent tickets to ensure you have the right categories.
      4. Record the ticket categorization scheme in the Service Desk Ticket Categorization Schemes template.

      A screenshot of the Service Desk Ticket Categorization Schemes template.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Flip Chart
      • Whiteboard
      • Service Desk Ticket Categorization Scheme

      Enhance the classification scheme with resolution and status codes for more granular reporting

      Resolution codes differ from detailed resolution notes.

      • A resolution code is a field within the ticketing system that should be updated at ticket close to categorize the primary way the ticket was resolved.
      • This is important for reporting purposes as it adds another level to the categorization scheme and can help you identify knowledgebase article candidates, training needs, or problems.

      Ticket statuses are a helpful field for both IT and end users to identify the current status of the ticket and to initiate workflows.

      • The most common statuses are open, pending/in progress, resolved, and closed (note the difference between resolved and closed).
      • Waiting on user or waiting on vendor are also helpful statuses to stop the clock when awaiting further information or input.

      Common Examples:

      Resolution Codes

      • How to/training
      • Configuration change
      • Upgrade
      • Installation
      • Data import/export/change
      • Information/research
      • Reboot

      Status Fields

      • Declined
      • Open
      • Closed
      • Waiting on user
      • Waiting on vendor
      • Reopened by user

      Identify and document resolution and status codes

      2.2.2 Enhance ticket categories with resolution codes

      Discuss:

      • How can we use resolution information to enhance reporting?
      • Are current status fields telling the right story?
      • Are there other requirements like project linking?

      Draft:

      1. Write out proposed resolution codes and status fields and critically assess their value.
      2. Resolutions can be further broken down by incident and service request if desired.
      3. Test resolution codes against a few recent tickets.
      4. Record the ticket categorization scheme in the Service Desk SOP.

      Participants

      • CIO
      • Service Desk Manager
      • Service Desk Technician(s)

      What You’ll Need

      • Whiteboard or Flip Chart
      • Markers

      Step 2.3: Design incident escalation and prioritization

      Image shows the steps in phase 2. Highlight is on step 2.3.

      This step will walk you through the following activities:

      • 2.3.1 Build a small number of rules to facilitate prioritization
      • 2.3.2 Define escalation rules
      • 2.3.3 Define automated escalations
      • 2.3.4 Provide guidance to each tier around escalation steps and times

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The reviewed ticket escalation and prioritization will streamline queue management, improve the quality of escalations, and ensure agents work on the right tickets at the right time.

      DELIVERABLES

      • Optimized ticket prioritization scheme
      • Guidelines for ticket escalations
      • List of automatic escalations

      Build a ticket prioritization matrix to make escalation assessment less subjective

      Most IT leaders agree that prioritization is one of the most difficult aspects of IT in general. Set priorities based on business needs first.

      Mission-critical systems or problems that affect many people should always come first (i.e. Severity Level 1).

      The bulk of reported problems, however, are often individual problems with desktop PCs (i.e. Severity Level 3 or 4).

      Some questions to consider when deciding on problem severity include:

      • How is productivity affected?
      • How many users are affected?
      • How many systems are affected?
      • How critical are the affected systems to the organization?

      Decide how many severity levels the organization needs the service desk to have. Four levels of severity are ideal for most organizations.

      Image shows example ticket prioritization matrix

      Collect the ticket prioritization scheme in one diagram to ensure service support aligns to business requirements

      Image shows example ticket prioritization matrix

      Prioritize incidents based on severity and urgency to foreground critical issues

      2.3.1 Build a clearly defined priority scheme

      Estimated Time: 60 minutes

      1. Decide how many levels of severity are appropriate for your organization.
      2. Build a prioritization matrix, breaking down priority levels by impact and urgency.
      3. Build out the definitions of impact and urgency to complete the prioritization matrix.
      4. Run through examples of each priority level to make sure everyone is on the same page.

      Image shows example ticket prioritization matrix

      Document in the SOP

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP

      Example of outcome from 2.3.1

      Define response and resolution targets for each priority level to establish service-level objectives for service support

      Image shows example of response and resolution targets.

      Build clear rules to help agents determine when to escalate

      2.3.2 Assign response, resolution, and escalation times to each priority level

      Estimated Time: 60 minutes

      Instructions:

      For each incident priority level, define the associated:

      1. Response time – time from when incident record is created to the time the service desk acknowledges to the customer that their ticket has been received and assigned.
      2. Resolution time – time from when the incident record is created to the time that the customer has been advised that their problem has been resolved.
      3. Escalation time – maximum amount of time that a ticket should be worked on without progress before being escalated to someone else.

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens

      Image shows example of response and resolution targets

      Use the table on the previous slide as a guide.

      Discuss the possible root causes for escalation issues

      WHY IS ESCALATION IMPORTANT?

      Escalation is not about admitting defeat, but about using your resources properly.

      Defining procedures for escalation reduces the amount of time the service desk spends troubleshooting before allocating the incident to a higher service tier. This reduces the mean time to resolve and increases end-user satisfaction.

      You can correlate escalation paths to ticket categories devised in step 2.2.

      Image shows example on potential root causes for escalation issues.

      Build decision rights to help agents determine when to escalate

      2.3.3 Provide guidance to each tier around escalation steps and times

      Estimated Time: 60 minutes

      Instructions

      1. For each support tier, define escalation rules for troubleshooting (steps that each tier should take before escalation).
      2. For each support tier, define maximum escalation times (maximum amount of time to work on a ticket without progress before escalating).
      Example of outcome from step 2.3.3 to determine when to escalate issues.

      Create a list of application specialists to get the escalation right the first time

      2.3.4 Define automated escalations

      Estimated Time: 60 minutes

      1. Identify applications that will require specialists for troubleshooting or access rights.
      2. Identify primary and secondary specialists for each application.
      3. Identify vendors that will receive escalations either immediately or after troubleshooting.
      4. Set up application groups in the service desk tool.
      5. Set up workflows in the service desk tool where appropriate.
      6. Document the automated escalations in the categorization scheme developed in step 2.2 and in the Service Desk Roles and Responsibilities Guide.

      A screenshot of the Service Desk Roles and Responsibilities Guide

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens

      Phase 3

      Design Request Fulfilment Processes

      Step 3.1: Build request workflows

      Image shows the steps in phase 3. Highlight is on step 3.1.

      This step will walk you through the following activities:

      • 3.1.1 Distinguish between requests and small projects
      • 3.1.2 Define service requests with SLAs
      • 3.1.3 Build and critique request workflows

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Workflows for service requests will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.

      DELIVERABLES

      • Workflows for the most common service requests
      • An estimated service level for each service request
      • Request vs. project criteria

      Standardize service requests for more efficient delivery

      Definitions:

      • An incident is an unexpected disruption to normal business processes and requires attempts to restore service as soon as possible (e.g. printer not working).
      • A service request is a request where nothing is broken or impacting a service and typically can be scheduled rather than requiring immediate resolution (e.g. new software application).
      • Service requests are repeatable, predictable, and easier to commit to SLAs.
      • By committing to SLAs, expectations can be set for users and business units for service fulfillment.
      • Workflows for service requests should be documented and reviewed to ensure consistency of fulfillment.
      • Documentation should be created for service request procedures that are complex.
      • Efficiencies can be created through automation such as with software deployment.
      • All service requests can be communicated through a self-service portal or service catalog.

      PREPARE A FUTURE SERVICE CATALOG

      Standardize requests to develop a consistent offering and prepare for a future service catalog.

      Document service requests to identify time to fulfill and approvals.

      Identify which service requests can be auto-approved and which will require a workflow to gain approval.

      Document workflows and analyze them to identify ways to improve SLAs. If any approvals are interrupting technical processes, rearrange them so that approvals happen before the technical team is involved.

      Determine support levels for each service offering and ensure your team can sustain them.

      Where it makes sense, automate delivery of services such as software deployment.

      Distinguish between service requests and small projects to ensure agents and end users follow the right process

      The distinction between service requests and small projects has two use cases, which are two sides of the same resourcing issue.

      • Service desk managers need to understand the difference to ensure the right approval process is followed. Typically, projects have more stringent intake requirements than requests do.
      • PMOs need to understand the difference to ensure the right people are doing the work and that small, frequent changes are standardized, automated, and taken out of the project list.

      What’s the difference between a service request and a small project?

      • The key differences involve resource scope, frequency, and risk.
      • Requests are likely to require fewer resources than projects, be fulfilled more often, and involve less risk.
      • Requests are typically done by tier 1 and 2 employees throughout the IT organization.
      • A request can turn into a small project if the scope of the request grows beyond the bounds of a normal request.

      Example: A mid-sized organization goes on a hiring blitz and needs to onboard 150 new employees in one quarter. Submitting and scheduling 150 requests for onboarding new employees would require much more time and resources.

      Projects are different from service requests and have different criteria

      A project, by terminology, is a temporary endeavor planned around producing a specific organizational or business outcome.

      Common Characteristics of Projects:

      • Time sensitive, temporary, one-off.
      • Uncertainty around how to create the unique thing, product, or service that is the project’s goal.
      • Non-repetitive work and sizeable enough to introduce heightened risk and complexity.
      • Strategic focus, business case-informed capital funding, and execution activities driven by a charter.
      • Introduces change to the organization.
      • Multiple stakeholders involved and cross-functional resourcing.

      Info-Tech Insight

      Projects require greater risk, effort, and resources than a service request and should be redirected to the PMO.

      Standard service requests vs. non-standard service requests: criteria to make them distinct

      • If there is no differentiation between standard and non-standard requests, those tickets can easily move into the backlog, growing it very quickly.
      • Create a process to easily identify non-standard requests when they enter the ticket queue to ensure customers are made aware of any delay of service, especially if it is a product or service currently not offered. This will give time for any approvals or technical solutioning that may need to occur.
      • Take recurring non-standard requests and make them standard. This is a good way to determine if there are any gaps in services offered and another vehicle to understand what your customers want.

      Standard Requests

      • Very common requests, delivered on an on-going basis
      • Defined process
      • Measured in hours or days
      • Uses service catalog, if it exists
      • Formalized and should already be documented
      • The time to deal with the request is defined

      Non-Standard Requests

      • Higher level complexity than standard requests
      • Cannot be fulfilled via service catalog
      • No defined process
      • Not supplied by questions that Service Request Definition (SRD) offers
      • Product or service is not currently offered, and it may need time for technical review, additional approvals, and procurement processes

      The right questions can help you distinguish between standard requests, non-standard requests, and projects

      Where do we draw the line between a standard and non-standard request and a project?

      The service desk can’t and shouldn’t distinguish between requests and projects on its own. Instead, engage stakeholders to determine where to draw the line.

      Whatever criteria you choose, define them carefully.

      Be pragmatic: there is no single best set of criteria and no single best definition for each criterion. The best criteria and definitions will be the ones that work in your organizational context.

      Common distinguishing factors and thresholds:

      Image shows table of the common distinguishing factors and thresholds.

      Distinguish between standard and non-standard service requests and projects

      3.1.1 Distinguish between service requests and projects

      1. Divide the group into two small teams.
      2. Each team will brainstorm examples of service requests and small projects.
      3. Identify factors and thresholds that distinguish between the two groups of items.
      4. Bring the two groups together and discuss the two sets of criteria.
      5. Consolidate one set of criteria that will help make the distinction between projects and service requests.
      6. Capture the table in the Service Desk SOP.

      Image shows blank template of the common distinguishing factors and thresholds.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Distinguishing factors and thresholds

      Don’t standardize request fulfilment processes alone

      Everyone in IT contributes to the fulfilment of requests, but do they know it?

      New service desk managers sometimes try to standardize request fulfilment processes on their own only to encounter either apathy or significant resistance to change.

      Moving to a tiered generalist service desk with a service-oriented culture, a high first-tier generalist resolution rate, and collaborative T2 and T3 specialists can be a big change. It is critical to get the request workflows right.

      Don’t go it alone. Engage a core team of process champions from all service support. With executive support, the right process building exercises can help you overcome resistance to change.

      Consider running the process building activities in this project phase in a working session or a workshop setting.

      Info-Tech Insight

      If they build it, they will come. Service desk improvement is an exercise in organizational change that crosses IT disciplines. Organizations that fail to engage IT specialists from other silos often encounter resistance to change that jeopardizes the process improvements they are trying to make. Overcome resistance by highlighting how process changes will benefit different groups in IT and solicit the feedback of specialists who can affect or be affected by the changes.

      Define standard service requests with SLAs and workflows

      WHY DO I NEED WORKFLOWS?

      Move approvals out of technical IT processes to make them more efficient. Evaluate all service requests to see where auto-approvals make sense. Where approvals are required, use tools and workflows to manage the process.

      Example:

      Image is an example of SLAs and workflows.

      Approvals can be the main roadblock to fulfilling service requests

      Image is example of workflow approvals.

      Review the general standard service request and inquiry fulfillment processes

      As standard service requests should follow standard, repeatable, and predictable steps to fulfill, they can be documented with workflows.

      Image is a flow chart of service and inquiry request processes.

      Review the general standard service request and inquiry fulfillment processes

      Ensure there is a standard and predictable methodology for assessing non-standard requests; inevitably those requests may still cause delay in fulfillment.

      Create a process to ensure reasonable expectations of delivery can be set with the end user and then identify what technology requests should become part of the existing standard offerings.

      Image is a flowchart of non-standard request processes

      Document service requests to ensure consistent delivery and communicate requirements to users

      3.1.2 Define service requests with SLAs

      1. On a flip chart, list standard service requests.
      2. Identify time required to fulfill, including time to schedule resources.
      3. Identify approvals required; determine if approvals can be automated through defining roles.
      4. Discuss opportunities to reduce SLAs or automate, but recognize that this may not happen right away.
      5. Discuss plans to communicate SLAs to the business units, recognizing that some users may take a bit of time to adapt to the new SLAs.
      6. Work toward improving SLAs as new opportunities for process change occur.
      7. Document SLAs in the Service Desk SOP and update as SLAs change.
      8. Build templates in the service desk tool that encapsulate workflows and routing, SLAs, categorization, and resolution.

      Participants

      • Service Desk Managers
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Info-Tech Insight

      These should all be scheduled services. Anything that is requested as a rush needs to be marked as a higher urgency or priority to track end users who need training on the process.

      Analyze service request workflows to improve service delivery

      3.1.3 Build and critique request workflows

      1. Divide the group into small teams.
      2. Each team will choose one service request from the list created in the previous module and then draw the workflow. Include decision points and approvals.
      3. Discuss availability and technical support:
        • Can the service be fulfilled during regular business hours or 24x7?
        • Is technical support and application access available during regular business hours or 24x7?
      4. Reconvene and present workflows to the group.
      5. Document workflows in Visio and add to the Service Desk SOP. Where appropriate, enter workflows in the service desk tool.

      Critique workflows for efficiencies and effectiveness:

      • Do the workflows support the SLAs identified in the previous exercise?
      • Are the workflows efficient?
      • Is the IT staff consistently following the same workflow?
      • Are approvals appropriate? Is there too much bureaucracy or can some approvals be removed? Can they be preapproved?
      • Are approvals interrupting technical processes? If so, can they be moved?

      Participants

      • Service Desk Managers
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Project Summary
      • Flip Chart
      • Whiteboard

      Step 3.2: Build a targeted knowledgebase

      Image shows the steps in phase 3. Highlight is on step 3.2.

      This step will walk you through the following activities:

      • 3.2.1 Design knowledge management processes
      • 3.2.2 Create actionable knowledgebase articles

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The section will introduce service catalogs and get the organization to envision what self-service tools it might include.

      DELIVERABLES

      • Knowledgebase policy and process

      A knowledgebase is an essential tool in the service management toolbox

      Knowledge Management

      Gathering, analyzing, storing & sharing knowledge to reduce the need to rediscover known solutions.

      Knowledgebase

      Organized repository of IT best practices and knowledge gained from practical experiences.

      • End-User KB
      • Give end users a chance to resolve simple issues themselves without submitting a ticket.

      • Internal KB
      • Shared resource for service desk staff and managers to share and use knowledge.

      Use the knowledgebase to document:

      • Steps for pre-escalation troubleshooting.
      • Known errors.
      • Workarounds or solutions to recurring issues.
      • Solutions that require research or complex troubleshooting.
      • Incidents that have many root causes. Start with the most frequent solution and work toward less likely issues.

      Draw on organizational goals to define the knowledge transfer target state

      Image is Info-Tech’s Knowledge Transfer Maturity Model
      *Source: McLean & Company, 2013; N=120

      It’s better to start small than to have nothing at all

      Service desk teams are often overwhelmed by the idea of building and maintaining a comprehensive integrated knowledgebase that covers an extensive amount of information.

      Don’t let this idea stop you from building a knowledgebase! It takes time to build a comprehensive knowledgebase and you must start somewhere.

      Start with existing documentation or knowledge that depends on the expertise of only a few people and is easy to document and you will already see the benefits.

      Then continue to build and improve from there. Eventually, knowledge management will be a part of the culture.

      Engage the team to build a knowledgebase targeted on your most important incidents and requests

      WHERE DO I START?

      Inventory and consolidate existing documentation, then evaluate it for audience relevancy, accuracy, and usability. Use the exercise and the next slides to develop a knowledgebase template.

      Produce a plan to improve the knowledgebase.

      • Identify the current top five or ten incidents from the service desk reports and create related knowledgebase articles.
      • Evaluate for end-user self-service or technician resolution.
      • Note any resolutions that require access rights to servers.
      • Assign documentation creation tasks for the knowledgebase to individual team members each week.
      • Apply only one incident per article.
      • Set goals for each technician to submit one or two meaningful articles per month.
      • Assign a knowledge manager to monitor creation and edit and maintain the database.
      • Set policy to drive currency of the knowledgebase. See the Service Desk SOP for an example of a workable knowledge policy.

      Use a phased approach to build a knowledgebase

      Image is an example of a phased approach to build a knowledge base

      Use a quarterly, phased approach to continue to build and maintain your knowledgebase

      Continual Knowledgebase Maintenance:

      • Once a knowledgebase is in place, future articles should be written using established templates.
      • Articles should be regularly reviewed and monitored for usage. Outdated information will be retired and archived.
      • Ticket trend analysis should be done on an ongoing basis to identify new articles.
      • A proactive approach will anticipate upcoming issues based on planned upgrades and maintenance or other changes, and document resolution steps in knowledgebase articles ahead of time.

      Every Quarter:

      1. Conduct a ticket trend analysis. Identify the most important and common tickets.
      2. Review the knowledgebase to identify relevant articles that need to be revised or written.
      3. Use data from knowledge management tool to track expiring content and lesser used articles.
      4. Assign the task of writing articles to all IT staff members.
      5. Build and revise ticket templates for incident and service requests.

      Assign a knowledge manager role to ensure accountability for knowledgebase maintenance

      Assign a knowledge manager to monitor creation and edit and maintain database.

      Knowledge Manager/Owner Role:

      • Has overall responsibility for the knowledgebase.
      • Ensures content is consistent and maintains standards.
      • Regularly monitors and updates the list of issues that should be added to the knowledgebase.
      • Regularly reviews existing knowledgebase articles to ensure KB is up to date and flags content to retire or review.
      • Assigns content creation tasks.
      • Optimizes knowledgebase structure and organization.
      • See Info-Tech’s knowledge manager role description if you need a hand defining this position.

      The knowledge manager role will likely be a role assigned to an existing resource rather than a dedicated position.

      Develop a template to ensure knowledgebase articles are easy to read and write

      A screenshot of the Knowledgebase Article Template

      QUICK TIPS

      • Use non-technical language whenever possible to help less-technical readers.
      • Identify error messages and use screenshots where it makes sense.
      • Take advantage of social features like voting buttons to increase use.
      • Use Info-Tech’s Knowledge Base Article Template to get you started.

      Analyze the necessary features for your knowledgebase and compare them against existing tools

      Service desk knowledgebases range in complexity from simple FAQs to fully integrated software suites.

      Options include:

      • Article search with negative and positive filters.
      • Tagging, with the option to have keywords generate top matches.
      • Role-based permissions (to prevent unauthorized deletions).
      • Ability to turn a ticket resolution into a knowledgebase article (typically only available if knowledgebase tool is part of the service desk tool).
      • Natural language search.
      • Partitioning so relevant articles only appear for specific audiences.
      • Editorial workflow management.
      • Ability to set alerts for scheduled article review.
      • Article reporting (most viewed, was it useful?).
      • Rich text fields for attaching screenshots.

      Determine which features your organization needs and check to see if your tools have them.

      For more information on knowledgebase improvement, refer to Info-Tech’s Optimize the Service Desk With a Shift-Left Strategy.

      Document your knowledge management maintenance workflow to identify opportunities for improvement

      Workflow should include:

      • How you will identify top articles that need to be written
      • How you will ensure articles remain relevant
      • How you will assign new articles to be written, inclusive of peer review
      Image of flowchart of knowledgebase maintenance process.

      Design knowledgebase management processes

      3.2.1 Design knowledgebase management processes

      1. Assign a knowledge manager to monitor creation and edit and maintain the database. See Info-Tech’s knowledge manager role description if you need a hand defining this position.
      2. Discuss how you can use the service desk tool to integrate the knowledgebase with incident management, request fulfilment, and self-service processes.
      3. Discuss the suitability of a quarterly process to build and edit articles for a target knowledgebase that covers your most important incidents and requests.
      4. Set knowledgebase creation targets for tier 1, 2, and 3 analysts.
      5. Identify relevant performance metrics.
      6. Brainstorm elements that might be used as an incentive program to encourage the creation of knowledgebase articles and knowledge sharing more generally.
      7. Set policy to drive currency of knowledgebase. See the Service Desk SOP for an example of a workable knowledge policy.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Create actionable knowledgebase articles

      3.2.2 Run a knowledgebase working group

      Write and critique knowledgebase articles.

      1. On a whiteboard, build a list of potential knowledgebase articles divided by audience: Technician or End User.
      2. Each team member chooses one topic and spends 20 minutes writing.
      3. Each team member either reads the article and has the team critique or passes to the technician to the right for peer review. If there are many participants, break into smaller groups.
      4. Set a goal with the team for how, when, and how often knowledgebase articles will be created.
      5. Capture knowledgebase processes in the Service Desk SOP.

      Audience: Technician

      • Password update
      • VPN printing
      • Active directory – policy, procedures, naming conventions
      • Cell phones
      • VPN client and creation set-up

      Audience: End users

      • Set up email account
      • Password creation policy
      • Voicemail – access, change greeting, activities
      • Best practices for virus, malware, phishing attempts
      • Windows 10 tips and tricks

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Step 3.3: Prepare for a self-service portal project

      Image shows the steps in phase 3. Highlight is on step 3.3.

      This step will walk you through the following activities:

      • 3.3.1 Develop self-service tools for the end user
      • 3.3.2 Make a plan for creating or improving the self-service portal

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The section prepares you to tackle a self-service portal project once the service desk standardization is complete.

      DELIVERABLES

      • High-level activities to create a self-service portal

      Design the self-service portal with the users’ computer skills in mind

      A study by the OECD offers a useful reminder of one of usability’s most hard-earned lessons: you are not the user.

      • There is an important difference between IT professionals and the average user that’s even more damaging to your ability to predict what will be a good self-service tool: skills in using computers, the internet, and technology in general.
      • An international research study explored the computer skills of 215,942 people aged 16-65 in 33 countries.
      • The results show that across 33 rich countries, only 5% of the population has strong computer-related abilities and only 33% of people can complete medium-complexity computer tasks.
      • End users are skilled, they just don’t have the same level of comfort with computers as the average IT professional. Design your self-service tools with that fact in mind.
      Image is of a graph showing the ability of computer skills from age 16-65 among various countries.

      Take an incremental and iterative approach to developing your self-service portal

      Use a web portal to offer self-serve functionality or provide FAQ information to your customers to start.

      • Don’t build from scratch. Ideally, use the functionality included with your ITSM tool.
      • If your ITSM tool doesn’t have an adequate self-service portal functionality, then harness other tools that IT already uses. Common examples include Microsoft SharePoint and Google Forms.
      • Make it as easy as possible to access the portal:
        • Deploy an app to managed devices or put the app in your app store.
        • Create a shortcut on people’s start menus or home screens.
        • Print the URL on swag such as mousepads.
      • Follow Info-Tech’s approach to developing your user facing service catalog.

      Some companies use vending machines as a form of self serve. Users can enter their purchase code and “buy” a thin client, mouse, keyboard, software, USB keys, tablet, headphones, or loaners.

      Info-Tech Insight

      Building the basics first will provide your users with immediate value. Incrementally add new features to your portal.

      Optimize the portal: self-service should be faster and more convenient than the alternative

      Design the portal by demand, not supply

      Don’t build a portal framed around current offerings and capabilities just for the sake of it. Build the portal based on what your users want and need if you want them to use it.

      Make user experience a top priority

      The portal should be designed for users to self-serve, and thus self-service must be seamless, clear, and attractive to users.

      Speak your users’ language

      Keep in mind that users may not have high technical literacy or be familiar with terminology that you find commonplace. Use terms that are easy to understand.

      Appeal to both clickers and searchers

      Ensure that users can find what they’re looking for both by browsing the site and by using search functionality.

      Use one central portal for all departments

      If multiple departments (i.e. HR, Finance) use or will use a portal, set up a shared portal so that users won’t have to guess where to go to ask for help.

      You won’t know unless you test

      You will know how to navigate the portal better than anyone, but that doesn’t mean it’s intuitive for a new user. Test the portal with users to collect and incorporate feedback.

      Self-service portal examples (1/2)

      Image is of an example of the self-service portal

      Image source: Cherwell Service Management

      Self-service examples (2/2)

      Image is of an example of the self-service portal

      Image source: Team Dynamix

      Keep the end-user facing knowledgebase relevant with workflows, multi-device access, and social features

      Workflows:

      • Easily manage peer reviews and editorial and relevance review.
      • Enable links and importing between tickets and knowledgebase articles.
      • Enable articles to appear based on ticket content.

      Multi-device access:

      • Encourage users to access self-service.
      • Enable technicians to solve problems from anywhere.

      Social features:

      • Display most popular articles first to solve trending issues.
      • Enable voting to improve usability of articles.
      • Allow collaboration on self-service.

      For more information on building self-service portal, refer to Info-Tech’s Optimize the Service Desk with a Shift-Left Strategy

      Draft a high-level project plan for a self-service portal project

      3.3.1 Draft a high-level project plan for a self-service portal project

      1. Identify stakeholders who can contribute to the project.
        • Who will help with FAQ creation?
        • Who can design the self-service portal?
        • Who needs to sign off on the project?
      2. Identify the high-level tasks that need to be done.
        • How many FAQs need to be created?
        • How will we design the service catalog’s web portal?
        • What might a phased approach look like?
        • How can we break down the project into design, build, and implementation tasks?
        • What is the rough timeline for these tasks?
      3. Capture the high-level activities in the Service Desk Roadmap.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Flip Chart
      • Whiteboard
      • Implementation Roadmap

      Once you have a service portal, you can review the business requirements for a service catalog

      A service catalog is a communications device that lists the IT services offered by an organization. The service catalog is designed to enable the creation of a self-service portal for the end user. The portal augments the service desk so analysts can spend time managing incidents and providing technical support.

      The big value comes from workflows:

      • Improved economics and a means to measure the costs to serve over time.
      • Incentive for adoption because things work better.
      • Abstracts delivery from offer to serve so you can outsource, insource, crowdsource, slow, speed, reassign, and cover absences without involving the end user.

      There are three types of catalogs:

      • Static:Informational only, so can be a basic website.
      • Routing and workflow: Attached to service desk tool.
      • Workflow and e-commerce: Integrated with service desk tool and ERP system.
      Image is an example of service catalog

      Image courtesy of University of Victoria

      Understand the time and effort involved in building a service catalog

      A service catalog will streamline IT service delivery, but putting one together requires a significant investment. Service desk standardization comes first.

      • Workflows and back-end services must be in place before setting up a service catalog.
      • Think of the catalog as just the delivery mechanism for service you currently provide. If they aren’t running well and delivery is not consistent, you don’t want to advertise SLAs and options.
      • Service catalogs require maintenance.
      • It’s not a one-time investment – service catalogs must be kept up to date to be useful.
      • Service catalog building requires input from VIPs.
      • Architects and wordsmiths are not the only ones that spend effort on the service catalog. Leadership from IT and the business also provide input on policy and content.

      Sample Service Catalog Efforts

      • A college with 17 IT staff spent one week on a simple service catalog.
      • A law firm with 110 IT staff spent two months on a service catalog project.
      • A municipal government with 300 IT people spent over seven months and has yet to complete the project.
      • A financial organization with 2,000 IT people has spent seven months on service catalog automation alone! The whole project has taken multiple years.

      “I would say a client with 2,000 users and an IT department with a couple of hundred, then you're looking at six months before you have the catalog there.”

      – Service Catalog Implementation Specialist,

      Health Services

      Draft a high-level project plan for a self-service portal project

      3.2.2 Make a plan for creating or improving the self-service portal

      Identify stakeholders who can contribute to the project.

      • Who will help with FAQs creation?
      • Who can design the self-service portal?
      • Who needs to sign off on the project?

      Evaluate tool options.

      • Will you stick with your existing tool or invest in a new tool?

      Identify the high-level tasks that need to be done.

      • How will we design the web portal?
      • What might a phased approach look like?
      • What is the rough timeline for these tasks?
      • How many FAQs need to be created?
      • Will we have a service catalog, and what type?

      Document the plan and tasks in the Service Desk Roadmap.

      Examples of publicly posted service catalogs:

      University of Victoria is an example of a catalog that started simple and now includes multiple divisions, notifications, systems status, communications, e-commerce, incident registration, and more.

      Indiana University is a student, faculty, and staff service catalog and self-service portal that goes beyond IT services.

      If you are ready to start building a service catalog, use Info-Tech’s Design and Build a User-Facing Service Catalog blueprint to get started.

      Phase 4

      Plan the Implementation of the Service Desk

      Step 4.1: Build communication plan

      Image shows the steps in phase 4. Highlight is on step 4.1.

      This step will walk you through the following activities:

      • 4.1.1 Create the communication plan

      This step involves the following participants:

      • CIO
      • IT Director
      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The communication plan and project summary will help project managers outline recommendations and communicate their benefits.

      DELIVERABLES

      • Communication plan
      • Project summary

      Effectively communicate the game plan to IT to ensure the success of service desk improvements

      Communication is crucial to the integration and overall implementation of your service desk improvement.

      An effective communication plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintainthe presence of the program throughout the business.
      • Instill ownership throughout the business, from top-level management to new hires.

      Build a communication plan to:

      1. Communicate benefits to IT:
        • Share the standard operating procedures for training and feedback.
        • Train staff on policies as they relate to end users and ensure awareness of all policy changes.
        • As changes are implemented, continue to solicit feedback on what is and is not working and communicate adjustments as appropriate.
      2. Train technicians:
        • Make sure everyone is comfortable communicating changes to customers.
      3. Measure success:
        • Review SLAs and reports. Are you consistently meeting SLAs?
        • Is it safe to communicate with end users?

      Create your communication plan to anticipate challenges, remove obstacles, and secure buy-in

      Why:

      • What problems are you trying to solve?

      What:

      • What processes will it affect (that will affect me)?

      Who:

      • Who will be affected?
      • Who do I go to if I have issues with the new process?
      3 gears are depicted. The top gear is labelled managers with an arrow going clockwise. The middle gear is labelled technical staff with an arrow going counterclockwise. The bottom gear is labelled end users with an arrow going clockwise

      When:

      • When will this be happening?
      • When will it affect me?

      How:

      • How will these changes manifest themselves?

      Goal:

      • What is the final goal?
      • How will it benefit me?

      Create a communication plan to outline the project benefits

      Improved business satisfaction:

      • Improve confidence that the service desk can solve issues within the service-level agreement.
      • Channel incidents and requests through the service desk.
      • Escalate incidents quickly and accurately.

      Fewer recurring issues:

      • Tickets are created for every incident and categorized correctly.
      • Reports can be used for root-cause analysis.

      Increased efficiency or lower cost to serve:

      • Use FAQs to enable end users to self-solve.
      • Use knowledgebase to troubleshoot once, solve many times.
      • Cross-train to improve service consistency.

      Enhanced demand planning:

      • Trend analysis and reporting improve IT’s ability to forecast and address the demands of the business.

      Organize the information to manage the deployment of key messages

      Example of how to organize and manage key messages

      Create the communication plan

      4.1.1 Create the communication plan

      Estimated Time: 45 minutes

      Develop a stakeholder analysis.

      1. Identify everyone affected by the project.
      2. Assess their level of interest, value, and influence.
      3. Develop a communication strategy tailored to their level of engagement.

      Craft key messages tailored to each stakeholder group.

      Finalize the communication plan.

      1. Examine your roadmap and determine the most appropriate timing for communications.
      2. Assess when communications must happen with executives, business unit leaders, end users, and technicians.
      3. Identify any additional communication challenges that have come up.
      4. Identify who will send out the communications.
      5. Identify multiple methods for getting the messages out (newsletters, emails, posters, company meetings).
      6. For inspiration, you can refer to the Sample Communication Plan for the project.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Step 4.2: Build implementation roadmap

      Image shows the steps in phase 4. Highlight is on step 4.2.

      This step will walk you through the following activities:

      • 4.2.1 Build implementation roadmap

      This step involves the following participants:

      • CIO
      • IT Director
      • IT Managers
      • Service Desk Manager
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The implementation plan will help track and categorize the next steps and finalize the project.

      DELIVERABLES

      • Implementation roadmap

      Collaborate to create an implementation plan

      4.2.1 Create the implementation plan

      Estimated Time: 45 minutes

      Determine the sequence of improvement initiatives that have been identified throughout the project.

      The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.

      Instructions:

      1. Review the initiatives that will be taken to improve the service desk and revise tasks, as necessary.
      2. Input each of the tasks in the data entry tab and provide a description and rationale behind the task.
      3. Assign an effort, priority, and cost level to each task (high, medium, low).
      4. Assign ownership to each task.
      5. Identify the timeline for each task based on the priority, effort, and cost (short, medium, and long term).
      6. Highlight risk for each task if it will be deferred.
      7. Track the progress of each task with the status column.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      A screenshot of the Roadmap tool.

      Document using the Roadmap tool.

      Related Info-Tech Research

      Standardize the Service Desk

      ImplementHardware and Software Asset Management

      Optimize Change Management Incident and Problem Management Build a Continual Improvement Plan for the Service Desk

      The Standardize blueprint reviews service desk structures and metrics and builds essential processes and workflows for incident management, service request fulfillment, and knowledge management practices.

      Once the service desk is operational, there are three paths to basic ITSM maturity:

      • Having the incident management processes and workflows built allows you to:
        • Introduce Change Management to reduce change-related incidents.
        • Introduce Problem Management to reduce incident recurrence.
        • Introduce Asset Management to augment service management processes with reliable data.

      Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users, with each service broken down by department and seniority level.

      Works cited

      “Help Desk Staffing Models: Simple Analysis Can Save You Money.” Giva, Inc., 2 Sept. 2009. Web.

      Marrone et al. “IT Service Management: A Cross-national Study of ITIL Adoption.” Communications of the Association for Information Systems: Vol. 34, Article 49. 2014. PDF.

      Rumburg, Jeff. “Metric of the Month: First Level Resolution Rate.” MetricNet, 2011. Web.

      “Service Recovery Paradox.” Wikipedia, n.d. Web.

      Tang, Xiaojun, and Yuki Todo. “A Study of Service Desk Setup in Implementing IT Service Management in Enterprises.” Technology and Investment: Vol. 4, pp. 190-196. 2013. PDF.

      “The Survey of Adult Skills (PIAAC).” Organisation for Economic Co-operation and Development (OECD), 2016. Web.

      Contributors

      • Jason Aqui, IT Director, Bellevue College
      • Kevin Sigil, IT Director, Southwest Care Centre
      • Lucas Gutierrez, Service Desk Manager, City of Santa Fe
      • Rama Dhuwaraha, CIO, University of North Texas System
      • Annelie Rugg, CIO, UCLA Humanities
      • Owen McKeith, Manager IT Infrastructure, Canpotex
      • Rod Gula, IT Director, American Realty Association
      • Rosalba Trujillo, Service Desk Manager, Northgate Markets
      • Jason Metcalfe, IT Manager, Mesalabs
      • Bradley Rodgers, IT Manager, SecureTek
      • Daun Costa, IT Manager, Pita Pit
      • Kari Petty, Service Desk Manager, Mansfield Oil
      • Denis Borka, Service Desk Manager, PennTex Midstream
      • Lateef Ashekun, IT Manager, City of Atlanta
      • Ted Zeisner, IT Manager, University of Ottawa Institut de Cardiologie

      Set a Strategic Course of Action for the PMO in 100 Days

      • Buy Link or Shortcode: {j2store}356|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $13,744 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • As a new PMO director, you’ve been thrown into the middle of an unfamiliar organizational structure and a chaotic project environment.
      • The expectations are that the PMO will help improve project outcomes, but beyond that your mandate as PMO director is opaque.
      • You know that the statistics around PMO longevity aren’t good, with 50% of new PMOs closing within the first three years. As early in your tenure as possible, you need to make sure that your stakeholders understand the value that your role could provide to the organization with the right level of buy-in and support.
      • Whether you’re implementing a new PMO or taking over an already existing one, you need to quickly overcome these challenges by rapidly assessing your unfamiliar tactical environment, while at the same time demonstrating confidence and effective leadership to project staff, business stakeholders, and the executive layer.

      Our Advice

      Critical Insight

      • The first 100 days are critical. You have a window of influence where people are open to sharing insights and opinions because you were wise enough to seek them out. If you don’t reach out soon, people notice and assume you’re not wise enough to seek them out, or that you don’t think they are important enough to involve.
      • PMOs most commonly stumble when they shortsightedly provide project management solutions to what are, in fact, more complex, systemic challenges requiring a mix of project management, portfolio management, and organizational change management capabilities. If you fail to accurately diagnose pain points and needs in your first days, you could waste your tenure as PMO leader providing well-intentioned solutions to the wrong project problems.
      • You have diminishing value on your time before skepticism and doubt start to erode your influence. Use your first 100 days to define an appropriate mandate for your PMO, get the right people behind you, and establish buy-in for long-term PMO success.

      Impact and Result

      • Develop an action plan to help leverage your first 100 days on the job. Hit the ground running in your new role with an action plan to achieve realistic goals and milestones in your first 100 days. A results-driven first three months will help establish roots throughout the organization that will continue to feed and grow the PMO beyond your first year.
      • Get to know what you don’t know quickly. Use Info-Tech’s advice and tools to perform a triage of every aspect of PMO accountability as well as harvest stakeholder input to ensure that your PMO meets or exceeds expectations and establishes the right solutions to the organization’s project challenges.
      • Solidify the PMO’s long-term mission. Adopt our stakeholder engagement best practices to ensure that you knock on the right doors early in your tenure. Not only do you need to clarify expectations, but you will ultimately need buy-in from key stakeholders as you move to align the mandate, authority, and resourcing needed for long-term PMO success.

      Set a Strategic Course of Action for the PMO in 100 Days Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how capitalizing on your first 100 days as PMO leader can help ensure the long-term success of your PMO.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Survey the project landscape

      Get up-to-speed quickly on key PMO considerations by engaging PMO sponsors, assessing stakeholders, and taking stock of your PMO inventory.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 1: Survey the Project Landscape
      • Mission Identification and Inventory Tool
      • PMO Director First 100 Days Timeline - MS Project
      • PMO Director First 100 Days Timeline - MS Excel

      2. Gather PMO requirements

      Make your first major initiative as PMO director be engaging the wider pool of PMO stakeholders throughout the organization to determine their expectations for your office.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 2: Gather PMO Requirements
      • PMO Requirements Gathering Tool
      • PMO Course of Action Stakeholder Interview Guide

      3. Solidify your PPM goals

      Review the organization’s current PPM capabilities in order to identify your ability to meet stakeholder expectations and define a sustainable mandate.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 3: Solidify Your PPM Goals
      • Project Portfolio Management Maturity Assessment Workbook
      • Project Management Maturity Assessment Workbook
      • Organizational Change Management Maturity Assessment Workbook
      • PMO Strategic Expectations Glossary

      4. Formalize the PMO’s mandate

      Communicate your strategic vision for the PMO and garner stakeholder buy-in.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 4: Formalize the PMO's Mandate
      • PMO Mandate and Strategy Roadmap Template
      • PMO Director Peer Feedback Evaluation Template
      • PMO Director First 100 Days Self-Assessment Tool
      [infographic]

      Workshop: Set a Strategic Course of Action for the PMO in 100 Days

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current Project Ecosystem

      The Purpose

      Quickly develop an on-the-ground view of the organization’s project ecosystem and the PMO’s abilities to effectively serve.

      Key Benefits Achieved

      A comprehensive and actionable understanding of the PMO’s tactical environment

      Activities

      1.1 Perform a PMO SWOT analysis.

      1.2 Assess the organization’s portfolio management, project management, and organizational change management capability levels.

      1.3 Take inventory of the PMO’s resourcing levels, project demand levels, and tools and artifacts.

      Outputs

      Overview of current strengths, weaknesses, opportunities, and threats

      Documentation of your current process maturity to execute key portfolio management, project management, and organizational change management functions

      Stock of the PMO’s current access to PPM personnel relative to total project demand

      2 Analyze PMO Stakeholders

      The Purpose

      Determine stakeholder expectations for the PMO.

      Key Benefits Achieved

      An accurate understanding of others’ expectations to help ensure the PMO’s course of action is responsive to organizational culture and strategy

      Activities

      2.1 Conduct a PMO Mission Identification Survey with key stakeholders.

      2.2 Map the PMO’s stakeholder network.

      2.3 Analyze key stakeholders for influence, interest, and support.

      Outputs

      An understanding of expected PMO outcomes

      A stakeholder map and list of key stakeholders

      A prioritized PMO requirements gathering elicitation plan

      3 Determine Strategic Expectations and Define the Tactical Plan

      The Purpose

      Develop a process and method to turn stakeholder requirements into a strategic vision for the PMO.

      Key Benefits Achieved

      A strategic course of action for the PMO that is responsive to stakeholders’ expectations.

      Activities

      3.1 Assess the PMO’s ability to support stakeholder expectations.

      3.2 Use Info-Tech’s PMO Strategic Expectations glossary to turn raw process and service requirements into specific strategic expectations.

      3.3 Define an actionable tactical plan for each of the strategic expectations in your mandate.

      Outputs

      An understanding of PMO capacity and limits

      A preliminary PMO mandate

      High-level statements of strategy to help support your mandate

      4 Formalize the PMO’s Mandate and Roadmap

      The Purpose

      Establish a final PMO mandate and a process to help garner stakeholder buy-in to the PMO’s long-term vision.

      Key Benefits Achieved

      A viable PMO course of action complete with stakeholder buy-i

      Activities

      4.1 Finalize the PMO implementation timeline.

      4.2 Finalize Info-Tech’s PMO Mandate and Strategy Roadmap Template.

      4.3 Present the PMO’s strategy to key stakeholders.

      Outputs

      A 3-to-5-year implementation timeline for key PMO process and staffing initiatives

      A ready-to-present strategy document

      Stakeholder buy-in to the PMO’s mandate

      Master Your Security Incident Response Communications Program

      • Buy Link or Shortcode: {j2store}321|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $2,339 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • When a significant security incident is discovered, usually very few details are known for certain. Nevertheless, the organization will need to say something to affected stakeholders.
      • Security incidents tend to be ongoing situations that last considerably longer than other types of crises, making communications a process rather than a one-time event.
      • Effective incident response communications require collaboration from: IT, Legal, PR, and HR – groups that often speak “different languages.”

      Our Advice

      Critical Insight

      • There’s no such thing as successful incident response communications; strive instead for effective communications. There will always be some fallout after a security incident, but it can be effectively mitigated through honesty, transparency, and accountability.
      • Effective external communications begin with effective internal communications. Security Incident Response Team members come from departments that don’t usually work closely with each other. This means they often have different ways of thinking and speaking about issues. Be sure they are familiar with each other before a crisis occurs.
      • You won’t save face by withholding embarrassing details. Lying only makes a bad situation worse, but coming clean and acknowledging shortcomings (and how you’ve fixed them) can go a long way towards restoring stakeholders’ trust.

      Impact and Result

      • Effective and efficient management of security incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities: communications must be integrated into each of these phases.
      • Understand that prior planning helps to take the guesswork out of incident response communications. By preparing for several different types of security incidents, the communications team will get used to working with each other, as well as learning what strategies are and are not effective. Remember, the communications team contains diverse members from various departments, and each may have different ideas about what information is important to release.

      Master Your Security Incident Response Communications Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement a security incident response communications plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Dive into communications planning

      This phase addresses the benefits and challenges of incident response communications and offers advice on how to assemble a communications team and develop a threat escalation protocol.

      • Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning
      • Security Incident Management Plan

      2. Develop your communications plan

      This phase focuses on creating an internal and external communications plan, managing incident fallout, and conducting a post-incident review.

      • Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan
      • Security Incident Response Interdepartmental Communications Template
      • Security Incident Communications Policy Template
      • Security Incident Communications Guidelines and Templates
      • Security Incident Metrics Tool
      • Tabletop Exercises Package
      [infographic]

      Domino – Maintain, Commit to, or Vacate?

      If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Our Advice

      Critical Insight

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Impact and Result

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Domino – Maintain, Commit to, or Vacate? Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

      This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

      • Domino – Maintain, Commit to, or Vacate? Storyboard

      2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      Use this tool to input the outcomes of your various application assessments.

      • Application Rationalization Tool

      Infographic

      Further reading

      Domino – Maintain, Commit to, or Vacate?

      Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

      Executive Summary

      Info-Tech Insight

      “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
      – Nigel Cheshire in Team Studio

      Your Challenge

      You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Common Obstacles

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Info-Tech Approach

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Review

      Is “Lotus” Domino still alive?

      Problem statement

      The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

      This research is designed for:

      • IT strategic direction decision-makers
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating migration options for mission-critical applications running on Domino

      This research will help you:

      1. Evaluate migration options.
      2. Assess the fit and purpose.
      3. Consider strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      The “everything may work” scenario

      Adopt and expand

      Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

      Importance to current business processes

      • Importance of use
      • Complexity in migrations
      • Choosing a new platform

      Available tools to facilitate

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Info-Tech Insight

      With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

      • Archive/retire
      • Application migration
      • Application replatform
      • Stay right where you are

      Eliminate your bias – consider the advantages

      “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

      – Rob Salerno, Founder & CTO, Rivet Technology Partners

      Domino advantages include:

      Modern Cloud & Application

      • No-code/low-code technology

      Business-Managed Application

      • Business written and supported
      • Embrace the business support model
      • Enterprise class application

      Leverage the Application Taxonomy & Build

      • A rapid application development platform
      • Develop skill with HCL training

      HCL Domino is a supported and developed platform

      Why consider HCL?

      • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
      • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
      • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

      Visualize Your Application Roadmap

      1. Focus on the application portfolio and crafting a roadmap for rationalization.
        • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
      2. Document your findings on respective application capability heatmaps.
        • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
      3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
        • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

      Our external support perspective

      by Darin Stahl

      Member Feedback

      • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
      • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
      • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
      • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
      • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

      Domino database assessments

      Consider the database.

      • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
      • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
      Key/Value Column

      Use case: Heavily accessed, rarely updated, large amounts of data
      Data Model: Values are stored in a hash table of keys.
      Fast access to small data values, but querying is slow
      Processor friendly
      Based on amazon's Dynamo paper
      Example: Project Voldemort used by LinkedIn

      this is a Key/Value example

      Use case: High availability, multiple data centers
      Data Model: Storage blocks of data are contained in columns
      Handles size well
      Based on Google's BigTable
      Example: Hadoop/Hbase used by Facebook and Yahoo

      This is a Column Example
      Document Graph

      Use case: Rapid development, Web and programmer friendly
      Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
      Better query abilities than Key/Value databases.
      Inspired by Lotus Notes.
      Example: CouchDB used by BBC

      This is a Document Example

      Use case: Best at dealing with complexity and relationships/networks
      Data model: Nodes and relationships.
      Data is processed quickly
      Inspired by Euler and graph theory
      Can easily evolve schemas
      Example: Neo4j

      This is a Graph Example

      Understand your options

      Archive/Retire

      Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

      Migrate

      Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

      Replatform

      Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

      Stay

      Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

      Archive/retire

      Retire the application, storing the application data in a long-term repository.

      Abstract

      The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

      Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

      Advantages

      • Reduce support cost.
      • Consolidate applications.
      • Reduce risk.
      • Reduce compliance and security concerns.
      • Improve business processes.

      Considerations

      • Application transformation
      • eDiscovery costs
      • Legal implications
      • Compliance implications
      • Business process dependencies

      Info-Tech Insights

      Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

      Application migration

      Migrate to a new version of the application

      Abstract

      An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

      This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

      Advantages

      • Reduce hardware costs.
      • Leverage cloud technologies.
      • Improve scalability.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
      • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
      • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
      • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

      Application replatform

      Transition an existing Domino application to a new modern platform

      Abstract

      This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

      Two challenges are particularly significant when migrating or replatforming Domino applications:

      • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
      • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

      Advantages

      • Leverage cloud technologies.
      • Improve scalability.
      • Align to a SharePoint platform.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Application replatform resource effort
      • Network bandwidth
      • New platform terms and conditions
      • Secure connectivity and communication
      • New platform security and compliance
      • Degree of complexity

      Info-Tech Insights

      There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

      Stay with HCL

      Stay with HCL, understanding its future commitment to the platform.

      Abstract

      Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

      1. Replatform
      2. Retire
      3. Move to cloud
      4. Modernize

      That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

      Advantages

      • Known environment
      • Domino is a supported platform
      • Domino is a developed platform
      • No-code/low-code optimization
      • Business developed applications
      • Rapid application framework

      This is the HCL Domino Logo

      Understand your tools

      Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

      Notes Archiving & Notes to SharePoint

      Summary of Vendor

      “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

      Tools

      Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

      Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

      Headquarters

      Croatia

      Best fit

      • Application archive and retire
      • Migration to SharePoint

      This is an image of the SwingSoftware Logo

      * swingsoftware.com

      Domino Migration to SharePoint

      Summary of Vendor

      “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

      Tools

      Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

      Rivive Me: Migrate Notes Domino applications to an enterprise web application

      Headquarters

      Canada

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the RiVit Logo

      * rivit.ca

      Lotus Notes to M365

      Summary of Vendor

      “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

      Tools

      SkyBow Studio: The low-code platform fully integrated into Microsoft 365

      Headquarters:

      Switzerland

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the SkyBow Logo

      * skybow.com | About skybow

      Notes to SharePoint Migration

      Summary of Vendor

      “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

      Tools

      CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

      Headquarters

      United Kingdom

      Best fit

      • Application replatform
      • Migration to SharePoint

      This is an image of the CIMtrek Logo

      * cimtrek.com | About CIMtrek

      Domino replatform/Rapid application selection framework

      Summary of Vendor

      “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

      Tools

      4WS.Platform is available in two editions: Community and Enterprise.
      The Platform Enterprise Edition, allows access with an optional support pack.

      4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

      The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

      Headquarters

      Italy

      Best fit

      • Application replatform

      This is an image of the 4WS PLATFORM Logo

      * 4wsplatform.org

      Activity

      Understand your Domino options

      Application Rationalization Exercise

      Info-Tech Insight

      Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      This activity involves the following participants:

      • IT strategic direction decision-makers.
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating platforms for mission-critical applications.

      Outcomes of this step:

      • Completed Application Rationalization Tool

      Application rationalization exercise

      Use this Application Rationalization Tool to input the outcomes of your various application assessments

      In the Application Entry tab:

      • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

      In the Business Value & TCO Comparison tab, determine rationalization priorities.

      • Input your business value scores and total cost of ownership (TCO) of applications.
      • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

      In the Disposition Selection tab:

      • Add to or adapt our list of dispositions as appropriate.

      In the Rationalization Inputs tab:

      • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
      • Input the results of your various assessments for each application.

      In the Disposition Settings tab:

      • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

      In the Disposition Recommendations tab:

      • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

      In the Timeline Considerations tab:

      • Enter the estimated timeline for when you execute your dispositions.

      In the Portfolio Roadmap tab:

      • Review and present your roadmap and rationalization results.

      Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

      This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

      Info-Tech Insight

      Watch out for misleading scores that result from poorly designed criteria weightings.

      Related Info-Tech Research

      Build an Application Rationalization Framework

      Manage your application portfolio to minimize risk and maximize value.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Darin Stahl, Principal Research Advisor,
      Info-Tech Research Group

      Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy Cheeseman, Practice Lead,
      Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Research Contributors

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

      Bibliography

      Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

      “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

      McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

      Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

      Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

      Secure IT-OT Convergence

      • Buy Link or Shortcode: {j2store}382|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,499 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations

      IT and OT are both very different complex systems. However, significant benefits have driven OT to be converged to IT. This results in IT security leaders, OT leaders and their teams' facing challenges in:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.

      Our Advice

      Critical Insight

      • Returning to isolated OT is not beneficial for the organization, therefore IT and OT need to learn to collaborate starting with communication to build trust and to overcome differences between IT and OT. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and metrics for OT security.
      • Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.
      • OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT-OT based on negotiation and this needs top-down support.

      Impact and Result

      Info-Tech’s approach in preparing for IT/OT convergence in the planning phase is coordination and collaboration of IT and OT to

      • initiate communication to define roles and responsibilities.
      • establish governance and build cross-functional team.
      • identify convergence components and compliance obligations.
      • assess readiness.

      Secure IT/OT Convergence Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Secure IT/OT Convergence Storyboard – A step-by-step document that walks you through how to secure IT-OT convergence.

      Info-Tech provides a three-phase framework of secure IT/OT convergence, namely Plan, Enhance, and Monitor & Optimize. The essential steps in Plan are to:

    • Initiate communication to define roles and responsibilities.
    • Establish governance and build a cross-functional team.
    • Identify convergence components and compliance obligations.
    • Assess readiness.
      • Secure IT/OT Convergence Storyboard

      2. Secure IT/OT Convergence Requirements Gathering Tool – A tool to map organizational goals to secure IT-OT goals.

      This tool serves as a repository for information about the organization, compliance, and other factors that will influence your IT/OT convergence.

      • Secure IT/OT Convergence Requirements Gathering Tool

      3. Secure IT/OT Convergence RACI Chart Tool – A tool to identify and understand the owners of various IT/OT convergence across the organization.

      A critical step in secure IT/OT convergence is populating a RACI (Responsible, Accountable, Consulted, and Informed) chart. The chart assists you in organizing roles for carrying out convergence steps and ensures that there are definite roles that different individuals in the organization must have. Complete this tool to assign tasks to suitable roles.

      • Secure IT/OT Convergence RACI Chart Tool
      [infographic]

      Further reading

      Secure IT/OT Convergence

      Create a holistic IT/OT security culture.

      Analyst Perspective

      Are you ready for secure IT/OT convergence?

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating into the IT ecosystem, primarily to improve access via connectivity and to leverage other standard IT capabilities for economic benefit.

      In the past, OT systems were engineered to be air gapped, relying on physical protection and with little or no security in design, (e.g. OT protocols without confidentiality properties). However, now, OT has become dependent on the IT capabilities of the organization, thus OT inherits IT’s security issues, that is, OT is becoming more vulnerable to attack from outside the system. IT/OT convergence is complex because the culture, policies, and rules of IT are quite foreign to OT processes such as change management, and the culture, policies, and rules of OT are likewise foreign to IT processes.

      A secure IT/OT convergence can be conceived of as a negotiation of a strong treaty between two systems: IT and OT. The essential initial step is to begin with communication between IT and OT, followed by necessary components such as governing and managing OT security priorities and accountabilities, converging security controls between IT and OT environments, assuring compliance with regulations and standards, and establishing metrics for OT security.

      Photo of Ida Siahaan, Research Director, Security and Privacy Practice, Info-Tech Research Group. Ida Siahaan
      Research Director, Security and Privacy Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      IT and OT are both very different complex systems. However, significant benefits have driven OT to converge with IT. This results in IT security leaders, OT leaders, and their teams facing challenges with:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.
      Common Obstacles
      • IT/OT network segmentation and remote access issues, as most OT incidents indicate that the attackers gained access through the IT network, followed by infiltration into OT networks.
      • OT proprietary devices and unsecure protocols use outdated systems which may be insecure by design.
      • Different requirements of OT and IT security – i.e. IT (confidentiality, integrity, and availability) vs. OT (safety, reliability, and availability).
      Info-Tech’s Approach

      Info-Tech’s approach in preparing for IT/OT convergence (i.e. the Plan phase) is coordination and collaboration of IT and OT to:

      • Initiate communication to define roles and responsibilities.
      • Establish governance and build a cross-functional team.
      • Identify convergence components and compliance obligations.
      • Assess readiness.

      Info-Tech Insight

      Returning to isolated OT is not beneficial for the organization, so IT and OT need to learn to collaborate, starting with communication to build trust and to overcome their differences. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and establishing metrics for OT security.

      Consequences of unsecure IT/OT convergence

      OT systems were built with no or little security design

      90% of organizations that use OT experienced a security incident. (Fortinet, 2021. Ponemon, 2019.)

      Bar graph comparing three years, 2019-2021, of four different OT security incidents: 'Ransomeware', 'Insider breaches', 'Phishing', and 'Malware'.
      (Source: Fortinet, 2021.)
      Lack of visibility

      86% of OT security-related service engagements lack complete visibility of OT network in 2021 (90% in 2020, 81% in 2019). (Source: “Cybersecurity Year In Review” Dragos, 2022.)

      The need for secure IT/OT convergence

      Important Industrial Control System (ICS) cyber incidents

      2000
      Target: Australian sewage plant. Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.
      2012
      Target: Middle East energy companies. Method: Shamoon. Impact: Overwritten Windows-based systems files.
      2014
      Target: German Steel Mill. Method: Spear-phishing. Impact: Blast furnace failed to shut down.
      2017
      Target: Middle East safety instrumented system (SIS). Method: TRISIS/TRITON. Impact: Modified SIS ladder logic.
      2022
      Target: Viasat’s KA-SAT network. Method: AcidRain. Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat’s services.
      Timeline of Important Industrial Control System (ICS) cyber incidents.
      1903
      Target: Marconi wireless telegraph presentation. Method: Morse code. Impact: Fake message sent “Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily.”
      2010
      Target: Iranian uranium enrichment plant. Method: Stuxnet. Impact: Compromised programmable logic controllers (PLCs).
      2013
      Target: ICS supply chain. Method: Havex. Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers
      2016
      Target: Ukrainian power grid. Method: BlackEnergy. Impact: For 1-6 hours, power outages for 230,000 consumers.
      2021
      Target: Colonial Pipeline. Method: DarkSide ransomware. Impact: Compromised billing infrastructure halted the pipeline operation.

      (Source: US Department of Energy, 2018.


      ”Significant Cyber Incidents,” CSIS, 2022


      MIT Technology Review, 2022.)

      Info-Tech Insight

      Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

      Case Study

      Horizon Power
      Logo for Horizon Power.
      INDUSTRY
      Utilities
      SOURCE
      Interview

      Horizon Power is the regional power provider in Western Australia and stands out as a leader not only in the innovative delivery of sustainable power, but also in digital transformation. Horizon Power is quite mature in distributed energy resource management; moving away from centralized generation to decentralized, community-led generation, which reflects in its maturity in converging IT and OT.

      Horizon Power’s IT/OT convergence journey started over six years ago when advanced metering infrastructure (AMI) was installed across its entire service area – an area covering more than one quarter of the Australian continent.

      In these early days of the journey, the focus was on leveraging matured IT approaches such as adoption of cloud services to the OT environment, rather than converging the two. Many years later, Horizon Power has enabled OT data to be more accessible to derive business benefits such as customer usage data using data analytics with the objective of improving the collection and management of the OT data to improve business performance and decision making.

      The IT/OT convergence meets legislation such as the Australian Energy Sector Cyber Security Framework (AESCSF), which has impacts on the architectural layer of cybersecurity that support delivery of the site services.

      Results

      The lessons learned in converging IT and OT from Horizon Power were:

      • Start with forming relationships to build trust and overcome any divide between IT and OT.
      • Collaborate with IT and OT teams to successfully implement solutions, such as vulnerability management and discovery tools for OT assets.
      • Switch the focus from confidentiality and integrity to availability in solutions evaluation
      • Develop training and awareness programs for all levels of the organization.
      • Actively encourage visible sponsorship across management by providing regular updates and consistent messaging.
      • Monitor cybersecurity metrics such as vulnerabilities, mean time to treat vulnerabilities, and intrusion attempts.
      • Manage third-party vendors using a platform which not only performs external monitoring but provides third-party vendors with visibility or potential threats in their organization.

      The Secure IT/OT Convergence Framework

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating onto the IT ecosystem, to improve access via the internet and to leverage other standard IT capabilities. However, IT and OT are historically very different, and without careful calculation, simply connecting the two systems will result in a problem. Therefore, IT and OT need to learn to live together starting with communication to build trust and to overcome differences between IT and OT.
      Convergence Elements
      • Process convergence
      • Software and data convergence
      • Network and infrastructure convergence
      Target Groups
      • OT leader and teams
      • IT leader and teams
      • Security leader and teams
      Security Components
      • Governance and compliance
      • Security strategy
      • Risk management
      • Security policies
      • IR, DR, BCP
      • Security awareness and training
      • Security architecture and controls

      Plan

      • Initiate communication
      • Define roles and responsibilities
      • Establish governance and build a cross-functional team
      • Identify convergence elements and compliance obligations
      • Assess readiness

      Governance

      Compliance

      Enhance

      • Update security strategy for IT/OT convergence
      • Update risk-management framework for IT/OT convergence
      • Update security policies and procedures for IT/OT convergence
      • Update incident response, disaster recovery, and business continuity plan for IT/OT convergence

      Security strategy

      Risk management

      Security policies and procedures

      IR, DR, and BCP

      Monitor &
      Optimize

      • Implement awareness, induction, and cross-training program
      • Design and deploy converging security architecture and controls
      • Establish and monitor IT/OT security metrics on effectiveness and efficiency
      • Red-team followed by blue-team activity for cross-functional team building

      Awareness and cross-training

      Architecture and controls

      Phases
      Color-coded phases with arrows looping back up from the bottom to top phase.
      • Plan
      • Enhance
      • Monitor & Optimize
      Plan Outcomes
      • Mapping business goals to IT/OT security goals
      • RACI chart for priorities and accountabilities
      • Compliance obligations register
      • Readiness checklist
      Enhance Outcomes
      • Security strategy for IT/OT convergence
      • Risk management framework
      • Security policies & procedures
      • IR, DR, BCP
      Monitor & Optimize Outcomes
      • Security awareness and training
      • Security architecture and controls
      Plan Benefits
      • Improved flexibility and less divided IT/OT
      • Improved compliance
      Enhance Benefits
      • Increased strategic common goals
      • Increased efficiency and versatility
      Monitor & Optimize Benefits
      • Enhanced security
      • Reduced costs

      Plan

      Initiate communication

      To initiate communication between the IT and OT teams, it is important to understand how the two groups are different and to build trust to find a holistic approach which overcomes those differences.
      IT OT
      Remote Access Well-defined access control Usually single-level access control
      Interfaces Human Machine, equipment
      Software ERP, CRM, HRIS, payroll SCADA, DCS
      Hardware Servers, switches, PCs PLC, HMI, sensors, motors
      Networks Ethernet Fieldbus
      Focus Reporting, communication Up-time, precision, safety
      Change management Frequent updates and patches Infrequent updates and patches
      Security Confidentiality, integrity, availability Safety, reliability, availability
      Time requirement Normally not time critical Real time

      Info-Tech Insight

      OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT and OT based on negotiation, and this needs top-down support.

      Identifying organization goals is the first step in aligning your secure IT/OT convergence with your organization’s vision.

      • Security leaders need to understand the direction the organization is headed in.
      • Wise security investments depend on aligning your security initiatives to the organization.
      • Secure IT/OT convergence should contribute to your organization’s objectives by supporting operational performance and ensuring brand protection and shareholder value.

      Map organizational goals to IT/OT security goals

      Input: Corporate, IT, and OT strategies

      Output: Your goals for the security strategy

      Materials: Secure IT/OT Convergence Requirements Gathering Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader, Compliance, Legal, Risk management

      1. As a group, brainstorm organization goals.
        1. Review relevant corporate, IT, and OT strategies.
      2. Record the most important business goals in the Secure IT/OT Convergence Requirements Gathering Tool. Try to limit the number of business goals to no more than 10 goals. This limitation will be critical to helping focus on your secure IT/OT convergence.
      3. For each goal, identify one to two security alignment goals. These should be objectives for the security strategy that will support the identified organization goals.

      Download the Secure IT/OT Convergence Requirements Gathering Tool

      Record organizational goals

      Sample of the definitions table with columns numbered 1-4.

      Refer to the Secure IT/OT Convergence Framework when filling in the following elements.

      1. Record your identified organization goals in the Goals Cascade tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      2. For each of your organizational goals, identify IT alignment goals.
      3. For each of your organizational goals, identify OT alignment goals.
      4. For each of your organizational goals, select one to two IT/OT security alignment goals from the drop-down lists.

      Establish scope and boundaries

      It is important to know at the outset of the strategy: What are we trying to secure in IT/OT convergence ?
      This includes physical areas we are responsible for, types of data we care about, and departments or IT/OT systems we are responsible for.

      This also includes what is not in scope. For some outsourced services or locations, you may not be responsible for their security. In some business departments, you may not have control of security processes. Ensure that it is made explicit at the outset what will be included and what will be excluded from security considerations.

      Physical Scope and Boundaries

      • How many offices and locations does your organization have?
      • Which locations/offices will be covered by your information security management system (ISMS)?
      • How sensitive is the data residing at each location?
      • You may have many physical locations, and it is not necessary to list each one. Rather, list exceptional cases that are specifically in or out of scope.

      IT Systems Scope and Boundaries

      • There may be hundreds of applications that are run and maintained in your organization. Some of these may be legacy applications. Do you need to secure all your programs or only a select few?
      • Is the system owned or outsourced?
      • Where are you accountable for security?
      • How sensitive is the data that each system handles?

      Organizational Scope and Boundaries

      • Will your ISMS cover all departments within your organization? For example, do certain departments (e.g. operations) not need any security coverage?
      • Do you have the ability to make security decisions for each department?
      • Who are the key stakeholders/data owners for each department?

      OT Systems Scope and Boundaries

      • There may be hundreds of OT systems that are run and maintained in your organization. Do you need to secure all OT or a select subset?
      • Is the system owned or outsourced?
      • Where are you accountable for safety and security?
      • What reliability requirements does each system handle?

      Record scope and boundaries

      Sample Scope and Boundaries table. Refer to the Secure IT/OT Convergence Framework when filling in the following elements:
      • Record your security-related organizational scope, physical location scope, IT systems scope, and OT systems scope in the Scope tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      • For each item scoped, give the rationale for including it in the comments column. Careful attention should be paid to any elements that are not in scope.

      Plan

      Define roles and responsibilities

      Input: List of relevant stakeholders

      Output: Roles and responsibilities for the secure IT/OT convergence program

      Materials: Secure IT/OT Convergence RACI Chart Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader

      There are many factors that impact an organization’s level of effectiveness as it relates to IT/OT convergence. How the two groups interact, what skill sets exist, the level of clarity around roles and responsibilities, and the degree of executive support and alignment are only a few. Thus, it is imperative in the planning phase to identify stakeholders who are:

      • Responsible: The people who do the work to accomplish the activity; they have been tasked with completing the activity and/or getting a decision made.
      • Accountable: The person who is accountable for the completion of the activity. Ideally, this is a single person and will often be an executive or program sponsor.
      • Consulted: The people who provide information. This is usually several people, typically called subject matter experts (SMEs).
      • Informed: The people who are updated on progress. These are resources that are affected by the outcome of the activities and need to be kept up to date.

      Download the Secure IT/OT Convergence RACI Chart Tool

      Define RACI Chart

      Sample RACI chart with only the 'Plan' section enlarged.

      Define responsible, accountable, consulted, and informed (RACI) stakeholders.
      1. Customize the "work units" to best reflect your operation with applicable stakeholders.
      2. Customize the "action“ rows as required.
      Info-Tech Insight

      The roles and responsibilities should be clearly defined. For example, IT network should be responsible for the communication and configuration of all access points and devices from the remote client to the control system DMZ, and controls engineering should be responsible from the control system DMZ to the control system.

      Plan

      Establish governance and build cross-functional team

      To establish governance and build an IT/OT cross-functional team, it is important to understand the operation of OT systems and their interactions with IT within the organization, e.g. ad hoc, centralized, decentralized.

      The maturity ladder with levels 'Fully Converged', 'Collaborative Partners', 'Trusted Resources', 'Affiliated Entities', and 'Siloed' at the bottom. Each level has four maturity indicators listed.

      Info-Tech Insight

      To determine IT/OT convergence maturity level, Info-Tech provides the IT/OT Convergence Self-Evaluation Tool.

      Centralized security governance model example

      Example of a centralized security governance model.

      Plan

      Identify convergence elements and compliance obligations

      To switch the focus from confidentiality and integrity to safety and availability for OT system, it is important to have a common language such as the Purdue model for technical communication.
      • A lot of OT compliance standards are technically focused and do not address governance and management, e.g. IT standards like the NIST Cybersecurity Framework. For example, OT system modeling with Purdue model will help IT teams to understand assets, networking, and controls. This understanding is needed to know the possible security solutions and where these solutions could be embedded to the OT system with respect to safety, reliability, and availability.
      • However, deployment of technical solutions or patches to OT system may nullify warranty, so arrangements should be made to manage this with the vendor or manufacturer prior to modification.
      • Finally, OT modernizations such as smart grid together with the advent of IIoT where data flow is becoming less hierarchical have encouraged the birth of a hybrid Purdue model, which maintains segmentation with flexibility for communications.

      Level 5: Enterprise Network

      Level 4: Site Business

      Level 3.5: DMZ
      Example: Patch Management Server, Application Server, Remote Access Server

      Level 3: Site Operations
      Example: SCADA Server, Engineering Workstation, Historian

      Level 2: Area Supervisory Control
      Example: SCADA Client, HMI

      Level 1: Basic Control
      Example: Batch Controls, Discrete Controls, Continuous Process Controls, Safety Controls, e.g. PLCs, RTUs

      Level 0: Process
      Example: Sensors, Actuators, Field Devices

      (Source: “Purdue Enterprise Reference Architecture (PERA) Model,” ISA-99.)

      Identify compliance obligations

      To manage compliance obligations, it is important to use a platform which not only performs internal and external monitoring, but also provides third-party vendors with visibility on potential threats in their organization.
      Example table of compliance obligations standards. Example tables of compliance obligations regulations and guidelines.

      Source:
      ENISA, 2013
      DHS, 2009.

      • OT system has compliance obligations with industry regulations and security standards/regulations/guidelines. See the lists given. The lists are not exhaustive.
      • OT system owner can use the standards/regulations/guidelines as a benchmark to determine and manage the security level provided by third parties.
      • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations, e.g. IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series.

      IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series

      International series of standards for asset owners, system integrators, and product manufacturers.
      Diagram of the international series of standards for asset owners.
      (Source: Cooksley, 2021)
      • IEC/ISA 62443 is a comprehensive international series of standards covering security for ICS systems, which recognizes three roles, namely: asset owner, system integrator, and product manufacturer.
      • In IEC/ISA 62443, requirements flow from the asset owner to the product manufacturer, while solutions flow in the opposite direction.
      • For the asset owner who owns and operates a system, IEC 62443-2 enables defining target security level with reference to a threat level and using the standard as a benchmark to determine the current security level.
      • For the system integrator, IEC 62443-3 assists to evaluate the asset owner’s requirements to create a system design. IEC 62443-3 also provides a method for verification that components provided by the product manufacturer are securely developed and support the functionality required.

      Record your compliance obligations

      Refer to the “Goals Cascade” tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      1. Identify your compliance obligations. Most organizations have compliance obligations that must be adhered to. These can include both mandatory and voluntary obligations. Mandatory obligations include:
        1. Laws
        2. Government regulations
        3. Industry standards
        4. Contractual agreements
        Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your secure IT/OT convergence, include only those that have OT security requirements.
      2. Record your compliance obligations, along with any notes, in your copy of the Secure IT/OT Convergence Requirements Gathering Tool.
      3. Refer to the “Compliance DB” tab for lists of standards/regulations/guidelines.
      Table of mandatory and voluntary security compliance obligations.

      Plan

      Assess readiness

      Readiness checklist for secure IT/OT convergence

      People

      • Define roles and responsibilities on interaction based on skill sets and the degree of support and alignment.
      • Adopt well-established security governance practices for cross-functional teams.
      • Analyze and develop skills required by implementing awareness, induction, and cross-training program.

      Process

      • Conduct a maturity assessment of key processes and highlight interdependencies.
      • Redesign cybersecurity processes for your secure IT/OT convergence program.
      • Develop a baseline and periodically review on risks, security policies and procedures, incident response, disaster recovery, and business continuity plan.

      Technology

      • Conduct a maturity assessment and identify convergence elements and compliance obligations.
      • Develop a roadmap and deploy converging security architecture and controls step by step, working with trusted technology partners.
      • Monitor security metrics on effectiveness and efficiency and conduct continuous testing by red-team and blue-team activities.

      (Source: “Grid Modernization: Optimize Opportunities And Minimize Risks,” Info-Tech)

      Enhance

      Update security strategy

      To update security strategy, it is important to actively encourage visible sponsorship across management and to provide regular updates.

      Cycle for updating security strategy: 'Architecture design', 'Procurement', 'Installation', 'Maintenance', 'Decommissioning'.
      (Source: NIST SP 800-82 Rev.3, “Guide to Operational Technology (OT) Security,” NIST, 2022.)
      • OT system life cycle is like the IT system life cycle, starting with architectural design and ending with decommissioning.
      • Currently, IT only gets involved from installation or maintenance, so they may not fully understand the OT system. Therefore, if OT security is compromised, the same personnel who commissioned the OT system (e.g. engineering, electrical, and maintenance specialists) must be involved. Thus, it is important to have the IT team collaborate with the OT team in each stage of the OT system’s life cycle.
      • Finally, it is necessary to have propositional sharing of responsibilities between IT leaders, security leaders, and OT leaders who have broader responsibilities.

      Enhance

      Update risk management framework

      The need for asset and threat taxonomy

      • One of issues in IT/OT convergence is that OT systems focus on production, so IT solutions like security patching or updates may deteriorate a machine or take a machine offline and may not be applicable. For example, some facilities run with reliability of 99.999%, which only allows maximum of 5 minutes and 35 seconds or less of downtime per year.
      • Managing risks requires an understanding of the assets and threats for IT/OT systems. Having a taxonomy of the assets and the threats cand help.
      • Applying normal IT solutions to mitigate security risks may not be applicable in an OT environment, e.g. running an antivirus tool on OT system may remove essential OT operations files. Thus, this approach must be avoided; instead, systems must be rebuilt from golden images.
      Risk management framework.
      (Source: ENISA, 2018.)

      Enhance

      Update security policies and procedures

      • Policy is the link between people, process, and technology for any size of organization. Small organizations may think that having formal policies in place is not necessary for their operations, but compliance is applicable to all organizations, and vulnerabilities affect organizations of all sizes as well. Small organizations partnering with clients or other organizations are sometimes viewed as ideal proxies for attackers.
      • Updating security policies to align with the OT system so that there is a uniform approach to securing both IT and OT environments has several benefits. For example, enhancing the overall security posture as issues are pre-emptively avoided, being better prepared for auditing and compliance requirements, and improving governance especially when OT governance is weak.
      • In updating security policies, it is important to redefine the policy framework to include the OT framework and to prioritize the development of security policies. For example, entities that own or manage US and Canadian electric power grids must comply with North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards, specifically CIP-003 for Policy and Governance. This can be achieved by understanding the current state of policies and by right-sizing the policy suite based on a policy hierarchy.
      The White House released an Executive Order on Improving the Nation’s Cybersecurity (EO 14028) in 2021 that establishes new requirements on the scope of protection and security policy such that it must include both IT and OT.

      Policy hierarchy example

      This example of a policy hierarchy features templates from Info-Tech’s Develop and Deploy Security Policies and Identify the Best Framework for Your Security Policies research.

      Example policy hierarchy with four levels, from top-down: 'Governance', 'Process-based policies', 'Prescriptive/ technical (for IT including OT elements)', 'Prescriptive/ technical (for users)'.

      Enhance

      Update IR, DR, and BCP

      A proactive approach to security is important, so actions such as updating and testing the incident response plan for OT are a must. (“Cybersecurity Year In Review” Dragos, 2022.)

      1. Customize organizational chart for IT/OT IR, DR, BCP based on governance and management model.
        E.g. ad hoc, internal distributed, internal centralized, combined distributed, and decentralized. (Software Engineering Institute, 2003)
      2. Adjust the authority of the new organizational chart and decide if it requires additional staffing.
        E.g. full authority, shared authority. (Software Engineering Institute, 2003)
      3. Update IR plan, DR plan, and BCP for IT/OT convergence.
        E.g. incorporate zero trust principles for converge network
      4. Testing updated IR plan, DR plan, and BCP.

      Optimize

      Implement awareness, induction, and cross-training

      To develop training and awareness programs for all levels of the organization, it is important to understand the common challenges in IT security that also affect secure IT/OT convergence and how to overcome those challenges.

      Alert Fatigue

      Too many false alarms, too many events to process, and an evolving threat landscape that wastes analysts’ valuable time on mundane tasks such as evidence collection. Meanwhile, only limited time is given for decision and conclusion, which results in fear of missing an incident and alert fatigue.

      Skill Shortages

      Obtaining and retaining cybersecurity-skilled talent is challenging. Organizations need to invest in the people, but not all organizations will be able to invest sufficiently to have their own dedicated security team.

      Lack of Insight

      To report progress, clear metrics are needed. However, cybersecurity still falls short in this area, as the system itself is complex, and much work is siloed. Furthermore, lessons learned are not yet distilled into insights yet for improving future accuracy.

      Lack of Visibility

      Ensuring complete visibility of the threat landscape, risks, and assets requires system integration and consistent workflow across the organization, and the convergence of OT, IoT, and IT enhances this challenge (e.g. machines cannot be scanned during operational uptime).
      (Source: Security Intelligence, 2020.)
      “Cybersecurity staff are feeling burnout and stressed to the extent that many are considering leaving their jobs.” (Danny Palmer, ZDNET News, 2022)

      Awareness may not correspond to readiness

      • An issue with IT/OT convergence training and awareness happens when awareness exists, but the personnel are trained only for IT security and are not trained for OT-specific security. For example, some organizations still use generic topics such as not opening email attachments, when the personnel do not even operate using email nor in a web browsing environment. (“Assessing Operational Readiness,” Dragos, 2022)
      • Meanwhile, as is the case with IT, OT security training topics are broad, such as OT threat intelligence, OT-specific incident response, and tabletop exercises.
      • Hence, it requires the creation of a training program development plan that considers the various audiences and topics and maps them accordingly.
      • Moreover, roles are also evolving due to convergence and modernization. These new roles require an integrative skill set. For example, the grid security & ops team might consist of an IT security specialist, SCADA technician/engineer, and OT/IIOT security specialist where OT/IIOT security specialist is a new role. (Grid Modernization: Optimize Opportunities and Minimize Risks,” Info-Tech)
      • In conclusion, it is important to approach talent development with an open mind. The ability to learn and flexibility in the face of change are important attributes, and technical skill sets can be improved with certifications and training.
      “One area regularly observed by Dragos is a weakness in overall cyber readiness and training tailored specific to the OT environment.” (“Assessing Operational Technology,” Dragos, 2022.)

      Certifications

      What are the options?
      • One of issues in certification is the complexity on relevancy in topics with respect to roles and levels.
      • An example solution is the European Union Agency for Cybersecurity (ENISA)’s approach to analyzing existing certifications by orientation, scope, and supporting bodies, grouped into specific certifications, relevant certifications, and safety certifications.

      Specific cybersecurity certification of ICS/SCADA
      Example: ISA-99/IEC 62443 Cybersecurity Certificate Program, GIAC Global Industrial Cyber Security Professional (GICSP), Certified SCADA Security Architect (CSSA), EC-Council ICS/SCADA Cybersecurity Training Course.

      Other relevant certification schemes
      Example: Network and Information Security (NIS) Driving License, ISA Certified Automation Professional (CAP), Industrial Security Professional Certification (NCMS-ISP).

      Safety Certifications
      Example: Board of Certified Safety Professionals (BCSP), European Network of Safety and Health Professional Organisations (ENSHPO).

      Order of certifications with 'Orientation' at the top, 'Scope', then 'Support'.(Source: ENISA, 2015.)

      Optimize

      Design and deploy converging security architecture and controls

      • IT/OT convergence architecture can be modeled as a layered structure based on security. In this structure, the bottom layer is referred as “OT High-Security Zone” and the topmost layer is “IT Low-Security Zone.” In this model, each layer has its own set of controls configured and acts like an additional layer of security for the zone underneath it.
      • The data flows from the “OT High-Security Zone” to the topmost layer, the “IT Low-Security Zone,” and the traffic must be verified to pass to another zone based on the need-to-know principle.
      • In the normal control flow within the “OT High-Security Zone” from level 3 to level 0, the traffic must be verified to pass to another level based on the principle of least privilege.
      • Remote access (dotted arrow) is allowed under strict access control and change control based on the zero-trust principle with clear segmentation and a point for disconnection between the “OT High-Security Zone” and the “OT Low-Security Zone”
      • This model simplifies the security process, as if the lower layers have been compromised, then the compromise can be confined on that layer, and it also prevents lateral movement as access is always verified.
      Diagram for the deployments of converging security architecture.(Source: “Purdue Enterprise Reference Architecture (PERA) model,” ISA-99.)

      Off-the-shelf solutions

      Getting the right recipe: What criteria to consider?

      Image of a shopping cart with the four headlines on the right listed in order from top to bottom.
      Icon of an eye crossed out. Visibility and Asset Management

      Passive data monitoring using various protocol layers, active queries to devices, or parsing configuration files of OT, IoT, and IT environments on assets, processes, and connectivity paths.

      Icon of gears. Threat Detection, Mitigation, and Response (+ Hunting)

      Automation of threat analysis (signature-based, specification-based, anomaly-based, sandboxing) not only in IT but also in relevant environments, e.g. IoT, IIoT, and OT on assets, data, network, and orchestration with threat intelligence sharing and analytics.

      Icon of a check and pen. Risk Assessment and Vulnerability Management

      Risk scoring approach (qualitative, quantitative) based on variables such as behavioral patterns and geolocation. Patching and vulnerability management.

      Icon of a wallet. Usability, Architecture, Cost

      The user and administrative experience, multiple deployment options and extensive integration capabilities, and affordability.

      Optimize

      Establish and monitor IT/OT security metrics for effectiveness and efficiency

      Role of security metrics in a cybersecurity program (EPRI, 2017.)
      • Requirements for secure IT/OT are derived from mandatory or voluntary compliance, e.g. NERC CIP, NIST SP 800-53.
      • Frameworks for secure IT/OT are used to build and implement security, e.g. NIST CSF, AESCSF.
      • Maturity of secure IT/OT is used to measure the state of security, e.g. C2M2, CMMC.
      • Security metrics have the role of measuring effectiveness and efficiency.

      Icon of a person ascending stairs.
      Safety

      OT interfaces with the physical world. Thus, metrics based on risks related with life, health, and safety are crucial. These metrics motivate personnel by making clear why they should care about security. (EPRI, 2017.)

      Icon of a person ascending stairs.
      Business Performance

      The impact of security on the business can be measured in various metrics such as operational metrics, service level agreements (SLAs), and financial metrics. (BMC, 2022.)

      Icon of a person ascending stairs.
      Technology Performance

      Early detection will lead to faster remediation and less damage. Therefore, metrics such as maximum tolerable downtime (MTD) and mean time to recovery (MTR) indicate system reliability. (Dark Reading, 2022)

      Icon of a person ascending stairs.
      Security Culture

      The metrics for the overall quality of security culture with indicators such as compliance and audit, vulnerability management, and training and awareness.

      Further information

      Related Info-Tech Research

      Sample of 'Build an Information Security Strategy'.

      Build an Information Security Strategy

      Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations.

      This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current-state assessment, prioritizing initiatives, and building a security roadmap.

      Sample of 'Preparing for Technology Convergence in Manufacturing'.

      Preparing for Technology Convergence in Manufacturing

      Information technology (IT) and operational technology (OT) teams have a long history of misalignment and poor communication.

      Stakeholder expectations and technology convergence create the need to leave the past behind and build a culture of collaboration.

      Sample of 'Implement a Security Governance and Management Program'.

      Implement a Security Governance and Management Program

      Your security governance and management program needs to be aligned with business goals to be effective.

      This approach also helps provide a starting point to develop a realistic governance and management program.

      This project will guide you through the process of implementing and monitoring a security governance and management program that prioritizes security while keeping costs to a minimum.

      Bibliography

      Assante, Michael J. and Robert M. Lee. “The Industrial Control System Cyber Kill Chain.” SANS Institute, 2015.

      “Certification of Cyber Security Skills of ICS/SCADA Professionals.” European Union Agency for Cybersecurity (ENISA), 2015. Web.

      Cooksley, Mark. “The IEC 62443 Series of Standards: A Product Manufacturer‘s Perspective.” YouTube, uploaded by Plainly Explained, 27 Apr. 2021. Accessed 26 Aug. 2022.

      “Cyber Security Metrics for the Electric Sector: Volume 3.” Electric Power Research Institute (EPRI), 2017.

      “Cybersecurity and Physical Security Convergence.” Cybersecurity and Infrastructure Security Agency (CISA). Accessed 19 May 2022.

      “Cybersecurity in Operational Technology: 7 Insights You Need to Know,” Ponemon, 2019. Web.

      “Developing an Operational Technology and Information Technology Incident Response Plan.” Public Safety Canada, 2020. Accessed 6 Sep. 2022.

      Gilsinn, Jim. “Assessing Operational Technology (OT) Cybersecurity Maturity.” Dragos, 2021. Accessed 02 Sep. 2022.

      “Good Practices for Security of Internet of Things.” European Union Agency for Cybersecurity (ENISA), 2018. Web.

      Greenfield, David. “Is the Purdue Model Still Relevant?” AutomationWorld. Accessed 1 Sep. 2022

      Hemsley, Kevin E., and Dr. Robert E. Fisher. “History of Industrial Control System Cyber Incidents.” US Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.

      “ICS Security Related Working Groups, Standards and Initiatives.” European Union Agency for Cybersecurity (ENISA), 2013.

      Killcrece, Georgia, et al. “Organizational Models for Computer Security Incident Response Teams (CSIRTs).” Software Engineering Institute, CMU, 2003.

      Liebig, Edward. “Security Culture: An OT Survival Story.” Dark Reading, 30 Aug. 2022. Accessed 29 Aug. 2022.

      Bibliography

      O'Neill, Patrick. “Russia Hacked an American Satellite Company One Hour Before the Ukraine Invasion.” MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.

      Palmer, Danny. “Your Cybersecurity Staff Are Burned Out – And Many Have Thought About Quitting.” Zdnet, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Pathak, Parag. “What Is Threat Management? Common Challenges and Best Practices.” SecurityIntelligence, 23 Jan. 2020. Web.

      Raza, Muhammad. “Introduction To IT Metrics & KPIs.” BMC, 5 May 2022. Accessed 12 Sep. 2022.

      “Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability.” Department of Homeland Security (DHS), Oct. 2009. Web.

      Sharma, Ax. “Sigma Rules Explained: When and How to Use Them to Log Events.” CSO Online, 16 Jun. 2018. Accessed 15 Aug. 2022.

      “Significant Cyber Incidents.” Center for Strategic and International Studies (CSIS). Accessed 1 Sep. 2022.

      Tom, Steven, et al. “Recommended Practice for Patch Management of Control Systems.” Department of Homeland Security (DHS), 2008. Web.

      “2021 ICS/OT Cybersecurity Year In Review.” Dragos, 2022. Accessed 6 Sep. 2022.

      “2021 State of Operational Technology and Cybersecurity Report,” Fortinet, 2021. Web.

      Zetter, Kim. “Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed.” Black Hat USA, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Research Contributors and Experts

      Photo of Jeff Campbell, Manager, Technology Shared Services, Horizon Power, AU. Jeff Campbell
      Manager, Technology Shared Services
      Horizon Power, AU

      Jeff Campbell has more than 20 years' experience in information security, having worked in both private and government organizations in education, finance, and utilities sectors.

      Having focused on developing and implementing information security programs and controls, Jeff is tasked with enabling Horizon Power to capitalize on IoT opportunities while maintaining the core security basics of confidentiality, integrity and availability.

      As Horizon Power leads the energy transition and moves to become a digital utility, Jeff ensures the security architecture that supports these services provides safer and more reliable automation infrastructures.

      Christopher Harrington
      Chief Technology Officer (CTO)
      Carolinas Telco Federal Credit Union

      Frank DePaola
      Vice President, Chief Information Security Officer (CISO)
      Enpro

      Kwasi Boakye-Boateng
      Cybersecurity Researcher
      Canadian Institute for Cybersecurity

      Present Security to Executive Stakeholders

      • Buy Link or Shortcode: {j2store}262|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $2,000 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders find it challenging to convey the necessary information to obtain support for security objectives.
      • Changes to the threat landscape and shifts in organizational goals exacerbate the issue, as they impact security leaders' ability to prioritize topics to be communicated.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.

      Our Advice

      Critical Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and ensuring that you have met your goal.

      Impact and Result

      • Developing a thorough understanding of the security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Present Security to Executive Stakeholders Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Present Security to Executive Stakeholders – A step-by-step guide to communicating security effectively to obtain support from decision makers.

      Use this as a guideline to assist you in presenting security to executive stakeholders.

      • Present Security to Executive Stakeholders Storyboard

      2. Security Presentation Templates – A set of security presentation templates to assist you in communicating security to executive stakeholders.

      The security presentation templates are a set of customizable templates for various types of security presentation including:

      • Present Security to Executive Stakeholders Templates

      Infographic

      Further reading

      Present Security to Executive Stakeholders

      Learn how to communicate security effectively to obtain support from decision makers.

      Analyst Perspective

      Build and deliver an effective security communication to your executive stakeholders.

      Ahmad Jowhar

      As a security leader, you’re tasked with various responsibilities to ensure your organization can achieve its goals while its most important assets are being protected.

      However, when communicating security to executive stakeholders, challenges can arise in determining what topics are pertinent to present. Changes in the security threat landscape coupled with different business goals make identifying how to present security more challenging.

      Having a communication framework for presenting security to executive stakeholders will enable you to effectively identify, develop, and deliver your communication goals while obtaining the support you need to achieve your objectives.

      Ahmad Jowhar
      Research Specialist, Security & Privacy

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Many security leaders struggle to decide what to present and how to present security to executive stakeholders.
      • Constant changes in the security threat landscape impacts a security leader’s ability to prioritize topics to be communicated.
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.
      • Developing a thorough understanding of security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Info-Tech Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Your challenge

      As a security leader, you need to communicate security effectively to executive stakeholders in order to obtain support for your security objectives.

      • When it comes to presenting security to executive stakeholders, many security leaders find it challenging to convey the necessary information in order to obtain support for security objectives.
      • This is attributed to various factors, such as an increase in the threat landscape, changes to industry regulations and standards, and new organizational goals that security has to align with.
      • Furthermore, with the limited time to communicate with executive stakeholders, both in frequency and duration, identifying the most important information to address can be challenging.

      76% of security leaders struggle in conveying the effectiveness of a cybersecurity program.

      62% find it difficult to balance the risk of too much detail and need-to-know information.

      41% find it challenging to communicate effectively with a mixed technical and non-technical audience.

      Source: Deloitte, 2022

      Common obstacles

      There is a disconnect between security leaders and executive stakeholders when it comes to the security posture of the organization:

      • Executive stakeholders are not confident that their security leaders are doing enough to mitigate security risks.
      • The issue has been amplified, with security threats constantly increasing across all industries.
      • However, security leaders don’t feel that they are in a position to make themselves heard.
      • The lack of organizational security awareness and support from cross-functional departments has made it difficult to achieve security objectives (e.g. education, investments).
      • Defining an approach to remove that disconnect with executive stakeholders is of utmost importance for security leaders, in order to improve their organization’s security posture.

      9% of boards are extremely confident in their organization’s cybersecurity risk mitigation measures.

      77% of organizations have seen an increase in the number of attacks in 2021.

      56% of security leaders claimed their team is not involved when leadership makes urgent security decisions.

      Source: EY, 2021
      The image contains a screenshot of an Info-Tech Thoughtmodel titled: Presenting Security to Executive Stakeholders.

      Info-Tech’s methodology for presenting security to executive stakeholders

      1. Identify communication goals

      2. Collect information to support goals

      3. Develop communication

      4. Deliver communication

      Phase steps

      1. Identify drivers for communicating to executives
      2. Define your goals for communicating to executives
      1. Identify data to collect
      2. Plan how to retrieve data
      1. Plan communication
      2. Build a compelling communication document
      1. Deliver a captivating presentation
      2. Obtain/verify goals

      Phase outcomes

      A defined list of drivers and goals to help you develop your security presentations

      A list of data sources to include in your communication

      A completed communication template

      A solidified understanding of how to effectively communicate security to your stakeholders

      Develop a structured process for communicating security to your stakeholders

      Security presentations are not a one-way street
      The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Identifying your goals is the foundation of an effective presentation
      Defining your drivers and goals for communicating security will enable you to better prepare and deliver your presentation, which will help you obtain your desired outcome.

      Harness the power of data
      Leveraging data and analytics will help you provide quantitative-based communication, which will result in a more meaningful and effective presentation.

      Take your audience on a journey
      Developing a storytelling approach will help engage with your audience.

      Win your audience by building a rapport
      Establishing credibility and trust with executive stakeholders will enable you to obtain their support for security objectives.

      Tactical insight
      Conduct background research on audience members (i.e. professional background) to help understand how best to communicate with them and overcome potential objections.

      Tactical insight
      Verifying your objectives at the end of the communication is important, as it ensures you have successfully communicated to executive stakeholders.

      Project deliverables

      This blueprint is accompanied by a supporting deliverable which includes five security presentation templates.

      Report on Security Initiatives
      Template showing how to inform executive stakeholders of security initiatives.

      Report on Security Initiatives.

      Security Metrics
      Template showing how to inform executive stakeholders of current security metrics that would help drive future initiatives.

      Security Metrics.

      Security Incident Response & Recovery
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Incident Response & Recovery

      Security Funding Request
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Funding Request

      Key template:

      Security and Risk Update

      Template showing how to inform executive stakeholders of proactive security and risk initiatives.

      Blueprint benefits

      IT/InfoSec benefits

      Business benefits

      • Reduce effort and time spent preparing cybersecurity presentations for executive stakeholders by having templates to use.
      • Enable security leaders to better prepare what to present and how to present it to their executive stakeholders, as well as driving the required outcomes from those presentations.
      • Establish a best practice for communicating security and IT to executive stakeholders.
      • Gain increased awareness of cybersecurity and the impact executive stakeholders can have on improving an organization’s security posture.
      • Understand how security’s alignment with the business will enable the strategic growth of the organization.
      • Gain a better understanding of how security and IT objectives are developed and justified.

      Measure the value of this blueprint

      Phase

      Measured Value (Yearly)

      Phase 1: Identify communication goals

      Cost to define drivers and goals for communicating security to executives:

      16 FTE hours @ $233K* =$1,940

      Phase 2: Collect information to support goals

      Cost to collect and synthesize necessary data to support communication goals:

      16 FTE hours @ $233K = $1,940

      Phase 3: Develop communication

      Cost to develop communication material that will contextualize information being shown:

      16 FTE hours @ $233K = $1,940

      Phase 4: Deliver communication

      Potential Savings:

      Total estimated effort = $5,820

      Our blueprint will help you save $5,820 and over 40 FTE hours

      * The financial figure depicts the annual salary of a CISO in 2022

      Source: Chief Information Security Officer Salary.” Salary.com, 2022

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Phase 1

      Identify communication goals

      Phase 1 Phase 2 Phase 3 Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding the different drivers for communicating security to executive stakeholders
      • Identifying different communication goals

      This phase involves the following participants:

      • Security leader

      1.1. Identify drivers for communicating to executive stakeholders

      As a security leader, you meet with executives and stakeholders with diverse backgrounds, and you aim to showcase your organization’s security posture along with its alignment with the business’ goals.

      However, with the constant changes in the security threat landscape, demands and drivers for security could change. Thus, understanding potential drivers that will influence your communication will assist you in developing and delivering an effective security presentation.

      39% of organizations had cybersecurity on the agenda of their board’s quarterly meeting.

      Source: EY, 2021.

      Info-Tech Insight

      Not all security presentations are the same. Keep your communication strategy and processes agile.

      Know your drivers for security presentations

      By understanding the influences for your security presentations, you will be able to better plan what to present to executive stakeholders.

      • These meetings, which are usually held once per quarter, provide you with less than one hour of presentation time.
      • Hence, it is crucial to know why you need to present security and whether these drivers are similar across the other presentations.

      Understanding drivers will also help you understand how to present security to executive stakeholders.

      • These drivers will shape the structure of your presentation and help determine your approach to communicating your goals.
      • For example, financial-based presentations that are driven by budget requests might create a sense of urgency or assurance about investment in a security initiative.

      Identify your communication drivers, which can stem from various initiatives and programs, including:

      • Results from internal or external audit reports.
      • Upcoming budget meetings.
      • Briefing newly elected executive stakeholders on security.

      When it comes to identifying your communication drivers, you can collaborate with subject matter experts, like your corporate secretary or steering committees, to ensure the material being communicated will align with some of the organizational goals.

      Examples of drivers for security presentations

      Audit
      Upcoming internal or external audits might require updates on the organization’s compliance

      Organizational restructuring
      Restructuring within an organization could require security updates

      Merger & Acquisition
      An M&A would trigger presentations on organization’s current and future security posture

      Cyber incident
      A cyberattack would require an immediate presentation on its impact and the incident response plan

      Ad hoc
      Provide security information requested by stakeholders

      1.2. Define your goals for communicating to executives

      After identifying drivers for your communication, it’s important to determine what your goals are for the presentation.

      • Communication drivers are mainly triggers for why you want to present security.
      • Communication goals are the potential outcomes you are hoping to obtain from the presentation.
      • Your communication goals would help identify what data and metrics to include in your presentation, the structure of your communication deck, and how you deliver your communication to executive stakeholders.

      Identifying your communication goals could require the participation of the security team, IT leadership, and other business stakeholders.

      • As a group, brainstorm the security goals that align with your business goals for the coming year.
        • Aim to have at least two business goals that align with each security goal.
      • Identify what benefits and value the executive stakeholders will gain from the security goal being presented.
        • E.g. Increased security awareness, updates on organization's security posture.
      • Identify what the ask is for this presentation.
        • E.g. Approval for increasing budget to support security initiatives, executive support to implement internal security programs.

      Info-Tech Insight

      There can be different reasons to communicate security to executive stakeholders. You need to understand what you want to get out of your presentation.

      Examples of security presentation goals

      Educate
      Educate the board on security trends and/or latest risks in the industry

      Update
      Provide updates on security initiatives, relevant security metrics, and compliance posture

      Inform
      Provide an incident response plan due to a security incident or deliver updates on current threats and risks

      Investment
      Request funding for security investments or financial updates on past security initiatives

      Ad hoc
      Provide security information requested by stakeholders

      Phase 2

      Collect information to support goals

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding what types of data to include in your security presentations
      • Defining where and how to retrieve data

      This phase involves the following participants:

      • Security leader
      • Network/security analyst

      2.1 Identify data to collect

      After identifying drivers and goals for your communication, it’s important to include the necessary data to justify the information being communicated.

      • Leveraging data and analytics will assist in providing quantitative-based communication, which will result in a more meaningful and effective presentation.
      • The data presented will showcase the visibility of an organization’s security posture along with potential risks and figures on how to mitigate those risks.
      • Providing analysis of the quantitative data presented will also showcase further insights on the figures, allow the audience to better understand the data, and show its relevance to the communication goals.

      Identifying data to collect doesn’t need to be a rigorous task; you can follow these steps to help you get started:

      • Work with your security team to identify the main type of data applicable to the communication goals.
        • E.g. Financial data would be meaningful to use when communicating a budget presentation.
      • Identify supporting data linked to the main data defined.
        • E.g. If a financial investment is made to implement a security initiative, then metrics on improvements to the security posture will be relevant.
      • Show how both the main and supporting data align with the communication goals.
        • E.g. Improvement in security posture would increase alignment with regulation standards, which would result in additional contracts being awarded and increased revenue.

      Info-Tech Insight

      Understand how to present your information in a way that will be meaningful to your audience, for instance by quantifying security risks in financial terms.

      Examples of data to present

      Educate
      Number of organizations in industry impacted by data breaches during past year; top threats and risks affecting the industries

      Update
      Degree of compliance with standards (e.g. ISO-27001); metrics on improvement of security posture due to security initiatives

      Inform
      Percentage of impacted clients and disrupted business functions; downtime; security risk likelihood and financial impact

      Investment
      Capital and operating expenditure for investment; ROI on past and future security initiatives

      Ad hoc
      Number of security initiatives that went over budget; phishing test campaign results

      2.2 Plan how to retrieve the data

      Once the data that is going to be used for the presentation has been identified, it is important to plan how the data can be retrieved, processed, and shared.

      • Most of the data leveraged for security presentations are structured data, which are highly organized data that are often stored in a relational and easily searchable database.
        • This includes security log reports or expenditures for ongoing and future security investments.
      • Retrieving the data, however, would require collaboration and cooperation from different team members.
      • You would need to work with the security team and other appropriate stakeholders to identify where the data is stored and who the data owner is.

      Once the data source and owner has been identified, you need to plan how the data would be processed and leveraged for your presentation

      • This could include using queries to retrieve the relevant information needed (e.g. SQL, Microsoft Excel).
      • Verify the accuracy and relevance of the data with other stakeholders to ensure it is the most appropriate data to be presented to the executive stakeholders.

      Info-Tech Insight

      Using a data-driven approach to help support your objectives is key to engaging with your audience.

      Plan where to retrieve the data

      Identifying the relevant data sources to retrieve your data and the appropriate data owner enables efficient collaboration between departments collecting, processing, and communicating the data and graphics to the audience.

      Examples of where to retrieve your data

      Data Source

      Data

      Data Owner

      Communication Goal

      Audit & Compliance Reports

      Percentage of controls completed to be certified with ISO 27001; Number of security threats & risks identified.

      Audit Manager;

      Compliance Manager;

      Security Leader

      Ad hoc, Educate, Inform

      Identity & Access Management (IAM) Applications

      Number of privileged accounts/department; Percentage of user accounts with MFA applied

      Network/Security Analyst

      Ad hoc, Inform, Update

      Security Information & Event Management (SIEM)

      Number of attacks detected and blocked before & after implementing endpoint security; Percentage of firewall rules that triggered a false positive

      Network/Security Analyst

      Ad hoc, Inform, Update

      Vulnerability Management Applications

      Percentage of critical vulnerabilities patched; Number of endpoints encrypted

      Network/Security Analyst

      Ad hoc, Inform, Update

      Financial & Accounting Software

      Capital & operating expenditure for future security investments; Return on investment (ROI) on past and current security investments

      Financial and/or Accounting Manager

      Ad hoc, Educate, Investments

      Phase 3

      Develop communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a communication strategy for presenting security
      • Identifying security templates that are applicable to your presentation

      This phase involves the following participants:

      • Security leader

      3.1 Plan communication: Know who your audience is

      • When preparing your communication, it's important to understand who your target audience is and to conduct background research on them.
      • This will help develop your communication style and ensure your presentation caters to the expected audience in the room.

      Examples of two profiles in a boardroom

      Formal board of directors

      The executive team

      • In the private sector, this will include an appointed board of shareholders and subcommittees external to the organization.
      • In the public sector, this can include councils, commissions, or the executive team itself.
      • In government, this can include mayors, ministers, and governors.
      • The board’s overall responsibility is governance.
      • This audience will include your boss and your peers internal to the organization.
      • This category is primarily involved in the day-to-day operations of the organization and is responsible for carrying out the strategic direction set by the board.
      • The executive team’s overall responsibility is operations.

      3.1.1 Know what your audience cares about

      • Understanding what your executive stakeholders value will equip you with the right information to include in your presentations.
      • Ensure you conduct background research on your audience to assist you in knowing what their potential interests are.
      • Your background research could include:
        • Researching the audience’s professional background through LinkedIn.
        • Reviewing their comments from past executive meetings.
        • Researching current security trends that align with organizational goals.
      • Once the values and risks have been identified, you can document them in notes and share the notes with subject matter experts to verify if these values and risks should be shared in the coming meetings.

      A board’s purpose can include the following:

      • Sustaining and expanding the organization’s purpose and ability to execute in a competitive market.
      • Determining and funding the organization’s future and direction.
      • Protecting and increasing shareholder value.
      • Protecting the company’s exposure to risks.

      Examples of potential values and risks

      • Business impact
      • Financial impact
      • Security and incidents

      Info-Tech Insight
      Conduct background research on audience members (e.g. professional background on LinkedIn) to help understand how best to communicate to them and overcome potential objections.

      Understand your audience’s concerns

      • Along with knowing what your audience values and cares about, understanding their main concerns will allow you to address those items or align them with your communication.
      • By treating your executive stakeholders as your project sponsors, you would build a level of trust and confidence with your peers as the first step to tackling their concerns.
      • These concerns can be derived from past stakeholder meetings, recent trends in the industry, or strategic business alignments.
      • After capturing their concerns, you’ll be equipped with the necessary understanding on what material to include and prioritize during your presentations.

      Examples of potential concerns for each profile of executive stakeholders

      Formal board of directors

      The executive team

      • Business impact (What is the impact of IT in solving business challenges?)
      • Investments (How will it impact organization’s finances and efficiency?)
      • Cybersecurity and risk (What are the top cybersecurity risks, and how is IT mitigating those risks to the business?)
      • Business alignment (How do IT priorities align to the business strategy and goals?)
      • IT operational efficiency (How is IT set up for success with foundational elements of IT’s operational strategy?)
      • Innovation & transformation priorities (How is IT enabling the organization’s competitive advantage and supporting transformation efforts as a strategic business partner?)

      Build your presentation to tackle their main concerns

      Your presentation should be well-rounded and compelling when it addresses the board’s main concerns about security.

      Checklist:

      • Research your target audience (their backgrounds, board composition, dynamics, executive team vs. external group).
      • Include value and risk language in your presentation to appeal to your audience.
      • Ensure your content focuses on one or more of the board’s main concerns with security (e.g. business impact, investments, or risk).
      • Include information about what is in it for them and the organization.
      • Research your board’s composition and skillsets to determine their level of technical knowledge and expertise. This helps craft your presentation with the right amount of technology vs. business-facing information.

      Info-Tech Insight
      The executive stakeholder’s main concerns will always boil down to one important outcome: providing a level of confidence to do business through IT products, services, and systems – including security.

      3.1.2 Take your audience through a security journey

      • Once you have defined your intended target and their potential concerns, developing the communication through a storytelling approach will be the next step to help build a compelling presentation.
      • You need to help your executive stakeholders make sense of the information being conveyed and allow them to understand the importance of cybersecurity.
      • Taking your audience through a story will allow them to see the value of the information being presented and better resonate with its message.
      • You can derive insights for your storytelling presentation by doing the following:
        • Provide a business case scenario on the topic you are presenting.
        • Identify and communicate the business problem up front and answer the three questions (why, what, how).
        • Quantify the problems in terms of business impact (money, risk, value).

      Info-Tech Insight
      Developing a storytelling approach will help keep your audience engaged and allow the information to resonate with them, which will add further value to the communication.

      Identify the purpose of your presentation

      You should be clear about your bottom line and the intent behind your presentation. However, regardless of your bottom line, your presentation must focus on what business problems you are solving and why security can assist in solving the problem.

      Examples of communication goals

      To inform or educate

      To reach a decision

      • In this presentation type, it is easy for IT leaders to overwhelm a board with excessive or irrelevant information.
      • Focus your content on the business problem and the solution proposed.
      • Refrain from too much detail about the technology – focus on business impact and risk mitigated. Ask for feedback if applicable.
      • In this presentation type, there is a clear ask and an action required from the board of directors.
      • Be clear about what this decision is. Once again, don’t lead with the technology solution: Start with the business problem you are solving, and only talk about technology as the solution if time permits.
      • Ensure you know who votes and how to garner their support.

      Info-Tech Insight
      Nobody likes surprises. Communicate early and often. The board should be pre-briefed, especially if it is a difficult subject. This also ensures you have support when you deliver a difficult message.

      Gather the right information to include in your boardroom presentation

      Once you understand your target audience, it’s important to tailor your presentation material to what they will care about.

      Typical IT boardroom presentations include:

      • Communicating the value of ongoing business technology initiatives.
      • Requesting funds or approval for a business initiative that IT is spearheading.
      • Security incident response/Risk/DRP.
      • Developing a business program or an investment update for an ongoing program.
      • Business technology strategy highlights and impacts.
      • Digital transformation initiatives (value, ROI, risk).

      Info-Tech Insight
      You must always have a clear goal or objective for delivering a presentation in front of your board of directors. What is the purpose of your board presentation? Identify your objective and outcome up front and tailor your presentation’s story and contents to fit this purpose.

      Info-Tech Insight
      Telling a good story is not about the message you want to deliver but the one the executive stakeholders want to hear. Articulate what you want them to think and what you want them to take away, and be explicit about it in your presentation. Make your story logically flow by identifying the business problem, complication, the solution, and how to close the gap. Most importantly, communicate the business impacts the board will care about.

      Structure your presentation to tell a logical story

      To build a strong story for your presentation, ensure you answer these three questions:

      WHY

      Why is this a business issue, or why should the executive stakeholders care?

      WHAT

      What is the impact of solving the problem and driving value for the company?

      HOW

      How will we leverage our resources (technology, finances) to solve the problem?

      Examples:

      Scenario 1: The company has experienced a security incident.

      Intent: To inform/educate the board about the security incident.

      WHY

      The data breach has resulted in a loss of customer confidence, negative brand impact, and a reduction in revenue of 30%.

      WHAT

      Financial, legal, and reputational risks identified, and mitigation strategies implemented. IT is working with the PR team on communications. Incident management playbook executed.

      HOW

      An analysis of vulnerabilities was conducted and steps to address are in effect. Recovery steps are 90% completed. Incident management program reviewed for future incidents.

      Scenario 2: Security is recommending investments based on strategic priorities.

      Intent: To reach a decision with the board – approve investment proposal.

      WHY

      The new security strategy outlines two key initiatives to improve an organization’s security culture and overall risk posture.

      WHAT

      Security proposed an investment to implement a security training & phishing test campaign, which will assist in reducing data breach risks.

      HOW

      Use 5% of security’s budget to implement security training and phishing test campaigns.

      Time plays a key role in delivering an effective presentation

      What you include in your story will often depend on how much time you have available to deliver the message.

      Consider the following:

      • Presenting to executive stakeholders often means you have a short window of time to deliver your message. The average executive stakeholder presentation is 15 minutes, and this could be cut short due to other unexpected factors.
      • If your presentation is too long, you risk overwhelming or losing your audience. You must factor in the time constraints when building your board presentation.
      • Your executive stakeholders have a wealth of experience and knowledge, which means they could jump to conclusions quickly based on their own experiences. Ensure you give them plenty of background information in advance. Provide your presentation material, a brief, or any other supporting documentation before the meeting to show you are well prepared.
      • Be prepared to have deep conversations about the topic, but respect that the executive stakeholders might not be interested in hearing the tactical information. Build an elevator pitch, a one-pager, back-up slides that support your ask and the story, and be prepared to answer questions within your allotted presentation time to dive deeper.

      Navigating through Q&A

      Use the Q&A portion to build credibility with the board.

      • It is always better to say, “I’m not certain about the answer but will follow up,” than to provide false or inaccurate information on the spot.
      • When asked challenging or irrelevant questions, ensure you have an approach to deflect them. Questions can often be out of scope or difficult to answer in a group. Find what works for you to successfully navigate through these questions:
        • “Let’s work with the sub-committee to find you an answer.”
        • “Let’s take that offline to address in more detail.”
        • “I have some follow-up material I can provide you to discuss that further after our meeting.”
      • And ensure you follow up! Make sure to follow through on your promise to provide information or answers after the meeting. This helps build trust and credibility with the board.

      Info-Tech Insight
      The average board presentation is 15 minutes long. Build no more than three or four slides of content to identify the business problem, the business impacts, and the solution. Leave five minutes for questions at the end, and be prepared with back-up slides to support your answers.

      Storytelling checklist

      Checklist:

      • Tailor your presentation based on how much time you have.
      • Find out ahead of time how much time you have.
      • Identify if your presentation is to inform/educate or reach a decision.
      • Identify and communicate the business problem up front and answer the three questions (why, what, how).
      • Express the problem in terms of business impact (risk, value, money).
      • Prepare and send pre-meeting collateral to the members of the board and executive team.
      • Include no more than 5-6 slides for your presentation.
      • Factor in Q&A time at the end of your presentation window.
      • Articulate what you want them to think and what you want them to take away – put it right up front and remind them at the end.
      • Have an elevator speech handy – one or two sentences and a one-pager version of your story.
      • Consider how you will build your relationship with the members outside the boardroom.

      3.1.3 Build a compelling communication document

      Once you’ve identified your communication goals, data, and plan to present to your stakeholders, it’s important to build the compelling communication document that will attract all audiences.

      A good slide design increases the likelihood that the audience will read the content carefully.

      • Bad slide structure (flow) = Audience loses focus
        • You can have great content on a slide, but if a busy audience gets confused, they’ll just close the file or lose focus. Structure encompasses horizontal and vertical logic.
      • Good visual design = Audience might read more
        • Readers will probably skim the slides first. If the slides look ugly, they will already have a negative impression. If the slides are visually appealing, they will be more inclined to read carefully. They may even use some slides to show others.
      • Good content + Good structure + Visual appeal = Good presentation
        • A presentation is like a house. Good content is the foundation of the house. Good structure keeps the house strong. Visual appeal differentiates houses.

      Slide design best practices

      Leverage these slide design best practices to assist you in developing eye-catching presentations.

      • Easy to read: Assume reader is tight on time. If a slide looks overwhelming, the reader will close the document.
      • Concise and clear: Fewer words = more skim-able.
      • Memorable: Use graphics and visuals or pithy quotes whenever you can do so appropriately.
      • Horizontal logic: Good horizontal logic will have slide titles that cascade into a story with no holes or gaps.
      • Vertical logic: People usually read from left to right, top to bottom, or in a Z pattern. Make sure your slide has an intuitive flow of content.
      • Aesthetics: People like looking at visually appealing slides, but make sure your attempts to create visual appeal do not detract from the content.

      Your presentation must have a logical flow

      Horizontal logic

      Vertical logic

      • Horizontal logic should tell a story.
      • When slide titles are read in a cascading manner, they will tell a logical and smooth story.
      • Title & tagline = thesis (best insight).
      • Vertical logic should be intuitive.
      • Each step must support the title.
      • The content you intend to include within each slide is directly applicable to the slide title.
      • One main point per slide.

      Vertical logic should be intuitive

      The image contains a screenshot example of a bad design layout for a slide. The image contains a screenshot example of a good design layout for a slide.

      The audience is unsure where to look and in what order.

      The audience knows to read the heading first. Then look within the pie chart. Then look within the white boxes to the right.

      Horizontal and vertical logic checklists

      Horizontal logic

      Vertical logic

      • List your slide titles in order and read through them.
      • Good horizontal logic should feel like a story. Incomplete horizontal logic will make you pause or frown.
      • After a self-test, get someone else to do the same exercise with you observing them.
      • Note at which points they pause or frown. Discuss how those points can be improved.
      • Now consider each slide title proposed and the content within it.
      • Identify if there is a disconnect in title vs. content.
      • If there is a disconnect, consider changing the title of the slide to appropriately reflect the content within it, or consider changing the content if the slide title is an intended path in the story.

      Make it easy to read

      The image contains a screenshot that demonstrates an uneasy to read slide. The image contains a screenshot that demonstrates an easy to read slide.
      • Unnecessary coloring makes it hard on the eyes
      • Margins for title at top is too small
      • Content is not skim-able (best to break up the slide)

      Increase skim-ability:

      • Emphasize the subheadings
      • Bold important words

      Make it easier on the eyes:

      • Declutter and add sections
      • Have more white space

      Be concise and clear

      1. Write your thoughts down
        • This gets your content documented.
        • Don’t worry about clarity or concision yet.
      2. Edit for clarity
        • Make sure the key message is very clear.
        • Find your thesis statement.
      3. Edit for concision
        • Remove unnecessary words.
        • Use the active voice, not passive voice (see below for examples).

      Passive voice

      Active voice

      “There are three things to look out for” (8 words)

      “Network security was compromised by hackers” (6 words)

      “Look for these three things” (5 words)

      “Hackers compromised network security” (4 words)

      Be memorable

      The image contains a screenshot of an example that demonstrates a bad example of how to be memorable. The image contains a screenshot of an example that demonstrates a good example of how to be memorable.

      Easy to read, but hard to remember the stats.

      The visuals make it easier to see the size of the problem and make it much more memorable.

      Remember to:

      • Have some kind of visual (e.g. graphs, icons, tables).
      • Divide the content into sections.
      • Have a bit of color on the page.

      Aesthetics

      The image contains a screenshot of an example of bad aesthetics. The image contains a screenshot of an example of good aesthetics.

      This draft slide is just content from the outline document on a slide with no design applied yet.

      • Have some kind of visual (e.g. graphs, icons, tables) as long as it’s appropriate.
      • Divide the content into sections.
      • Have a bit of color on the page.
      • Bold or italicize important text.

      Why use visuals?

      How graphics affect us

      Cognitively

      • Engage our imagination
      • Stimulate the brain
      • Heighten creative thinking
      • Enhance or affect emotions

      Emotionally

      • Enhance comprehension
      • Increase recollection
      • Elevate communication
      • Improve retention

      Visual clues

      • Help decode text
      • Attract attention
      • Increase memory

      Persuasion

      • 43% more effective than text alone
      Source: Management Information Systems Research Center

      Presentation format

      Often stakeholders prefer to receive content in a specific format. Make sure you know what you require so that you are not scrambling at the last minute.

      • Is there a standard presentation template?
      • Is a hard-copy handout required?
      • Is there a deadline for draft submission?
      • Is there a deadline for final submission?
      • Will the presentation be circulated ahead of time?
      • Do you know what technology you will be using?
      • Have you done a dry run in the meeting room?
      • Do you know the meeting organizer?

      Checklist to build compelling visuals in your presentation

      Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.

      Checklist:

      • Do the visuals grab the audience’s attention?
      • Will the visuals mislead the audience/confuse them?
      • Do the visuals facilitate data comparison or highlight trends and differences in a more effective manner than words?
      • Do the visuals present information simply, cleanly, and accurately?
      • Do the visuals display the information/data in a concentrated way?
      • Do the visuals illustrate messages and themes from the accompanying text?

      3.2 Security communication templates

      Once you have identified your communication goals and plans for building your communication document, you can start building your presentation deck.

      These presentation templates highlight different security topics depending on your communication drivers, goals, and available data.

      Info-Tech has created five security templates to assist you in building a compelling presentation.

      These templates provide support for presentations on the following five topics:

      • Security Initiatives
      • Security & Risk Update
      • Security Metrics
      • Security Incident Response & Recovery
      • Security Funding Request

      Each template provides instructions on how to use it and tips on ensuring the right information is being presented.

      All the templates are customizable, which enables you to leverage the sections you need while also editing any sections to your liking.

      The image contains screenshots of the Security Presentation Templates.

      Download the Security Presentation Templates

      Security template example

      It’s important to know that not all security presentations for an organization are alike. However, these templates would provide a guideline on what the best practices are when communicating security to executive stakeholders.

      Below is an example of instructions to complete the “Security Risk & Update” template. Please note that the security template will have instructions to complete each of its sections.

      The image contains a screenshot of the Executive Summary slide. The image contains a screenshot of the Security Goals & Objectives slide.

      The first slide following the title slide includes a brief executive summary on what would be discussed in the presentation. This includes the main security threats that would be addressed and the associated risk mitigation strategies.

      This slide depicts a holistic overview of the organization’s security posture in different areas along with the main business goals that security is aligning with. Ensure visualizations you include align with the goals highlighted.

      Security template example (continued)

      The image contains a screenshot example of the Top Threats & Risks. The image contains a screenshot example of the Top Threats & Risks.

      This slide displays any top threats and risks an organization is facing. Each threat consists of 2-3 risks and is prioritized based on the negative impact it could have on the organization (i.e. red bar = high priority; green bar = low priority). Include risks that have been addressed in the past quarter, and showcase any prioritization changes to those risks.

      This slide follows the “Top Threats & Risks” slide and focuses on the risks that had medium or high priority. You will need to work with subject matter experts to identify risk figures (likelihood, financial impact) that will enable you to quantify the risks (Likelihood x Financial Impact). Develop a threshold for each of the three columns to identify which risks require further prioritization, and apply color coding to group the risks.

      Security template example (continued)

      The image contains a screenshot example of the slide, Risk Analysis. The image contains a screenshot example of the slide, Risk Mitigation Strategies & Roadmap.

      This slide showcases further details on the top risks along with their business impact. Be sure to include recommendations for the risks and indicate whether further action is required from the executive stakeholders.

      The last slide of the “Security Risk & Update” template presents a timeline of when the different initiatives to mitigate security risks would begin. It depicts what initiatives will be completed within each fiscal year and the total number of months required. As there could be many factors to a project’s timeline, ensure you communicate to your executive stakeholders any changes to the project.

      Phase 4

      Deliver communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a strategy to deliver compelling presentations
      • Ensuring you follow best practices for communicating and obtaining your security goals

      This phase involves the following participants:

      • Security leader

      4.1 Deliver a captivating presentation

      You’ve gathered all your data, you understand what your audience is expecting, and you are clear on the outcomes you require. Now, it’s time to deliver a presentation that both engages and builds confidence.

      Follow these tips to assist you in developing an engaging presentation:

      • Start strong: Give your audience confidence that this will be a good investment of their time. Establish a clear direction for what’s going to be covered and what the desired outcome is.
      • Use your time wisely: Odds are, your audience is busy, and they have many other things on their minds. Be prepared to cover your content in the time allotted and leave sufficient time for discussion and questions.
      • Be flexible while presenting: Do not expect that your presentation will follow the path you have laid out. Anticipate jumping around and spending more or less time than you had planned on a given slide.

      Keep your audience engaged with these steps

      • Be ready with supporting data. Don’t make the mistake of not knowing your content intimately. Be prepared to answer questions on any part of it. Senior executives are experts at finding holes in your data.
      • Know your audience. Who are you presenting to? What are their specific expectations? Are there sensitive topics to be avoided? You can’t be too prepared when it comes to understanding your audience.
      • Keep it simple. Don’t assume that your audience wants to learn the details of your content. Most just want to understand the bottom line, the impact on them, and how they can help. More is not always better.
      • Focus on solving issues. Your audience members have many of their own problems and issues to worry about. If you show them how you can help make their lives easier, you’ll win them over.

      Info-Tech Insight
      Establishing credibility and trust with executive stakeholders is important to obtaining their support for security objectives.

      Be honest and straightforward with your communication

      • Be prepared. Being properly prepared means not only that your update will deliver the value that you expect, but also that you will have confidence and the flexibility you require when you’re taken off track.
      • Don’t sugarcoat it. These are smart, driven people that you are presenting to. It is neither beneficial nor wise to try to fool them. Be open and transparent about problems and issues. Ask for help.
      • No surprises. An executive stakeholder presentation is not the time or the place for a surprise. Issues seen as unexpected or contentious should always be dealt with prior to the meeting with those most impacted.

      Hone presentation skills before meeting with the executive stakeholders

      Know your environment

      Be professional but not boring

      Connect with your audience

      • Your organization has standards for how people are expected to dress at work. Make sure that your attire meets this standard – don’t be underdressed.
      • Think about your audience – would they appreciate you starting with a joke, or do they want you to get to the point as quickly as possible?
      • State the main points of your presentation confidently. While this should be obvious, it is essential. Your audience should be able to clearly see that you believe the points you are stating.
      • Present with lots of energy, smile, and use hand gestures to support your speech.
      • Look each member of the audience in the eye at least once during your presentation. Avoid looking at the ceiling, the back wall, or the floor. Your audience should feel engaged – this is essential to keeping their attention on you.
      • Never read from your slides. If there is text on a slide, paraphrase it while maintaining eye contact.

      Checklist for presentation logistics

      Optimize the timing of your presentation:

      • Less is more: Long presentations are detrimental to your cause – they lead to your main points being diluted. Keep your presentation short and concise.
      • Keep information relevant: Only present information that is important to your audience. This includes the information that they are expecting to see and information that connects to the business.
      • Expect delays: Your audience will likely have questions. While it is important to answer each question fully, it will take away from the precious time given to you for your presentation. Expect that you will not get through all the information you have to present.

      Script your presentation:

      • Use a script to stay on track: Script your presentation before the meeting. A script will help you present your information in a concise and structured manner.
      • Develop a second script: Create a script that is about half the length of the first script but still contains the most important points. This will help you prepare for any delays that may arise during the presentation.
      • Prepare for questions: Consider questions that may be asked and script clear and concise answers to each.
      • Practice, practice, practice: Practice your presentation until you no longer need the script in front of you.

      Checklist for presentation logistics (continued)

      Other considerations:

      • After the introduction of your presentation, clearly state the objective – don’t keep people guessing and consequently lose focus on your message.
      • After the presentation is over, document important information that came up. Write it down or you may forget it soon after.
      • Rather than create a long presentation deck full of detailed slides that you plan to skip over during the presentation, create a second, compact deck that contains only the slides you plan to present. Send out the longer deck after the presentation.

      Checklist for delivering a captivating presentation

      Leverage this checklist to ensure you are prepared to develop and deliver an engaging presentation.

      Checklist:

      • Start with a story or something memorable to break the ice.
      • Go in with the end state in mind (focus on the outcome/end goal and work back from there) – What’s your call to action?
      • Content must compliment your end goal, filter out any content that doesn’t compliment the end goal.
      • Be prepared to have less time to speak. Be prepared with shorter versions of your presentation.
      • Include an appendix with supporting data, but don’t be data heavy in your presentation. Integrate the data into a story. The story should be your focus.

      Checklist for delivering a captivating presentation (continued)

      • Be deliberate in what you want to show your audience.
      • Ensure you have clean slides so the audience can focus on what you’re saying.
      • Practice delivering your content multiple times alone and in front of team members or your Info-Tech counselor, who can provide feedback.
      • How will you handle being derailed? Be prepared with a way to get back on track if you are derailed.
      • Ask for feedback.
      • Record yourself presenting.

      4.2 Obtain and verify support on security goals

      Once you’ve delivered your captivating presentation, it’s imperative to communicate with your executive stakeholders.

      • This is your opportunity to open the floor for questions and clarify any information that was conveyed to your audience.
      • Leverage your appendix and other supporting documents to justify your goals.
      • Different approaches to obtaining and verifying your goals could include:
        • Acknowledgment from the audience that information communicated aligns with the business’s goals.
        • Approval of funding requests for security initiatives.
        • Written and verbal support for implementation of security initiatives.
        • Identifying next steps for information to communicate at the next executive stakeholder meeting.

      Info-Tech Insight
      Verifying your objectives at the end of the presentation is important, as it ensures you have successfully communicated to executive stakeholders.

      Checklist for obtaining and verify support on security goals

      Follow this checklist to assist you in obtaining and verifying your communication goals.

      Checklist:

      • Be clear about follow-up and next steps if applicable.
      • Present before you present: Meet with your executive stakeholders before the meeting to review and discuss your presentation and other supporting material and ensure you have executive/CEO buy-in.
      • “Be humble, but don’t crumble” – demonstrate to the executive stakeholders that you are an expert while admitting you don’t know everything. However, don’t be afraid to provide your POV and defend it if need be. Strike the right balance to ensure the board has confidence in you while building a strong relationship.
      • Prioritize a discussion over a formal presentation. Create an environment where they feel like they are part of the solution.

      Summary of Accomplishment

      Problem Solved

      A better understanding of security communication drivers and goals

      • Understanding the difference between communication drivers and goals
      • Identifying your drivers and goals for security presentation

      A developed a plan for how and where to retrieve data for communication

      • Insights on what type of data can be leveraged to support your communication goals
      • Understanding who you can collaborate with and potential data sources to retrieve data from

      A solidified communication plan with security templates to assist in better presenting to your audience

      • A guideline on how to prepare security presentations to executive stakeholders
      • A list of security templates that can be customized and used for various security presentations

      A defined guideline on how to deliver a captivating presentation to achieve your desired objectives

      • Clear message on best practices for delivering security presentations to executive stakeholders
      • Understanding how to verify your communication goals have been obtained

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Build an Information Security Strategy
      This blueprint will walk you through the steps of tailoring best practices to effectively manage information security.

      Build a Security Metrics Program to Drive Maturity
      This blueprint will assist you in identifying security metrics that can tie to your organizational goals and build those metrics to achieve your desired maturity level.

      Bibliography

      Bhadauriya, Amit S. “Communicating Cybersecurity Effectively to the Board.” Metricstream. Web.
      Booth, Steven, et al. “The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them.” Mandiant, May 2019. Web.
      Bradford, Nate. “6 Slides Every CISO Should Use in Their Board Presentation.” Security Boulevard, 9 July 2020. Web.
      Buckalew, Lauren, et al. “Get the Board on Board: Leading Cybersecurity from the Top Down.” Newsroom, 2 Dec. 2019. Web.
      Burg, Dave, et al. “Cybersecurity: How Do You Rise above the Waves of a Perfect Storm?” EY US - Home, EY, 22 July 2021. Web.
      Carnegie Endowment for International Peace. Web.
      “Chief Information Security Officer Salary.” Salary.com, 2022. Web.
      “CISO's Guide to Reporting to the Board - Apex Assembly.” CISO's Guide To Reporting to the Board. Web.
      “Cyber Security Oversight in the Boardroom” KPMG, Jan. 2016. Web.
      “Cybersecurity CEO: My 3 Tips for Presenting in the Boardroom.” Cybercrime Magazine, 31 Mar. 2020. Web.
      Dacri , Bryana. Do's & Don'ts for Security Professionals Presenting to Executives. Feb. 2018. Web.
      Froehlich, Andrew. “7 Cybersecurity Metrics for the Board and How to Present Them: TechTarget.” Security, TechTarget, 19 Aug. 2022. Web.
      “Global Board Risk Survey.” EY. Web.
      “Guidance for CISOs Presenting to the C-Suite.” IANS, June 2021. Web.
      “How to Communicate Cybersecurity to the Board of Directors.” Cybersecurity Conferences & News, Seguro Group, 12 Mar. 2020. Web.
      Ide, R. William, and Amanda Leech. “A Cybersecurity Guide for Directors” Dentons. Web.
      Lindberg, Randy. “3 Tips for Communicating Cybersecurity to the Board.” Cybersecurity Software, Rivial Data Security, 8 Mar. 2022. Web.
      McLeod, Scott, et al. “How to Present Cybersecurity to Your Board of Directors.” Cybersecurity & Compliance Simplified, Apptega Inc, 9 Aug. 2021. Web.
      Mickle, Jirah. “A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations.” Tenable®, 28 Nov. 2022. Web.
      Middlesworth, Jeff. “Top-down: Mitigating Cybersecurity Risks Starts with the Board.” Spiceworks, 13 Sept. 2022. Web.
      Mishra, Ruchika. “4 Things Every CISO Must Include in Their Board Presentation.” Security Boulevard, 17 Nov. 2020. Web.
      O’Donnell-Welch, Lindsey. “CISOs, Board Members and the Search for Cybersecurity Common Ground.” Decipher, 20 Oct. 2022. Web.

      Bibliography

      “Overseeing Cyber Risk: The Board's Role.” PwC, Jan. 2022. Web.
      Pearlson, Keri, and Nelson Novaes Neto. “7 Pressing Cybersecurity Questions Boards Need to Ask.” Harvard Business Review, 7 Mar. 2022. Web.
      “Reporting Cybersecurity Risk to the Board of Directors.” Web.
      “Reporting Cybersecurity to Your Board - Steps to Prepare.” Pondurance ,12 July 2022. Web.
      Staynings, Richard. “Presenting Cybersecurity to the Board.” Resource Library. Web.
      “The Future of Cyber Survey.” Deloitte, 29 Aug. 2022. Web.
      “Top Cybersecurity Metrics to Share with Your Board.” Packetlabs, 10 May 2022. Web.
      Unni, Ajay. “Reporting Cyber Security to the Board? How to Get It Right.” Cybersecurity Services Company in Australia & NZ, 10 Nov. 2022. Web.
      Vogel, Douglas, et al. “Persuasion and the Role of Visual Presentation Support.” Management Information Systems Research Center, 1986.
      “Welcome to the Cyber Security Toolkit for Boards.” NCSC. Web.

      Research Contributors

      • Fred Donatucci, New-Indy Containerboard, VP, Information Technology
      • Christian Rasmussen, St John Ambulance, Chief Information Officer
      • Stephen Rondeau, ZimVie, SVP, Chief Information Officer

      Digital Data Ethics

      • Download01-Title: Tech Trend Update: If Digital Ethics Then Data Equity
      • Download-01: Visit Link
      • member rating overall impact: 9/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      In the past two years, we've seen that we need quick technology solutions for acute issues. We quickly moved to homeworking and then to a hybrid form. We promptly moved many of our offline habits online.

      That necessitated a boost in data collection from us towards our customers and employees, and business partners.
      Are you sure how to approach this structurally? What is the right thing to do?

      Impact and Results

      • When you partner with another company, set clear expectations
      • When you are building your custom solution, invite constructive criticism
      • When you present yourself as the authority, consider the most vulnerable in the relationship

      innovation

      Build a Data Pipeline for Reporting and Analytics

      • Buy Link or Shortcode: {j2store}126|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $61,999 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Continuous and disruptive database design updates while trying to have one design pattern to fit all use cases.
      • Sub-par performance while loading, retrieving, and querying data.
      • You want to shorten time-to-market of the projects aimed at data delivery and consumption.
      • Unnecessarily complicated database design limits usability of the data and requires knowledge of specific data structures for their effective use.

      Our Advice

      Critical Insight

      • Evolve your data architecture. Data pipeline is an evolutionary break away from the enterprise data warehouse methodology.
      • Avoid endless data projects. Building centralized all-in-one enterprise data warehouses takes forever to deliver a positive ROI.
      • Facilitate data self-service. Use-case optimized data delivery repositories facilitate data self-service.

      Impact and Result

      • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
      • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
      • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

      Build a Data Pipeline for Reporting and Analytics Research & Tools

      Start here – read the Executive Brief

      Build your data pipeline using the most appropriate data design patterns.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data progression

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      • Build a Data Pipeline for Reporting and Analytics – Phase 1: Understand Data Progression

      2. Identify data pipeline components

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      • Build a Data Pipeline for Reporting and Analytics – Phase 2: Identify Data Pipeline Components

      3. Select data design patterns

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      • Build a Data Pipeline for Reporting and Analytics – Phase 3: Select Data Design Patterns
      [infographic]

      Workshop: Build a Data Pipeline for Reporting and Analytics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Data Progression

      The Purpose

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      Key Benefits Achieved

      Indicates the ownership of datasets and the high-level data flows across the organization.

      Activities

      1.1 Review & discuss typical pitfalls (and their causes) of major data management initiatives.

      1.2 Discuss the main business capabilities of the organization and how they interact.

      1.3 Discuss the business processes running inside and across business capabilities and the datasets involved.

      1.4 Create the Enterprise Business Process Model (EBPM).

      Outputs

      Understanding typical pitfalls (and their causes) of major data management initiatives.

      Business capabilities map

      Business processes map

      Enterprise Business Process Model (EBPM)

      2 Identify Data Pipeline Components

      The Purpose

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      Key Benefits Achieved

      Design the high-level data progression pipeline.

      Activities

      2.1 Review and discuss the concept of a data pipeline in general, as well as the vertical zones: data creation, accumulation, augmentation, and consumption.

      2.2 Identify these zones in the enterprise business model.

      2.3 Review and discuss multi-lane data progression.

      2.4 Identify different speed lanes in the enterprise business model.

      Outputs

      Understanding of a data pipeline design, including its zones.

      EBPM mapping to Data Pipeline Zones

      Understanding of multi-lane data progression

      EBPM mapping to Multi-Speed Data Progression Lanes

      3 Develop the Roadmap

      The Purpose

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      Key Benefits Achieved

      Use of appropriate data design pattern for each zone with calibration on the data progression speed.

      Activities

      3.1 Review and discuss various data design patterns.

      3.2 Discuss and select the data design pattern selection for data pipeline components.

      3.3 Discuss applicability of data model industry standards (if available).

      Outputs

      Understanding of various data design patterns.

      Data Design Patterns mapping to the data pipeline.

      Selection of an applicable data model from available industry standards.

      Mature and Scale Product Ownership

      • Buy Link or Shortcode: {j2store}145|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $21,919 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.
      • Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.
      • In many organizations, the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Our Advice

      Critical Insight

      A product owner is the CEO for their product. Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      • Product and service ownership share the same foundation - underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.
      • Product owners represent three primary perspectives: Business (externally facing), Technical (systems and tools), or Operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
      • Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Impact and Result

      • Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.
      • Promote and develop true Agile skills among your product owners and family managers.
      • Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Mature and Scale Product Ownership Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mature and Scale Product Ownership Storyboard – Establish a culture of success for product management and mature product owner capabilities.

      Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

    • Establish a foundation for empowerment and success.
    • Assign and align product owners with products and stakeholders.
    • Mature product owner capabilities and skills.
      • Mature and Scale Product Ownership Storyboard

      2. Mature and Scale Product Ownership Readiness Assessment – Determine your readiness for a product-centric culture based on Info-Tech’s CLAIM+G model.

      Using Info-Tech’s CLAIM model, quickly determine your organization’s strengths and weaknesses preparing for a product culture. Use the heat map to identify key areas.

      • Mature and Scale Product Ownership Readiness Assessment

      3. Mature and Scale Product Ownership Playbook – Playbook for product owners and product managers.

      Use the blueprint exercises to build your personal product owner playbook. You can also use the workbook to capture exercise outcomes.

      • Mature and Scale Product Ownership Playbook

      4. Mature and Scale Product Ownership Workbook – Workbook for product owners and product managers.

      Use this workbook to capture exercise outcomes and transfer them to your Mature and Scale Product Ownership Playbook (optional).

      • Mature and Scale Product Ownership Workbook

      5. Mature and Scale Product Ownership Proficiency Assessment – Determine your current proficiency and improvement areas.

      Product owners need to improve their core capabilities and real Agile skills. The assessment radar will help identify current proficiency and growth opportunities.

      • Mature and Scale Product Ownership Proficiency Assessment
      [infographic]

      Workshop: Mature and Scale Product Ownership

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the foundation for product ownership

      The Purpose

      Establish the foundation for product ownership.

      Key Benefits Achieved

      Product owner playbook with role clarity and RACI.

      Activities

      1.1 Define enablers and blockers of product management.

      1.2 Define your product management roles and names.

      1.3 Assess your product management readiness.

      1.4 Identify your primary product owner perspective.

      1.5 Define your product owner RACI.

      Outputs

      Enablers and blockers

      Role definitions.

      Product culture readiness

      Product owner perspective mapping

      Product owner RACI

      2 Align product owners to products

      The Purpose

      Align product owners to products.

      Key Benefits Achieved

      Assignment of resources to open products.

      A stakeholder management strategy.

      Activities

      2.1 Assign resources to your products and families.

      2.2 Visualize relationships to identify key influencers.

      2.3 Group stakeholders into categories.

      2.4 Prioritize your stakeholders.

      Outputs

      Product resource assignment

      Stakeholder management strategy

      Stakeholder management strategy

      Stakeholder management strategy

      3 Mature product owner capabilities

      The Purpose

      Mature product owner capabilities.

      Key Benefits Achieved

      Assess your Agile product owner readiness

      Assess and mature product owner capabilities

      Activities

      3.1 Assess your real Agile skill proficiency.

      3.2 Assess your vison capability proficiency.

      3.3 Assess your leadership capability proficiency.

      3.4 Assess your PLM capability proficiency.

      3.5 Assess your value realization capability proficiency.

      3.6 Identify your business value drivers and sources of value.

      Outputs

      Real Agile skill proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Business value drivers and sources of value

      Further reading

      Mature and Scale Product Ownership

      Strengthen the product owner’s role in your organization by focusing on core capabilities and proper alignment.

      Executive Brief

      Analyst Perspective

      Empower product owners throughout your organization.

      Hans Eckman

      Whether you manage a product or service, the fundamentals of good product ownership are the same. Organizations need to focus on three key elements of product ownership in order to be successful.

      • Create an environment of empowerment and service leadership to reinforce product owners and product family managers as the true owners of the vision, improvement, and realized the value of their products.
      • Align product and product family owner roles based on operational alignment and the groups defined when scaling product management.
      • Develop your product owners to improve the quality of roadmaps, alignment to enterprise goals, and profit and loss (P&L) for each product or service.

      By focusing the attention of the teammates serving in product owner or service owner roles, your organization will deliver value sooner and respond to change more effectively.

      Hans Eckman

      Principal Research Director – Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.

      Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.

      In many organizations the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Common Obstacles

      Organizations have poor alignment or missing product owners between lines of business, IT, and operations.

      Product owners are aligned to projects and demand management rather than long-term strategic product ownership.

      Product families are not properly defined, scaled, and supported within organizations.

      Individuals in product owner roles have an incomplete understanding of needed capabilities and lack a development path.

      Info-Tech's Approach

      Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.

      Promote and develop true Agile skills among your product owners and family managers.

      Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Extend product management success using Deliver on Your Digital Product Vision and Deliver Digital Products at Scale.

      Info-Tech Insight

      There is no single correct approach to product ownership. Product ownership must be tuned and structured to meet the delivery needs of your organization and the teams it serves.

      Info-Tech’s Approach

      Product owners make the final decision

      • Establish a foundation for empowerment and success
      • Assign product owners and align with products and stakeholders
      • Mature product owner capabilities and skills
      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      The Info-Tech difference

      1. Assign product owners where product decisions are needed, not to match org charts or delivery teams. The product owner has the final word on product decisions.
      2. Organize product owners into related teams to ensure product capabilities delivered are aligned to enterprise strategy and goals.
      3. Shared products and services must support the needs of many product owners with conflicting priorities. Shared service product owners must map and prioritize demand to align to enterprise priorities and goals.
      4. All product owners share the same capability model.

      Insight summary

      There is no single correct approach to product ownership

      Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      Phase 1 insight

      Product owners represent three primary perspectives: business (external-facing), technical (systems and tools), or operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Phase 2 insight

      Start with your operational grouping of products and families, identifying where an owner is needed. Then, assign people to the products and families. The owner does not define the product or family.

      Phase 3 insight

      Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Product and service ownership share the same foundation

      The underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.

      Map product owner roles to your existing job titles

      Identify where product management is needed and align expectations with existing roles. Successful product management does not require a dedicated job family.

      Projects can be a mechanism for funding product changes and improvements

      Projects can be a mechanism for funding product changes and improvements. Shows difference of value for project life-cycles, hybrid life-cycles, and product life-cycles.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Product and services owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but would apply to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Insight

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Match your product management role definitions to your product family levels

      Product ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply a management relationship.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Understand special circumstances

      In Deliver Digital Products at Scale, products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      The primary value of the product owner is to fill the backlog with the highest ROI opportunities aligned with enterprise goals.

      Info-Tech Insight

      The product owner owns the direction of the product.

      • Roadmap - Where are we going?
      • Backlog - What changes are needed to get there?
      • Product review - Did we get close enough?

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Product family owners are more strategic

      When assigning resources, recognize that product family owners will need to be more strategic with their planning and alignment of child families and products.

      Product family owners are more strategic. They require a roadmap that is strategic, goal-based, high-level, and flexible.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

      Product family roadmap versus Product Roadmaps.

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers, to uncover hidden stakeholders.

      Stakeholder network map defines the influence landscape your product operates. Connectors determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.
      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Crossing the Chasm

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how the change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Info-Tech’s methodology for mature and scale product ownership

      Phase steps

      1. Establish the foundation for product ownership

      Step 1.1 Establish an environment for product owner success

      Step 1.2 Establish your product ownership model

      2. Align product owners to products

      Step 2.1 Assign product owners to products

      Step 2.2 Manage stakeholder influence

      3. Mature product owner capabilities

      Step 3.1 Assess your Agile product owner readiness

      Step 3.2 Mature product owner capabilities

      Phase outcomes

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      3.1.1 Assess your real Agile skill proficiency

      3.2 Mature product owner capabilities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Key deliverable

      Mature and Scale Product Ownership Playbook

      Capture and organize the outcomes of the activities in the workbook.

      Mature and Scale Product Ownership Workbook

      The workbook helps organize and communicate the outcomes of each activity.

      Mature and Scale Product Ownership Readiness Assessment

      Determine your level of mastery of real Agile skills and product owner capabilities.


      Blueprint benefits

      IT benefits

      • Competent product owner who can support teams operating in any delivery methodology.
      • Representative viewpoint and input from the technical and operational product owner perspectives.
      • Products aligned to business needs and committed work are achievable.
      • Single point of contact with a business representative.
      • Acceptance of product owner role outside the Scrum teams.

      Business benefits

      • Better alignment to enterprise goals, vision, and outcomes.
      • Improved coordination with stakeholders.
      • Quantifiable value realization tied to vision.
      • Product decisions made at the right time and with the right input.
      • Product owner who has the appropriate business, operations, and technical knowledge.

      Measure the value of this blueprint

      Align product owner metrics to product delivery and value realization.

      Member outcome

      Suggested Metric

      Estimated impact

      Increase business application satisfaction Satisfaction of business applications (CIO BV Diagnostic) 20% increase within one year after implementation
      Increase effectiveness of application portfolio management Effectiveness of application portfolio management (M&G Diagnostic) 20% increase within one year after implementation
      Increase importance and effectiveness of application portfolio Importance and effectiveness to business (APA Diagnostic) 20% increase within one year after implementation
      Increase satisfaction of support of business operations Support to business (CIO BV Diagnostic) 20% increase within one year after implementation
      Successfully deliver committed work (productivity) Number of successful deliveries; burndown Reduction in project implementation overrun by 20%

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project"

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Establish the Foundation for Product Ownership

      Phase 2 Align Product Owners to Products

      Phase 3 Mature Product Owner Capabilities

      • Call #1:
        Scope objectives and your specific challenges
      • Call #2:
        Step 1.1 Establish an environment for product owner success
        Step 1.2 Establish your product ownership model
      • Call #3:
        Step 2.1 Assign product owners to products
      • Call #4:
        Step 2.2 Manage stakeholder influence
      • Call #5:
        Step 3.1 Assess your Agile product owner readiness
      • Call #6:
        Step 3.2 Mature product owner capabilities

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 and 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 1

      Phase 2

      Phase 3

      Activities

      Establish the Foundation for Product Ownership

      Step 1.1 Establish an environment for product owner success

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Step 1.2 Establish your product ownership model

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Align Product Owners to Products

      Step 2.1 Assign product owners to products

      2.1.1 Assign resources to your products and families

      Step 2.2 Manage stakeholder influence

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Mature Product Owner Capabilities

      Step 3.1 Assess your Agile product owner readiness

      3.1.1 Assess your real Agile skill proficiency

      Step 3.2 Mature product owner capabilities=

      3.2.1 Assess your Vision capability proficiency

      3.2.2 Assess your Leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your Value Realization capability proficiency

      Deliverables

      1. Enablers and blockers
      2. Role definitions
      3. Product culture readiness
      4. Product owner perspective mapping
      5. Product owner RACI
      1. Product resource assignment
      2. Stakeholder management strategy
      1. Real Agile skill proficiency assessment
      2. Info-Tech’s product owner capability model proficiency assessment
      3. Business value drivers and sources of value

      Related Info-Tech Research

      Product delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application portfolio management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement its own applications with a trusted business-IT relationship.

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, delivery metrics, estimation

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational design and performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic Workforce Plan

      Have the right people in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it.

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Phase 1

      Establish the Foundation for Product Ownership

      Phase 1: Establish an environment for product owner success, Establish your product ownership model

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 1.1

      Establish an environment for product owner success

      Activities

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Enablers and blockers
      • Role definitions

      Empower product owners as the true owners of their product

      Product ownership requires decision-making authority and accountability for the value realization from those decisions. POs are more than a proxy for stakeholders, aggregators for changes, and the communication of someone else’s priorities.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman,
      “Tips for Starting Technical Product Managers”

      Info-Tech Best Practice

      Implement Info-Tech’s Product Owner Capability Model to help empower and hold product owners accountable for the maturity and success of their product. The product owner must understand how their product fits into the organization’s mission and strategy in order to align to enterprise value.

      Product and service owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but applies to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Define product ownership to match your culture and customers

      Characteristics of a discrete product:

      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate
      • Has a discrete backlog and roadmap of improvements

      What does not need a product owner?

      • Individual features
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams

      Info-Tech Insight

      • Products are long-term endeavors that don’t end after the project finishes.
      • Products mature and improve their ability to deliver value.
      • Products have a discrete backlog of changes to improve the product itself, separate from operational requests fulfilled by the product or service.

      Need help defining your products or services? Download our blueprint Deliver Digital Products at Scale.

      Connect roadmaps to value realization with KPIs

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.</p data-verified=

      " loading="lazy">

      Info-Tech Insight

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.

      Identify the differences between a project-centric and a product-centric organization

      Differences between Project centric and Product centric organizations in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      Projects lifecycle, hybrid lifecycle and product lifecycle. Period or periods of project development have parallel services that encompass a more product-based view.

      Projects withing products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompasses a more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Recognize common barriers to product management

      The transition to product ownership is a series of behavioral and cultural changes supported by processes and governance. It takes time and consistency to be successful.

      • Command and control structures
      • Lack of ownership and accountability
      • High instability in the market, demand, or organization
      • Lack of dedicated teams align to delivery, service, or product areas
      • Culture of one-off projects
      • Lack of identified and engaged stakeholders
      • Lack of customer exposure and knowledge

      Agile’s four core values

      “…while there is value in the items on the right, we value the items on the left more.”

      Source: “The Agile Manifesto”

      We value...

      We value being agile: Individuals and interactions, Working Software, Customer collaboration, Responding to change. Versus being prescriptive: Processes and tools, Comprehensive documentation, Contract negotiation, following a plan.

      Exercise 1.1.1 Define enablers and blockers of product management

      1 hour
      1. Identify and mitigate blockers of product management in your organization.
      2. What enablers will support strong product owners?
      3. What blockers will make the transition to product management harder?
      4. For each blocker, also define at least one mitigating step.
      Define enablers e.g. team culture. Define blockers and at least one mitigating step

      Output

      • Enablers and blockers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Effective product delivery requires thinking about more than just a single product

      Good application and product management begins with strengthening good practices for a single or small set of applications, products, and services.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Exercise 1.1.2 Define your product management roles and names

      1-2 hour
      1. Identify the roles in which product management activities will be owned.
      2. Define a common set of role names and describe the role.
      3. Map the level of accountability for each role: Product or Product Family
      4. Product owner perspectives will be defined in the next step.

      Define roles, description and level of product accountability.

      Output

      • Role definitions

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Exercise 1.1.3 Assess your product management readiness

      1 hour
      1. Open and complete the Mature and Scale Product Ownership Readiness Assessment in your Playbook or the provided Excel tool.
      2. Discuss high and low scores for each area to reach a consensus.
      3. Record your results in your Playbook.

      Assess your culture, learning, automation, Integrated teams, metrics and governance.

      Output

      • Assessment of product management readiness based on Info-Tech’s CLAIM+G model.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Readiness Assessment.

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      Step 1.2

      Establish your product ownership model

      Activities

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product owner perspective mapping
      • Product owner RACI

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Identify and align to product owner perspectives to ensure product success

      Product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.
      1. Each product owner perspective provides important feedback, demand, and support for the product.
      2. Where a perspective is represented by a distinct role, the perspective is managed with that product owner.
      3. If separate roles don’t exist, the product owner must evaluate their work using two or three perspectives.
      4. The ultimate success of a product, and therefore product owner, is meeting the end-user value of the business product owner, tool support of the technical product owner, and manual processing support of the operations product owner.

      Line of business (LOB) product owners

      LOB product owners focus on the products and services consumed by the organization’s external consumers and users. The role centers on the market needs, competitive landscape, and operational support to deliver products and services.

      Business perspective

      • Alignment to enterprise strategy and priorities
      • Growth: market penetration and/or revenue
      • Perception of product value
      • Quality, stability, and predictability
      • Improvement and innovation
      • P&L
      • Market threats and opportunities
      • Speed to market
      • Service alignment
      • Meet or exceed individual goals

      Relationship to Operations

      • Customer satisfaction
      • Speed of delivery and manual processing
      • Continuity

      Relationship to Technical

      • Enabler
      • Analysis and insight
      • Lower operating and support costs

      Technical product owners

      Technical product owners are responsible for the IT systems, tools, platforms, and services that support business operations. Often they are identified as application or platform managers.

      Technical perspective

      • Application, application suite, or group of applications
      • Core platforms and tools
      • Infrastructure and networking
      • Third-party technology services
      • Enable business operations
      • Direct-to-customer product or service
      • Highly interconnected
      • Need for continuous improvement
      • End-of-life management
      • Internal value proposition and users

      Relationship to Business

      • Direct consumers
      • End users
      • Source of funding

      Relationship to Operations

      • End users
      • Process enablement or automation
      • Support, continuity, and manual intervention

      Operations (service) product owners

      Operational product owners focus on the people, processes, and tools needed for manual processing and decisions when automation is not cost-effective. Operational product owners are typically called service owners due to the nature of their work.

      Operational perspective

      • Business enablement
      • Continuity
      • Problem, incident, issue resolution
      • Process efficiency
      • Throughput
      • Error/defect avoidance
      • Decision enablement
      • Waste reduction
      • Limit time in process
      • Disaster recovery

      Relationship to Business

      • Revenue enablement
      • Manual intervention and processing
      • End-user satisfaction

      Relationship to Technical

      • Process enabler
      • Performance enhancement
      • Threat of automation

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Identify which product owner perspective represents your primary focus.
      2. Determine where the other perspectives need to be part of your product roadmap or if they are managed by other product owners.

      Identify product/service name, identify product owner perspective, determine if other perspectives need to be part of roadmap.

      Output

      • Identification of primary product owner perspective.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Realign differences between project managers and product owners

      Differences between Project Manager and Product Owners in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their product delivery life-cycles.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles. Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

      Define who manages each key milestone

      Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the product owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.

      Example milestones and Project Manager, Product Owner and Team Facilitator.

      *Scrum Master, Delivery Manager, Team Lead

      Exercise 1.2.2 Define your product owner RACI

      60 minutes
      1. Review your product and project delivery methodologies to identify key milestones (including approvals, gates, reviews, compliance checks, etc.). List each milestone on a flip chart or whiteboard.
      2. For each milestone, define who is accountable for the completion.
      3. For each milestone, define who is responsible for executing the milestone activity. (Who does the work that allows the milestone to be completed?)
      4. Review any responsibility and accountability gaps and identify opportunities to better support and execute your operating model.
      5. If you previously completed Deliver Digital Products at Scale , review and update your RACI in the Mature and Scale Product Ownership Workbook .

      Define: Milestones, Project Manager, Product/service owner, Team Facilitator, and Other roles.

      Output

      • Product owner RACI

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Phase 2

      Align Product Owners to Products

      Phase 2: Assign product owners to products, Manage stakeholder influence

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 2.1

      Assign product owners to products

      Activities

      2.1.1 Assign resources to your products and families

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product resource assignment

      Match your product management role definitions to your product family levels

      Using the role definitions, you created in Exercise 1.1.2, determine which roles correspond to which levels of your product families.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Assign resources throughout your product families

      Project families are owned by a product manager. Product owners own each product that has a distinct backlog.

      Info-Tech Insight

      • Start by assigning resources to each product or product family box.
      • A product owner can be responsible for more than one product.
      • Ownership of more than one product does not mean they share the same backlog.
      • For help organizing your product families, please download Deliver Digital Products at Scale.

      Understand special circumstances

      In Deliver Digital Products at Scale , products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map the source of demand to each product

      With enterprise applications and shared services, your demand comes from other product and service owners rather than end customers in a value stream.

      Enterprise applications

      • Primary demand comes from the operational teams and service groups using the platform.
      • Each group typically has processes and tools aligned to a module or portion of the overall platform.
      • Product owners determine end-user needs to assist with process improvement and automation.
      • Product family managers help align roadmap goals and capabilities across the modules and tools to ensure consistency and the alignment of changes.

      Shared services

      • Primary demand for shared services comes from other product owners and service managers whose solution or application is dependent on the shared service platform.
      • Families are grouped by related themes (e.g. workflow tools) to increase reusability, standard enterprise solutions, reduced redundancy, and consistent processes across multiple teams.
      • Product owners manage the individual applications or services within a family.

      Pattern: Enterprise applications

      A division or group delivers enabling capabilities and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

      Workforce Management, Strategic HR, Talent Management, Core HR

      Example:

      • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
      • Each operational team is supported by one or more applications or modules within a primary HR system.
      • Even though the teams work independently, the information they manage is shared with, or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

      For additional information about HRMS, please download Get the Most Out of Your HRMS.

      Assigning owners to enterprise applications

      Align your enterprise application owners to your operating teams that use the enterprise applications. Effectively, your service managers will align with your platform module owners to provide integrated awareness and planning.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Pattern: Shared services

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Example:

      • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
      • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
      • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
      • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

      Assigning owners to shared services

      Assign owners by service type, knowledge area, or technology to provide alignment of shared business capabilities and common solutions.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      Exercise 2.1.1 Assign resources to your products and families

      1-4 hours
      1. Use the product families you completed in Deliver Digital Products at Scale to determine which products and product families need a resource assigned. Where the same resource fills more than one role, they are the product owner or manager for each independently.
      2. Product families that are being managed as products (one backlog for multiple products) should have one owner until the family is split into separate products later.
      3. For each product and family, define the following:
        • Who is the owner (role or person)?
        • Is ownership clearly defined?
        • Are there other stakeholders who make decisions for the product?
      4. Record the results in the Mature and Scale Product Ownership Workbook on the Product Owner Mapping worksheet.

      Output

      • Product owner and manager resource alignment.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Step 2.2

      Manage stakeholder influence

      Activities

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Stakeholder management strategy

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Create a stakeholder network map to product roadmaps and prioritization. Use connectors to determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Exercise 2.2.1 Visualize relationships to identify key influencers

      1 hour
      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate informal bidirectional influence relationships.
      5. Record the results in the Mature and Scale Product Ownership Workbook .

      Output

      • Relationships among stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product owners categorize their stakeholders by their level of influence and ownership in the product and/or teams.

      Influence versus Ownership/Interest

      There are four areas on the map, and the stakeholders within each area should be treated differently.

      • Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediments to the objectives.
      • Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
      • Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively but have little ability to enact their wishes.
      • Spectators are generally apathetic and have little influence over or interest in the initiative.

      Exercise 2.2.2 Group stakeholders into categories

      1 hour
      1. Identify your stakeholders’ interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Influence versus Ownership/Interest with CMO, CIO and Product Manager in assigned areas.

      Output

      • Categorization of stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Stakeholder category versus level of support.

      Consider the three dimensions of stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: How likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive your focused attention. The table to the right indicates how stakeholders are ranked.

      Exercise 2.2.3 Prioritize your stakeholders

      1 hour
      1. Identify the level of support of each stakeholder by answering the following question: How likely is it that your stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Stakeholder, Category, level of support, prioritization.

      Output

      • Stakeholder and influencer prioritization

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Define strategies for engaging stakeholders by type

      Authority Vs. Ownership/Interest.

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using mediators to help them.

      Spectators

      Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy spectators and noisemakers while ensuring the needs of mediators and players are met.

      Phase 3

      Mature Product Owner Capabilities

      Phase 3: Assess your Agile product owner readiness, Mature product owner capabilities.

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      3.1.1 Assess your real Agile skill proficiency

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      This phase involves the following participants:

      • Product owners
      • Product managers

      Step 3.1

      Assess your Agile product owner readiness

      Activities

      3.1.1 Assess your real Agile skill proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Real Agile skill proficiency assessment

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.

      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Info-Tech research shows these are the real Agile skills to get started with

      Skill Name

      Description

      Accountability

      Refers to the state of being accountable. In an Agile context, it implies transparency, dedication, acting responsibly, and doing what is necessary to get the job done.

      Collaboration

      Values diverse perspectives and working with others to achieve the best output possible. Effective at working toward individual, team, department, and organizational goals.

      Comfort with ambiguity

      Allows you to confidently take the next steps when presented with a problem without having all the necessary information present.

      Communication

      Uses different techniques to share information, concerns, or emotions when a situation arises, and it allows you to vary your approach depending on the current phase of development.

      Empathy

      Is the ability to understand and share the feelings of another to better serve your team and your stakeholders.

      Facilitation

      Refers to guiding and directing people through a set of conversations and events to learn and achieve a shared understanding.

      Functional decomposition

      Is being able to break down requirements into constituent epics and stories.

      Initiative

      Is being able to anticipate challenges and then act on opportunities that lead to better business outcomes.

      Process discipline

      Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.

      Resilience

      Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      Accountability

      An accountable person:

      • Takes ownership of their own decisions and actions and is responsible for the quality of results.
      • Recognizes personal accountabilities to others, including customers.
      • Works well autonomously.
      • Ensures that the mutual expectations between themselves and others are clearly defined.
      • Takes the appropriate actions to ensure that obligations are met in a timely manner.
      • As a leader, takes responsibility for those being led.

      Accountability drives high performance in teams and organizations

      • The performance level of teams depends heavily on accountability and who demonstrates it:
        • In weak teams, there is no accountability.
        • In mediocre teams, supervisors demonstrate accountability.
        • In high-performance teams, peers manage most performance problems through joint accountability. (Grenny, 2014)
      • According to Bain & Company, accountability is the third most important attribute of high-performing companies. Some of the other key attributes include honest, performance-focused, collaborative, and innovative. (Mankins, 2013)

      All components of the employee empowerment driver have a strong, positive correlation with engagement.

      Employee empowerment and Correlation with engagement.

      Source: McLean & Company Engagement Database, 2018; N=71,794

      Accountability

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Alerts others to possible problems in a timely manner.
      • Seeks appropriate support to solve problems.
      • Actively contributes to the creation and evaluation of possible solutions.
      • Acts on solutions selected and decisions made as directed.
      • Makes effective decisions about how to complete work tasks.
      • Demonstrates the capability of breaking down concrete issues into parts and synthesizing information succinctly.
      • Collects and analyzes information from a variety of sources.
      • Seeks information and input to fully understand the cause of problems.
      • Takes action to address obstacles and problems before they impact performance and results.
      • Initiates the evaluation of possible solutions to problems.
      • Makes effective decisions about work task prioritization.
      • Appropriately assesses risks before deciding.
      • Effectively navigates through ambiguity, using multiple data points to analyze issues and identify trends.
      • Does not jump to conclusions.
      • Draws logical conclusions and provides opinions and recommendations with confidence.
      • Takes ownership over decisions and their consequences.
      • Demonstrates broad knowledge of information sources that can be used to assess problems and make decisions.
      • Invests time in planning, discovery, and reflection to drive better decisions.
      • Effectively leverages hard data as inputs to making decisions.
      • Garners insight from abstract data and makes appropriate decisions.
      • Coaches others in effective decision-making practices.
      • Has the authority to solve problems and make decisions.
      • Thinks several steps ahead in deciding the best course of action, anticipating likely outcomes, risks, or implications.
      • Establishes metrics to aid in decision-making, for self and teams
      • Prioritizes objective and ambiguous information and analyzes this when making decisions.
      • Solicits a diverse range of opinions and perspectives as inputs to decision making.
      • Applies frameworks to decision making, particularly in situations that have little base in prior experience.
      • Makes effective decisions about organizational priorities.
      • Holds others accountable for their decisions and consequences.
      • Creates a culture of empowerment and trust to facilitate effective problem solving and decision making.
      • Makes sound decisions that have organization-wide consequences and that influence future direction.

      Collaboration as a skill

      The principles and values of Agile revolve around collaboration.

      • Works well with others on specialized and cross-functional teams.
      • Can self-organize while part of a team.
      • Respects the commitments that others make.
      • Identifies and articulates dependencies.
      • Values diverse perspectives and works with others to achieve the best output possible.
      • Effective at working toward individual, team, department, and organizational goals.
      The principles and values of Agile revolve around collaboration. Doing what was done before (being prescriptive), going though the motions (doing Agile), living the principles (being Agile)

      Collaboration

      The Agile Manifesto has three principles that focus on collaboration:

      1. The business and developers must work together daily throughout the project.
      2. Build projects around motivated individuals. Give them the environment and support they need and trust them to get the job done.
      3. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.

      Effective collaboration supports Agile behaviors, including embracing change and the ability to work iteratively.

      Collaboration

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Understands role on the team and the associated responsibilities and accountabilities.
      • Treats team members with respect.
      • Contributes to team decisions and to the achievement of team goals and objectives.
      • Demonstrates a positive attitude.
      • Works cross-functionally to achieve common goals and to support the achievement of other team/department goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Fosters team camaraderie, collaboration, and cohesion.
      • Understands the impact of one's actions on the ability of team members to do their jobs.
      • Respects the differences other team members bring to the table by openly seeking others' opinions.
      • Helps the team accomplish goals and objectives by breaking down shared goals into smaller tasks.
      • Approaches challenging team situations with optimism and an open mind, focusing on coming to a respectful conclusion.
      • Makes suggestions to improve team engagement and effectiveness.
      • Supports implementation of team decisions.
      • Professionally gives and seeks feedback to achieve common goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Motivates the team toward achieving goals and exceeding expectations.
      • Reaches out to other teams and departments to build collaborative, cross-functional relationships.
      • Creates a culture of collaboration that leverages team members' strengths, even when the team is remote or virtual.
      • Participates and encourages others to participate in initiatives that improve team engagement and effectiveness.
      • Builds consensus to make and implement team decisions, often navigating through challenging task or interpersonal obstacles.
      • Values leading a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Creates a culture of collaboration among teams, departments, external business partners, and all employee levels.
      • Breaks down silos to achieve inter-departmental collaboration.
      • Demonstrates ownership and accountability for team/department/ organizational outcomes.
      • Uses an inclusive and consultative approach in setting team goals and objectives and making team decisions.
      • Coaches others on how to identify and proactively mitigate potential points of team conflict.
      • Recognizes and rewards teamwork throughout the organization.
      • Provides the tools and resources necessary for teams to succeed.
      • Values diverse teams and understands the importance of differing perspectives to develop unique solutions or ideas.

      Comfort with ambiguity

      Ability to handle ambiguity is a key factor in Agile success.

      • Implies the ability to maintain a level of effectiveness when all information is not present.
      • Able to confidently act when presented with a problem without all information present.
      • Risk and uncertainty can comfortably be handled.
      • As a result, can easily adapt and embrace change.
      • People comfortable with ambiguity demonstrate effective problem-solving skills.

      Relative importance of traits found in Agile teams

      1. Handles ambiguity
      2. Agreeable
      3. Conscientious

      Comfort with ambiguity

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Requires most information to be present before carrying out required activities.
      • Can operate with some information missing.
      • Comfortable asking people within their known circles for help.
      • Significant time is taken to reveal small pieces of information.
      • More adept at operating with information missing.
      • Willing to reach out to people outside of their regular circles for assistance and clarification.
      • Able to apply primary and secondary research methods to fill in the missing pieces.
      • Can operate essentially with a statement and a blank page.
      • Able to build a plan, drive others and themselves to obtain the right information to solve the problem.
      • Able to optimize only pulling what is necessary to answer the desired question and achieve the desired outcome.

      Communication

      Even though many organizations recognize its importance, communication is one of the root causes of project failure.

      Project success vs Communication effectiveness. Effective communications is associated with a 17% increase in finishing projects within budget.

      56%

      56% of the resources spent on a project are at risk due to ineffective communications.

      PMI, 2013.

      29%

      In 29% of projects started in the past 12 months, poor communication was identified as being one of the primary causes of failure.

      PMI, 2013.

      Why are communication skills important to the Agile team?

      It’s not about the volume, it’s about the method.

      • Effectively and appropriately interacts with others to build relationships and share ideas and information.
      • Uses tact and diplomacy to navigate difficult situations.
      • Relays key messages by creating a compelling story, targeted toward specific audiences.

      Communication effectiveness, Activity and Effort required.

      Adapted From: Agile Modeling

      Communication

      Your Score:____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Actively listens, learns through observation, and uses clear and precise language.
      • Possesses an open and approachable demeanor, with a positive and constructive tone.
      • Demonstrates interest in the thoughts and feelings of others.
      • Considers potential responses of others before speaking or acting.
      • Checks own understanding of others’ communication by repeating or paraphrasing.
      • Demonstrates self-control in stressful situations.
      • Provides clear, concise information to others via verbal or written communication.
      • Seeks to understand others' points of view, looking at verbal and non-verbal cues to encourage open and honest discussions.
      • Invites and encourages others to participate in discussions.
      • Projects a sincere and genuine tone.
      • Remains calm when dealing with others who are upset or angry.
      • Provides and seeks support to improve communication.
      • Does not jump to conclusions or act on assumptions.
      • Tailors messages to meet the different needs of different audiences.
      • Accurately interprets responses of others to their words and actions.
      • Provides feedback effectively and with empathy.
      • Is a role model for others on how to effectively communicate.
      • Ensures effective communication takes place at the departmental level.
      • Engages stakeholders using appropriate communication methods to achieve desired outcomes.
      • Creates opportunities and forums for discussion and idea sharing.
      • Demonstrates understanding of the feelings, motivations, and perspectives of others, while adapting communications to anticipated reactions.
      • Shares insights about their own strengths, weaknesses, successes, ad failures to show empathy and help others relate.
      • Discusses contentious issues without getting defensive and maintains a professional tone.
      • Coaches others on how to communicate effectively and craft targeted messages.
      • Sets and exemplifies standards for respectful and effective communications in the organization.
      • Comfortably delivers strategic messages supporting their function and the organization at the enterprise level.
      • Communicates with senior-level executives on complex organizational issues.
      • Promotes inter-departmental communication and transparency.
      • Achieves buy-in and consensus from people who share widely different views.
      • Shares complex messages in clear, understandable language.
      • Accurately interprets how they are perceived by others.
      • Rallies employees to communicate ideas and build upon differing perspectives to drive innovation.

      Empathy

      Empathy is the ability to understand and share the feelings of another in order to better serve your team and your stakeholders. There are three kinds:

      Cognitive

      Thought, understanding, intellect

      • Knowing how someone else feels and what they might be thinking.
      • Contributes to more effective communication.

      Emotional

      Feelings, physical sensation

      • You physically feel the emotions of the other person.
      • Helps build emotional connections with others.

      Compassionate

      Intellect, emotion with action

      • Along with understanding, you take action to help.

      How is empathy an Agile skill?

      Empathy enables you to serve your team, your customers, and your organization

      Serving the team

      • Primary types: Emotional and compassionate empathy.
      • The team is accountable for delivery.
      • By being able to empathize with the person you are talking to, complex issues can be addressed.
      • A lack of empathy leads to a lack of collaboration and being able to go forward on a common path.

      Serving your customers and stakeholders

      • Primary type: Cognitive empathy.
      • Agile enables the delivery of the right value at the right time to your stakeholders
      • Translating your stakeholders' needs requires an understanding of who they are as people. This is done through observations, interviews and conversations.
      • Leveraging empathy maps and user-story writing is an effective tool.

      Empathy

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Knowing how someone else feels and what they might be thinking.
      • Ability to build emotional connections with others.
      • Able to harness emotional connections to achieve tangible and experiential outcomes.
      • Demonstrates an awareness of different feelings and ways of thinking by both internal and external stakeholders.
      • Limited ability to make social connections with others outside of the immediate team.
      • Able to connect with similarly minded people to improve customer/stakeholder satisfaction. (Insights into action)
      • Able to interact and understand others with vastly different views.
      • Lack of agreement does not stop individual. from asking questions, understanding, and pushing the conversation forward

      Facilitation

      It’s not just your manager’s problem.

      “Facilitation is the skill of moderating discussions within a group in order to enable all participants to effectively articulate their views on a topic under discussion, and to ensure that participants in the discussion are able to recognize and appreciate the differing points of view that are articulated.” (IIBA, 2015)

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.

      Facilitation

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.
      • Maps and executes processes effectively.
      • Uses facts and concrete examples to demonstrate a point and gain support from others.
      • Openly listens to the perspectives of others.
      • Builds relationships through honest and consistent behavior.
      • Understands the impact of their own actions and how others will perceive it.
      • Identifies impediments to progress.
      • Anticipates the effect of one's approach on the emotions and sensitivities of others.
      • Practices active listening while demonstrating positivity and openness.
      • Customizes discussion and presentations to include "what’s in it for me" for the audience.
      • Presents compelling information to emphasize the value of an idea.
      • Involves others in refining ideas or making decisions in order to drive buy-in and action.
      • Knows how to appropriately use influence to achieve outcomes without formal authority.
      • Seeks ways and the help of others to address barriers or blockers to progress.
      • Leverages a planned approach to influencing others by identifying stakeholder interests, common goals, and potential barriers.
      • Builds upon successes to gain acceptance for new ideas.
      • Facilitates connections between members of their network for the benefit of the organization or others.
      • Demonstrates the ability to draw on trusting relationships to garner support for ideas and action.
      • Encourages a culture that allows space for influence to drive action.
      • Adept at appropriately leveraging influence to achieve business unit outcomes.
      • Actively manages the removal of barriers and blockers for teams.

      Functional decomposition

      It’s not just a process, it’s a skill.

      “Functional decomposition helps manage complexity and reduce uncertainty by breaking down processes, systems, functional areas, or deliverables into their simpler constituent parts and allowing each part to be analyzed independently."

      (IIBA, 2015)

      Being able to break down requirements into constituent consumable items (example: epics and user stories).

      Start: Strategic Initiatives. 1: Epics. 2: Capabilities. 3: Features. End: Stories.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Functional Decomposition

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Able to decompose items with assistance from other team members.
      • Able to decompose items independently, ensuring alignment with business value.
      • Able to decompose items independently and actively seeks out collaboration opportunities with relevant SME's during and after the refinement process to ensure completion.
      • Able to decompose items at a variety of granularity levels.
      • Able to teach and lead others in their decomposition efforts.
      • Able to quickly operate at different levels of the requirements stack.

      Initiative and self-organization

      A team that takes initiative can self-organize to solve critical problems.

      • "The best architectures, requirements, and designs emerge from self-organizing teams." (Agile Manifesto)
      • In a nutshell, the initiative represents the ability to anticipate challenges and act on opportunities that lead to better business outcomes.
      • Anticipates challenges and acts on opportunities that lead to better business outcomes.
      • Thinks critically and is motivated to use both specialist expertise and general knowledge.
      • Driven by the delivery of business value and better business outcomes.
      • Empowers others to act and is empowered and self-motivated.

      Initiative and self-organization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of an opportunity or issue which is presently occurring or is within the immediate work area.
      • Reports an opportunity or issue to the appropriate person.
      • Acts instead of waiting to be asked.
      • Willingly takes on challenges, even if they fall outside their area of expertise.
      • Is proactive in identifying issues and making recommendations to resolve them.
      • Within the scope of the work environment, takes action to improve processes or results, or to resolve problems.
      • Not deterred by obstacles.
      • Tackles challenges that require risk taking.
      • Procures the necessary resources, team and technical support to enable success.
      • Assists others to get the job done.
      • Demonstrates awareness of an opportunities or issues which are in the future or outside the immediate work area.
      • Typically exceeds the expectations of the job.
      • Learns new technology or skills outside their specialization so that they can be a more effective team member.
      • Recommends solutions to enhance results or prevent potential issues.
      • Drives implementation of new processes within the team to improve results.
      • Able to provide recommendations on plans and decisions that are strategic and future-oriented for the organization.
      • Identifies areas of high risk or of organizational level impact.
      • Able to empower significant recourses from the organization to enable success.
      • Leads long-term engagements that result in improved organizational capabilities and processes.

      Process discipline

      A common misconception is that Agile means no process and no discipline. Effective Agile teams require more adherence to the right processes to create a culture of self-improvement.

      • Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.
      • Focus on following the right steps for a given activity at the right time to achieve desired outcomes.
      Example: Scrum Ceremonies during a sprint (1 - 4 weeks/sprint). 1: Sprint planning, 2: Daily scrum, 3: Sprint review, 4: Sprint retrospective.

      Process discipline

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of the key processes and steps that are needed in a given situation.
      • Limited consistency in following processes and limited understanding of the 'why' behind the processes.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates not only the knowledge of processes but understands the 'why' behind their existence.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates understanding of not only why specific processes exist but can suggest changes to improve efficiency, consistency, and outcomes.

      N/A -- Maximum level is '3

      Resilience

      If your team hits the wall, don’t let the wall hit them back.

      • Resilience is critical for an effective Agile transformation. A team that demonstrates resilience always exhibits:
      • Evolution over transformation – There is a recognition that changes happen over time.
      • Intensity and productivity – A race is not won by the ones who are the fastest, but by the ones who are the most consistent. Regardless of what comes up, the team can push through.
      • That organizational resistance is futile – Given that it is working on the right objectives, the team needs to demonstrate a consistency of approach and intensity regardless of what may stand in its way.
      • Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      How resilience aligns with Agile

      A team is not “living the principles” without resilience.

      1. Purpose

        Aligns with: “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software.” The vision or goals may not be clear in certain circumstances and can be difficult to relate to a single work item. Being able to intrinsically source and harness a sense of purpose becomes more important, especially as a self-organizing team.
      2. Perseverance

        Aligns with: “Agile processes harness change for the customer's competitive advantage.” Perseverance enables teams to continuously deliver at a steady pace, addressing impediments or setbacks and continuing to move forward.
      3. Composure

        Aligns with: “Agile processes promote sustainable development,” and “At regular intervals, the team reflects ... and adjusts its behavior accordingly.”
        When difficult situations arise, composure allows us to understand perspectives, empathize with customers, accept late changes, and sustain a steady pace.
      4. Self-Reliance

        Aligns with: “The best architectures, requirements, and designs emerge from self-organizing teams.” Knowing oneself, recognizing strengths, and drawing on past successes, can be a powerful aid in creating high-performing Agile teams
      5. Authenticity

        Aligns with: “At regular intervals, the team reflects … and adjusts its behavior accordingly,” and “Build projects around motivated individuals.”
        When difficult situations arise, authenticity is crucial. “For example, being able to openly disclose areas outside of your strengths in sprint planning or being able to contribute constructively toward self-organization.”

      Adapted from: Why Innovation, 2019.

      Resilience

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Easily distracted and stopped by moderately stressful and challenging situations.
      • Requires significant help from others to get back on track.
      • Not frequently able (or knows) how to ask for help
      • Handles typical stresses and challenges for the given role.
      • Able to get back on track with limited assistance.
      • Able to ask for help when they need it.
      • Quality of work unaffected by an increase in pressures and challenges.
      • Handles stresses and challenges what is deemed above and beyond their given role.
      • Able to provide advice to others on how to handle difficult and challenging situations.
      • Quality of work and outcomes is maintained and sometimes exceeded as pressure increases.
      • Team looks to this individual as being the gold standard on how to approach any given problem or situation.
      • Directly mentors others on approaches in situations regardless of the level of challenge.

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Review each real Agile skill and determine your current proficiency.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Accountability, Collaboration, Comfort in Ambiguity, Communication, Empathy, Facilitation, Functional Decomposition, Initiative, Process Discipline, Resilience.

      Output

      • Agile skills assessment results.

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your Agile skills proficiency: Edit chart data to plot your scores or add your data points and connect the lines.

      Step 3.2

      Mature product owner capabilities

      Activities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Info-Tech product owner capability model proficiency assessment

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view . Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Capabilities: Vision

      Market Analysis

      • Customer Empathy: Identify the target users and unique value your product provides that is not currently being met. Define the size of your user base, segmentation, and potential growth.
      • Customer Journey: Define the future path and capabilities your users will respond to.
      • Competitive analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.

      Business Alignment

      • Enterprise alignment: Align to enterprise and product family goals, strategies, and constraints.
      • Delivery and release strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes. Value delivery is constrained by your delivery pipeline.
      • OCM and go-to-market strategy: Create organizational change management, communications, and a user implementation approach to improve adoption and satisfaction from changes.

      Product Roadmap

      • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
      • Value prioritization: Define criteria used to evaluate and sequence demand items.
      • Release and capacity planning: Build your roadmap with realistic goals and milestones based on your delivery pipeline and dependencies.

      “Customers are best heard through many ears.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Vision: Market Analysis, Business Alignment, and Product Roadmap.

      Info-Tech Insight

      Data comes from many places and may still not tell the complete story.

      Build your product strategy playbook

      Complete Deliver on Your Digital Product Vision to define your Vision, Goals, Roadmap approach, and Backlog quality filters.

      Digital Product Strategy Supporting Workbook

      Supporting workbook that captures the interim results from a number of exercises that will contribute to your overall digital product vision.

      Product Backlog Item Prioritization Tool

      An optional tool to help you capture your product backlog and prioritize based on your given criteria

      Product Roadmap Tool

      An optional tool to help you build out and visualize your first roadmap.

      Your Digital Product Vision Details Strategy

      Record the results from the exercises to help you define, detail, and make real your digital product vision.

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Geoffrey Moore, 2014.

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Use product roadmaps to guide delivery

      In Deliver on Your Digital Product Vision, we showed how the product roadmap is key to value realization. As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy.

      As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy

      Info-Tech Best Practice

      Info-Tech Best Practice Product delivery requires a comprehensive set of business and technical competencies to effectively roadmap, plan, deliver, support, and validate your product portfolio. Product delivery is a “multi-faceted, complex discipline that can be difficult to grasp and hard to master.” It will take time to learn and adopt methods and become a competent product manager or owner (“What Is Product Management?”, Pichler Consulting Limited).

      Match your roadmap and backlog to the needs of the product

      Ultimately, you want products to be able to respond faster to changes and deliver value sooner. The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their release dates.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles! Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints!

      Milestones

      • Points in the timeline when the established set of artifacts is complete (feature-based), or checking status at a particular point in time (time-based).
      • Typically assigned a date and used to show the progress of development.
      • Plays an important role when sequencing different types of artifacts.

      Release dates

      • Releases mark the actual delivery of a set of artifacts packaged together in a new version of the product.
      • Release dates, firm or not, allow stakeholders to anticipate when this is coming.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Capability: Vision

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product backlog.
      • Basic roadmap with milestones and releases.
      • Unprioritized stakeholder list.
      • Understanding of product’s purpose and value.
      • Customers and end-users defined with core needs identified.
      • Roadmap with goals and capabilities defined by themes and set to appropriate time horizons.
      • Documented stakeholder management plan with communication and collaboration aligned to the stakeholder strategy.
      • Value drivers traced to product families and enterprise goals.
      • Customer personas defined with pain relievers and value creators defined.
      • Fully-developed roadmap traced to family (and child) roadmaps.
      • Expected ROI for all current and next roadmap items.
      • KPIs/OKRs used to improve roadmap prioritization and sequencing.
      • Proactive stakeholder engagement and reviews.
      • Cross-functional engagement to align opportunities and drive enterprise value.
      • Formal metrics to assess customer needs and value realization.
      • Roadmaps managed in an enterprise system for full traceability, value realization reporting, and views for defined audiences.
      • Proactive stakeholder engagement with regular planning and review ceremonies tied to their roadmaps and goals.
      • Cross-functional innovation to find disruptive opportunities to drive enterprise value.
      • Omni-channel metrics and customer feedback mechanisms to proactively evaluate goals, capabilities, and value realization.

      Exercise 3.2.1 Assess your Vision capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Leadership

      Soft Skills

      • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
      • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
      • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

      Collaboration

      • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
      • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
      • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

      Decision Making

      • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
      • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
      • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

      “Everything walks the walk. Everything talks the talk.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Leadership: Soft skills, collaboration, decision making.

      Info-Tech Insight

      Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

      Capability: Leadership

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Activities are prioritized with minimal direction and/or assistance.
      • Progress self-monitoring against objectives with leadership apprised of deviations against plan.
      • Facilitated decisions from stakeholders or teams.
      • Informal feedback on performance and collaboration with teams.
      • Independently prioritized activities and provide direction or assistance to others as needed.
      • Managed issue resolution and provided guidance on goals, priorities, and constraints.
      • Product decision ownership with input from stakeholders, SMEs, and delivery teams.
      • Formal product management retrospectives with tracked and measured changes to improve performance.
      • Consulted in the most challenging situations to provide subject matter expertise on leading practices and industry standards.
      • Provide mentoring and coaching to your peers and/or teammates.
      • Use team empowerment, pushing decisions to the lowest appropriate level based on risk and complexity.
      • Mature and flexible communication.
      • Provide strategies and programs ensuring all individuals in the delivery organization obtain the level of coaching and supervision required for success in their position.
      • Provide leadership to the organization’s coaches ensuring delivery excellence across the organization.
      • Help develop strategic initiatives driving common approaches and utilizing information assets and processes across the enterprise.

      Exercise 3.2.2 Assess your Leadership capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capability: Product lifecycle management

      Plan

      • Product backlog: Follow a schedule for backlog intake, grooming, updates, and prioritization.
      • Journey map: Create an end-user journey map to guide adoption and loyalty.
      • Fit for purpose: Define expected value and intended use to ensure product meets your end user’s needs.

      Build

      • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
      • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
      • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

      Run

      • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
      • Support: Build operational support and business continuity into every team.
      • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

      “Pay fantastic attention to detail. Reward, recognize, celebrate.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Product Lifecycle Management: Plan, Build, Run

      Info-Tech Insight

      Product owners must actively manage the full lifecycle of the product.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      A backlog stores and organizes PBIs at various stages of readiness

      A backlog stores and organizes PBIs at different levels of readiness. Stage 3 - Ideas are composed of raw, vague ideas that have yet to go through any formal valuation. Stage 2 - Qualified are researched and qualified PBIs awaiting refinement. Stage 1 - Ready are Discrete, refined RBIs that are read to be placed in your development team's sprint plans.

      A well-formed backlog can be thought of as a DEEP backlog:

      Detailed Appropriately: PBIs are broken down and refined, as necessary.

      Emergent: The backlog grows and evolves over time as PBIs are added and removed.

      Estimated: The effort a PBI requires is estimated at each tier.

      Prioritized: The PBI’s value and priority are determined at each tier.

      (Perforce, 2018)

      Distinguish your specific goals for refining in the product backlog vs. planning for a sprint itself

      Often backlog refinement is used interchangeably or considered a part of sprint planning. The reality is they are very similar, as the required participants and objectives are the same; however, there are some key differences.

      Backlog refinement versus Sprint planning. Differences in Objectives, Cadence and Participants

      Use quality filters to promote high value items into the delivery pipeline

      Product backlog has quality filters such as: Backlogged, Qualified and Ready. Sprint backlog has a backlog of accepted PBI's

      Basic scrum process

      The scrum process coordinates multiple stakeholders to deliver on business priorities.

      Prioritized Backlog, Sprint Backlog, Manage Delivery, Sprint Review, Product Release

      Capability: Product lifecycle management

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Informal or undocumented intake process.
      • Informal or undocumented delivery lifecycle.
      • Unstable or unpredictable throughput or quality.
      • Informal or undocumented testing and release processes.
      • Informal or undocumented organizational change management planning for each release.
      • Informal or undocumented compliance validation with every release.
      • Documented intake process with stakeholder prioritization of requests.
      • Consistent delivery lifecycle with stable and predictable throughput with an expected range of delivery variance.
      • Formal and documented testing and release processes.
      • Organizational change management planning for each major release.
      • Compliance validation with every major release.
      • Intake process using value drivers and prioritization criteria to sequence all items.
      • Consistent delivery lifecycle with stable and predictable throughput with little variance.
      • Risk-based and partially automated testing and release processes.
      • Organizational change management planning for all releases.
      • Automated compliance validation with every major release.
      • Intake process using enterprise value drivers and prioritization criteria to sequence all items.
      • Stable Agile DevOps with low variability and automation.
      • Risk-based automated and manual testing.
      • Multiple release channels based on risk. Automated build, validation, and rollback capabilities.
      • Cross-channel, integrated organizational change management for all releases.
      • Automated compliance validation with every change or release.

      Exercise 3.2.3 Assess your PLM capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Value realization

      Key performance indicators (KPIs)

      • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
      • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
      • Fit for purpose: Verify the product addresses the intended purpose better than other options.

      Financial management

      • P&L: Manage each product as if it were its own business with profit and loss statements.
      • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
      • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

      Business model

      • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
      • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
      • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

      “The competition is anyone the customer compares you with.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Value Realization: KPIs, Financial management, Business model

      Info-Tech Insight

      Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Include balanced value as one criteria to guide better decisions

      Your balanced value is just one of many criteria needed to align your product goals and sequence roadmap items. Feasibility, delivery pipeline capacity, shared services, and other factors may impact the prioritization of backlog items.

      Build your balanced business value score by using four key value drivers.

      Determine your value drivers

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      Business value matrix

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Financial benefits vs. improved capabilities

      Financial benefits refer to the degree to which the value source can be measured through monetary metrics and is often quite tangible.

      Human benefits refer to how a product or service can deliver value through a user’s experience.

      Inward vs. outward orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.

      Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Exercise 3.2.4 Identify your business value drivers and sources of value

      1 hour
      1. Brainstorm the different types of business value that you produce on the sticky notes (one item per page). Draw from examples of products in your portfolio.
      2. Identify the most important value items for your organization (two to three per quadrant).
      3. Record the results in the Mature and Scale Product Ownership Workbook.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Ownership Workbook.

      My business value sources

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Capability: Value realization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product canvas or basic product positioning overview.
      • Simple budget or funding mechanism for changes.
      • Product demos and informal user feedback mechanisms.
      • Business value canvas or basic business model tied to roadmap funding.
      • Product funding tied to roadmap milestones and prioritization.
      • Defined KPIs /OKRs for roadmap delivery throughput and value realization measurement.
      • Business model with operating cost structures, revenue/value traceability, and market/user segments.
      • Scenario-based roadmap funding alignment.
      • Roadmap aligned KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.
      • Business model tied to enterprise operating costs and value realization KPIs/OKRs.
      • P&L roadmap and cost accounting tied to value metrics.
      • Roadmap aligned enterprise and scenario-based KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.

      Exercise 3.2.5 Assess your value realization capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your product owner capability proficiency in regards to: Vision, Leadership, Product Lifecycle, and Value Realization

      Summary of Accomplishment

      Problem solved.

      Product ownership can be one of the most difficult challenges facing delivery and operations teams. By focusing on operational grouping and alignment of goals, organizations can improve their value realization at all levels in the organization.

      The foundation for delivering and enhancing products and services is rooted in the same capability model. Traditionally, product owners have focused on only a subset of skills and capabilities needed to properly manage and grow their products. The product owner capability model is a useful tool to ensure optimal performance from product owners and assess the right level of detail for each product within the product families.

      Congratulations. You’ve completed a significant step toward higher-value products and services.

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Assess your real Agile skill proficiency

      Assess your skills and capabilities against the real Agile skills inventory

      2.2.3 Prioritize your stakeholders

      Build a stakeholder management strategy.

      Research Contributors and Experts

      Emily Archer

      Lead Business Analyst,
      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      David Berg

      Founder & CTO
      Strainprint Technologies Inc.

      David Berg is a product commercialization expert who has spent the last 20 years delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world, with a goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Research Contributors and Experts

      Kathy Borneman

      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Charlie Campbell

      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Research Contributors and Experts

      Yarrow Diamond

      Sr. Director, Business Architecture
      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Cari J. Faanes-Blakey, CBAP, PMI-PBA

      Enterprise Business Systems Analyst,
      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Research Contributors and Experts

      Kieran Gobey

      Senior Consultant Professional Services
      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

      Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Rupert Kainzbauer

      VP Product, Digital Wallets
      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. With a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Research Contributors and Experts

      Saeed Khan

      Founder,
      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in Canada and the US and has held several leadership roles in Product Management in that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

      Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

      Hoi Kun Lo

      Product Owner
      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Research Contributors and Experts

      Abhishek Mathur

      Sr Director, Product Management
      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Jeff Meister

      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

      Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

      Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Research Contributors and Experts

      Vincent Mirabelli

      Principal,
      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Oz Nazili

      VP, Product & Growth
      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Research Contributors and Experts

      Mike Starkey

      Director of Engineering
      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Anant Tailor

      Cofounder and Head of Product
      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

      Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

      Anant is a Professional Engineer with a Bachelor degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Research Contributors and Experts

      Angela Weller

      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application Portfolio Management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational Design and Performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic IT Workforce Plan

      Have the right people, in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Bibliography (Product Management)

      “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Aghina, Handscomb, Ludolph, West, and Abby Yip, “How to select and develop individuals for successful agile teams: A practical guide” McKinsey & Company 20 Dec. 2018. Web.

      Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

      Ambler, Scott W. "Communication on Agile Software Teams“, Agile Modeling. 2001-2022. Web.

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Beck, Beedle, van Bennekum, Cockburn, Cunningham, Fowler, Grenning, Highsmith, Hunt, Jeffries, Kern, Marick, Martin, Mellor, Schwaber, Sutherland, Thomas, "Manifesto for Agile Software Development." agilemanifesto.org. 2001

      Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

      Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

      “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Grenny, Joseph. “The Best Teams Hold Themselves Accountable.” Harvard Business Review, 30 May 2014. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

      Bibliography (Product Management)

      IIBA "A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) v3" IIBA. 15 APR 2015

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      Mankins, Michael. “The Defining Elements of a Winning Culture.” Bain, 19 Dec. 2013. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web. Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014. Web.

      Moore, Geoffrey A. “Crossing the Chasm, 3rd Edition.” Collins Business Essentials, 28 Jan 2014

      Oh, Paul. “How Mastering Resilience Can Help Drive Agile Transformations.” Why Innovation!, 10 Oct. 2019.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      PMI "The high cost of low performance: the essential role of communications“. PMI Pulse of Profession, May 2013.

      Radigan,Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Bibliography (Product Management)

      Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

      Spitz, Enid R. “The Three Kinds of Empathy: Emotional, Cognitive, Compassionate.” The Three Kinds of Empathy: Emotional, Cognitive, Compassionate. Heartmanity. Web.

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

      Backlog

      2009 Business Analysis Benchmark Study.” IAG Consulting, 2009. Web.

      Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc, 2015. Web.

      Bradley, Marty. “Agile Estimation Guidance.” Leading Agile, 30 Aug. 2016. Web. Feb. 2019.

      CollabNet and VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Accessed Feb. 2019.

      “Enablers.” Scaled Agile, n.d. Web.

      “Epic.” Scaled Agile, n.d. Web.

      Fischer, Christian. “Scrum Compact.” Itemis, n.d. Web. Feb. 2019.

      Hackshall, Robin. “Product Backlog Refinement.” Scrum Alliance, 9 Oct. 2014. Accessed Feb. 2019.

      Hartman, Bob. “New to agile? INVEST in good user stories.” Agile For All, 14 May 2009. Web.

      Huether, Derek. “Cheat Sheet for Product Backlog Refinement (Grooming).” Leading Agile, 2 Nov. 2013. Accessed Feb. 2019.

      Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce, 18 May 2018. Accessed Feb. 2019.

      Khan, Saeed. “Good Bye ‘Product Owner’, Hello ‘Backlog Manager.’” On Product Management, 27 June 2011. Accessed Feb. 2019.

      Khan, Saeed. “Let’s End the Confusion: A Product Owner is NOT a Product Manager.” On Product Management, 14 July 2017. Accessed Feb. 2019.

      Lawrence, Richard. “New Story Splitting Resource.” Agile For All. 27 Jan. 2012. Web. Feb. 2019.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile Inc, 2017. Accessed Feb. 2019.

      Lucero, Mario. “Product Backlog – Deep Model.” Agilelucero, 8 Oct. 2014. Web.

      “PI Planning.” Scaled Agile, n.d. Web.

      Pichler, Roman. “The Product Roadmap and the Product Backlog.” Roman Pichler, 9 Sept. 2014. Accessed Feb. 2019.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Burozeven, 20 Nov. 2017. Accessed Feb. 2019.

      Srinivasan, Vibhu. “Product Backlog Management: Tips from a Seasoned Product Owner.” Agile Alliance, n.d. Accessed Feb. 2019.

      Todaro, Dave. “Splitting Epics and User Stories.” Ascendle, n.d. Accessed Feb. 2019.

      “What Characteristics Make Good Agile Acceptance Criteria?” Segue Technologies, 3 Sept. 2015. Web. Feb. 2019.

      Bibliography (Roadmap)

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

      Bibliography (Vision and Canvas)

      Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

      “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

      Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

      Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

      “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

      “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

      Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

      Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

      Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

      Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

      Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

      “Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

      Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

      Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

      “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

      Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

      Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

      Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

      Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

      Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Blog, Medium.com, 2019. Web.

      Bibliography (Vision and Canvas)

      Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

      “How do you define a product?” Scrum.org, 4 Apr 2017, Web

      Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

      “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

      “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

      Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

      Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

      Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

      Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

      Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

      Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

      Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

      Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

      Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

      Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

      Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

      Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

      Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

      Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

      Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

      “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

      Bibliography (Vision and Canvas)

      “Product Canvas.” SketchBubble, 2019, Web.

      “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

      “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

      Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

      Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

      Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

      Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

      Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

      Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

      “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

      Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

      “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

      Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

      “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

      “What Is a Product Vision?” Aha!, 2019. Web.

      Supporting Research

      Transformation topics and supporting Info-Tech research to make the journey easier, with less rework.

      Supporting research and services

      Improving IT alignment

      Build a Business-Aligned IT Strategy

      Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

      Includes a "Strategy on a page" template

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Create an IT View of the Service Catalog

      Unlock the full value of your service catalog with technical components.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Supporting research and services

      Shifting toward Agile DevOps

      Agile/DevOps Resource Center

      Tools and advice you need to be successful with Agile.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Perform an Agile Skills Assessment

      Being Agile isn't about processes, it's about people.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      Projects and products are not mutually exclusive.

      Supporting research and services

      Shifting toward product management

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build a Better Product Owner

      Strengthen the product owner's role in your organization by focusing on core capabilities and proper alignment.

      Supporting research and services

      Improving value and delivery metrics

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for because you will probably get it.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Supporting research and services

      Improving governance, prioritization, and value

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Maximize Business Value from IT Through Benefits Realization

      Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

      Drive Digital Transformation With Platform Strategies

      Innovate and transform your business models with digital platforms.

      Succeed With Digital Strategy Execution

      Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Supporting research and services

      Improving requirements management and quality assurance

      Requirements Gathering for Small Enterprises

      Right-size the guidelines of your requirements gathering process.

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Build a Software Quality Assurance Program

      Build quality into every step of your SDLC.

      Automate Testing to Get More Done

      Drive software delivery throughput and quality confidence by extending your automation test coverage.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Create a Business Process Management Strategy

      Avoid project failure by keeping the "B" in BPM.

      Build a Winning Business Process Automation Playbook

      Optimize and automate your business processes with a user-centric approach.

      Create a Winning BPI Playbook

      Don't waste your time focusing on the "as is." Focus on the improvements and the "to be."

      Supporting research and services

      Improving release management

      Optimize Applications Release Management

      Build trust by right-sizing your process using appropriate governance.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensure exceptional value from your apps.

      Optimize Change Management

      Right-size your change management process.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Improve Application Development Throughput

      Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

      Supporting research and services

      Business relationship management

      Embed Business Relationship Management

      Leverage knowledge of the business to become a strategic IT partner.

      Improving security

      Build an Information Security Strategy

      Create value by aligning your strategy to business goals and business risks.

      Develop and Deploy Security Policies

      Enhance your overall security posture with a defensible and prescriptive policy suite.

      Simplify Identity and Access Management

      Leverage risk- and role-based access control to quantify and simplify the IAM process.

      Supporting research and services

      Improving and supporting business-managed applications

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Enhance Your Solution Architecture Practices

      Ensure your software systems solution is architected to reflect stakeholders’ short-and long-term needs.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Build Your First RPA Bot

      Support RPA delivery with strong collaboration and management foundations.

      Automate Work Faster and More Easily With Robotic Process Automation

      Embrace the symbiotic relationship between the human and digital workforce.

      Supporting research and services

      Improving business intelligence, analytics, and reporting

      Modernize Data Architecture for Measurable Business Results

      Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, Agile, and fit-for-purpose data architecture practice.

      Build a Reporting and Analytics Strategy

      Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

      Build Your Data Quality Program

      Quality data drives quality business decisions.

      Design Data-as-a-Service

      Journey to the data marketplace ecosystems.

      Build a Robust and Comprehensive Data Strategy

      Key to building and fostering a data-driven culture.

      Build an Application Integration Strategy

      Level the table before assembling the application integration puzzle or risk losing pieces.

      Appendix

      Pulse survey results

      Pulse survey (N=18): What are the key components of product/service ownership?

      Pulse survey results: What are the key components of product/service ownership? Table shows answer options and responses in percentage.

      Pulse Survey (N=18): What are the key individual skills for a product/service owner?

      What are the key individual skills for a product/service owner? Table shows answer options and responses in percentage

      Other choices entered by respondents:

      • Anticipating client needs, being able to support delivery in all phases of the product lifecycle, adaptability, and ensuring a healthy backlog (at least two sprints’ worth of work).
      • Requirements elicitation and prioritization.
      • The key skill is being product-focused to ensure it provides value for competitive advantage.

      Pulse Survey (N=18): What are three things an outstanding product/service owner does that an average one doesn’t?

      What are three things an outstanding product/service owner does that an average one doesn't? Table shows results.

      In Case Of Emergency...

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      1. Get people to safety efficiently by following the floor warden's information and get out if needed
        If there are no floor wardens, YOU take the initiative and alert people. Vacate the premises if you suspect danger.
        Err on the side of caution. Nobody ever got fired over keeping people safe.
      2. Get people to safety (yes! double check this)
      3. Check what is happening
      4. Stop the bleeding
      5. Check what you broke while stopping the bleeding
      6. Check if you need to go into DR mode
      7. Go into DR mode if that is the fastest way to restore the service
      8. Only now start to look deeper

      Notice what is missing in this list?

      • WHY did this happen?
      • WHO did what

      During the first reactions to an event, stick to the facts of what is happening and the symptoms. If the symptoms are bad, attend to people first, no matter the financial losses occurring.
      Remember that financial losses are typically insured. Human life is not. Only loss of income and ability to pay is insured! Not the person's life.

      The WHY, HOW, WHO and other root cause questions are asked in the aftermath of the incident and after you have stabilized the situation.
      In ITIL terms, those are Problem Management and Root Cause Analysis stage questions.

       

       

       

      Management, incident, reaction, emergency

      Prepare for Cognitive Service Management

      • Buy Link or Shortcode: {j2store}335|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 10 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design
      • The evolution of natural language processing and machine learning applications has led to specialized AI-assisted toolsets that promise to improve the efficiency and timeliness of IT operations.

      Our Advice

      Critical Insight

      • These are early days. These AI-assisted toolsets are generating a considerable amount of media attention, but most of them are relatively untested. Early adopters willing to absorb experimentation costs are in the process of deploying the first use cases. Initial lessons are showing that IT operations in most organizations are not yet mature enough to take advantage of AI-assisted toolsets.
      • Focus on the problem, not the tool. Explicit AI questions should be at the end of the list. Start by asking what business problem you want to solve.
      • Get your house in order. The performance of AI-assisted tools depends on mature IT operations processes and reliable data sets. Standardize service management processes and build a knowledgebase of structured content to prepare for AI-assisted IT operations.

      Impact and Result

      • Don’t fall prey to the AI-bandwagon effect. AI-assisted innovations will support shift-left service support strategies through natural language processing and machine learning applications. However, the return on your AI investment will depend on whether it helps you meet an actual business goal.
      • AI-assisted tools presuppose the existence of mature IT operations functions, including standardized processes, high-quality structured content focused on the incidents and requests that matter, and a well-functioning ITSM web portal.
      • The success of AI ITSM projects hinges on adoption. If your vision is to power end-user interactions with chatbots and deploy intelligent agents on tickets coming through the web portal, be sure to develop a self-service culture that empowers end users to help themselves and experiment with new tools and technologies. Without end-user adoption, the promised benefits of AI projects will not materialize.

      Prepare for Cognitive Service Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should prepare for cognitive service management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review emerging AI technology

      Get an overview of emerging AI applications to understand how they will strengthen a shift-left service support strategy.

      2. Sort potential IT operations AI use cases

      Review potential use cases for AI applications to prioritize improvement initiatives and align them to organizational goals.

      • Disruptive Technology Shortlisting Tool
      • Disruptive Technology Value-Readiness and SWOT Analysis Tool

      3. Prepare for a cognitive service management project

      Develop an ITSM AI strategy to prepare your organization for the coming of cognitive service management, and build a roadmap for implementation.

      • Customer Journey Map (PDF)
      • Customer Journey Map (Visio)
      • Infrastructure Roadmap Technology Assessment Tool
      • Strategic Infrastructure Roadmap Tool
      [infographic]

      Hire or Develop a World-Class CISO

      • Buy Link or Shortcode: {j2store}243|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
      • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
      • Current CISOs need to scope out areas of future development.

      Our Advice

      Critical Insight

      The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Impact and Result

      • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
      • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
      • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

      Hire or Develop a World-Class CISO Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Hire of Develop a World-Class CISO Deck – A step-by-step guide on finding or developing the CISO that best fits your organization.

      Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you have identified the right candidate, create a plan to develop your CISO.

      • Hire or Develop a World-Class CISO – Phases 1-4

      2. CISO Core Competency Evaluation Tool – Determine which competencies your organization needs and which competencies your CISO needs to work on.

      This tool will help you determine which competencies are a priority for your organizational needs and which competencies your CISO needs to develop.

      • CISO Core Competency Evaluation Tool

      3. CISO Stakeholder Power Map Template – Visualize stakeholder and CISO relationships.

      Use this template to identify stakeholders who are key to your security initiatives and to understand your relationships with them.

      • CISO Stakeholder Power Map Template

      4. CISO Stakeholder Management Strategy Template – Develop a strategy to improve stakeholder and CISO relationships.

      Create a strategy to cultivate your stakeholder relationships and manage each relationship in the most effective way.

      • CISO Stakeholder Management Strategy Template

      5. CISO Development Plan Template – Develop a plan to support a world-class CISO.

      This tool will help you create and implement a plan to remediate competency gaps.

      • CISO Development Plan Template

      Infographic

      Further reading

      Hire or Develop a World-Class CISO

      Find a strategic and security-focused champion for your business.

      Analyst Perspective

      Create a plan to become the security leader of tomorrow

      The days are gone when the security leader can stay at a desk and watch the perimeter. The rapidly increasing sophistication of technology, and of attackers, has changed the landscape so that a successful information security program must be elastic, nimble, and tailored to the organization’s specific needs.

      The Chief Information Security Officer (CISO) is tasked with leading this modern security program, and this individual must truly be a Chief Officer, with a finger on the pulses of the business and security processes at the same time. The modern, strategic CISO must be a master of all trades.

      A world-class CISO is a business enabler who finds creative ways for the business to take on innovative processes that provide a competitive advantage and, most importantly, to do so securely.

      Cameron Smith, Research Lead, Security and Privacy

      Cameron Smith
      Research Lead, Security & Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • CEOs/CXOs are looking to hire or develop a senior security leader and aren’t sure where to start.
      • Conversely, security practitioners are looking to upgrade their skill set and are equally stuck in terms of what an appropriate starting point is.
      • Organizations are looking to optimize their security plans and move from a tactical position to a more strategic one.

      Common Obstacles

      • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
      • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
      • You are a current CISO and need to scope out your areas of future development.

      Info-Tech’s Approach

      • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
      • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
      • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

      Info-Tech Insight
      The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Your challenge

      This Info-Tech blueprint will help you hire and develop a strategic CISO

      • Security without strategy is a hacker’s paradise.
      • The outdated model of information security is tactical, where security acts as a watchdog and responds.
      • The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Around one in five organizations don’t have an individual with the sole responsibility for security1

      1 Navisite

      Info-Tech Insight
      Assigning security responsibilities to departments other than security can lead to conflicts of interest.

      Common obstacles

      It can be difficult to find the right CISO for your organization

      • The smaller the organization, the less likely it will have a CISO or equivalent position.
      • Because there is a shortage of qualified candidates, qualified CISOs can demand high salaries and many CISO positions will go unfilled.
      • It is easier for larger companies to attract top CISO talent, as they generally have more resources available.

      Source: Navisite

      Only 36% of small businesses have a CISO (or equivalent position).

      48% of mid-sized businesses have a CISO.

      90% of large organizations have a CISO.

      Source: Navisite

      Strategic versus tactical

      CISOs should provide leadership based on a strategic vision 1

      Strategic CISO Tactical CISO

      Proactive

      Focus is on protecting hyperdistributed business processes and data

      Elastic, flexible, and nimble

      Engaged in business design decisions

      Speaks the language of the audience (e.g. business, financial, technical)

      Reactive

      Focus is on protecting current state

      Perimeter and IT-centric approach

      Communicates with technical jargon

      1 Journal of Computer Science and Information Technology

      Info-Tech has identified three key behaviors of the world-class CISO

      To determine what is required from tomorrow’s security leader, Info-Tech examined the core behaviors that make a world-class CISO. These are the three areas that a CISO engages with and excels in.

      Later in this blueprint, we will review the competencies and skills that are required for your CISO to perform these behaviors at a high level.

      Align

      Aligning security enablement with business requirements

      Enable

      Enabling a culture of risk management

      Manage

      Managing talent and change

      Info-Tech Insight
      Through these three overarching behaviors, you can enable a security culture that is aligned to the business and make security elastic, flexible, and nimble to maintain the business processes.

      Info-Tech’s approach

      Understand what your organization needs in a CISO: Consider the core competencies of a CISO. Assess: Assess candidates' core competencies and the CISO's stakeholder relationships. Plan improvements: Identify resources to close competency gaps and an approach to improve stakeholder relationships. Executive development: Decide next steps to support your CISO moving forward and regularly reassess to measure progress.

      Info-Tech’s methodology to Develop or Hire a World-Class CISO

      1. Launch 2. Assess 3. Plan 4. Execute
      Phase Steps
      1. Understand the core competencies
      2. Measure security and business satisfaction and alignment
      1. Assess stakeholder relationships
      2. Assess core competencies
      1. Identify resources to address your CISO’s competency gaps
      2. Plan an approach to improve stakeholder relationships
      1. Decide next actions and support your CISO moving forward
      2. Regularly reassess to measure development and progress
      Phase Outcomes

      At the end of this phase, you will have:

      • Determined the current gaps in satisfaction and business alignment for your IT security program.
      • Identified the desired qualities in a security leader, specific to your current organizational needs.

      At the end of this phase, you will have:

      • Used the core competencies to help identify the ideal candidate.
      • Identified areas for development in your new or existing CISO.
      • Determined stakeholder relationships to cultivate.

      At the end of this phase, you will have:

      • Created a high-level plan to address any deficiencies.
      • Improved stakeholder relations.

      At the end of this phase, you will have:

      • Created an action-based development plan, including relevant metrics, due dates, and identified stakeholders. This plan is the beginning, not the end. Continually reassessing your organizational needs and revisiting this blueprint’s method will ensure ongoing development.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      CISO Core Competency Evaluation Tool

      Assess the competency levels of a current or prospective CISO and identify areas for improvement.

      Stakeholder Power Map Template

      Visualize the importance of various stakeholders and their concerns.

      Stakeholder Management Strategy Template

      Document a plan to manage stakeholders and track actions.

      Key deliverable:

      CISO Development Plan Template

      The CISO Development Plan Template is used to map specific activities and time frames for competency development to address gaps and achieve your goal.

      Strategic competencies will benefit the organization and the CISO

      Career development should not be seen as an individual effort. By understanding the personal core competencies that Info-Tech has identified, the individual wins by developing relevant new skills and the organization wins because the CISO provides increased value.

      Organizational Benefits Individual Benefits
      • Increased alignment between security and business objectives
      • Development of information security that is elastic, nimble, and flexible for the business
      • Reduction in wasted efforts and resources, and improvement in efficiency of security and the organization as a whole
      • True synergy between security and business stakeholders, where the goals of both groups are being met
      • Increased opportunity as you become a trusted partner within your organization
      • Improved relationships with peers and stakeholders
      • Less resistance and more support for security initiatives
      • More involvement and a stronger role for security at all levels of the organization

      Measured value of a world-class CISO

      Organizations with a CISO saw an average of $145,000 less in data breach costs.1

      However, we aren’t talking about hiring just any CISO. This blueprint seeks to develop your CISO’s competencies and reach a new level of effectiveness.

      Organizations invest a median of around $375,000 annually in their CISO.2 The CISO would have to be only 4% more effective to represent $15,000 more value from this position. This would offset the cost of an Info-Tech workshop, and this conservative estimate pales in comparison to the tangible and intangible savings as shown below.

      Your specific benefits will depend on many factors, but the value of protecting your reputation, adopting new and secure revenue opportunities, and preventing breaches cannot be overstated. There is a reason that investment in information security is on the rise: Organizations are realizing that the payoff is immense and the effort is worthwhile.

      Tangible cost savings from having a world-class CISO Intangible cost savings from having a world-class CISO
      • Cost savings from incident reduction.
      • Cost savings achieved through optimizing information security investments, resulting in savings from previously misdiagnosed issues.
      • Cost savings from ensuring that dollars spent on security initiatives support business strategy.
      • More opportunities to create new business processes through greater alignment between security and business.
      • Improved reputation and brand equity achieved through a proper evaluation of the organization’s security posture.
      • Continuous improvement achieved through a good security assessment and measurement strategy.
      • Ability to plan for the future since less security time will be spent firefighting and more time will be spent engaged with key stakeholders.

      1 IBM Security
      2 Heidrick & Struggles International, Inc.

      Case Study

      In the middle of difficulty lies opportunity

      SOURCE
      Kyle Kennedy
      CISO, CyberSN.com

      Challenge
      The security program identified vulnerabilities at the database layer that needed to be addressed.

      The decision was made to move to a new vendor. There were multiple options, but the best option in the CISO’s opinion was a substantially more expensive service that provided more robust protection and more control features.

      The CISO faced the challenge of convincing the board to make a financial investment in his IT security initiative to implement this new software.

      Solution
      The CISO knew he needed to express this challenge (and his solution!) in a way that was meaningful for the executive stakeholders.

      He identified that the business has $100 million in revenue that would move through this data stream. This new software would help to ensure the security of all these transactions, which they would lose in the event of a breach.

      Furthermore, the CISO identified new business plans in the planning stage that could be protected under this initiative.

      Results
      The CISO was able to gain support for and implement the new database platform, which was able to protect current assets more securely than before. Also, the CISO allowed new revenue streams to be created securely.

      This approach is the opposite of the cautionary tales that make news headlines, where new revenue streams are created before systems are put in place to secure them.

      This proactive approach is the core of the world-class CISO.

      Info-Tech offers various levels of support to best suit your needs

      Guided Implementation

      What does a typical GI on this topic look like?

      Launch Assess Plan Execute

      Call #1: Review and discuss CISO core competencies.

      Call #2: Discuss Security Business Satisfaction and Alignment diagnostic results.

      Call #3: Discuss the CISO Stakeholder Power Map Template and the importance of relationships.

      Call #4: Discuss the CISO Core Competency Evaluation Tool.

      Call #5: Discuss results of the CISO Core Competency Evaluation and identify resources to close gaps.

      Call #6: Review organizational structure and key stakeholder relationships.

      Call #7: Discuss and create your CISO development plan and track your development

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 10 calls over the course of 3 to 6 months.

      Phase 1

      Launch

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Review and understand the core competencies of a world-class CISO.
      • Launch your diagnostic survey.
      • Evaluate current business satisfaction with IT security.
      • Determine the competencies that are valuable to your IT security program’s needs.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      An organization hires a new Information Security Manager into a static and well-established IT department.

      Situation: The organization acknowledges the need for improved information security, but there is no framework for the Security Manager to make successful changes.

      Challenges Next Steps
      • The Security Manager is an outsider in a company with well-established habits and protocols. He is tasked with revamping the security strategy to create unified threat management.
      • Initial proposals for information security improvements are rejected by executives. It is a challenge to implement changes or gain support for new initiatives.
      • The Security Manager will engage with individuals in the organization to learn about the culture and what is important to them.
      • He will assess existing misalignments in the business so that he can target problems causing real pains to individuals.

      Follow this case study throughout the deck to see this organization’s results

      Step 1.1

      Understand the Core Competencies of a World-Class CISO

      Activities

      Review core competencies the security leader must develop to become a strategic business partner

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step
      Analysis and understanding of the eight strategic CISO competencies required to become a business partner

      Launch

      Core competencies

      Info-Tech has identified eight core competencies affecting the CISO’s progression to becoming a strategic business partner.

      Business Acumen
      A CISO must focus primarily on the needs of the business.

      Leadership
      A CISO must be a security leader and not simply a practitioner.

      Communication
      A CISO must have executive communication skills

      Technical Knowledge
      A CISO must have a broad technical understanding.

      Innovative Problem Solving
      A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.”

      Vendor Management
      Vendor and financial management skills are critical to becoming a strategic CISO.

      Change Management
      A CISO improves security processes by being an agent of change for the organization.

      Collaboration
      A CISO must be able to use alliances and partnerships strategically.

      1.1 Understand the core competencies a CISO must focus on to become a strategic business partner

      < 1 hour

      Over the next few slides, review each world-class CISO core competency. In Step 1.2, you will determine which competencies are a priority for your organization.

      CISO Competencies Description
      Business Acumen

      A CISO must focus primarily on the needs of the business and how the business works, then determine how to align IT security initiatives to support business initiatives. This includes:

      • Contributing to business growth with an understanding of the industry, core functions, products, services, customers, and competitors.
      • Understanding the business’ strategic direction and allowing it to securely capitalize on opportunities.
      • Understanding the key drivers of business performance and the use of sound business practice.
      Leadership

      A CISO must be a security leader, and not simply a practitioner. This requires:

      • Developing a holistic view of security, risk, and compliance for the organization.
      • Fostering a culture of risk management.
      • Choosing a strong team. Having innovative and reliable employees who do quality work is a critical component of an effective department.
        • This aspect involves identifying talent, engaging your staff, and managing their time and abilities.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Communication

      Many CISOs believe that using technical jargon impresses their business stakeholders – in fact, it only makes business stakeholders become confused and disinterested. A CISO must have executive communication skills. This involves:

      • Clearly communicating with business leaders in meaningful language (i.e. business, financial, social) that they understand by breaking down the complexities of IT security into simple and relatable concepts.
      • Not using acronyms or technological speak. Easy-to-understand translations will go a long way.
      • Strong public speaking and presentation abilities.
      Technical Knowledge

      A CISO must have a broad technical understanding of IT security to oversee a successful security program. This includes:

      • Understanding key security and general IT technologies and processes.
      • Assembling a complementary team, because no individual can have deep knowledge in all areas.
      • Maintaining continuing education to stay on top of emerging technologies and threats.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Innovative Problem Solving

      A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.” This can include:

      • Taking an active role in seizing opportunities created by emerging technologies.
      • Facilitating the secure implementation of new, innovative revenue models.
      • Developing solutions for complex business problems that require creativity and ingenuity.
      • Using information and technology to drive value around the customer experience.
      Vendor Management

      With the growing use of “anything as a service,” negotiation, vendor, and financial management skills are critical to becoming a strategic CISO.

      • The CISO must be able to evaluate service offerings and secure favorable contracts with the right provider. It is about extracting the maximum value from vendors for the dollars you are spending.
      • Vendor products must be aligned with future business plans to create maximum ongoing value.
      • The CISO must develop financial management skills. This includes the ability to calculate total cost of ownership, return on investment, and project spending over multiyear business plans.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Change Management

      A world-class CISO improves security processes by being an agent of change for the organization. This involves:

      • Leading, guiding, and motivating teams to adopt a responsible risk management culture.
      • Communicating important and complex ideas in a persuasive way.
      • Demonstrating an ability to change themselves and taking the initiative in adopting more efficient behaviors.
      • Handling unplanned change, such as unforeseen attacks or personnel changes, in a professional and proactive manner.
      Collaboration

      A CISO must be able to use alliances and partnerships strategically to benefit both the business and themselves. This includes:

      • Identifying formal and informal networks and constructive relationships to enable security development.
      • Leveraging stakeholders to influence positive outcomes for the organization.
      • Getting out of the IT or IT security sphere and engaging relationships in diverse areas of the organization.

      Step 1.2

      Evaluate satisfaction and alignment between the business and IT security

      Activities

      • Conduct the Information Security Business Satisfaction and Alignment diagnostic
      • Use your results as input into the CISO Core Competency Evaluation Tool

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step
      Determine current gaps in satisfaction and alignment between information security and your organization.

      If seeking to hire/develop a CISO: Your diagnostic results will help develop a profile of the ideal CISO candidate to use as a hiring and interview guide.

      If developing a current CISO, use your diagnostic results to identify existing competency gaps and target them for improvement.

      For the CISO seeking to upgrade capabilities: Use the core competencies guide to self-assess and identify competencies that require improvement.

      Launch

      1.2 Get started by conducting Info-Tech’s Information Security Business Satisfaction and Alignment diagnostic

      Suggested Time: One week for distribution, completion, and collection of surveys
      One-hour follow-up with an Info-Tech analyst

      The primary goal of IT security is to protect the organization from threats. This does not simply mean bolting everything down, but it means enabling business processes securely. To do this effectively requires alignment between IT security and the overall business.

      • Once you have completed the diagnostic, call Info-Tech to review your results with one of our analysts.
      • The results from this assessment will provide insights to inform your entries in the CISO Core Competency Evaluation Tool.

      Call an analyst to review your results and provide you with recommendations.

      Info-Tech Insight
      Focus on the high-priority competencies for your organization. You may find a candidate with perfect 10s across the board, but a more pragmatic strategy is to find someone with strengths that align with your needs. If there are other areas of weakness, then target those areas for development.

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      • Your diagnostic results will indicate where your information security program is aligned well or poorly with your business.
      • For example, the diagnostic may show significant misalignment between information security and executives over the level of external compliance. The CISO behavior that would contribute to solving this is aligning security enablement with business requirements.
        • This misalignment may be due to a misunderstanding by either party. The competencies that will contribute to resolving this are communication, technical knowledge, and business acumen.
        • This mapping method is what will be used to determine which competencies are most important for your needs at the present moment.

      Download the CISO Core Competency Evaluation Tool

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      1. Starting on Tab 2: CISO Core Competencies, use your understanding of each competency from section 1.1 along with the definitions described in the tool.
        • For each competency, assign a degree of importance using the drop-down menu in the second column from the right.
        • Importance ratings will range from not at all important at the low end to critically important at the high end.
        • Your importance score will be influenced by several factors, including:
          • The current alignment of your information security department.
          • Your organizational security posture.
          • The size and structure of your organization.
          • The existing skills and maturity within your information security department.

      Download the CISO Core Competency Evaluation Tool

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      1. Still on Tab 2. CISO Core Competencies, you will now assign a current level of effectiveness for each competency.
        • This will range from foundational at a low level of effectiveness up to capable, then inspirational, and at the highest rating, transformational.
        • Again, this rating will be very specific to your organization, depending on your structure and your current employees.
        • Fundamentally, these scores will reflect what you want to improve in the area of information security. This is not an absolute scale, and it will be influenced by what skills you want to support your goals and direction as an organization.

      Download the CISO Core Competency Evaluation Tool

      Phase 2

      Assess

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Use the CISO Core Competency Evaluation Tool to create and implement an interview guide.
      • Assess and analyze the core competencies of your prospective CISOs. Or, if you are a current CISO, use the CISO Core Competency Evaluation Tool as a self-analysis and identify areas for personal development.
      • Evaluate the influence, impact, and support of key executive business stakeholders using the CISO Stakeholder Power Map Template.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager engages with employees to learn the culture.

      Outcome: Understand what is important to individuals in order to create effective collaboration. People will engage with a project if they can relate it to something they value.

      Actions Next Steps
      • The Security Manager determines that he must use low-cost small wins to integrate with the organizational culture and create trust and buy-in and investment will follow.
      • The Security Manager starts a monthly newsletter to get traction across the organization, create awareness of his mandate to improve information security, and establish himself as a trustworthy partner.
      • The Security Manager will identify specific ways to engage and change the culture.
      • Create a persuasive case for investing in information security based on what resonates with the organization.

      Follow this case study throughout the deck to see this organization’s results

      Step 2.1

      Identify key stakeholders for the CISO and assess current relationships

      Activities

      Evaluate the power, impact, and support of key stakeholders

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Power map of executive business stakeholders
      • Evaluation of each stakeholder in terms of influence, impact, and current level of support

      Assess

      Identify key stakeholders who own business processes that intersect with security processes

      Info-Tech Insight
      Most organizations don’t exist for the sole purpose of doing information security. For example, if your organization is in the business of selling pencils, then information security is in business to enable the selling of pencils. All the security in the world is meaningless if it doesn’t enable your primary business processes. The CISO must always remember the fundamental goals of the business.

      The above insight has two implications:

      1. The CISO needs to understand the key business processes and who owns them, because these are the people they will need to collaborate with. Like any C-level, the CISO should be one of the most knowledgeable people in the organization regarding business processes.
      2. Each of these stakeholders stands to win or lose depending on the performance of their process, and they can act to either block or enable your progress.
        • To work effectively with these stakeholders, you must learn what is important to them, and pose your initiatives so that you both benefit.

      When people are not receptive to the CISO, it’s usually because the CISO has not been part of the discussion when plans were being made. This is the heart of proactivity.

      You need to be involved from the start … from the earliest part of planning.

      The job is not to come in late and say “No” ... the job is to be involved early and find creative and intelligent ways to say “Yes.”

      The CISO needs to be the enabling security asset that drives business.

      – Elliot Lewis, CEO at Keyavi Data

      Evaluate the importance of business stakeholders and the support necessary from them

      The CISO Stakeholder Power Map Template is meant to provide a visualization of the CISO’s relationships within the organization. This should be a living document that can be updated throughout the year as relationships develop and the structure of an organization changes.

      At a glance, this tool should show:

      • How influential each stakeholder is within the company.
      • How supportive they currently are of the CISO’s initiatives.
      • How strongly each person is impacted by IT security activities.

      Once this tool has been created, it provides a good reference as the CISO works to develop lagging relationships. It shows the landscape of influence and impact within the organization, which may help to guide the CISO’s strategy in the future.

      Evaluate the importance of business stakeholders and the support necessary from them

      Download the CISO Stakeholder Power Map Template

      Evaluate the importance of business stakeholders and the support necessary from them

      1. Identify key stakeholders.
        1. Focus on owners of important business processes.
      2. Evaluate and map each stakeholder in terms of:
        1. Influence (up/down)
        2. Support (left/right)
        3. Impact (size of circle)
        4. Involvement (color of circle)
      3. Decide whether the level of support from each stakeholder needs to change to facilitate success.

      Evaluate the importance of business stakeholders and the support necessary from them

      Info-Tech Insight
      Some stakeholders must work closely with your incoming CISO. It is worth consideration to include these individuals in the interview process to ensure you will have partners that can work well together. This small piece of involvement early on can save a lot of headache in the future.

      Where can you find your desired CISO?

      Once you know which competencies are a priority in your new CISO, the next step is to decide where to start looking. This person may already exist in your company.

      Internal

      Take some time to review your current top information security employees or managers. It may be immediately clear that certain people will or will not be suitable for the CISO role. For those that have potential, proceed to Step 2.2 to map their competencies.

      Recruitment

      If you do not have any current employees that will fit your new CISO profile, or you have other reasons for wanting to bring in an outside individual, you can begin the recruitment process. This could start by posting the position for applications or by identifying and targeting specific candidates.

      Ready to start looking for your ideal candidate? You can use Info-Tech’s Chief Information Security Officer job description template.

      Use the CISO job description template

      Alternatives to hiring a CISO

      Small organizations are less able to muster the resources required to find and retain a CISO,

      Technical Counselor Seat

      In addition to having access to our research and consulting services, you can acquire a Technical Counselor Seat from our Security & Risk practice, where one of our senior analysts would serve with you on a retainer. You may find that this option saves you the expense of having to hire a new CISO altogether.

      Virtual CISO

      A virtual CISO, or vCISO, is essentially a “CISO as a service.” A vCISO provides an organization with an experienced individual that can, on a part-time basis, lead the organization’s security program through policy and strategy development.

      Why would an organization consider a vCISO?

      • A vCISO can provide services that are flexible, technical, and strategic and that are based on the specific requirements of the organization.
      • They can provide a small organization with program maturation within the organization’s resources.
      • They can typically offer depth of experience beyond what a small business could afford if it were to pursue a full-time CISO.

      Source: InfoSec Insights by Sectigo Store

      Why would an organization not consider a vCISO?

      • The vCISO’s attention is divided among their other clients.
      • They won’t feel like a member of your organization.
      • They won’t have a deep understanding of your systems and processes.

      Source: Georgia State University

      Step 2.2

      Assess CISO candidates and evaluate their current competency

      Activities

      Assess CISO candidates in terms of desired core competencies

      or

      Self-assess your personal core competencies

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      and

      • Any key stakeholders or collaborators you choose to include in the assessment process

      Outcomes of this step

      • You have assessed your requirements for a CISO candidate.
      • The process of hiring is under way, and you have decided whether to hire a CISO, develop a CISO, or consider a Counselor Seat as another option.

      Assess

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

      Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

      Download the CISO Core Competency Evaluation Tool

      Info-Tech Insight
      The most important competencies should be your focus. Unless you are lucky enough to find a candidate that is perfect across the board, you will see some areas that are not ideal. Don’t forget the importance you assigned to each competency. If a candidate is ideal in the most critical areas, you may not mind that some development is needed in a less important area.

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

      After deciding the importance of and requirements for each competency in Phase 1, assess your CISO candidates.

      Your first pass on this tool will be to look at internal candidates. This is the develop a CISO option.

      1. In the previous phase, you rated the Importance and Current Effectiveness for each competency in Tab 2. CISO Core Competencies. In this step, use Tab 3. Gap Analysis to enter a Minimum Level and a Desired Level for each competency. Keep in mind that it may be unrealistic to expect a candidate to be fully developed in all aspects.
      2. Next, enter a rating for your candidate of interest for each of the eight competencies.
      3. This scorecard will generate an overall suitability score for the candidate. The color of the output (from red to green) indicates the suitability, and the intensity of the color indicates the importance you assigned to that competency.

      Download the CISO Core Competency Evaluation Tool

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

      • If the internal search does not identify a suitable candidate, you will want to expand your search.
      • Repeat the scoring process for external candidates until you find your new CISO.
      • You may want to skip your external search altogether and instead contact Info-Tech for more information on our Counselor Seat options.

      Download the CISO Core Competency Evaluation Tool

      Phase 3

      Plan

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Create a plan to develop your competency gaps.
      • Construct and consider your organizational model.
      • Create plan to cultivate key stakeholder relationships.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager changes the security culture by understanding what is meaningful to employees.

      Outcome: Engage with people on their terms. The CISO must speak the audience’s language and express security terms in a way that is meaningful to the audience.

      Actions Next Steps
      • The Security Manager identifies recent events where ransomware and social engineering attacks were successful in penetrating the organization.
      • He uses his newsletter to create organization-wide discussion on this topic.
      • This very personal example makes employees more receptive to the Security Manager’s message, enabling the culture of risk management.
      • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

      Follow this case study throughout the deck to see this organization’s results

      Step 3.1

      Identify resources for your CISO to remediate competency gaps

      Activities

      Create a plan to remediate competency gaps

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Identification of core competency deficiencies
      • A plan to close the gaps

      Plan

      3.1 Close competency gaps with Info-Tech’s Cybersecurity Workforce Development Training

      Resources to close competency gaps

      Info-Tech’s Cybersecurity Workforce Training develops critical cybersecurity skills missing within your team and organization. The leadership track provides the same deep coverage of technical knowledge as the analyst track but adds hands-on support and has a focus on strategic business alignment, program management, and governance.

      The program builds critical skills through:

      • Standardized curriculum with flexible projects tailored to business needs
      • Realistic cyber range scenarios
      • Ready-to-deploy security deliverables
      • Real assurance of skill development

      Info-Tech Insight
      Investing in a current employee that has the potential to be a world-class CISO may take less time, effort, and money than finding a unicorn.

      Learn more on the Cybersecurity Workforce Development webpage

      3.1 Identify resources for your CISO to remediate competency gaps

      < 2 hours

      CISO Competencies Description
      Business Acumen

      Info-Tech Workshops & Blueprints

      Actions/Activities

      • Take a business acumen course: Acumen Learning, What the CEO Wants You to Know: Building Business Acumen.
      • Meet with business stakeholders. Ask them to take you through the strategic plan for their department and then identify opportunities where security can provide support to help drive their initiatives.
      • Shadow another C-level executive. Understand how they manage their business unit and demonstrate an eagerness to learn.
      • Pursue an MBA or take a business development course.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Leadership

      Info-Tech Training and Blueprints

      Action/Activities

      • Communicate your vision for security to your team. You will gain buy-in from your employees by including them in the creation of your program, and they will be instrumental to your success.

      Info-Tech Insight
      Surround yourself with great people. Insecure leaders surround themselves with mediocre employees that aren’t perceived as a threat. Great leaders are supported by great teams, but you must choose that great team first.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Communication

      Info-Tech Workshops & Blueprints

      Build and Deliver an Optimized IT Update Presentation: Show IT’s value and relevance by dropping the technical jargon and speaking to the business in their terms.

      Master Your Security Incident Response Communications Program: Learn how to talk to your stakeholders about what’s going on when things go wrong.

      Develop a Security Awareness and Training Program That Empowers End Users: Your weakest link is between the keyboard and the chair, so use engaging communication to create positive behavior change.

      Actions/Activities

      Learn to communicate in the language of your audience (whether business, finance, or social), and frame security solutions in terms that are meaningful to your listener.

      Technical Knowledge

      Actions/Activities

      • In many cases, the CISO is progressing from a strong technical background, so this area is likely a strength already.
      • However, as the need for executive skills are being recognized, many organizations are opting to hire a business or operations professional as a CISO. In this case, various Info-Tech blueprints across all our silos (e.g. Security, Infrastructure, CIO, Apps) will provide great value in understanding best practices and integrating technical skills with the business processes.
      • Pursue an information security leadership certification: GIAC, (ISC)², and ISACA are a few of the many organizations that offer certification programs.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Innovative Problem Solving

      Info-Tech Workshops & Blueprints

      Actions/Activities

      Vendor Management

      Info-Tech Blueprints & Resources

      Actions/Activities

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Change Management

      Info-Tech Blueprints

      Actions/Activities

      • Start with an easy-win project to create trust and support for your initiatives.
      Collaboration

      Info-Tech Blueprints

      Actions/Activities

      • Get out of your office. Have lunch with people from all areas of the business. Understanding the goals and the pains of employees throughout your organization will help you to design effective initiatives and cultivate support.
      • Be clear and honest about your goals. If people know what you are trying to do, then it is much easier for them to work with you on it. Being ambiguous or secretive creates confusion and distrust.

      3.1 Create the CISO’s personal development plan

      • Use Info-Tech’s CISO Development Plan Template to document key initiatives that will close previously identified competency gaps.
      • The CISO Development Plan Template is used to map specific actions and time frames for competency development, with the goal of addressing competency gaps and helping you become a world-class CISO. This template can be used to document:
        • Core competency gaps
        • Security process gaps
        • Security technology gaps
        • Any other career/development goals
      • If you have a coach or mentor, you should share your plan and report progress to that person. Alternatively, call Info-Tech to speak with an executive advisor for support and advice.
        • Toll-Free: 1-888-670-8889

      What you will need to complete this exercise

      • CISO Core Competency Evaluation Tool results
      • Information Security Business Satisfaction and Alignment diagnostic results
      • Insights gathered from business stakeholder interviews

      Step 3.2

      Plan an approach to improve your relationships

      Activities

      • Review engagement strategies for different stakeholder types
      • Create a stakeholder relationship development plan

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Stakeholder relationship strategy deliverable

      Plan

      Where should the CISO sit?

      Where the CISO sits in the organization can have a big impact on the security program.

      • Organizations with CISOs in the C-suite have a fewer security incidents.1
      • Organizations with CISOs in the C-suite generally have better IT ability.1
      • An organization whose CISO reports to the CIO risks conflict of interest.1
      • 51% of CISOs believe their effectiveness can be hampered by reporting lines.2
      • Only half of CISOs feel like they are in a position to succeed.2

      A formalized security organizational structure assigns and defines the roles and responsibilities of different members around security. Use Info-Tech’s blueprint Implement a Security Governance and Management Program to determine the best structure for your organization.

      Who the CISO reports to, by percentage of organizations3

      Who the CISO reports to, by percentage of organizations

      Download the Implement a Security Governance and Management Program blueprint

      1. Journal of Computer Science and Information
      2. Proofpoint
      3. Heidrick & Struggles International, Inc

      3.2 Make a plan to manage your key stakeholders

      Managing stakeholders requires engagement, communication, and relationship management. To effectively collaborate and gain support for your initiatives, you will need to build relationships with your stakeholders. Take some time to review the stakeholder engagement strategies for different stakeholder types.

      Influence Mediators
      (Satisfy)
      Key Players
      (Engage)
      Spectators
      (Monitor)
      Noisemakers
      (Inform)
      Support for you

      When building relationships, I find that what people care about most is getting their job done. We need to help them do this in the most secure way possible.

      I don’t want to be the “No” guy, I want to enable the business. I want to find to secure options and say, “Here is how we can do this.”

      – James Miller, Information Security Director, Xavier University

      Download the CISO Stakeholder Management Strategy Template

      Key players – Engage

      Goal Action
      Get key players to help champion your initiative and turn your detractors into supporters. Actively involve key players to take ownership.
      Keep It Positive Maintain a Close Relationship
      • Use their positive support to further your objectives and act as your foundation of support.
      • Key players can help you build consensus among other stakeholders.
      • Get supporters to be vocal in your town halls.
      • Ask them to talk to other stakeholders over whom they have influence.
      • Get some quick wins early to gain and maintain stakeholder support and help convert them to your cause.
      • Use their influence and support to help persuade blockers to see your point of view.
      • Collaborate closely. Key players are tuned in to information streams that are important. Their advice can keep you informed and save you from being blindsided.
      • Keep them happy. By definition, these individuals have a stake in your plans and can be affected positively or negatively. Going out of your way to maintain relationships can be well worth the effort.

      Info-Tech Insight
      Listen to your key players. They understand what is important to other business stakeholders, and they can provide valuable insight to guide your future strategy.

      Mediators – Satisfy

      Goal Action
      Turn mediators into key players Increase their support level.
      Keep It Positive Maintain a Close Relationship
      • Make stakeholders part of the conversation by consulting them for input on planning and strategy.
      • Sample phrases:
        • “I’ve heard you have experience in this area. Do you have time to answer a few questions?”
        • “I’m making some decisions and I would value your thoughts. Can I get your perspective on this?”
      • Enhance their commitment by being inclusive. Encourage their support whenever possible.
      • Make them feel acknowledged and solicit feedback.
      • Listen to blockers with an open mind to understand their point of view. They may have valuable insight.
      • Approach stakeholders on their individual playing fields.
        • They want to know that you understand their business perspective.
      • Stubborn mediators might never support you. If consulting doesn’t work, keep them informed of important decision-making points and give them the opportunity to be involved if they choose to be.

      Info-Tech Insight
      Don’t dictate to stakeholders. Make them feel like valued contributors by including them in development and decision making. You don’t have to incorporate all their input, but it is essential that they feel respected and heard.

      Noisemakers – Inform

      Goal Action
      Have noisemakers spread the word to increase their influence. Encourage noisemakers to influence key stakeholders.
      Keep It Positive Maintain a Close Relationship
      • Identify noisemakers who have strong relationships with key stakeholders and focus on them.
        • These individuals may not have decision-making power, but their opinions and advice may help to sway a decision in your favor.
      • Look for opportunities to increase their influence over others.
      • Put effort into maintaining the positive relationship so that it doesn’t dwindle.
      • You already have this group’s support, but don’t take it for granted.
      • Be proactive, pre-emptive, and transparent.
      • Address issues or bad news early and be careful not to exaggerate their significance.
      • Use one-on-one meetings to give them an opportunity to express challenges in a private setting.
      • Show individuals in this group that you are a problem-solver:
        • “The implementation was great, but we discovered problems afterward. Here is what we’re doing about it.”

      Spectators – Monitor

      Goal Action
      Keep spectators content and avoid turning them into detractors. Keep them well informed.
      Keep It Positive Maintain a Close Relationship
      • A hands-on approach is not required with this group.
      • Keep them informed with regular, high-altitude communications and updates.
      • Use positive, exciting announcements to increase their interest in your initiatives.
      • Select a good venue for generating excitement and assessing the mood of spectators.
      • Spectators may become either supporters or blockers. Monitor them closely and keep in touch with them to stop these individuals from becoming blockers.
      • Listen to questions from spectators carefully. View any engagement as an opportunity to increase participation from this group and generate a positive shift in interest.

      3.2 Create the CISO’s stakeholder management strategy

      Develop a strategy to manage key stakeholders in order to drive your personal development plan initiatives.

      • The purpose of the CISO Stakeholder Management Strategy Template is to document the results of the power mapping exercise, create a plan to proactively manage stakeholders, and track the actions taken.
      • Use this in concert with Info-Tech’s CISO Stakeholder Power Map Template to help visualize the importance of key stakeholders to your personal development. You will document:
        • Stakeholder role and type.
        • Current relationship with the stakeholder.
        • Level of power/influence and degree of impact.
        • Current and desired level of support.
        • Initiatives that require the stakeholder’s engagement.
        • Actions to be taken – along with the status and results.

      What you will need to complete this exercise

      • Completed CISO Stakeholder Power Map
      • Security Business Satisfaction and Alignment Diagnostic results

      Download the CISO Stakeholder Management Strategy Template

      Phase 4

      Execute

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Populate the CISO Development Plan Template with appropriate targets and due dates.
      • Set review and reassess dates.
      • Review due dates with CISO.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager leverages successful cultural change to gain support for new security investments.

      Outcome: Integrating with the business on a small level and building on small successes will lead to bigger wins and bigger change.

      Actions Next Steps
      • By fostering positive relationships throughout the organization, the Security Manager has improved the security culture and established himself as a trusted partner.
      • In an organization that had seen very little change in years, he has used well developed change management, business acumen, leadership, communication, collaboration, and innovative problem-solving competencies to affect his initiatives.
      • He can now return to the board with a great deal more leverage in seeking support for security investments.
      • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

      Step 4.1

      Decide next actions and support your CISO moving forward

      Activities

      • Complete the Info-Tech CISO Development Plan Template
      • Create a stakeholder relationship development plan

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      Next actions for each of your development initiatives

      Execute

      Establish a set of first actions to set your plan into motion

      The CISO Development Plan Template provides a simple but powerful way to focus on what really matters to execute your plan.

      • By this point, the CISO is working on the personal competency development while simultaneously overseeing improvements across the security program, managing stakeholders, and seeking new business initiatives to engage with. This can be a lot to juggle effectively.
      • Disparate initiatives like these can hinder progress by creating confusion.
      • By distilling your plan down to Subject > Action > Outcome, you immediately restore focus and turn your plans into actionable items.
      • The outcome is most valuable when it is measurable. This makes progress (or lack of it) very easy to track and assess, so choose a meaningful metric.
      Item to Develop
      (competency/process/tech)
      First Action Toward Development
      Desired Outcome, Including a Measurable Indicator

      Download the CISO Development Plan Template

      4.1 Create a CISO development plan to keep all your objectives in one place

      Use Info-Tech’s CISO Development Plan Template to create a quick and simple yet powerful tool that you can refer to and update throughout your personal and professional development initiatives. As instructed in the template, you will document the following:

      Your Item to Develop The Next Action Required The Target Outcome
      This could be a CISO competency, a security process item, a security technology item, or an important relationship (or something else that is a priority). This could be as simple as “schedule lunch with a stakeholder” or “email Info-Tech to schedule a Guided Implementation call.” This part of the tool is meant to be continually updated as you progress through your projects. The strength of this approach is that it focuses your project into simple actionable steps that are easily achieved, rather than looking too far down the road and seeing an overwhelming task ahead. This will be something measurable like “reduce spending by 10%” or “have informal meeting with leaders from each department.”

      Info-Tech Insight
      A good plan doesn’t require anything that is outside of your control. Good measurable outcomes are behavior based rather than state based.
      “Increase the budget by 10%” is a bad goal because it is ultimately reliant on someone else and can be derailed by an unsupportive executive. A better goal is “reduce spending by 10%.” This is something more within the CISO’s control and is thus a better performance indicator and a more achievable goal.

      4.1 Create a CISO development plan to keep all your objectives in one place

      Below you will find sample content to populate your CISO Development Plan Template. Using this template will guide your CISO in achieving the goals identified here.

      The template itself is a metric for assessing the development of the CISO. The number of targets achieved by the due date will help to quantify the CISO’s progress.

      You may also want to include improvements to the organization’s security program as part of the CISO development plan.

      Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
      Core Competencies:
      Communication
      Executive
      communication
      Take economics course to learn business language Course completed [Insert date] [Y/N]
      Core Competencies:
      Communication
      Improve stakeholder
      relationships
      Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
      Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
      Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

      Check out the First 100 Days as CISO blueprint for guidance on bringing improvements to the security program

      4.1 Use your action plan to track development progress and inform stakeholders

      • As you progress toward your goals, continually update the CISO development plan. It is meant to be a living document.
      • The Next Action Required should be updated regularly as you make progress so you can quickly jump in and take meaningful actions without having to reassess your position every time you open the plan. This is a simple but very powerful method.
      • To view your initiatives in customizable ways, you can use the drop-down menu on any column header to sort your initiatives (i.e. by due date, completed status, area for development). This allows you to quickly and easily see a variety of perspectives on your progress and enables you to bring upcoming or incomplete projects right to the top.
      Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
      Core Competencies:
      Communication
      Executive
      communication
      Take economics course to learn business language Course completed [Insert date] [Y/N]
      Core Competencies:
      Communication
      Improve stakeholder
      relationships
      Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
      Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
      Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

      Step 4.2

      Regularly reassess to track development and progress

      Activities

      Create a calendar event for you and your CISO, including which items you will reassess and when

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      Scheduled reassessment of the CISO’s competencies

      Execute

      4.2 Regularly evaluate your CISO’s progress

      < 1 day

      As previously mentioned, your CISO development plan is meant to be a living document. Your CISO will use this as a companion tool throughout project implementation, but periodically it will be necessary to re-evaluate the entire program to assess your progress and ensure that your actions are still in alignment with personal and organizational goals.

      Info-Tech recommends performing the following assessments quarterly or twice yearly with the help of our executive advisors (either over the phone or onsite).

      1. Sit down and re-evaluate your CISO core competencies using the CISO Core Competency Evaluation Tool.
      2. Analyze your relationships using the CISO Stakeholder Power Map Template.
      3. Compare all of these against your previous results to see what areas you have strengthened and decide if you need to focus on a different area now.
      4. Consider your CISO Development Plan Template and decide whether you have achieved your desired outcomes. If not, why?
      5. Schedule your next reassessment, then create a new plan for the upcoming quarter and get started.
      Materials
      • Laptop
      • CISO Development Plan Template
      Participants
      • CISO
      • Hiring executive (possibly)
      Output
      • Complete CISO and security program development plan

      Summary of Accomplishment

      Knowledge Gained

      • Understanding of the competencies contributing to a successful CISO
      • Strategic approach to integrate the CISO into the organization
      • View of various CISO functions from a variety of business and executive perspectives, rather than just a security view

      Process Optimized

      • Hiring of the CISO
      • Assessment and development of stakeholder relationships for the CISO
      • Broad planning for CISO development

      Deliverables Completed

      • IT Security Business Satisfaction and Alignment Diagnostic
      • CISO Core Competency Evaluation Tool
      • CISO Stakeholder Power Map Template
      • CISO Stakeholder Management Strategy Template
      • CISO Development Plan Template

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation

      Contact your account representative for more information

      workshop@infotech.com
      1-888-670-8889

      Related Info-Tech Research

      Build an Information Security Strategy
      Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context.

      The First 100 Days as CISO
      Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, but the approach to the new position will be relatively the same.

      Implement a Security Governance and Management Program
      Business and security goals should be the same. Businesses cannot operate without security, and security's goal is to enable safe business operations.

      Research Contributors

      • Mark Lester, Information Security Manager, South Carolina State Ports Authority
      • Kyle Kennedy, CISO, CyberSN.com
      • James Miller, Information Security Director, Xavier University
      • Elliot Lewis, Vice President Security & Risk, Info-Tech Research Group
      • Andrew Maroun, Enterprise Security Lead, State of California
      • Brian Bobo, VP Enterprise Security, Schneider National
      • Candy Alexander, GRC Security Consultant, Towerall Inc.
      • Chad Fulgham, Chairman, PerCredo
      • Ian Parker, Head of Corporate Systems Information Security Risk and Compliance, Fujitsu EMEIA
      • Diane Kelly, Information Security Manager, Colorado State Judicial Branch
      • Jeffrey Gardiner, CISO, Western University
      • Joey LaCour, VP & Chief Security, Colonial Savings
      • Karla Thomas, Director IT Global Security, Tower Automotive
      • Kevin Warner, Security and Compliance Officer, Bridge Healthcare Providers
      • Lisa Davis, CEO, Vicinage
      • Luis Brown, Information Security & Compliance Officer, Central New Mexico Community College
      • Peter Clay, CISO, Qlik
      • Robert Banniza, Senior Director IT Center Security, AMSURG
      • Tim Tyndall, Systems Architect, Oregon State

      Bibliography

      Dicker, William. "An Examination of the Role of vCISO in SMBs: An Information Security Governance Exploration." Dissertation, Georgia State University, May 2, 2021. Accessed 30 Sep. 2022.

      Heidrick & Struggles. "2022 Global Chief Information Security Officer (CISO) Survey" Heidrick & Struggles International, Inc. September 6, 2022. Accessed 30 Sep. 2022.

      IBM Security. "Cost of a Data Breach Report 2022" IBM. August 1, 2022. Accessed 9 Nov. 2022.

      Mehta, Medha. "What Is a vCISO? Are vCISO Services Worth It?" Infosec Insights by Sectigo, June 23, 2021. Accessed Nov 22. 2022.

      Milica, Lucia. “Proofpoint 2022 Voice of the CISO Report” Proofpoint. May 2022. Accessed 6 Oct. 2022.

      Navisite. "The State of Cybersecurity Leadership and Readiness" Navisite. November 9, 2021. Accessed 9 Nov. 2022.

      Shayo, Conrad, and Frank Lin. “An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function” Journal of Computer Science and Information Technology, vol. 7, no. 1, June 2019. Accessed 28 Sep. 2022.

      z-Series Modernization and Migration

      • Buy Link or Shortcode: {j2store}114|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications.

      Our Advice

      Critical Insight

      The most common tactic is for the organization to better realize their z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious, the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market.

      Impact and Result

      This research will help you:

      • Evaluate the future viability of this platform.
      • Assess the fit and purpose, and determine TCO
      • Develop strategies for overcoming potential challenges.
      • Determine the future of this platform for your organization.

      z/Series Modernization and Migration Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. z/Series Modernization and Migration Guide – A brief deck that outlines key migration options and considerations for the z/Series platform.

      This blueprint will help you assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of z/Series for your organization.

      • z/Series Modernization and Migration Storyboard

      2. Scale Up vs. Scale Out TCO Tool – A tool that provides organizations with a framework for TCO.

      Use this tool to play with the pre-populated values or insert your own amounts to compare possible database decisions, and determine the TCO of each. Note that common assumptions can often be false; for example, open-source Cassandra running on many inexpensive commodity servers can actually have a higher TCO over six years than a Cassandra environment running on a larger single expensive piece of hardware. Therefore, calculating TCO is an essential part of the database decision process.

      • Scale Up vs. Scale Out TCO Tool
      [infographic]

      Further reading

      z/Series Modernization and Migration

      The biggest migration is yet to come.

      Executive Summary

      Info-Tech Insight

      “A number of market conditions have coalesced in a way that is increasingly driving existing mainframe customers to consider running their application workloads on alternative platforms. In 2020, the World Economic Forum noted that 42% of core skills required to perform existing jobs are expected to change by 2022, and that more than 1 billion workers need to be reskilled by 2030.” – Dale Vecchio

      Your Challenge

      It seems like anytime there’s a new CIO who is not from the mainframe world there is immediate pressure to get off this platform. However, just as there is a high financial commitment required to stay on System Z, moving off is risky and potentially more costly. You need to truly understand the scale and complexity ahead of the organization.

      Common Obstacles

      Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud, but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications.

      Info-Tech Approach

      The most common tactic is for the organization to better realize its z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market.

      Review

      We help IT leaders make the most of their z/Series environment

      Problem statement:

      The z/Series remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited and aging resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap.

      This research is designed for:

      IT strategic direction decision makers.

      IT managers responsible for an existing z/Series platform.

      Organizations evaluating platforms for mission critical applications.

      This research will help you:

      1. Evaluate the future viability of this platform.
      2. Assess the fit and purpose, and determine TCO.
      3. Develop strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      Analyst Perspective

      Good Luck.

      Darin Stahl.

      Modernize the mainframe … here we go again.

      Prior to 2020, most organizations were muddling around in “year eleven of the four-year plan” to exit the mainframe platform where a medium-term commitment to the platform existed. Since 2020, it appears the appetite for the mainframe platform changed. Again. Discussions mostly seem to be about what the options are beyond hardware outsourcing or re-platforming to “cloud” migration of workloads – mostly planning and strategy topics. A word of caution: it would appear unwise to stand in front of the exit door for fear of being trampled.

      Hardware expirations between now and 2025 are motivating hosting deployments. Others are in migration activities, and some have already decommissioned and migrated but now are trying to rehab the operations team now lacking direction and/or structure.

      There is little doubt that modernization and “digital transformation” trends will drive more exit traffic, so IT leaders who are still under pressure to get off the platform need to assess their options and decide. Being in a state of perpetually planning to get off the mainframe handcuffs your ability to invest in the mainframe, address deficiencies, and improve cost-effectiveness.

      Darin Stahl
      Principal Research Advisor, Infrastructure & Operations Research
      Info-Tech Research Group

      The mainframe “fidget spinner”

      Thinking of modernizing your mainframe can cause you angst so grab a fidget spinner and relax because we have you covered!

      External Business Pressures:

      • Digital transformation
      • Modernization programs
      • Compliance and regulations
      • TCO

      Internal Considerations:

      • Reinvest
      • Migrate to a new platform
      • Evaluate public and vendor cloud alternatives
      • Hosting versus infrastructure outsourcing

      Info-Tech Insight

      With multiple control points to be addressed, care must be taken to simplify your options while addressing all concerns to ease operational load.

      The analyst call review

      “Who has Darin talked with?” – Troy Cheeseman

      Dating back to 2011, Darin Stahl has been the primary z/Series subject matter expert within the Infrastructure & Operations Research team. Below represents the percentage of calls, per industry, where z/Series advisory has been provided by Darin*:

      37% - State Government

      19% - Insurance

      11% - Municipality

      8% - Federal Government

      8% - Financial Services

      5% - Higher Education

      3% - Retail

      3% - Hospitality/Resort

      3% - Logistics and Transportation

      3% - Utility

      Based on the Info-Tech call history, there is a consistent cross section of industry members who not only rely upon the mainframe but are also considering migration options.

      Note:

      Of course, this only represents industries who are Info-Tech members and who called for advisory services about the mainframe.

      There may well be more Info-Tech members with mainframes who have no topic to discuss with us about the mainframe specifically. Why do we mention this?

      We caution against suggesting things like, ”somewhat less than 50% of mainframes live in state data centers” or any other extrapolated inference from this data.

      Our viewpoint and discussion is based on the cases and the calls that we have taken over the years.

      *37+ enterprise calls were reviewed and sampled.

      Scale out versus scale up

      For most workloads “scale out" (e.g. virtualized cloud or IaaS ) is going to provide obvious and quantifiable benefits.

      However, with some workloads (extremely large analytics or batch processing ) a "scale up" approach is more optimal. But the scale up is really limited to very specific workloads. Despite some assumptions, the gains made when moving from scale up to scale out are not linear.

      Obviously, when you scale out from a performance perspective you experience a drop in what a single unit of compute can do. Additionally, there will be latency introduced in the form of network overhead, transactions, and replication into operations that were previously done just bypassing object references within a single frame.

      Some applications or use cases will have to be architected or written differently (thinking about the high-demand analytic workloads at large scale). Remember the “grid computing” craze that hit us during the early part of this century? It was advantageous for many to distribute work across a grid of computing devices for applications but the advantage gained was contingent on the workload able to be parsed out as work units and then pulled back together through the application.

      There can be some interesting and negative consequences for analytics or batch operations in a large scale as mentioned above. Bottom line, as experienced previously with Microfocus mainframe ports to x86, the batch operations simply take much longer to complete.

      Big Data Considerations*:

      • Value: Data has no inherent value until it’s used to solve a business problem.
      • Variety: The type of data being produced is increasingly diverse and ranges from email and social media to geo-spatial and photographic data. This data may be difficult to process using a structured data model.
      • Volume: The sheer size of the datasets is growing exponentially, often ranging from terabytes to petabytes. This is complicating traditional data management strategies.
      • Velocity: The increasing speed at which data is being collected and processed is also causing complications. Big data is often time sensitive and needs to be captured in real time as it is streaming into the enterprise.

      *Build a Strategy for Big Data Platforms

      Consider your resourcing

      Below is a summary of concerns regarding core mainframe skills:

      1. System Management (System Programmers): This is the most critical and hard-to-replace skill since it requires in-depth low-level knowledge of the mainframe (e.g. at the MVS level). These are skills that are generally not taught anymore, so there is a limited pool of experienced system programmers.
      2. Information Management System (IMS) Specialists: Requires a combination of mainframe knowledge and data analysis skills, which makes this a rare skill set. This is becoming more critical as business intelligence takes on an ever-increasing focus in most organizations.
      3. Application Development: The primary concern here is a shortage of developers skilled in older languages such as COBOL. It should be noted that this is an application issue; for example, this is not solved by migrating off mainframes.
      4. Mainframe Operators: This is an easier skill set to learn, and there are several courses and training programs available. An IT person new to mainframes could learn this position in about six weeks of on-the-job training.
      5. DB2 Administration: Advances in database technology have simplified administration (not just for DB2 but also other database products). As a result, as with mainframe operators, this is a skill set that can be learned in a short period of time on the job.

      The Challenge

      An aging workforce, specialized skills, and high salary expectations

      • Mainframe specialists, such as system programmers and IMS specialists, are typically over 50, have a unique skill set, and are tasked with running mission-critical systems.

      The In-House Solution:

      Build your mentorship program to create a viable succession plan

      • Get your money’s worth out of your experienced staff by having them train others.
      • Operator skills take about six weeks to learn. However, it takes about two years before a system programmer trainee can become fully independent. This is similar to the learning curve for other platforms; however, this is a more critical issue for mainframes since organizations have far fewer mainframe specialists to fall back on when senior staff retire or move on.

      Understand your options

      Migrate to another platform

      Use a hosting provider

      Outsource

      Re-platform (cloud/vendors)

      Reinvest

      There are several challenges to overcome in a migration project, from finding an appropriate alternative platform to rewriting legacy code. Many organizations have incurred huge costs in the attempt, only to be unsuccessful in the end, so make this decision carefully.

      Organizations often have highly sensitive data on their mainframes (e.g. financial data), so many of these organizations are reluctant to have this data live outside of their four walls. However, the convenience of using a hosting provider makes this an attractive option to consider.

      The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house.

      A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings
      “re-host.”

      If you’re staying with the mainframe and keeping it in-house, it’s important to continue to invest in this platform, keep it current, and look for opportunities to optimize its value.

      Migrate

      Having perpetual plans to migrate handcuffs your ability to invest in your mainframe, extend its value, and improve cost effectiveness.

      If this sounds like your organization, it’s time to do the analysis so you can decide and get clarity on the future of the mainframe in your organization.

      1. Identify current performance, availability, and security requirements. Assess alternatives based on this criteria.
      2. Review and use Info-Tech’s Mainframe TCO Comparison Tool to compare mainframe costs to the potential alternative platform.
      3. Assess the business risks and benefits. Can the alternative deliver the same performance, reliability, and security? If not, what are the risks? What do you gain by migrating?
      4. If migration is still a go, evaluate the following:
      • Do you have the expertise or a reliable third party to perform the migration, including code rewrites?
      • How long will the migration take? Can the business function effectively during this transition period?
      • How much will the migration cost? Is the value you expect to gain worth the expense?

      *3 of the top 4 challenges related to shortfalls of alternative platforms

      The image contains a bar graph that demonstrates challenges related to shortfalls of alternative platforms.

      *Source: Maximize the Value of IBM Mainframes in My Business

      Hosting

      Using a hosting provider is typically more cost-effective than running your mainframe in-house.

      Potential for reduced costs

      • Hosting enables you to reduce or eliminate your mainframe staff.
      • Economies of scale enable hosting providers to reduce software licensing costs. They also have more buying power to negotiate better terms.
      • Power and cooling costs are also transferred to the hosting provider.

      Reliable infrastructure and experienced staff

      • A quality hosting provider will have 24/7 monitoring, full redundancy, and proven disaster recovery capabilities.
      • The hosting provider will also have a larger mainframe staff, so they don’t have the same risk of suddenly being without those advanced critical skills.

      So, what are the risks?

      • A transition to a hosting provider usually means eliminating or significantly reducing your in-house mainframe staff. With that loss of in-house expertise, it will be next to impossible to bring the mainframe back in-house, and you become highly dependent on your hosting provider.

      Outsourcing

      The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house.

      The options here for the non-commodity (z/Series, IBM Power platforms, for example) are not as broad as with commodity server platforms. More confusingly, the term “outsourcing” for these can include:

      Traditional/Colocation – A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.”

      Onsite Outsourcing – Here a provider will support the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models.

      Managed Hosting – A customer transitions their legacy application environment to an off-prem hosted multi-tenanted environment. It will provide the most cost savings following the transition, stabilization, and disposal of existing environment. Some providers will provide software licensing, and some will also support “Bring Your Own,” as permitted by IBM terms for example.

      Info-Tech Insight

      Technical debt for non-commodity platforms isn’t only hardware based. Moving an application written for the mainframe onto a “cheaper” hardware platform (or outsourced deployment) leaves the more critical problems and frequently introduces a raft of new ones.

      Re-platform – z/Series COBOL Cloud

      Re-platforming is not trivial.

      While the majority of the coded functionality (JCLs, programs, etc.) migrate easily, there will be a need to re-code or re-write objects – especially if any object, code, or location references are not exactly the same in the new environment.

      Micro Focus has solid experience in this but if consider it within the context of an 80/20 rule (the actual metrics might be much better than that), meaning that some level of rework would have to be accomplished as an overhead to the exercise.

      Build that thought into your thinking and business case.

      AWS Cloud

      • Astadia (an AWS Partner) is re-platforming mainframe workloads to AWS. With its approach you reuse the original application source code and data to AWS services. Consider reviewing Amazon’s “Migrating a Mainframe to AWS in 5 Steps.”

      Azure Cloud

      Micro Focus COBOL (Visual COBOL)

      • Micro Focus' Visual COBOL also supports running COBOL in Docker containers and managing and orchestrating the containers with Kubernetes. I personally cannot imagine what sort of drunken bender decision would lead me to move COBOL into Docker and then use Kubernetes to run in GCP but there you are...if that's your Jam you can do it.

      Re-platform – z/Series (Non-COBOL)

      But what if it's not COBOL?

      Yeah, a complication for this situation is the legacy code.

      While re-platforming/re-hosting non-COBOL code is not new, we have not had many member observations compared to the re-platforming/re-hosting of COBOL functionality initiatives.

      That being said, there are a couple of interesting opportunities to explore.

      NTT Data Services (GLOBAL)

      • Most intriguing is the re-hosting of a mainframe environment into AWS. Not sure if the AWS target supports NATURAL codebase; it does reference Adabas however (Re-Hosting Mainframe Applications to AWS with NTT DATA Services). Nevertheless, NTT has supported re-platforming and NATURAL codebase environments previously.

      ModernSystems (or ModSys) has relevant experience.

      • ModSys is the resulting entity following a merger between BluePhoenix and ATERAS a number of years ago. ATERAS is the entity I find references to within my “wayback machine” for member discussions. There are also a number of published case studies still searchable about ATERAS’ successful re-platforming engagements, including the California Public Employees Retirement System (CalPERS) most famously after the Accenture project to rewrite it failed.

      ATOS, as a hosting vendor mostly referenced by customers with global locations in a short-term transition posture, could be an option.

      Lastly, the other Managed Services vendors with NATURAL and Adabas capabilities:

      Reinvest

      By contrast, reducing the use of your mainframe makes it less cost-effective and more challenging to retain in-house expertise.

      • For organizations that have migrated applications off the mainframe (at least partly to reduce dependency on the platform), inevitably there remains a core set of mission critical applications that cannot be moved off for reasons described on the “Migrate” slide. This is when the mainframe becomes a costly burden:
        • TCO is relatively high due to low utilization.
        • In-house expertise declines as workload declines and current staffing allocations become harder to justify.
      • Organizations that are instead adding capacity and finding new ways to use this platform have lower cost concerns and resourcing challenges. The charts below illustrate this correlation. While some capacity growth is due to normal business growth, some is also due to new workloads, and it reflects an ongoing commitment to the platform.

      *92% of organizations that added capacity said TCO is lower than for commodity servers (compared to 50% of those who did not add capacity)

      *63% of organizations that added capacity said finding resources is not very difficult (compared to 42% of those who did not add capacity)

      The image contains a bar graph as described in the above text. The image contains a bar graph as described in the above text.

      *Maximize the Value of IBM Mainframes in My Business

      An important thought about data migration

      Mainframe data migrations – “VSAM, IMS, etc.”

      • While the application will be replaced and re-platformed, there is the historical VIN data remaining in the VSAM files and access via the application. The challenge is that a bulk conversion can add upfront costs and delay the re-platforming of the application functionality. Some shops will break the historical data migration into a couple of phases.
      • While there are technical solutions to accessing VSAM data stores, what I have observed with other members facing a similar scenario is a need to “shrink” the data store over time. The technical accesses to historical VSAM records would also have a lifespan, and rather than kicking the can down the road indefinitely, many have turned to a process-based solution allowing them to shrink the historical data store over time. I have observed three approaches to the handling or digitization of historical records like this:

      Temporary workaround. This would align with a technical solution allowing the VASM files to be accessed using platforms other than on mainframe hardware (Micro Focus or other file store trickery). This can be accomplished relatively quickly but does run the risk of technology obsolesce for the workaround at some point in the future.

      Bulk conversion. This method would involve the extract/transform/load of the historical records into the new application platform. Often the order of the conversion is completed on work newest to oldest (the idea is that the newest historical records would have the highest likelihood of an access need), but all files would be converted to the new application and the old data store destroyed.

      Forward convert, which would have files undergo the extract/transform/load conversion into the new application as they are accessed or reopened. This method would keep historical records indefinitely or until they are converted – or the legal retention schedule allows for their destruction (hopefully no file must be kept forever). This could be a cost-efficient approach since the historical files remaining on the VSAM platform would be shrunk over time based on demand from the district attorney process. The conversion process could be automated and scripted, with a QR step allowing for the records to be deleted from the old platform.

      Info-Tech Insight

      It is not usual for organizations to leverage options #2 and #3 above to move the functionality forward while containing the scope creep and costs for the data conversions.

      Enterprise class job scheduling

      Job scheduling or data center automation?

      • Enterprise class job scheduling solutions enable complex unattended batched programmatically conditioned task/job scheduling.
      • Data center automation (DCIM) software automates and orchestrates the processes and workflow for infrastructure operations including provisioning, configuring, patching of physical, virtual, and cloud servers, and monitoring of tasks involved in maintaining the operations of a data center or Infrastructure environment.
      • While there maybe some overlap and or confusion between data center automation and enterprise class job scheduling solutions, data center automation (DCIM) software solutions are least likely to have support for non-commodity server platforms and lack robust scheduling functionality.

      Note: Enterprise job scheduling is a topic with low member interest or demand. Since our published research is driven by members’ interest and needs, the lack of activity or member demand would obviously be a significant influence into our ability to aggregate shared member insight, trends, or best practices in our published agenda.

      Data Center Automation (DCIM) Software

      Orchestration/Provisioning Software

      Enterprise class job scheduling features

      The feature set for these tools is long and comprehensive. The feature list below is not exhaustive as specific tools may have additional product capabilities. At a minimum, the solutions offered by the vendors in the list below will have the following capabilities:

      • Automatic restart and recovery
      • File management
      • Integration with security systems such as AD
      • Operator alerts
      • Ability to control spooling devices
      • Cross-platform support
      • Cyclical scheduling
      • Deadline scheduling
      • Event-based scheduling / triggers
      • Inter-dependent jobs
      • External task monitoring (e.g. under other sub-systems)
      • Multiple calendars and time-zones
      • Scheduling of packaged applications (such as SAP, Oracle, JD Edwards)
      • The ability to schedule web applications (e.g. .net, java-based)
      • Workload analysis
      • Conditional dependencies
      • Critical process monitoring
      • Event-based automation (“self-healing” processes in response to common defined error conditions)
      • Graphical job stream/workflow visualization
      • Alerts (job failure notifications, task thresholds (too long, too quickly, missed windows, too short, etc.) via multiple channels
      • API’s supporting programmable scheduler needs
      • Virtualization support
      • Workload forecasting and workload planning
      • Logging and message data supporting auditing capabilities likely to be informed by or compliant with regulatory needs such as Sarbanes, Gramme-Leach
      • Historical reporting
      • Auditing reports and summaries

      Understand your vendors and tools

      List and compare the job scheduling features of each vendor.

      • This is not presented as an exhaustive list.
      • The list relies on observations aggregated from analyst engagements with Info-Tech Research Group members. Those member discussions tend to be heavily tilted toward solutions supporting non-commodity platforms.
      • Nothing is implied about a solution suitability or capability by the order of presentation or inclusion or absence in this list.

      ✓ Advanced Systems Concepts

      ✓ BMC

      ✓ Broadcom

      ✓ HCL

      ✓ Fortra

      ✓ Redwood

      ✓ SMA Technologies

      ✓ StoneBranch

      ✓ Tidal Software

      ✓ Vinzant Software

      Info-Tech Insight

      Creating vendor profiles will help quickly filter the solution providers that directly meet your z/Series needs.

      Advanced Systems Concepts

      ActiveBatch

      Workload Management:

      Summary

      Founded in 1981, ASCs ActiveBatch “provides a central automation hub for scheduling and monitoring so that business-critical systems, like CRM, ERP, Big Data, BI, ETL tools, work order management, project management, and consulting systems, work together seamlessly with minimal human intervention.”*

      URL

      advsyscon.com

      Coverage:

      Global

      Amazon EC2

      Hadoop Ecosystem

      IBM Cognos

      DataStage

      IBM PureData (Netezza)

      Informatica Cloud

      Microsoft Azure

      Microsoft Dynamics AX

      Microsoft SharePoint

      Microsoft Team Foundation Server

      Oracle EBS

      Oracle PeopleSoft

      SAP

      BusinessObjects

      ServiceNow

      Teradata

      VMware

      Windows

      Linux

      Unix

      IBM i

      *Advanced Systems Concepts, Inc.


      BMC

      Control-M

      Workload Management:

      Summary

      Founded in 1980, BMCs Control-M product “simplifies application and data workflow orchestration on premises or as a service. It makes it easy to build, define, schedule, manage, and monitor production workflows, ensuring visibility, reliability, and improving SLAs.”*

      URL

      bmc.com/it-solutions/control-m.html

      Coverage:

      Global

      AWS

      Azure

      Google Cloud Platform

      Cognos

      IBM InfoSphere

      DataStage

      SAP HANA

      Oracle EBS

      Oracle PeopleSoft

      BusinessObjects

      ServiceNow

      Teradata

      VMware

      Windows

      Linux

      Unix

      IBM i

      IBM z/OS

      zLinux

      *BMC

      Broadcom

      Atomic Automation

      Autosys Workload Automation

      Workload Management:

      Summary

      Broadcom offers Atomic Automation and Autosys Workload Automation which ”gives you the agility, speed and reliability required for effective digital business automation. From a single unified platform, Atomic centrally provides the orchestration and automation capabilities needed accelerate your digital transformation and support the growth of your company.”*

      URL

      broadcom.com/products/software/automation/automic-automation

      broadcom.com/products/software/automation/autosys

      Coverage:

      Global


      Windows

      MacOS

      Linux

      UNIX

      AWS

      Azure

      Google Cloud Platform

      VMware

      z/OS

      zLinux

      System i

      OpenVMS

      Banner

      Ecometry

      Hadoop

      Oracle EBS

      Oracle PeopleSoft

      SAP

      BusinessObjects

      ServiceNow

      Teradata

      VMware

      Windows

      Linux

      Unix

      IBM i

      *Broadcom

      HCL

      Workload Automation

      Workload Management:

      Summary

      “HCL Workload Automation streamlined modelling, advanced AI and open integration for observability. Accelerate the digital transformation of modern enterprises, ensuring business agility and resilience with our latest version of one stop automation platform. Orchestrate unattended and event-driven tasks for IT and business processes from legacy to cloud and kubernetes systems.”*

      URL

      hcltechsw.com/workload-automation

      Coverage:

      Global


      Windows

      MacOS

      Linux

      UNIX

      AWS

      Azure

      Google Cloud Platform

      VMware

      z/OS

      zLinux

      System i

      OpenVMS

      IBM SoftLayer

      IBM BigInsights

      IBM Cognos

      Hadoop

      Microsoft Dynamics 365

      Microsoft Dynamics AX

      Microsoft SQL Server

      Oracle E-Business Suite

      PeopleSoft

      SAP

      ServiceNow

      Apache Oozie

      Informatica PowerCenter

      IBM InfoSphere DataStage

      Salesforce

      BusinessObjects BI

      IBM Sterling Connect:Direct

      IBM WebSphere MQ

      IBM Cloudant

      Apache Spark

      *HCL Software

      Fortra

      JAMS Scheduler

      Workload Management:

      Summary

      Fortra’s “JAMS is a centralized workload automation and job scheduling solution that runs, monitors, and manages jobs and workflows that support critical business processes.

      JAMS reliably orchestrates the critical IT processes that run your business. Our comprehensive workload automation and job scheduling solution provides a single pane of glass to manage, execute, and monitor jobs—regardless of platforms or applications.”*

      URL

      jamsscheduler.com

      Coverage:

      Global


      OpenVMS

      OS/400

      Unix

      Windows

      z/OS

      SAP

      Oracle

      Microsoft

      Infor

      Workday

      AWS

      Azure

      Google Cloud Compute

      ServiceNow

      Salesforce

      Micro Focus

      Microsoft Dynamics 365

      Microsoft Dynamics AX

      Microsoft SQL Server

      MySQL

      NeoBatch

      Netezza

      Oracle PL/SQL

      Oracle E-Business Suite

      PeopleSoft

      SAP

      SAS

      Symitar

      *JAMS

      Redwood

      Redwood SaaS

      Workload Management:

      Summary

      Founded in 1993 and delivered as a SaaS solution, ”Redwood lets you orchestrate securely and reliably across any application, service or server, in the cloud or on-premises, all inside a single platform. Automation solutions are at the core of critical business operations such as forecasting, replenishment, reconciliation, financial close, order to cash, billing, reporting, and more. Enterprises in every industry — from manufacturing, utility, retail, and biotech to healthcare, banking, and aerospace.”*

      URL

      redwood.com

      Coverage:

      Global


      OpenVMS

      OS/400

      Unix

      Windows

      z/OS

      SAP

      Oracle

      Microsoft

      Infor

      Workday

      AWS

      Azure

      Google Cloud Compute

      ServiceNow

      Salesforce

      Github

      Office 365

      Slack

      Dropbox

      Tableau

      Informatica

      SAP BusinessObjects

      Cognos

      Microsoft Power BI

      Amazon QuickSight

      VMware

      Xen

      Kubernetes

      *Redwood

      Fortra

      Robot Scheduler

      Workload Management:

      Summary

      “Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management from your most reliable system: IBM i. Just create a calendar of when and how jobs should run, and the software will do the rest.”*

      URL

      fortra.com/products/job-scheduling-software-ibm-i

      Coverage:

      Global


      IBM i (System i, iSeries, AS/400)

      AIX/UNIX

      Linux

      Windows

      SQL/Server

      Domino

      JD Edwards EnterpriseOne

      SAP

      Automate Schedule (formerly Skybot Scheduler)

      *Fortra

      SMA Technologies

      OpCon

      Workload Management:

      Summary

      Founded in1980, SMA offers to “save time, reduce error, and free your IT staff to work on more strategic contributions with OpCon from SMA Technologies. OpCon offers powerful, easy-to-use workload automation and orchestration to eliminate manual tasks and manage workloads across business-critical operations. It's the perfect fit for financial institutions, insurance companies, and other transactional businesses.”*

      URL

      smatechnologies.com

      Coverage:

      Global

      Windows

      Linux

      Unix

      z/Series

      IBM i

      Unisys

      Oracle

      SAP

      Microsoft Dynamics AX

      Infor M3

      Sage

      Cegid

      Temenos

      FICS

      Microsoft Azure Data Management

      Microsoft Azure VM

      Amazon EC2/AWS

      Web Services RESTful

      Docker

      Google Cloud

      VMware

      ServiceNow

      Commvault

      Microsoft WSUS

      Microsoft Orchestrator

      Java

      JBoss

      Asysco AMT

      Tuxedo ART

      Nutanix

      Corelation

      Symitar

      Fiserv DNA

      Fiserv XP2

      *SMA Technologies

      StoneBranch

      Universal Automation Center (UAC)

      Workload Management:

      Summary

      Founded in 1999, ”the Stonebranch Universal Automation Center (UAC) is an enterprise-grade business automation solution that goes beyond traditional job scheduling. UAC's event-based workload automation solution is designed to automate and orchestrate system jobs and tasks across all mainframe, on-prem, and hybrid IT environments. IT operations teams gain complete visibility and advanced control with a single web-based controller, while removing the need to run individual job schedulers across platforms.”*

      URL

      stonebranch.com/it-automation-solutions/enterprise-job-scheduling

      Coverage:

      Global

      Windows

      Linux

      Unix

      z/Series

      Apache Kafka

      AWS

      Databricks

      Docker

      GitHub

      Google Cloud

      Informatica

      Jenkins

      Jscape

      Kubernetes

      Microsoft Azure

      Microsoft SQL

      Microsoft Teams

      PagerDuty

      PeopleSoft

      Petnaho

      RedHat Ansible

      Salesforce

      SAP

      ServiceNow

      Slack

      SMTP and IMAP

      Snowflake

      Tableau

      VMware

      *Stonebranch

      Tidal Software

      Workload Automation

      Workload Management:

      Summary

      Founded in 1979, Tidal’s Workload Automation will “simplify management and execution of end-to-end business processes with our unified automation platform. Orchestrate workflows whether they're running on-prem, in the cloud or hybrid environments.”*

      URL

      tidalsoftware.com

      Coverage:

      Global

      CentOS

      Linux

      Microsoft Windows Server

      Open VMS

      Oracle Cloud

      Oracle Enterprise Linux

      Red Hat Enterprise Server

      Suse Enterprise

      Tandem NSK

      Ubuntu

      UNIX

      HPUX (PA-RISC, Itanium)

      Solaris (Sparc, X86)

      AIX, iSeries

      z/Linux

      z/OS

      Amazon AWS

      Microsoft Azure

      Oracle OCI

      Google Cloud

      ServiceNow

      Kubernetes

      VMware

      Cisco UCS

      SAP R/3 & SAP S/4HANA

      Oracle E-Business

      Oracle ERP Cloud

      PeopleSoft

      JD Edwards

      Hadoop

      Oracle DB

      Microsoft SQL

      SAP BusinessObjects

      IBM Cognos

      FTP/FTPS/SFTP

      Informatica

      *Tidal

      Vinzant Software

      Global ECS

      Workload Management:

      Summary

      Founded in 1987, Global ECS can “simplify operations in all areas of production with the GECS automation framework. Use a single solution to schedule, coordinate and monitor file transfers, database operations, scripts, web services, executables and SAP jobs. Maximize efficiency for all operations across multiple business units intelligently and automatically.”*

      URL

      vinzantsoftware.com

      Coverage:

      Global

      Windows

      Linux

      Unix

      iSeries

      SAP R/3 & SAP S/4HANA

      Oracle, SQL/Server

      *Vizant Software

      Activity

      Scale Out or Scale Up

      Activities:

      1. Complete the Scale Up vs. Scale Out TCO Tool.
      2. Compare total lifecycle costs to determine TCO.

      This activity involves the following participants:

      IT strategic direction decision makers

      IT managers responsible for an existing z/Series platform

      Organizations evaluating platforms for mission critical applications

      Outcomes of this step:

      • Completed Scale Up vs. Scale Out TCO Tool

      Info-Tech Insight

      This checkpoint process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.

      Scale out versus scale up activity

      The Scale Up vs. Scale Out TCO Tool provides organizations with a framework for estimating the costs associated with purchasing and licensing for a scale-up and scale-out environment over a multi-year period.

      Use this tool to:

      • Compare the pre-populated values.
      • Insert your own amounts to contrast possible database decisions and determine the TCO of each.
      The image contains screenshots of the Scale Up vs. Scale Out TCO Tool.

      Info-Tech Insight

      Watch out for inaccurate financial information. Ensure that the financials for cost match your maintenance and contract terms.

      Use the Scale Up vs. Scale Out TCO Tool to determine your TCO options.

      Related Info-Tech Research

      Effectively Acquire Infrastructure Services

      Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

      There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Build Your Infrastructure Roadmap

      Move beyond alignment: Put yourself in the driver’s seat for true business value.

      Define Your Cloud Vision

      Make the most of cloud for your organization.

      Document Your Cloud Strategy

      Drive consensus by outlining how your organization will use the cloud.

      Build a Strategy for Big Data Platforms

      Know where to start and where to focus attention in the implementation of a big data strategy.

      Create a Better RFP Process

      Improve your RFPs to gain leverage and get better results.

      Research Authors

      Darin Stahl.

      Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Darin is a Principal Research Advisor within the Infrastructure Practice, and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring/ APM, Managed FTP, non-commodity servers (z/Series, mainframe, IBM i, AIX, Power PC).

      Troy Cheeseman.

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy has over 25 years of IT management experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups.

      Bibliography

      “AWS Announces AWS Mainframe Modernization.” Business Wire, 30 Nov. 2021.
      de Valence, Phil. “Migrating a Mainframe to AWS in 5 Steps with Astadia?” AWS, 23 Mar. 2018.
      Graham, Nyela. “New study shows mainframes still popular despite the rise of cloud—though times are changing…fast?” WatersTechnology, 12 Sept. 2022.
      “Legacy applications can be revitalized with API.” MuleSoft, 2022.
      Vecchio, Dale. “The Benefits of Running Mainframe Applications on LzLabs Software Defined Mainframe® & Microsoft Azure.” LzLabs Sites, Mar. 2021.

      Build a Cloud Security Strategy

      • Buy Link or Shortcode: {j2store}169|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $38,592 Average $ Saved
      • member rating average days saved: 44 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Leveraging the cloud introduces IT professionals to a new world that they are tasked with securing.
      • With many cloud vendors proposing to share the security responsibility, it can be a challenge for organizations to develop a clear understanding of how they can best secure their data off premises.

      Our Advice

      Critical Insight

      • Cloud security is not fundamentally different from security on premises.
      • While some of the mechanics are different, the underlying principles are the same. Accountability doesn’t disappear.
      • By virtue of its broad network accessibility, the cloud does expose decisions to extreme scrutiny, however.

      Impact and Result

      • The business is adopting a cloud environment and it must be secured, which includes:
        • Ensuring business data cannot be leaked or stolen.
        • Maintaining privacy of data and other information.
        • Securing the network connection points.
      • This blueprint and associated tools are scalable for all types of organizations within various industry sectors.

      Build a Cloud Security Strategy Research & Tools

      Start Here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a cloud security strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Explore security considerations for the cloud

      Explore how the cloud changes the required controls and implementation strategies for a variety of different security domains.

      • Build a Cloud Security Strategy – Phase 1: Explore Security Considerations for the Cloud
      • Cloud Security Information Security Gap Analysis Tool
      • Cloud Security Strategy Template

      2. Prioritize initiatives and construct a roadmap

      Develop your organizational approach to various domains of security in the cloud, considering the cloud’s unique risks and challenges.

      • Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap
      [infographic]

      Workshop: Build a Cloud Security Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your Approach

      The Purpose

      Define your unique approach to improving security in the cloud.

      Key Benefits Achieved

      An understanding of the organization’s requirements for cloud security.

      Activities

      1.1 Define your approach to cloud security.

      1.2 Define your governance requirements.

      1.3 Define your cloud security management requirements.

      Outputs

      Defined cloud security approach

      Defined governance requirements

      2 Respond to Cloud Security Challenges

      The Purpose

      Explore challenges posed by the cloud in various areas of security.

      Key Benefits Achieved

      An understanding of how the organization needs to evolve to combat the unique security challenges of the cloud.

      Activities

      2.1 Explore cloud asset management.

      2.2 Explore cloud network security.

      2.3 Explore cloud application security.

      2.4 Explore log and event management.

      2.5 Explore cloud incident response.

      2.6 Explore cloud eDiscovery and forensics.

      2.7 Explore cloud backup and recovery.

      Outputs

      Understanding of cloud security strategy components (cont.).

      3 Build Cloud Security Roadmap

      The Purpose

      Identify initiatives to mitigate challenges posed by the cloud in various areas of security.

      Key Benefits Achieved

      A roadmap for improving security in the cloud.

      Activities

      3.1 Define tasks and initiatives.

      3.2 Finalize your task list

      3.3 Consolidate gap closure actions into initiatives.

      3.4 Finalize initiative list.

      3.5 Conduct a cost-benefit analysis.

      3.6 Prioritize initiatives and construct a roadmap.

      3.7 Create effort map.

      3.8 Assign initiative execution waves.

      3.9 Finalize prioritization.

      3.10 Incorporate initiatives into a roadmap.

      3.11 Schedule initiatives.

      3.12 Review your results.

      Outputs

      Defined task list.

      Cost-benefit analysis

      Roadmap

      Effort map

      Initiative schedule

      The Complete Manual for Layoffs

      • Buy Link or Shortcode: {j2store}514|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $30,999 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Lead
      • Parent Category Link: /lead

      When the economy is negatively influenced by factors beyond any organization’s control, the impact can be felt almost immediately on the bottom line. This decline in revenue as a result of a weakening economy will force organizations to reconsider every dollar they spend.

      Our Advice

      Critical Insight

      • The remote work environment many organizations find themselves in adds a layer of complexity to the already sensitive process of laying off employees.
      • Carrying out layoffs must be done while keeping personal contact as your first priority. That personal contact should be the basis for all subsequent communication with laid-off and remaining staff, even after layoffs have occurred.

      Impact and Result

      By following our process, we can provide your organization with the direction, tools, and best practices to lay off employees. This will need to be done with careful consideration into your organization’s short- and longer-term strategic goals.

      The Complete Manual for Layoffs Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for layoffs

      Understand the most effective cost-cutting solutions and set layoff policies and guidelines.

      • The Complete Manual for Layoffs Storyboard
      • Layoffs SWOT Analysis Template
      • Redeployment and Layoff Strategy Workbook
      • Sample Layoffs Policy
      • Cost-Cutting Planning Tool
      • Termination Costing Tool

      2. Objectively identify employees

      Develop an objective layoff selection method and plan for the transfer of essential responsibilities.

      • Workforce Planning Tool
      • Employee Layoff Selection Tool

      3. Prepare to meet with employees

      Plan logistics, training, and a post-layoff plan communication.

      • Termination Logistics Tool
      • IT Knowledge Transfer Risk Assessment Tool
      • IT Knowledge Transfer Plan Template
      • IT Knowledge Identification Interview Guide Template
      • Knowledge Transfer Job Aid
      • Layoffs Communication Package

      4. Meet with employees

      Collaborate with necessary departments and deliver layoffs notices.

      • Employee Departure Checklist Tool

      5. Monitor and manage departmental effectiveness

      Plan communications for affected employee groups and monitor organizational performance.

      • Ten Ways to Connect With Your Employees
      • Creating Connections
      [infographic]

      Define a Release Management Process to Deliver Lasting Value

      • Buy Link or Shortcode: {j2store}158|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your software platforms are a key enabler of your brand. When there are issues releasing, this brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality otherwise they will look elsewhere.

      Our Advice

      Critical Insight

      • Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Impact and Result

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Define a Release Management Process to Deliver Lasting Value Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a Release Management Process to Deliver Lasting Value Deck – A step-by-step document that walks you through how to develop and implement a release management framework that takes advantage of continuous delivery.

      This presentation documents the Info-Tech approach to defining your application release management framework.

      • Define a Release Management Process to Deliver Lasting Value – Phases 1-4

      2. Define a Release Management Process to Deliver Lasting Value Template – Use this template to help you define, detail, and make a reality your strategy in support of your application release management framework.

      The template gives the user a guide to the development of their application release management framework.

      • Define a Release Management Process to Deliver Lasting Value Template

      3. Define a Release Management Process to Deliver Lasting Value Workbook – This workbook documents the results of the exercises contained in the blueprint and offers the user a guide to development of their release management framework.

      This workbook is designed to capture the results of your exercises from the Define a Release Management Process to Deliver Lasting Value blueprint.

      • Define a Release Management Process to Deliver Lasting Value Workbook
      [infographic]

      Workshop: Define a Release Management Process to Deliver Lasting Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define the Current Situation

      The Purpose

      Document the existing release management process and current pain points and use this to define the future-state framework.

      Key Benefits Achieved

      Gain an understanding of the current process to confirm potential areas of opportunity.

      Understand current pain points so that we can build resolution into the new process.

      Activities

      1.1 Identify current pain points with your release management process. If appropriate, rank them in order of most to least disruptive.

      1.2 Use the statement of quality and current pain points (in addition to other considerations) and outline the guiding principles for your application release management framework.

      1.3 Brainstorm a set of metrics that will be used to assess the success of your aspired-to application release management framework.

      Outputs

      Understanding of pain points, their root causes, and ranking.

      Built guiding principles for application release management framework.

      Created set of metrics to measure the effectiveness of the application release management framework.

      2 Define Standard Release Criteria

      The Purpose

      Build sample release criteria, release contents, and standards for how it will be integrated in production.

      Key Benefits Achieved

      Define a map to what success will look like once a new process is defined.

      Develop standards that the new process must meet to ensure benefits are realized.

      Activities

      2.1 Using an example of a product known to the team, list its criteria for release.

      2.2 Using an example of a product known to the team, develop a list of features and tasks that are directly and indirectly important for either a real or hypothetical upcoming release.

      2.3 Using an example of product known to the team, map out the process for its integration into the release-approved code in production. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example highlighting releasability.

      Completed Workbook example defining and detailing feature and task selection.

      Completed Workbook example defining and detailing the integration step.

      3 Define Acceptance and Deployment Standards

      The Purpose

      Define criteria for the critical acceptance and deployment phases of the release.

      Key Benefits Achieved

      Ensure that releases will meet or exceed expectations and meet user quality standards.

      Ensure release standards for no / low risk deployments are recognized and implemented.

      Activities

      3.1 Using an example of product known to the team, map out the process for its acceptance. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      3.2 Using an example of product known to the team, map out the process for its deployment. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example defining and detailing the acceptance step.

      Completed Workbook example defining and detailing the deployment step.

      4 Implement the Strategy

      The Purpose

      Define your future application release management process and the plan to make the required changes to implement.

      Key Benefits Achieved

      Build a repeatable process that meets the standards defined in phases 2 and 3.

      Ensure the pain points defined in Phase 1 are resolved.

      Show how the new process will be implemented.

      Activities

      4.1 Develop a plan and roadmap to enhance the integration, acceptance, and deployment processes.

      Outputs

      List of initiatives to reach the target state

      Application release management implementation roadmap

      Further reading

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Analyst Perspective

      Improving your release management strategy and practices is a key step to fully unlock the value of your portfolio.

      As firms invest in modern delivery practices based around product ownership, Agile, and DevOps, organizations assume that’s all that is necessary to consistently deliver value. As organizations continue to release, they continue to see challenges delivering applications of sufficient and consistent quality.

      Delivering value doesn’t only require good vision, requirements, and technology. It requires a consistent and reliable approach to releasing and delivering products and services to your customer. Reaching this goal requires the definition of standards and criteria to govern release readiness, testing, and deployment.

      This will ensure that when you deploy a release it meets the high standards expected by your clients and delivers the value you have intended.

      Dr. Suneel Ghei

      Principal Research Director, Application Development

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Your software platforms are a key enabler of your brand. When there are issues releasing, the brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture of product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality, otherwise they will look elsewhere.

      Common Obstacles

      • Development teams are moving faster but then face delays waiting for testing and deployment due to a lack of defined release cycle and process.
      • Individual stages in your software development life cycle (SDLC), such as code collaboration, testing, and deployment, have become leaner, but the overall complexity has increased since many products and services are composed of many applications, platforms, and processes.
      • The specifics of releasing products is (wrongly) classified as a technical concern and not a business concern, hindering the ability to prioritize improved release practices.

      Info-Tech's Approach

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Executive Summary

      Info-Tech Insights

      Turn release-related activities into non-events.

      Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Release management is NOT a part of the software delivery life cycle.

      The release cycle runs parallel to the software delivery life cycle but is not tightly coupled with it. The act of releasing begins at the point requirements are confirmed and ends when user satisfaction is measurable. In contrast, the software delivery life cycle is focused on activities such as building, architecting, and testing.

      All releases are NOT created equal.

      Barring standard guiding principles, each release may have specific nuances that need to be considered as part of release planning.

      Your release management journey

      1. Optimize Applications Release Management - Set a baseline release management process and organization.
      2. Modernize Your SDLC - Move your organization to Agile and increase throughput to feed releases.
      3. Deliver on Your Digital Product Vision - Understand the practices that go into delivering products, including articulating your release plans.
      4. Automate Testing to Get More Done - Create the ability to do more testing quickly and ensure test coverage.
      5. Implement DevOps Practices That Work - Build in tools and techniques necessary for release deployment automation.
      6. Define a Release Management Process to Deliver Lasting Value (We Are Here)

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Executive Brief

      Your software delivery teams are expected to deliver value to stakeholders in a timely manner and with high quality

      Software delivery teams must enable the organization to react to market needs and competitive changes to improve the business’ bottom line. Otherwise, the business will question the team’s competencies.

      The business is constantly looking for innovative ways to do their jobs better and they need support from your technical teams.

      The increased stress from the business is widening the inefficiencies that already exist in application release management, risking poor product quality and delayed releases.

      Being detached from the release process, business stakeholders do not fully understand the complexities and challenges of completing a release, which complicates the team’s communication with them when issues occur.

      IT Stakeholders Are Also Not Satisfied With Their Own Throughput

      • Only 29% of IT employees find application development throughput highly effective.
      • Only 9% of organizations were classified as having highly effective application development throughput.
      • Application development throughput ranked 37th out of 45 core IT processes in terms of effectiveness.

      (Info-Tech’s Management and Governance Diagnostic, N=3,930)

      Your teams, however, struggle with core release issues, resulting in delayed delivery (and disappointed stakeholders)

      Implementing tools on top of an inefficient pipeline can significantly magnify the existing release issues. This can lead to missed deadlines, poor product quality, and business distrust with software delivery teams.

      COMMON RELEASE ISSUES

      1. Local Thinking: Release decisions and changes are made and approved without consideration of the holistic system, process, and organization.
      2. No Release Cadence: Lack of process governance and oversight generates unpredictable bottlenecks and load and ill-prepared downstream teams.
      3. Mismanagement of Releases: Program management does not accommodate the various integrated releases completed by multiple delivery teams.
      4. Poor Scope Management: Teams are struggling to effectively accommodate changes during the project.

      The bottom line: The business’ ability to operate is dictated by the software delivery team’s ability to successfully complete releases. If the team performs poorly, then the business will do poorly as well. Application release management is critical to ensure business expectations are within the team’s constraints.

      As software becomes more embedded in the business, firms are discovering that the velocity of business change is now limited by how quickly they can deploy.” – Five Ways To Streamline Release Management, J.S. Hammond

      Historically, managing releases has been difficult and complicated…

      Typically, application release management has been hard to coordinate because…

      • Software has multiple dependencies and coordinating their inclusion into a deployable whole was not planned.
      • Teams many be spending too much time on features that are not needed any longer.
      • Software development functions (such as application architecture, test-first or test-driven design, source code integration, and functional testing) are not optimized.
      • There are no agreed upon service-level contracts (e.g. expected details in requirements, adequate testing, source control strategy) between development functions.
      • The different development functions are not integrated in a holistic style.
      • The different deployment environments have variability in their configuration, reducing the reliability of testing done in different environments.
      • Minimum thresholds for acceptable quality of development functions are either too low (leading to adverse outcomes down stream) or too high (leading to unnecessary delays).

      …but research shows being effective at application release management increases your throughput

      Research conducted on Info-Tech's members shows overwhelming evidence that application throughput is strongly tied to an effective application release management approach.

      The image shows a scatter plot, with Release Management Effectiveness on the x-axis and Application Development Throughput Effectiveness on the Y-axis. The graph shows a steady increase.

      (Info-Tech Management & Governance Diagnostic, since 2019; N=684 organizations)

      An application release management framework is critical for effective and timely delivery of software

      A well-developed application release management framework is transformative and changes...

      From To
      Short-lived projects Ongoing enhancements supporting a product strategy
      Aiming for mandated targets Flexible roadmaps
      Manual execution of release processes Automating a release pipeline as much as possible and reasonable
      Manual quality assurance Automated assessment of quality
      Centralized decision making Small, independent release teams, orchestrated through an optimized value stream

      Info-Tech Insight: Your application release management framework should turn a system release into a non-event. This is only possible through the development of a holistic, low-risk and standardized approach to releasing software, irrespective of their size or complexity.

      Robust continuous “anything” requires proficiency in five core practices

      A continuous anything evaluation should not be a “one-and-done” event. As part of ongoing improvements, keep evolving it to make it a fundamental component of a strong operational strategy.

      Continuous Anything

      • Automate where appropriate
        • Automation is not a silver bullet. All processes are not created equal; and therefore, some are not worthy of being automated.
      • Control system variables
        • Deploying and testing in environments that are apple to apple in comparison reduces the risk of unintended outcomes from production release.
      • Measure process outcomes
        • A process not open to being measured is a process bound to fail. If it can be measured, it should be, and insights found should be used for improving the system.
      • Select smaller features batches
        • Smaller release packages reduce the chances of cognitive load associated with finding root causes for defects and issues that may result as post-production incidents.
      • Reduction of cycle time
        • Identification of waste in each stage of the continuous anything process helps in lowering cost of operations and results in quicker generation of value for stakeholders.

      Invest time in developing an application release management framework for your development team(s) with a continuous anything mindset

      An application release management framework converts a set of features and make them ready for releasability in a low-risk, standardized, and high-quality process.

      The image shows a diagram titled Application Release Engineering From Idea to Product, which illustrates the process.

      A continuous anything (integration, delivery, and deployment) mindset is based on a growth and improvement philosophy, where every event is considered a valid data point for investigation of process efficiency.

      Diagram adapted from Continuous Delivery in the Wild, Pete Hodgson, Published by O'Reilly Media, Inc., 2020

      Related Info-Tech Research

      Streamline Application Maintenance

      • Justify the necessity of streamlined maintenance. Gain a grounded understanding of stakeholder objectives and concerns and validate their achievability against the current state of the people, process, and technologies involved in application maintenance.
      • Strengthen triaging and prioritization practices. Obtain a holistic picture of the business and technical impacts, risks, and urgencies of each accepted maintenance request to justify its prioritization and relevance within your backlog. Identify opportunities to bundle requests together or integrate them within project commitments to ensure completion.
      • Establish and govern a repeatable process. Develop a maintenance process with well-defined stage gates, quality controls, and roles and responsibilities, and instill development best practices to improve the success of delivery.

      “Releasability” (or release criteria) of a system depends upon the inclusion of necessary building blocks and proof that they were worked on

      There is no standard definition of a system’s releasability. However, there are common themes around completions or assessments that should be investigated as part of a release:

      • The range of performance, technical, or compliance standards that need to be assessed.
      • The full range of test types required for business approval: unit tests, acceptance tests, security test, data migration tests, etc.
      • The volume-criticality mix of defects the organization is willing to accept as a risk.
      • The best source and version control strategy for the development team. This is mostly a function of the team's skill with using release branches and coordinating their work artifacts.
      • The addition of monitoring points and measures required for evaluations and impact analysis.
      • The documentation required for audit and compliance.
      • External and internal dependencies and integrations.
      • Validations, approvals, and sign-offs required as part of the business’ operating procedure.
      • Processes that are currently carried out outside and should be moved into the pipeline.
      • Manual processes that may be automated.
      • Any waste activities that do not directly contribute to releasability that can be eliminated from the development process.
      • Knowledge the team has regarding challenges and successes with similar software releases in the past.

      Releasability of a system is different than governing principles for application release management

      Governing principles are fundamental ways of doing something, which in this case is application release management, while releasability will generally have governing principles in addition to specific needs for a successful release.

      Example of Governing Principles

      • Approval from Senior Director is necessary before releasing to production
      • Production deployments can only be done in off-hours
      • We will try to automate processes whenever it is possible for us to do so
      • We will use a collaborative set of metrics to measure our processes

      Examples of Releasability Criteria

      • For the upcoming release, add performance testing for Finance and Budget Teams’ APIs
      • Audit and compliance documentation is required for this release
      • Automation of manual deployment
      • Use trunk-based source code management instead of feature-based

      Regulated industries are not more stable despite being less nimble

      A pervasive myth in industry revolves around the misperception that continuous anything and nimble and non-event application release management is not possible in large bureaucratic and regulated organizations because they are risk-averse.

      "We found that external approvals were negatively correlated with lead-time, deployment frequency and restore time, and had no correlation with change failure rate. In short, approval by an external body (such as a manager or Change Approval Board) simply doesn’t work to increase the stability of production systems…However, it certainly slows things down. It is in fact worse than having no change approval process at all." – Accelerate by Gene Kim, Jez Humble, and Nicole Forsgren

      Many organizations reduce risk in their product release by adopting a paternalistic stance by:

      • Requiring manual sign-offs from senior personnel who are external to the organization.
      • Increasing the number and level of authorization gates.
      • Staying away from change and preferring to stick with what has worked in the past.

      Despite the prevalence of these types of responses to risk, the evidence is that they do not work and are in fact counter-productive because they:

      • Create blocks to frequent releases.
      • Introduce procedural complexity to each release and in effect make them “bigger.”
      • Prefer process over people (and trusting them). Increase non-value-add scrutiny and reporting.

      There is a persistent misunderstanding about continuous anything being only an IT engineering practice

      01

      At the enterprise level, continuous anything focuses on:

      • Visibility of final value being provided in a high-quality and expedited manner
      • Ensuring efficiency in the organization’s delivery framework
      • Ensuring adherence to established governance and risk mitigation strategy

      02

      Focus of this blueprint

      At the product level, continuous anything focuses on:

      • Reliability of the product delivery system
      • Use of scientific evidence for continuous improvement of the product’s delivery system
      • Orchestration of different artifacts into a single whole

      03

      At the functional level, continuous anything focuses on*:

      • Local functional optimization (functions = software engineering, testing, application design)
      • Automation of local functions
      • Use of patterns for standardizing inputs and functional areas

      *Where necessary, practices at this level have been mentioned.

      Related Info-Tech Research

      Implement DevOps Practices That Work

      • Be DevOps, rather than do DevOps. DevOps is a philosophy, not an industry framework. Your organization’s culture must shift toward system-wide thinking, cross-function collaboration, and empathy.
      • Culture, learning, automation, integrated teams, and metrics and governance (CLAIM) are all critical components of effective DevOps.

      Automate Testing to Get More Done

      • Optimize and automate SDLC stages to recover team capacity. Recognize that automation without optimization is a recipe for long-term pain. Do it right the first time.
      • Optimization and automation are not one-hit wonders. Technical debt is a part of software systems and never goes away. The only remedy is constant vigilance and enhancements to the processes.

      The seeds of a good release are sown even before work on it begins

      Pre-release practices such as requirements intake and product backlog management are important because:

      • A standard process for documentation of features and requirements helps reduce “cognitive dissonance” between business and technology teams. Clearly articulated and well-understood business needs are fundamental ingredients of a high-quality product.
      • Product backlog management done right ensures the prioritized delivery of value to stakeholders. Features can become stale or get a bump in importance, depending upon evolving circumstances. Prioritizing the backlog is, therefore, critical for ensuring time, effort, and budget are spent on things that matter.

      Master the Secrets of VMware Licensing to Maximize Your Investment

      • Buy Link or Shortcode: {j2store}138|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • A lack of understanding around VMware’s licensing models, bundles, and negotiation tactics makes it difficult to negotiate from a position of strength.
      • Unfriendly commercial practices combined with hyperlink-ridden agreements have left organizations vulnerable to audits and large shortfall payments.
      • Enterprise license agreements (ELAs) come in several purchasing models and do not contain the EULA or various VMware product guide documentation that governs license usage rules and can change monthly.
      • Without a detailed understanding of VMware’s various purchasing models, shelfware often occurs.

      Our Advice

      Critical Insight

      • Contracts are typically overweighted with a discount at the expense of contractual T&Cs that can restrict license usage and expose you to unpleasant financial surprises and compliance risk.
      • VMware customers almost always have incomplete price information from which to effectively negotiate a “best in class” ELA.
      • VMware has a large lead in being first to market and it realizes that running dual virtualization stacks is complex, unwieldy, and expensive. To further complicate the issues, most skill sets in the industry are skewed towards VMware.

      Impact and Result

      • Negotiate desired terms and conditions at the start of the agreement, and prioritize which use rights may be more important than an additional discount percentage.
      • Gather data points and speak with licensing partners to determine if the deal being offered is in fact as great as VMware says it is.
      • Beware of out-year pricing and ELA optimization reviews that may provide undesirable surprises and more spend than was planned.

      Master the Secrets of VMware Licensing to Maximize Your Investment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage Your VMware Agreements – Use the Info-Tech tools capture your existing licenses and prepare for your renewal bids.

      Use Info-Tech’s licensing best practices to avoid shelfware with VMware licensing and remain compliant in case of an audit.

      • Master the Secrets of VMware Licensing to Maximize Your Investment Storyboard

      2. Manage your VMware agreements

      Use Info-Tech’s licensing best practices to avoid shelfware with VMware licensing and remain compliant in case of an audit.

      • VMware Business as Usual – Install Base SnS Renewal Only Tool
      • VMware ELA RFQ Template

      3. Transition to the VMWare Cloud – Use these tools to evaluate your ELA and vShpere requirements and make an informed choice.

      Manage your renewals and transition to the cloud subscription model.

      • VPP Transactional Purchase Tool
      • VMware ELA Analysis Tool
      • vSphere Edition 7 Features List

      Infographic

      Further reading

      Master the Secrets of VMware Licensing to Maximize Your Investment

      Learn the essential steps to avoid overspending and to maximize negotiation leverage with VMware.

      EXECUTIVE BRIEF

      Analyst Perspective

      Master the Secrets of VMware Licensing to Maximize Your Investment.

      The image contains a picture of Scott Bickley.

      The mechanics of negotiating a deal with VMware may seem simple at first as the vendor is willing to provide a heavy discount on an enterprise license agreement (ELA). However, come renewal time, when a reduction in spend or shelfware is needed, or to exit the ELA altogether, the process can be exceedingly frustrating as VMware holds the balance of power in the negotiation.

      Negotiating a complete agreement with VMware from the start can save you from an immense headache and unforeseen expenditures. Many VMware customers do not realize that the terms and conditions in the Volume Purchasing Program (VPP) and Enterprise Purchasing Program (EPP) agreements limit how and where they are able to use their licenses.

      Furthermore, after the renewal is complete, organizations must still worry about the management of various license types, accurate discovery of what has been deployed, visibility into license key assignments, and over and under use of licenses.

      Preventive and proactive measures enclosed within this blueprint will help VMware clients mitigate this minefield of challenges.

      Scott Bickley
      Practice Lead, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      VMware's dominant position in the virtualization space can create uncertainty to your options in the long term as well as the need to understand:

      • The hybrid cloud model.
      • Hybrid VM security and management.
      • New subscription license model and how it affects renewals.

      Make an informed decision with your VMware investments to allow for continued ROI.

      There are several hurdles that are presented when considering a VMware ELA:

      • Evolving licensing and purchasing models
      • Understanding potential ROI in the cloud landscape
      • Evolving door of corporate ownership

      Overcoming these and other obstacles are key to long-term satisfaction with your VMware infrastructure.

      Info-Tech has a two-phase approach:

      • Manage your VMware agreements.
      • Plan a transition to the cloud.

      A tactical roadmap approach to VMware ELA and the cloud will ensure long-term success and savings.

      Info-Tech Insight

      VMware customers almost always have incomplete price information from which to effectively negotiate a “best in class” ELA.

      Your challenge

      VMware's dominant position in the virtualization space can create uncertainty to your options in the long term driven by:

      • VMware’s dominant market position and ownership of the virtualization market, which is forcing customers to focus on managing capacity demand to ensure a positive ROI on every license.
      • The trend toward a hybrid cloud for many organizations, especially those considering using VMware in public clouds, resulting in confusion regarding licensing and compliance scenarios.

      ELAs and EPPs are generally the only way to get a deep discount from VMware.

      The image contains a pie chart to demonstrate that 85% have answered yes to being audited by VMware for software license compliance.

      Common obstacles

      There are several hurdles that are presented when considering a VMware ELA.

      • A lack of understanding around VMware’s licensing models, bundles, and negotiation tactics makes it difficult to negotiate from a position of strength.
      • Unfriendly commercial practices combined with hyperlink-ridden agreements have left organizations vulnerable to audits and large shortfall payments.
      • ELAs come in several purchasing models and do not contain the EULA or various VMware product guide documentation that govern license usage rules and can change monthly.

      Competition is a key driver of price

      The image contains a screenshot of a bar graph to demonstrate virtualization market share % 2022.

      Source: Datanyze

      Master the Secrets of VMware Licensing to Maximize your Investment

      The image contains a screenshot of the Thought model on Master the secrets of VMware Licensing to Maximize your Investment.

      Info-Tech’s methodology for Master the Secrets of VMware Licensing to Maximize Your Investment

      1. Manage Your VMware Agreements

      2. Transition to the VMware Cloud

      Phase Steps

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      1.5 Understand SnS renewal management

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Manage SnS and cloud subscriptions

      Phase Outcomes

      Understanding of your licensing requirements and what agreement option best fits your needs for now and the future.

      Knowledge of VMware’s sales model and how to negotiate the best deal.

      Knowledge of the evolving cloud subscription model and how to plan your cloud migration and transition to the new licensing.

      Insight summary

      Overarching insight

      With the introduction of the subscription licensing model, VMware licensing and renewals are becoming more complex and require a deeper understanding of the license program options to best manage renewals and cloud deployments as well as to maximize legacy ROI.

      Phase 1 insight

      Contracts are typically overweighted with a discount at the expense of contractual T&Cs that can restrict license usage and expose you to unpleasant financial surprises and compliance risk.

      Phase 1 insight

      VMware has a large lead in being first to market and it realizes running dual virtualization stacks is complex, unwieldy, and expensive. To further complicate the issues, most skill sets in the industry are skewed toward VMware.

      Phase 2 insight

      VMware has purposefully reduced a focus on the actual license terms and conditions; most customers focus on the transactional purchase or the ELA document, but the rules governing usage are on a website and can be changed by VMware regularly.

      Tactical insight

      Beware of out-year pricing and ELA optimization reviews that may provide undesirable surprises and more spend than was planned.

      Tactical insight

      Negotiate desired terms and conditions at the start of the agreement, and prioritize which use rights may be more important than an additional discount percentage.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      VMware ELA Analysis Tool

      VMware ELA RFQ Template Tool

      VPP Transaction Purchase Tool

      VMware ELA Analysis Tool

      Use this tool as a template for an RFQ with VMware ELA contracts.

      Use this tool to analyze cost breakdown and discount based on your volume purchasing program (VPP) level.

      The image contains screenshots of the VMware ELA Analysis Tool. The image contains a screenshot of the VMware ELA RFQ template tool. The image contains a screenshot of the VPP Transaction Purchase Tool.

      Key deliverable:

      VMware Business as Usual SnS Renewal Only Tool

      Use this tool to analyze discounts from a multi-year agreement vs. prepay. See how you can get the best discount.

      The image contains screenshots of the VMware Business as Usual SnS Renewal Only Tool.

      Blueprint Objectives

      The aim of this blueprint is to provide a foundational understanding of VMware’s licensing agreement and best practices to manage them.

      Why VMware

      What to Know

      The Future

      VMware is the leader in OS virtualization, however, this is a saturated market, which is being pressured by public and hybrid cloud as a competitive force taking market share.

      There are few viable alternatives to VMware for virtualization due to vendor lock-in of existing IT infrastructure footprint. It is too difficult and cost prohibitive to make a shift away from VMware even when alternative solutions are available.

      ELAs are the preferred method of contracting as it sets the stage for a land-and-expand product strategy; once locked into the ELA model, customers must examine VMware alternatives with preference or risk having Support and Subscription Services (SnS) re-priced at retail.

      VMware does not provide a great deal of publicly available information regarding its enterprise license agreement (ELA) options, leaving a knowledge gap that allows the sales team to steer the customer.

      VMware is taking countermeasures against increasing competition.

      Recent contract terms changed to eliminate perpetual caps on SnS renewals; they are now tied to a single year of discounted SnS, then they go to list price.

      Migration of list pricing to a website versus contract, where pricing can now be changed, reducing discount percentage effectiveness.

      Increased audits of customers, especially those electing to not renew an ELA.


      Examining VMware’s vendor profile

      Turbonomics conducted a vendor profile on major vendors, focusing on licensing and compliance. It illustrated the following results:

      The image contains a pie graph to demonstrate that the majority of companies say yes to using license enterprise software from VMware.

      The image contains a bar graph to demonstrate what license products organizations use of VMware products.

      Source: Turbonomics
      N-sample size

      Case Study

      The image contains a logo for ADP.

      INDUSTRY: Finance

      SOURCE: VMware.com

      “We’ll have network engineers, storage engineers, computer engineers, database engineers, and systems engineers all working together as one intact team developing and delivering goals on specific outcomes.” – Vipul Nagrath, CIO, ADP

      Improving developer capital management

      Constant innovation helped ADP keep ahead of customer needs in the human resources space, but it also brought constant changes to the IT environment. Internally, the company found it was spending too long working on delivering the required infrastructure and system updates. IT staff wanted to improve velocity for refreshes to better match the needs of ADP developers and encourage continued development innovation.

      Business needs

      • Improve turnaround time on infrastructure refreshes to better meet developer roadmaps.
      • Establish an IT culture that works at the global scale of ADP and empowers individual team members.
      • Streamline approach toward infrastructure resource delivery to reduce need for manual management.

      Impact

      • Infrastructure resource delivery reduced from 100+ days to minutes, improving ADP developer efficiency.
      • VMware Cloud™ on AWS establishes seamless private and public cloud workflows, fostering agility and innovation.
      • Automating IT management redirects resources to R&D, boosting time to market for new services.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Discuss scope requirements, objectives, and your specific challenges.

      Call #2: Assess the current state.

      Determine licensing position.

      Call #3: Complete a deployment count, needs analysis, and internal audit.

      Call #4: Review findings with analyst:

      • Review licensing options.
      • Review licensing rules.
      • Review contract option types.

      Call #5: Select licensing option. Document forecasted costs and benefits.

      Call #6: Review final contract:

      • Discuss negotiation points.
      • Plan a roadmap for SAM.

      Call #7: Negotiate final contract. Evaluate and develop a roadmap for SAM.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 2 to 6 calls over the course of 1 to 2 months.

      Phase # 1

      Manage Your VMware Agreements

      Phase 1

      Phase 2

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Discuss the VMware sales approach

      2.4 Manage SnS and cloud subscriptions

      This phase will walk you through the following activities:

      • Understanding the VMware licensing model
      • Understanding the license agreement options
      • Understanding the VMware sales approach

      This phase will take you thorough:

      • The new VMware subscription movement to the cloud
      • How to prepare and migrate
      • Manage your subscriptions efficiently

      1.1 Establish licensing requirements

      VMware has greatly improved the features of vSphere over time.

      vSphere Main Editions Overview

      • vSphere Standard – Provides the basic features for server consolidation. A support and subscription contract (SnS) is mandatory when purchasing the vSphere Standard.
      • vSphere Enterprise Plus – Provides the full range of vSphere features. A support and subscription contract (SnS) is mandatory when purchasing the Enterprise Plus editions.
      • vSphere Essentials kit – The Essentials kit is an all-in-one solution for small environments with up to three hosts (2 CPUs on each host). Support is optional when purchasing the Essentials kit and is available on a per-incident basis.
      • vSphere Essentials Plus kit – This is similar to the Essentials kit and provides additional features such as vSphere vMotion, vSphere HA, and vSphere replication. A support and subscription contract (SnS) is sold separately, and a minimum of one year of SnS is required.

      Review vSphere Edition Features

      The image contains a screenshot to review the vSphere Edition Features.

      Download the vSphere Edition 7 Features List

      1.2 Evaluate licensing options

      VMware agreement types

      Review purchase options to align with your requirements.

      Transactional VPP EPP ELA

      Transactional

      Entry-level volume license purchasing program

      Mid-level purchasing program

      Highest-level purchasing program

      • Purchasing in this model is not recommended for business purposes unless very infrequent and low quantities.
      • 250 points minimum
      • Four tiers of discounts
      • Rolling eight-quarter points accumulation period
      • Discounts on license only

      Deal size of initial purchase typically is:

      • US$250K MSRP License + SnS (2,500 tokens)
      • Exceptions do exist with purchase volume

      Minimum deal size of top-up purchase:

      • US$50K MSRP License + SnS (500 tokens)
      • Initial purchase determines token level
      • Three-year term

      Minimum deal size of initial purchase:

      • US$150K-$250K
      • Discounted licenses and SnS through term of contract
      • Single volume license key
      • No final true-up
      • Global deployment rights and consolidation of multiple agreements

      1.2.1 The Volume Purchasing Program (VPP)

      This is the entry-level purchasing program aimed at small/mid-sized organizations.

      How the program works

      • The threshold to be able to purchase from the VPP program is 250 points minimum, equivalent to $25,000.
      • Discounts attained can only be applied to license purchases. They do not apply to service and support/renewals. Discounts range from 4% to 12%.
      • For the large majority of products 1 VPP point = ~$100.
        • Point values will be the same globally.
        • Point ratios may vary over time as SKUs are changed.
        • Points are valid for two years.

      Benefits

      • Budget predictability for two years.
      • Simple license purchase process.
      • Receive points on qualifying purchases that accumulate over a rolling eight-quarter period.
      • Online portal for tracking purchases and eligible discounts.
      • Global program where affiliates can purchase from existing contract.

      VPP Point & Discount Table

      Level

      Point Range

      Discount

      1

      250-599

      4%

      2

      600-999

      6%

      3

      1,000-1,749

      9%

      4

      1,750+

      12%

      Source: VMware Volume Purchasing Program

      1.2.2 Activity VPP Transactional Purchase Tool

      1-3 hours

      Instructions:

      1. Use the tool to analyze the cost breakdown and discount based on your Volume Purchasing Program level.
      2. On tab 1, Enter SnS install base renewal units and or new license details.
      3. Review tab 2 for Purchase summary.

      The image contains a screenshot of the VPP Transactional Purchase Tool.

      Input Output
      • SnS renewal details
      • New license requirements and pricing
      • Transaction purchase summary
      • Estimated VPP purchase level
      Materials Participants
      • Current VMware purchase orders
      • Any SnS renewal requirements
      • Transaction Purchase Tool
      • Procurement
      • Vendor Management
      • Licensing Admin

      Download the VPP Transactional Purchase Tool

      1.3 Evaluate agreement options

      Introduction to EPP and ELA

      What to know when using a token/credit-based agreement.

      Token/credit-based agreements carry high risk as customers are purchasing a set number of tokens/credits to be redeemed during the ELA term for licenses.

      • Tokens/credits that are not used during the ELA term expire and become worthless.
      • By default in most agreements (negotiation dependent), tokens/credits are tied to pricing maintained by VMware on its website that is subject to change (increase usually), resulting in a reduced value for the tokens/credits.
        • Therefore, it is necessary to negotiate to have current list prices for all products/versions included in the ELA to prevent price increases while in the current ELA term.
      • Token-based agreements may come with a lower overall discount level as VMware is granting more flexibility in terms of the wider product selection offered, vendor cost of overhead to manage the redemption program, currency exchange risks, and more complex revenue recognition headaches.

      1.3.1 The Enterprise Purchasing Program (EPP)

      This is aimed at mid-tier customers looking for flexibility with deeper discounting.

      How the program works

      • Token-based program in which tokens are redeemed for licenses and/or SnS.
        • Tokens can be added at any time to active fund.
        • Token usage is automatically tracked and reported.
      • Minimum order of 2,500 tokens, equivalent to $250,000 (1 token=$100).
        • Exceptions have been made, allowing for lower minimum spends.
      • Restricted to specific regions, not a global agreement.
      • Self-service portal for access to license keys and support entitlements.
      • Deeper discounting than the VMware Volume Purchase Program.
      • EPP initial purchase gets VPP L4 for four years.

      Benefits

      • Able to mix and match VMware products, manage licenses, and adjust deployment strategy.
      • Prices are protected for term of the EPP agreement.
      • Number of tokens needed to obtain a product or SnS are negotiated at the start of the contract and fixed for the term.
      • SnS is co-termed to the EPP term.
      • Ability to purchase new products that become available at a future date and are listed on the EPP Eligibility Matrix.

      EPP Level & Point Table

      Level

      Point Range

      7

      2,500-3,499

      8

      3,500-4,499

      9

      4,500-5,999

      10

      6,000+

      Source: VMware Volume Purchasing Program

      1.3.2 The ELA is aimed at large global organizations, offering the deepest discounts with operational benefits and flexibility

      What is an ELA?

      • The ELA agreement provides the best vehicle for global enterprises to obtain maximum discounts and price-hold protection for a set period of time. Discounts and price holds are removed once an ELA has expired.
      • The ELA minimum spend previously was $500,000. Purchase volume now generally starts at $250K total spend with exceptions and, depending on VMware, it may be possible to attain for $150K in net-new license spend.

      Key things to know

      • Customers pay up front for license and SnS rights, but depending on the deployment plans, the value of the licenses is not realized and/or recognized for up to two years after point of purchase.
      • License and SnS is paid up front for a three-year period in most ELAs, although a one- or two-year term can be negotiated.
      • Licenses not deployed in year one should be discounted in value and drive a re-evaluation of the ELA ROI, as even heavily discounted licenses that are not used until year three may not be such a great deal in retrospect.
        • Use a time value of money calculation to arrive at a realistic ROI.
        • Partner with Finance and Accounting to ensure the ROI also clears any Internal Hurdle Rate (IHR).
        • Share and strategically position your IHR with VMware and resellers to ensure they understand the minimum value an ELA deal must bring to the table.
      • Organizational changes, such as merger, acquisition, and divestiture (MAD) activities, may result in the customer paying for license rights that can no longer be used and/or require a renegotiated ELA.

      Info-Tech Insight

      If a legacy ELA exists that has “deploy or lose” language, engage VMware to recapture any lost license rights as VMware has changed this language effective with 2016 agreements and there is an “appeals” process for affected customers.

      1.3.3 Select the best ELA variant to match your specific demand profile and financial needs

      The advantages of an ELA are:

      • Maximum discount level + price protection
      • SnS discounted at % of net license fee
      • Sole option for global use territory rights

      General disadvantages are:

      • Term lock-in with SnS for three years
      • Pay up front and if defer usage, ROI drops
      • Territory rights priced at a premium versus domestic use rights

      Type of ELAs

      ELA Type

      Description

      Pros and Cons

      Capped (max quantities)

      Used to purchase a specific quantity and type of license.

      Pro – Clarity on what will be purchased

      Pro – Lower risk of over licensing

      Con – Requires accurate forecasting

      All you can eat or unlimited

      Used to purchase access to specified products that can be deployed in unlimited quantities during the ELA term.

      Pro – Acquire large quantity of licenses

      Pro – Accurate forecasting not critical

      Con – Deployment can easily exceed forecast, leading to high renewal costs

      Burn-down

      A form of capped ELA purchase that uses prepaid tokens that can be used more flexibly to acquire a variety of licenses or services. This can include the hybrid purchasing program (HPP) credits. However, the percentage redeemable for VMware subscription services may be limited to 10% of the MSRP value of the HPP credit.

      Pro – Accurate demand forecast not critical

      Pro – Can be used for products and services

      Con – Unused tokens or credits are forfeited

      True-up

      Allows for additional purchases during the ELA term on a determined schedule based on the established ELA pricing.

      Pro – Consumption payments matched after initial purchase

      Pro – Accurate demand forecast not critical

      Con – Potentially requires transaction throughout term

      1.4 Purchase and manage licenses

      Negotiating ELA terms and conditions

      Editable copies of VMware’s license and governance documentation are a requirement to initiate the dialogue and negotiation process over T&Cs.

      VMware’s licensing is complex and although documentation is publicly available, it is often hidden on VMware’s website.

      Many VMware customers often overlook reviewing the license T&Cs, leaving them open to compliance risks.

      It is imperative for customers to understand:

      • Product definition for licensing of each acquired product
      • Products included by bundle
      • Use restrictions:
        • The VMware Product Guide, which includes information about:
          • ELA Order Forms, Amendments, Exhibits, EULA, Support T&Cs, and other policies that add dozens of pages to a contractual agreement.
          • All of these documents are web based and can change monthly; URL links in the contract do not take the user to the actual document but a landing page from which customers must find the applicable documents.
        • Obtain copies of ALL current documents at the time of your order and keep as a reference in the CLM and SAM systems.

      Build in time to obtain, review, and negotiate these documents (easily weeks to months).

      1.4.1 Negotiating ELA terms and conditions specifics

      License and Deployment

      • Review perpetual use rights for all licenses purchased under the ELA (exception being subscription services).
      • Carefully scrutinize contract language for clearly defined deployment rights.
        • Some agreements contain language that terminates the use rights for licenses not deployed by the end of the ELA term.
      • While older contracts would frequently contain clearly defined token values and product prices for the ELA term, VMware has moved away from this process and now refers to URL links for current MSRP pricing.

      Use Rights

      • The customer’s legal entities and territories listed in the contract are hard limits on the license usage via the VMware Product Guide definitions. Global use rights are not a standard license grant with VMware license agreement by default. Global rights are usually tied to an ELA.
      • VMware audits most aggressively against violations of territory use rights and will use the non-compliance events to resolve the issue via a commercial transaction.
        • Negotiate for assignment rights with no strings attached in terms of fees or multi-party consent by future affiliates or successors to a surviving entity.
      • Extraordinary Corporate Transaction clause: VMware’s standard language prevents customers from using licenses within the ELA for any third party that becomes part of customer’s business by way of acquisition, merger, consolidation, change of control, reorganization, or other similar transaction.
        • Request VMware to drop this language.
      • Include any required language pertaining to MAD events as default language will not allow for transfer or assignment of license rights.

      Checklist of necessary information to negotiate the best deal

      Product details that go beyond the sales pitch

      • Product family
      • Unique product SKU for license renewal
      • Part description
      • Current regional or global price list
      • One and three-year proposal for SnS renewals including new license and SnS detail
      • SnS term dates
      • Discount or offered prices for all line items (global pricing is generally ~20% higher than US pricing)

      Different support levels (e.g. basic, enterprise, per incident)

      • Standard pricing:
        • Basic Support = 21% of current list price (12x5)
        • Production Support = 25% of current list price (24x7 for severity 1 issues) – defined in VMware Support and Subscription Services T&Cs; non-severity 1 issues are 12x5

      Details to ensure the product being purchased matches the business needs

      • Realizing after the fact the product is insufficient with respect to functional requirements or that extra spend is required can be frustrating and extend expected timelines

      SnS renewals pricing is based on the (1) year SnS list price

      • This can be bundled for a multi-year discounted SnS rate (can result in 12%+ under VPP)

      Governing agreements, VPP program details

      • Have a printed copy of documents that are URL links, which VMware can change, allowing for surprises or unexpected changes in rules

      1.4.2 Activity VMware ELA Analysis Tool

      2-4 hours

      Instructions:

      1. As a group, review the various RFQ responses. Identify top three proposals and start to enter proposal details into the VPP Prepay or ELA tabs of the analysis tool.
      2. Review savings in the ELA Offer Analysis tab.

      The image contains screenshots of the VMware ELA Analysis Tool.

      Input Output
      • RFQ requirements data
      • RFQ response data
      • Analysis of ELA proposals
      • ELA savings analysis
      Materials Participants
      • RFQ response documents
      • ELA Analysis Tool
      • IT Leadership
      • Procurement
      • Vendor Management

      Download the VMware ELA Analysis Tool

      1.4.3 Negotiating ELA terms and conditions specifics: pricing, renewal, and exit

      VMware does not offer price protection on future license consumption by default.

      Securing “out years” pricing for SnS or the cost of SnS is critical or it will default to a set percentage (25%) of MSRP, removing the ELA discount.

      Typically, the out year is one year; maximum is two years.

      Negotiate the “go forward” SnS pricing post-ELA term as part of the ELA negotiations when you have some leverage.

      Default after (1) out year is to rise to 25% of current MSRP versus as low as 20% of net license price within the ELA.

      Carefully incorporate the desired installed-base licenses that were acquired pre-ELA into the agreement, but ensure unwanted licenses are removed.

      Ancillary but binding support policies, online terms and conditions, and other hyperlinked documentation should be negotiated and incorporated as part of the agreement whenever possible.

      1.4.4 Find the best reseller partner

      Seek out a qualified VMware partner that will work with you and with your interest as a priority:

      1. Resellers, at minimum, should have achieved an enterprise-level rating, as these partners can offer the deepest discounts and have more clout with VMware.
      2. Select your reseller prior to engaging in any RFX acquisition steps. Verify they are enterprise level or higher AND secure their written commitment to maximum pass-through of the discounting provided to them by VMware.
      3. Document and prioritize key T&Cs for your ELA and submit to your sales team along with a requirement and timeline for their formal response. Essentially, this escalates outside of the VMware process and disrupts the status quo. Ideally this will occur in advance of being presented a contract by VMware and be pre-emptive in nature.
      4. If applicable and of benefit or a high priority, seek out a reseller that is willing to finance the VMware upfront payment cost at a low or no interest rate.
      5. It will be important to have ELA-level deals escalated to higher levels of authority to obtain “best in class” discount levels, above and beyond those prescribed in the VMware sales playbook.
      6. VMware’s standard process is to “route” customers through a pre-defined channel and “deal desk” process. Preferred pricing of up to an additional 10% discount is reserved for the first reseller that registers the deal with VMware, with larger discounts reserved for the Enterprise and Premium partners. Additional discounts can be earned if the deal closes within specified time periods (First Deal Registration).

      1.4.5 Activity VMware ELA RFQ Template

      1-3 hours

      Use this tool for as a template for an RFQ with VMware ELA contracts.

      1. For SnS renewals that contain no new licenses, state that the requirement for award consideration is the provisioning of all details for each itemized SnS renewal product code corresponding to all the licenses of your installed base. The details for the renewals are to be placed in Section 1 of the template.
      2. SnS Renewal Options: Info-Tech recommends that you ask for one- and three-year SnS renewal proposals, assuming these terms are realistic for your business requirements. Then compare your SnS BAU costs for these two options against ELA offers to determine the best choice for your renewal.

      The image contains a screenshot of the VMware ELA RFQ Template.

      Input Output
      • Renewing SnS data
      • Agreement type options
      • Detailed list of required licenses
      • Summary list of SnS requirements
      Materials Participants
      • RFQ Template
      • SnS renewal summary
      • New license/subscription details
      • IT Leadership
      • Vendor Management
      • Procurement

      Download the VMware ELA RFQ Template

      1.4.6 Consider your path forward

      Consider your route forward as contract commitments, license compliance, and terms and conditions differ in structure to perpetual models previously used.

      • Are you able to accurately discover VMware licensing within your environment?
      • Is licensing managed for compliance? Are internal audits conducted so you have accurate results?
      • Have the product use rights been examined for terms and conditions such as geographic rights? Some T&Cs may change over time due to hyperlinked references within commercial documents.
      • How are Oracle and SQL being used within your VMware environment? This may affect license compliance with Oracle and Microsoft in virtualized environments.
      • Prepare for the Subscription model; it’s here now and will be the lead discussion with all VMware reps going forward.

      Shift to Subscription

      1. With the $64bn takeover by Broadcom, there will be a significant shift and pressure to the subscription model.
      2. Broadcom has significant growth targets for its VMware acquisition that can only be achieved through a strong press to a SaaS model.

      Info-Tech Insight

      VMware has a license cost calculator and additional licensing documents that can be used to help determine what spend should be.

      Phase # 2

      Transition to the VMware Cloud

      Phase 1

      Phase 2

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Discuss the VMware sales approach

      2.4 Manage SnS and cloud subscriptions

      This phase will walk you through the following activities:

      • Understand the VMware licensing model
      • Understand the license agreement options
      • Understand the VMware sales approach

      This phase will take you thorough:

      • The new VMware subscription movement to the cloud
      • How to prepare and migrate
      • Manage your subscriptions efficiently

      2.1 Understand the VMware subscription model

      VMware Cloud Universal

      • VMware Cloud Universal unifies compute, network, and storage capabilities across infrastructures, management, and applications.
      • Take advantage of financial and cloud management flexibility by combining on-premises and SaaS capabilities for automation, operations, log analytics, and network visibility across your infrastructure.
      • Capitalize on VMware knowledge by integrating proven migration methods and plans across your transformation journey such as consumption strategies, business outcome workshops, and more.
      • Determine your eligibility to earn a one-time discount with this exclusive benefit designed to offset the value of your current unamortized VMware on-premises license investments and then reallocate toward your multi-cloud initiatives.

      2.2 Migrate workloads and licenses to the cloud

      There are several cloud migration options and solutions to consider.

      • VMware Cloud offers solutions that can provide a low-cost path to the cloud that will help accelerate modernization.
      • There are also many third-party solution providers who can be engaged to migrate workloads and other infrastructure to VMware Cloud and into other public cloud providers.
      • VMware Cloud can be deployed on many IaaS providers such as AWS, Azure, Google, Dell, and IBM.

      VMware Cloud Assist

      1. Leverage all available transition funding opportunities and any IaaS migration incentives from VMware.
      2. Learn and understand the value and capabilities of VMware vRealize Cloud Universal to help you transition and manage hybrid infrastructure.

      2.2.1 Manage your VMware cloud subscriptions

      Use VMware vRealize to manage private, public, and local environments.

      Combine SaaS and on-premises capabilities for automation, operations, log analytics, network visibility, security, and compliance into one license.

      The image contains a screenshot of a diagram to demonstrate VMware cloud subscriptions.

      2.3 The VMware sales approach

      Understand the pitch before entering the discussion

      1. VMware will present a PowerPoint presentation proposal comparing a Business-as-Usual (BAU) scenario versus the ELA model.
      2. Critical factors to consider if considering the proposed ELA are growth rate projections, deployment schedule, cost of non-ELA products/options, shelf-ware, and non-ELA discounts (e.g. VPP, multi-year, or pre-paid).
      3. Involving VMware’s direct account team along with your reseller in the negotiations can be beneficial. Keep in mind that VMware ultimately decides on the final price in terms of the discount that is passed through. Ensure you have a clear line of sight into how pricing is determined.
      4. Explore reseller incentives and promotional programs that may provide for deeper than normal discount opportunities.

      INFO-TECH TIP: Create your own assumptions as inputs into the BAU model and then evaluate the ELA value proposition instead of depending on VMware’s model.

      2.4 Manage SnS and cloud subscriptions

      The new subscription model is making SnS renewal more complex.

      • Start renewal planning four to six months prior to anniversary.
      • Work closely with your reseller on your SnS renewal options.
      • Request “as is” versus subscription renewal proposal from reseller or VMware with a “savings” component.
      • Consider and review multi-year versus annual renewal; savings will differ.
      • For the Subscription transition renewal model, ensure that credits for legacy licensing is provided.
      • Negotiate cloud transition investments and incentives from VMware.

      What information to collect and how to analyze it

      • Negotiating toward preferred terms on SnS is critical, more so than when new license purchases are made, as approximately 75-80% of server virtualization are at x86 workloads, where maintenance revenue is a larger source of revenue for VMware than new license sales.
      • All relevant license and SnS details must be obtained from VMware to include Product Family, Part Description, Product Code (SKU), Regional/Global List Price, SnS Term Dates, and Discount Price for all new licenses.
      • VMware has all costs tied to the US dollar; you must calculate currency conversion into ROI models as VMware does not adjust token values of products across geographies or currency of purchase. The token to dollar value by product SKU is locked for the three-year term. This translates into a variable cost model depending on how local currency fluctuates against the US dollar; time the initial purchase to take this into consideration, if applicable.
      • Products purchased based on MSRP price with each token contains a value of US$100. Under the Hybrid Purchasing Program (HPP) credit values and associated buying power will fluctuate over the term as VMware reserves the right to adjust current list prices. Consider locking in a set product list and pricing versus HPP.
      • Take a structured approach to discover true discounts via the use of a tailored RFQ template and options model to compare and contrast VMware ELA proposals.

      Use Info-Tech Research Group’s customized RFQ template to discover true discount levels and model various purchase options for VMware ELA proposals.

      The image contains a screenshot of the VMware RFQ Template Tool.

      Summary of accomplishment

      Knowledge Gained

      • The key pieces of licensing information that should be gathered about the current state of your own organization.
      • An in-depth understanding of the required licenses across all of your products.
      • Clear methodology for selecting the most effective contract type.
      • Development of measurable, relevant metrics to help track future project success and identify areas of strength and weakness within your licensing program.

      Processes Optimized

      • Senior leaders in IT now have a clear understanding of the importance of licensing in relation to business objectives.
      • Understanding of the various licensing considerations that need to be made.
      • Contract negotiation.

      Related Info-Tech Research

      Prepare for Negotiations More Effectively

      • IT budgets are increasing, but many CIOs feel their budgets are inadequate to accomplish what is being asked of them.
      • Eighty percent of organizations don’t have a mature, repeatable, scalable negotiation process.
      • Training dollars on negotiations are often wasted or ineffective.

      Price Benchmarking & Negotiation

      You need to achieve an objective assessment of vendor pricing in your IT contracts, but you have limited knowledge about:

      • Current price benchmarking on the vendor.
      • Pricing and negotiation intelligence.
      • How to secure a market-competitive price.
      • Vendor pricing tiers, models, and negotiation tactics.

      VMware vRealize Cloud Management

      VMware vCloud Suite is an integrated offering that brings together VMware’s industry-leading vSphere hypervisor and VMware vRealize Suite multi-vendor hybrid cloud management platform. VMware’s new portable licensing units allow vCloud Suite to build and manage both vSphere-based private clouds and multi-vendor hybrid clouds.

      Bibliography

      Barrett, Alex. “vSphere and vCenter licensing and pricing explained -- a VMware license guide.” TechTarget, July 2010. Accessed 7 May 2018.
      Bateman, Kayleigh. “VMware licensing, pricing and features mini guide.” Computer Weekly, May 2011. Accessed 7 May 2018.
      Blaisdell, Rick. “What Are The Common Business Challenges The VMware Sector Faces At This Point In Time?” CIO Review, n.d. Accessed 7 May 2018.
      COMPAREX. “VMware Licensing Program.” COMPAREX, n.d. Accessed 7 May 2018.
      Couesbot, Erwann. “Using VMware? Oracle customers hate this licensing pitfall.” UpperEdge, 17 October 2016. Accessed 7 May 2018.
      Crayon. “VMware Licensing Programs.” Crayon, n.d. Accessed 7 May 2018.
      Datanyze." Virtualization Software Market Share.” Datanyze, n.d. Web.
      Demers, Tom. “Top 18 Tips & Quotes on the Challenges & Future of VMware Licensing.” ProfitBricks, 1 September 2015. Accessed 7 May 2018.
      Fenech, J. “A quick look at VMware vSphere Editions and Licensing.” VMware Hub by Altaro, 17 May 2017. Accessed 7 May 2018.
      Flexera. “Challenges of VMware Licensing.” Flexera, n.d. Accessed 5 February 2018.
      Fraser, Paris. “A Guide for VMware Licensing.” Sovereign, 11 October 2016. Accessed 7 May 2018.
      Haag, Michael. “IDC Data Shows vSAN is the Largest Share of Total HCI Spending.” VMware Blogs, 1 December 2017. Accessed 7 May 2018.
      Kealy, Victoria. “VMware Licensing Quick Guide 2015.” The ITAM Review, 17 December 2015. Accessed 7 May 2018.
      Kirsch, Brian. “A VMware licensing guide to expanding your environment.” TechTarget, August 2017. Accessed 7 May 2018.
      Kirupananthan, Arun. “5 reasons to get VMware licensing right.” Softchoice, 16 April 2018. Accessed 7 May 2018.
      Knorr, Eric. “VMware on AWS: A one-way ticket to the cloud.” InfoWorld, 17 October 2016. Accessed 7 May 2018
      Leipzig. “Help, an audit! License audits by VMware. Are you ready?” COMPAREX Group, 2 May 2016. Accessed 7 May 2018.
      Mackie, Kurt. “VMware Rips Microsoft for Azure “Bare Metal” Migration Solution.” Redmond Magazine, 27 November 2017. Accessed 7 May 2018.
      Micromail. “VMware vSphere Software Licensing.” Micromail, n.d. Accessed 7 May 2018.
      Microsoft Corportation. “Migrating VMware to Microsoft Azure” Microsoft Azure, November 2017. Accessed 7 May 2018.
      Peter. “Server Virtualization and OS Trends.” Spiceworks, 30 August 2016. Accessed 7 May 2018.
      Rich. “VMware running on Azure.” The ITAM Review, 28 November 2017. Accessed 7 May 2018.
      Robb, Drew. “Everything you need to know about VMware’s licensing shake up.” Softchoice, 4 March 2016. Accessed 7 May 2018.
      Rose, Brendan. “How to determine which VMware licensing option is best.” Softchoice, 28 July 2015. Accessed 7 May 2018.
      Scholten, Eric. “New VMware licensing explained.” VMGuru, 12 July 2011. Accessed 7 May 2018.
      Sharwood, Simon. “Microsoft to run VMware on Azure, on bare metal. Repeat. Microsoft to run VMware on Azure.” The Register, 22 November 2017. Accessed 7 May 2018.
      Siebert, Eric. “Top 7 VMware Management Challenges.” Veeam, n.d. Web.
      Smith, Greg. “Will The Real HCI Market Leader Please Stand Up?” Nutanix, 29 September 2017. Accessed 7 May 2018.
      Spithoven, Richard. “Licensing Oracle software in VMware vCenter 6.0.” LinkedIn, 2 May 2016. Accessed 7 May 2018.
      VMTurbo, Inc. “Licensing, Compliance & Audits in the Cloud Era.” Turbonomics, November 2015. Web.
      VMware. “Aug 1st – Dec 31st 2016 Solution Provider Program Requirements & Incentives & Rewards.” VMware, n.d. Web.
      VMware. “Global Support and Subscription Services “SnS” Renewals Policy.” VMware, n.d. Web.
      VMware. “Support Policies.” VMware, n.d. Accessed 7 May 2018.
      VMware. “VMware Cloud Community.” VMware Cloud, n.d. Accessed 7 May 2018.
      VMware. “VMware Cloud on AWS” VMware Cloud, n.d. Accessed 7 May 2018.
      VMware. “VMware Enterprise Purchasing Program.” VMware, 2013. Web.
      VMware. “VMware Product Guide.” VMware, May 2018. Web.
      VMware. “VMware Volume Purchasing Program.” VMware, April 2019. Web.
      VMware. "VMware Case Studies." VMware, n.d. Web.
      Wiens, Rob. “VMware Enterprise Licensing – What You Need To Know. House of Brick, 14 April 2017. Accessed 7 May 2018

      The ESG Imperative and Its Impact on Organizations

      • Buy Link or Shortcode: {j2store}196|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Global regulatory climate disclosure requirements are still evolving and are not consistent.
      • Sustainability is becoming a corporate imperative, but IT’s role is not fully clear.
      • The environmental, social, and governance (ESG) data challenge is large and continually expanding in scope.
      • Collecting the necessary data and managing ethical issues across supply chains is a daunting task.
      • Communicating long-term value is difficult when customer and employee expectations are shifting.

      Our Advice

      Critical Insight

      • An organization's approach to ESG cannot be static or tactical. It is a moving landscape that requires a flexible, holistic approach across the organization. Cross-functional coordination is essential in order to be ready to respond to changing conditions.
      • Even though the ESG data requirements are large and continually expanding in scope, many organizations have well-established data frameworks and governance practices in place to meet regulatory obligations such as Sarbanes–Oxley that should used as a starting point.

      Impact and Result

      • Organizations will have greater success if they focus their ESG program efforts on the ESG factors that will have a material impact on their company performance and their key stakeholders.
      • Continually evaluating the evolving ESG landscape and its impact on key stakeholders will enable organizations to react quickly to changing conditions.
      • A successful ESG program requires a collaborative and integrated approach across key business stakeholders.
      • Delivering high-quality metrics and performance indicators requires a flexible and digital data approach, where possible, to enable data interoperability.

      The ESG Imperative and Its Impact on Organizations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The ESG Imperative and Its Impact on Organizations Deck – Learn why sustainability is becoming a key measurement of corporate performance and how to set your organization up for success.

      Understand the foundational components and drivers of the broader concept of sustainability: environmental, social, and governance (ESG) and IT’s roles within an organization’s ESG program. Learn about the functional business areas involved, the roles they play and how they interact with each other to drive program success.

      • The ESG Imperative and Its Impact on Organizations Storyboard

      Infographic

      Further reading

      The ESG Imperative and Its Impact on Organizations

      Design to enable an active response to changing conditions.

      Analyst Perspective

      Environmental, social, and governance (ESG) is a corporate imperative that is tied to long-term value creation. An organization's social license to operate and future corporate performance depends on managing ESG factors well.

      Central to an ESG program is having a good understanding of the ESG factors that may have a material impact on enterprise value and key internal and external stakeholders. A comprehensive ESG strategy supported by strong governance and risk management is also essential to success.

      Capturing relevant data and applying it within risk models, metrics, and internal and external reports is necessary for sharing your ESG story and measuring your progress toward meeting ESG commitments. Consequently, the data challenges have received a lot of attention, and IT leaders have a role to play as strategic partner and enabler to help address these challenges. However, ESG is more than a data challenge, and IT leaders need to consider the wider implications in managing third parties, selecting tools, developing supporting IT architecture, and ensuring ethical design.

      For many organizations, the ESG program journey has just begun, and collaboration between IT and risk, procurement, and compliance will be critical in shaping program success.

      This is a picture of Donna Bales, Principal Research Director, Info-Tech Research Group

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Global regulatory climate disclosure requirements are still evolving and are not consistent.
      • Sustainability is becoming a corporate imperative, but IT's role is not fully clear.
      • The ESG data challenge is large and continually expanding in scope.
      • Collecting the necessary data and managing ethical issues across supply chains is a daunting task.
      • Communicating long-term value is difficult when customer and employee expectations are shifting.

      Common Obstacles

      • The data necessary for data-driven insights and accurate disclosure is often hampered by inaccurate and incomplete primary data.
      • Other challenges include:
        • Approaching ESG holistically and embedding it into existing governance, risk, and IT capabilities.
        • Building knowledge and adapting culture throughout all levels of the organization.
        • Monitoring stakeholder sentiment and keeping strategy aligned to expectations.

      Info-Tech's Approach

      • Use this blueprint to educate yourself on ESG factors and the broader concept of sustainability.
      • Learn about Info-Tech's ESG program approach and use it as a framework to begin your ESG program journey.
      • Identify changes that may be needed in your organizational operating model, strategy, governance, and risk management approach.
      • Discover areas of IT that may need to be prioritized and resourced.

      Info-Tech Insight

      An organization's approach to ESG cannot be static or tactical. ESG is a moving landscape that requires a flexible, holistic approach across the organization. It must become part of the way you work and enable an active response to changing conditions.

      This is an image of Info-Tech's thoughtmap for eight steps of the ESG Program Journey

      Putting ESG in context

      ESG has moved beyond the tipping point to corporate table stakes

      • In recent years, ESG issues have moved from voluntary initiatives driven by corporate responsibility teams to an enterprise-wide strategic imperative.
      • Organizations are no longer being measured by financial performance but by how they contribute to a sustainable and equitable future, such as how they support sustainable innovation through their business models and their focus on collaboration and inclusion.
      • A corporation's efforts toward sustainability is measured by three components: environmental, social, and governance.

      Sustainability

      The ability of a corporation and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.

      This is an image of the United Nation's 17 sustainable goals.

      Source: United Nations

      Putting "E," "S," and "G" in context

      Corporate sustainability depends on managing ESG factors well

      • Environmental, social, and governance are the component pieces of a sustainability framework that is used to understand and measure how an organization impacts or is affected by society as a whole.
      • Human activities, particularly fossil fuel burning since the mid twentieth century, have increased greenhouse gas concentration, resulting in observable changes to the atmosphere, ocean, cryosphere, and biosphere.
      • The E in ESG relates to the positive and negative impacts an organization may have on the environment, such as the energy it takes in and the waste it discharges.
      • The S in ESG is the most ambiguous component in the framework, as social impact relates not only to risks but also prosocial behaviour. It's the most difficult to measure but can have significant financial and reputational impact on corporations if material and poorly managed.
      • The G in ESG is foundational to the realization of S and E. It encompasses how well an organization integrates these considerations into the business and how well the organization engages with key stakeholders, receives feedback, and is transparent with its intentions.

      Common examples of ESG issues include: Environmental: Climate change, greenhouse gas emissions (CHG), deforestation, biodiversity, pollution, water, waste, extended producer responsibility, etc. Social: Customer relations, employee relations, labor, human rights, occupational health and safety, community relations, supply chains, etc. Governance: Board management practices, succession planning, compensation, diversity, equity and inclusion, regulatory compliance, corruption, fraud, data hygiene and security, etc. Source: Getting started with ESG - Sustainalytics

      Understanding the drivers behind ESG

      $30 trillion is expected to be transferred from the baby boomers to Generation Z and millennials over the next decade
      – Accenture

      Drivers

      • The rapid rise of ESG investing
      • The visibility of climate change is driving governments, society, and corporations to act and to initiate and support net zero goals.
      • A younger demographic that has strong convictions and financial influence
      • A growing trend toward mandatory climate and diversity, equity, and inclusion (DEI) disclosures required by global regulators
      • Recent emphasis by regulators on board accountability and fiduciary duty
      • Greater societal awareness of social issues and sustainability
      • A new generation of corporate leadership that is focused on sustainable innovation

      The evolving regulatory landscape

      Global regulators are mobilizing toward mandatory regulatory climate disclosure

      Canada

      • Canadian Securities Administrators (CSA) NI 51-107 Disclosure of Climate-related Matters

      Europe

      • European Commission, Sustainable Finance Disclosure Regulation (SFDR)
      • European Commission, EU Supply Chain Act
      • Germany – The German Supply Chain Act (GSCA)
      • Financial Conduct Authority UK, Proposal (DP 21/4) Sustainability Disclosure Requirements and investment labels
      • UK Modern Slavery Act, 2015

      United States

      • Securities and Exchange Commission (SEC) 33-11042– The Enhancement and Standardization of Climate-Related Disclosures for Investors
      • SEC 33-11038 Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
      • Nasdaq Board Diversity Rule (5605(f))

      New Zealand

      • New Zealand, The Financial Sector (Climate-related Disclosures and Other Matters) Amendment Act 2021

      Begin by setting your purpose

      Consider your role as a corporation in society and your impact on key stakeholders

      • The impact of a corporation can no longer be solely measured by financial impact but also its impact on social good. Corporations have become real-world actors that impact and are affected by the environment, people, and society.
      • An ESG program should start with defining your organization's purpose in terms of corporate responsibility, the role it will play, and how it will endure over time through managing adverse impacts and promoting positive impacts.
      • Corporations should look inward and outward to assess the material impact of ESG factors on their organization and key internal and external stakeholders.
      • Once stakeholders are identified, consider how the ESG factors might be perceived by delving into what matters to stakeholders and what drives their behavior.

      Understanding your stakeholder landscape is essential to achieving ESG goals

      Internal Stakeholders: Board; Management; Employees. External Stakeholders: Activists; Regulators; Customers; Lenders; Government; Investors; Stakeholders; Community; Suppliers

      Assess ESG impact

      Materiality assessments help to prioritize your ESG strategy and enable effective reporting

      • The concept of materiality as it relates to ESG is the process of gaining different perspectives on ESG issues and risks that may have significant impact (both positive and negative) on or relevance to company performance.
      • The objective of a materiality assessment is to identify material ESG issues most critical to your organization by looking a broad range of social and environmental factors. Its purpose is to narrow strategic focus and enable an organization to assess the impact of financial and non-financial risks aggregately.
      • It helps to make the case for ESG action and strategy, assess financial impact, get ahead of long-term risks, and inform communication strategies.
      • Organizations can leverage assessment tools from Sustainalytics or SASB Standards to help assess ESG risks or use guidance or benchmarking information from industry associations.

      Info-Tech Insight

      Survey key stakeholders to obtain a more holistic viewpoint of expectations and the industry landscape and gain credibility through the process.

      Use a materiality matrix to understand ESG exposure

      This is an image of a materiality matrix used to understand ESG exposure.

      Example: Beverage Company

      Follow a holistic approach

      To deliver on your purpose, sustainability must be integrated throughout the organization

      • An ESG program cannot be implemented in a silo. It must be anchored on its purpose and supported by a strong governance structure that is intertwined with other functional areas.
      • Effective governance is essential to instill trust, support sound decision making, and manage ESG.
      • Governance extends beyond shareholder rights to include many other factors, such as companies' interactions with competitors, suppliers, and governments. More transparency is sought on:
        • Corporate behavior, executive pay, and oversight of controls.
        • Board diversity, compensation, and skill set.
        • Oversight of risk management, particularly risks related to fraud, product, data, and cybersecurity

      "If ESG is the framework of non-financial risks that may have a material impact on the company's stakeholders, corporate governance is the process by which the company's directors and officers manage those risks."
      – Zurich Insurance

      A pyramid is depicted. The top of the pyramid is labeled Continual Improvement, and the following terms are inside this box. Governance: Strategy; Risk Management; Metrics & Targets. At the bottom of the pyramid is a box with right facing arrows, labeled Transparency and Disclosure. This is Informed by the TCFD Framework

      Governance and organization approach

      There is no one-size-fits-all approach

      47% of companies reported that the full board most commonly oversees climate related risks and opportunities while 20% delegate to an existing board governance committee (EY Research, 2021).

      • The organizational approach to ESG will differ across industry segments and corporations depending on material risks and their upstream and downstream value change. However, the accountability for ESG sits squarely at the CEO and board level.
      • Some organizations have taken the approach of hiring a Chief Sustainability Officer to work alongside the CEO on execution of ESG goals and stakeholder communication, while others use other members of the strategic leadership to drive the desired outcomes.
      Governance Layer Responsibilities
      Board
      • Overall accountability lies with the full board. Some responsibilities may be delegated to newly formed dedicated ESG governance committee.
      Oversight
      Executive leadership
      • Accountable for sustainability program success and will work with CEO to set ESG purpose and goals.
      Oversight and strategic direction
      Management
      • Senior management drives execution; sometimes led by a cross-functional committee.
      Execution

      Strategy alignment

      "74% of finance leaders say that investors increasingly use nonfinancial information in their decision-making."

      – "Aligning nonfinancial reporting..." EY, 2020

      • Like any journey, the ESG journey requires knowing where you are starting from and where you are heading to.
      • Once your purpose is crystalized, identify and surface gaps between where you want to go as an organization (your purpose and goals) and what you need to deliver as an organization to meet the expectations of your internal and external stakeholders (your output).
      • Using the results of the materiality assessment, weigh the risk, opportunities, and financial impact to help prioritize and determine vulnerabilities and where you might excel.
      • Finally, evaluate and make changes to areas of your business that need development to be successful (culture, accountability and board structure, ethics committee, etc.)

      Gap analysis example for delivering reporting requirements

      Organizational Goals

      • Regulatory Disclosure
        • Climate
        • DEI
        • Cyber governance
      • Performance Tracking/Annual Reporting
        • Corporate transparency on ESG performance via social, annual circular
      • Evidence-Based Business Reporting
        • Risk
        • Board
        • Suppliers

      Risk-size your ESG goals

      When integrating ESG risks, stick with a proven approach

      • Managing ESG risks is central to making sound organizational decisions regarding sustainability but also to anticipating future risks.
      • Like any new risk type, ESG risk should be interwoven into your current risk management and control framework via a risk-based approach.
      • Yet ESG presents some new risk challenges, and some risk areas may need new control processes or enhancements.
      NET NEW ENHANCEMENT
      Climate disclosure Data quality management
      Assurance specific to ESG reporting Risk sensing and assessment
      Supply chain transparency tied back to ESG Managing interconnections
      Scenario analysis
      Third-party ratings and monitoring

      Info-Tech Insight

      Integrate ESG risks early, embrace uncertainty by staying flexible, and strive for continual improvement.

      A funnel chart is depicted. The inputs to the funnel are: Strategy - Derive ESG risks from strategy, and Enterprise Risk Appetite. Inside the funnel, are the following terms: ESG; Data; Cyber. The output of the funnel is: Evidence based reporting ESG Insights & Performance metrics

      Managing supplier risks

      Suppliers are a critical input into an organization's ESG footprint

      "The typical consumer company's supply chain ... [accounts] for more than 80% of greenhouse-gas emissions and more than 90% of the impact on air, land, water, biodiversity, and geological resources."
      – McKinsey & Company, 2016

      • Although companies are accustomed to managing third parties via procurement processes, voluntary due-diligence, and contractual provisions, COVID-19 surfaced fragility across global supply chains.
      • The mismanagement of upstream and downstream risks of supply chains can harm the reputation, operations, and financial performance of businesses.
      • To build resiliency to and visibility of supply chain risk, organizations need to adapt current risk management programs, procurement practices, and risk assessment tools and techniques.
      • Procurement departments have an enhanced function, effectively acting as gatekeepers by performing due diligence, evaluating performance, and strengthening the supplier relationship through continual feedback and dialogue.
      • Technologies such as blockchain and IoT are starting to play a more dominant role in supply chain transparency.

      Raw materials are upstream and consumers are downstream.

      "Forty-five percent of survey respondents say that they either have no visibility into their upstream supply chain or that they can see only as far as their first-tier suppliers."
      – "Taking the pulse of shifting supply chains," McKinsey & Company, 2022

      Metrics and targets

      Metrics are key to stakeholder transparency, measuring performance against goals, and surfacing organizational blind spots

      • ESG metrics are qualitative or quantitative insights that measure organizations' performance against ESG goals. Along with traditional business metrics, they assist investors with assessing the long-term performance of companies based on non-financial ESG risks and opportunities.
      • Metrics, key performance indicators (KPIs), and key risk indicators (KRIs) are used to measure how ESG factors affect an organization and how an organization may impact any of the underlying issues related to each ESG factor.
      • There are several reporting standards that offer specific ESG performance metrics, such as the Global Reporting Institute (GRI), Sustainability Accounting Standards Board (SASB), and World Economic Forum (WEF).
      • For climate-related disclosures, global regulators are converging on the Task Force for Climate-related Disclosures (TCFD) and the International Sustainability Standards Board (ISSB).

      Example metrics for ESG factors

      Example metrics for environment include greenhouse gas emissions, water footprint, renewable energy share, and % of recycled material. Example social metrics include rates of injury, proportion of spend on local supplies, and percentage of gender or ethnic groups in management roles. Example governance metrics include annual CEO compensation compared to median, number of PII data breaches, and completed number of supplier assessments.

      The impact of ESG on IT

      IT plays a critical role in achieving ESG goals

      • IT groups have a critical role to play in helping organizations develop strategic plans to meet ESG goals, measure performance, monitor risks, and deliver on disclosure requirements.
      • IT's involvement extends from the CIO providing input at a strategic level to leading the charge within IT to instill new goals and adapt the culture toward one focused on sustainability.
      • To set the tone, CIOs should begin by updating their IT governance structure and setting ESG goals for IT.
      • IT leaders will need to think about resource use and efficiency and incorporate this into their IT strategy.

      Info-Tech Insight

      IT leaders need to work collaboratively with risk management to optimize decision making and continually improve ESG performance and disclosure.

      "A great strategy meeting is a meeting of the minds."
      – Max McKeown

      The data challenge

      The ESG data requirement is large and continually expanding in scope

      • To meet ESG objectives, corporations are challenged with collecting non-financial data from across functional business and geographical locations and from their supplier base and supply chains.
      • One of the biggest impediments to ESG implementation is the lack of high-quality data and of mature processes and tools to support data collection.
      • The data challenge is compounded by the availability and usability of data, immature and fragmented standards that hinder comparability, and workflow integration.

      Info-Tech Insight

      Keep your data model flexible and digital where possible to enable data interoperability.

      A flow chart is depicted. the top box is labeled ESG Program. Below that are Boxes labeled Tactical and Strategic. Below the Tactical Box, is a large X showing a lack of connection to the following points: Duplicative; Inefficient/Costly. Below the box labeled Strategic are the following terms: Data-Driven; Reusable; Digital.

      "You can have data without information, but you cannot have information without data."
      – Daniel Keys Moran

      It's more than a data challenge

      Organizations will rely on IT for execution, and IT leaders will need to be ready

      Data Management: Aggregated Reporting; Supplier Management; Cyber Management; Operational Management; Ethical Design(AI, Blockchain); IT Architecture; Resource Efficiency; Processing & Tooling; Supplier Assessment.

      Top impacts on IT departments

      1. ESG requires corporations to keep track of ESG-related risks of third parties. This will mean more robust assessments and monitoring.
      2. Many areas of ESG are new and will require new processes and tools.
      3. The SEC has upped the ante recently, requiring more rigorous accountability and reporting on cyber incidents.
      4. New IT systems and architecture may be needed to support ESG programs.
      5. Current reporting frameworks may need updating as regulators move to digital.
      6. Ethical design will need to be considered when AI is used to support risk/data management and when it is used as part of product solutions.

      Key takeaways

      • It's critical for organizations to look inward and outward to assess the material impact of ESG factors on their organization and key internal and external stakeholders.
      • ESG requires a flexible, holistic approach across the organization. It must become part of the way you work and enable an active response to changing conditions.
      • ESG introduces new risks that should not be viewed in isolation but interwoven into your current risk management and control framework via a risk-based approach.
      • Identify and integrate risks early, embrace uncertainty by staying flexible, and strive for continual improvement.
      • Metrics are key to telling your ESG story. Place the appropriate importance on the information that will be reported.
      • Recognize that the data challenge is complex and evolving and design your data model to be flexible, interoperable, and digital.
      • IT's role is far reaching, and IT will have a critical part in managing third parties, selecting tools, developing supporting IT architecture, and using ethical design.

      Definitions

      TERM DEFINITON
      Corporate Social Responsibility Management concept whereby organizations integrate social and environmental concerns in their operations and interactions with their stakeholders.
      Chief Sustainability Officer Steers sustainability commitments, helps with compliance, and helps ensure internal commitments are met. Responsibilities may extend to acting as a liaison with government and public affairs, fostering an internal culture, acting as a change agent, and leading delivery.
      ESG An acronym that stands for environment, social, and governance. These are the three components of a sustainability program.
      ESG Standard Contains detailed disclosure criteria including performance measures or metrics. Standards provide clear, consistent criteria and specifications for reporting. Typically created through consultation process.
      ESG Framework A broad contextual model for information that provides guidance and shapes the understanding of a certain topic. It sets direction but does not typically delve into the methodology. Frameworks are often used in conjunction with standards.
      ESG Factors The factors or issues that fall under the three ESG components. Measures the sustainability performance of an organization.
      ESG Rating An aggregated score based on the magnitude of an organization's unmanaged ESG risk. Ratings are provided by third-party rating agencies and are increasingly being used for financing, transparency to investors, etc.
      ESG Questionnaire ESG surveys or questionnaires are administered by third parties and used to assess an organization's sustainability performance. Participation is voluntary.
      Key Risk Indicator (KRI) A measure to indicate the potential presence, level, or trend of a risk.
      Key Performance Indicator (KPI) A measure of deviation from expected outcomes to help a firm see how it is performing.
      Materiality Material topics are topics that have a direct or indirect impact on an organization's ability to create, preserve, or erode economic, environment and social impact for itself and its stakeholder and society as a whole
      Materiality Assessment A materiality assessment is a tool to identify and prioritize the ESG issues most critical to the organization.
      Risk Sensing The range of activities carried out to identify and understand evolving sources of risk that could have a significant impact on the organization (e.g. social listening).
      Sustainability The ability of an organization and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.
      Sustainalytics Now part of Morningstar. Sustainalytics provides ESG research, ratings, and data to institutional investors and companies.
      UN Guiding Principles on Business and Human Rights (UNGPs) UN Guiding Principles on Business and Human Rights (UNGPs) provide an essential methodological foundation for how impacts across all dimensions should be assessed.

      Reporting & standard frameworks

      STANDARD DEFINITION AND FOCUS
      CDP CDP has created standards and metrics for comparing sustainability impact. Focuses on environmental data (e.g. carbon, water, and forests) and on data disclosure and benchmarking.
      (Formally Carbon Disclosure Project) Audience: All stakeholders
      Dow Jones Sustainability Indices (DJSI) Heavy on corporate governance and company performance. Equal balance of economic, environmental, and social.
      Audience: All stakeholders
      Global Reporting Initiative (GRI) International standards organization that has a set of standards to help organizations understand and communicate their impacts on climate change and social responsibility. The standard has a strong emphasis on transparency and materiality, especially on social issues.
      Audience: All stakeholders
      International Sustainability Standards Board (ISSB) Standard-setting board that sits within the International Financial Reporting Standards (IFRS) Foundation. The IFRS Foundation is a not-for-profit, public-interest organization established to develop high-quality, understandable, enforceable, and globally accepted accounting and sustainability disclosure standards.
      Audience: Investor-focused
      United Nations Sustainable Development Goals (UNSDG) Global partnership across sectors and industries to achieve sustainable development for all (17 Global Goals)
      Audience: All stakeholders
      Sustainability Accounting Standards Board (SASB) Industry-specific standards to help corporations select topics that may impact their financial performance. Focus on material impacts on financial condition or operating performance.
      Audience: Investor-focused
      Task Force Of Climate-related Disclosures (TCFD; created by the Financial Stability Board) Standards framework focused on the impact of climate risk on financial and operating performance. More broadly the disclosures inform investors of positive and negative measures taken to build climate resilience and make transparent the exposure to climate-related risk.
      Audience: Investors, financial stakeholders

      Bibliography

      Anne-Titia Bove and Steven Swartz, McKinsey, "Starting at the source: Sustainability in supply chains", 11 November 2016

      Accenture, "The Greater Wealth Transfer – Capitalizing on the intergenerational shift in wealth", 2012

      Beth Kaplan, Deloitte, "Preparing for the ESG Landscape, Readiness and reporting ESG strategies through controllership playbook", 15 February 2022

      Bjorn Nilsson et al, McKinsey & Company, "Financial institutions and nonfinancial risk: How corporates build resilience," 28 February 2022

      Bolden, Kyle, Ernst and Young, "Aligning nonfinancial reporting with your ESG strategy to communicate long-term value", 18 Dec. 2020

      Canadian Securities Administrators, "Canadian securities regulators seek comment on climate-related disclosure requirements", 18 October 2021

      Carol A. Adams et al., Global Risk Institute, "The double-materiality concept, Application and issues", May 2021

      Dunstan Allison-Hope et al, BSR, "Impact-Based Materiality, Why Companies Should-Focus Their Assessments on Impacts Rather than Perception", 3 February 2022

      EcoVadis, "The World's Most Trusted Business Sustainability Ratings",

      Ernst and Young, "Four opportunities for enhancing ESG oversight", 29 June 2021

      Federal Ministry of Labour and Social Affairs, The Act on Corporate Due Diligence Obligations in Supply Chains (Gesetz über die unternehmerischen Sorgfaltspflichten in Lieferketten)", Published into Federal Law Gazette, 22, July 2021

      "What Every Company Needs to Know", Sustainalytics

      Global Risk Institute, The GRI Perspective, "The materiality madness: why definitions matter", 22 February 2022

      John P Angkaw "Applying ERM to ESG Risk Management", 1 August 2022

      Hillary Flynn et al., Wellington Management, "A guide to ESG materiality assessments", June 2022

      Katie Kummer and Kyle Lawless, Ernst and Young, "Five priorities to build trust in ESG", 14 July 2022

      Knut Alicke et al., McKinsey & Company, "Taking the pulse of shifting supply chains", 26 August 2022

      Kosmas Papadopoulos and Rodolfo Arauj. The Harvard School Forum on Corporate Governance, "The Seven Sins of ESG Management", 23 September 2020

      KPMG, Sustainable Insight, "The essentials of materiality assessment", 2014

      Lorraine Waters, The Stack, "ESG is not an environmental issue, it's a data one", 20 May 2021

      Marcel Meyer, Deloitte, "What is TCFD and why does it matter? Understanding the various layers and implications of the recommendations",

      Michael W Peregnne et al., "The Harvard Law School Forum on Corporate Governance, The Important Legacy of the Sarbanes Oxley Act," 30 August 2022

      Michael Posner, Forbes, "Business and Human Rights: Looking Ahead To The Challenges Of 2022", 15 December 2021

      Myles Corson and Tony Kilmas, Ernst and Young, "How the CFO can balance competing demands and drive future growth", 3 November 2020

      Novisto, "Navigating Climate Data Disclosure", 2022

      Novisto, "XBRL is coming to corporate sustainability reporting", 17 April 2022

      "Official Journal of the European Union, Regulation (EU) 2019/2088 of the European Parliament and of the Council of 27 November 2019 on sustainability-related disclosures in the financial services sector", 9 December 2019

      Osler, "ESG and the future of sustainability", Podcast, 01 June 2022

      Osler, "The Rapidly Evolving World of ESG Disclosure: ISSB draft standards for sustainability and climate related disclosures", 19 May 2022

      Sarwar Choudhury and Zach Johnston, Ernst and Young "Preparing for Sox-Like ESG Regulation", 7 June 2022

      Securities and Exchange Commission, "The Enhancement and Standardization of Climate-related Disclosures for Investors", 12 May 2022

      "Securities and Exchange Commission, SEC Proposes Rules on Cybersecurity, Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies, 9 May 2022

      Sean Brown and Robin Nuttall, McKinsey & Company, "The role of ESG and purpose", 4 January 2022

      Statement by Chair Gary Gensler, "Statement on ESG Disclosure Proposal", 25 May 2022

      Svetlana Zenkin and Peter Hennig, Forbes, "Managing Supply Chain Risk, Reap ESG Rewards", 22 June 2022

      Task Force on Climate Related Financial Disclosures, "Final Report, Recommendations of the Task Force on Climate-related Financial Disclosures", June 2017

      World Economic Forum, "Why sustainable governance and corporate integrity are crucial for ESG", 29 July 2022

      World Economic Forum (in collaboration with PwC) "How to Set Up Effective Climate Governance on Corporate Boards, Guiding Principles and questions", January 2019

      World Economic Forum, "Defining the "G" in ESG Governance Factors at the Heart of Sustainable Business", June 2022

      World Economic Forum, "The Risk and Role of the Chief Integrity Officer: Leadership Imperatives in and ESG-Driven World", December 2021

      World Economic Forum, "How to Set Up Effective Climate Governance on Corporate Boards Guiding principles and questions", January 2019

      Zurich Insurance, "ESG and the new mandate for corporate governance", 2022

      Build an ERP Strategy and Roadmap

      • Buy Link or Shortcode: {j2store}585|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $76,462 Average $ Saved
      • member rating average days saved: 22 Average Days Saved
      • Parent Category Name: Enterprise Resource Planning
      • Parent Category Link: /enterprise-resource-planning
      • Organizations often do not know where to start with an ERP project.
      • They focus on tactically selecting and implementing the technology.
      • ERP projects are routinely reported as going over budget, over schedule, and they fail to realize any benefits.

      Our Advice

      Critical Insight

      • An ERP strategy is an ongoing communication tool for the business.
      • Accountability for ERP success is shared between IT and the business.
      • An actionable roadmap provides a clear path to benefits realization.

      Impact and Result

      • Align the ERP strategy and roadmap with business priorities, securing buy-in from the business for the program.
      • Identification of gaps, needs, and opportunities in relation to business processes; ensuring the most critical areas are addressed.
      • Assess alternatives for the critical path(s) most relevant to your organization’s direction.

      Build an ERP Strategy and Roadmap Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build an ERP Strategy and Roadmap – A comprehensive guide to align business and IT on what the organization needs from their ERP.

      A business-led, top-management-supported initiative partnered with IT has the greatest chance of success.

    • Aligning and prioritizing key business and technology drivers.
    • Clearly defining what is in and out of scope for the project.
    • Getting a clear picture of how the business process and underlying applications support the business strategic priorities.
    • Pulling it all together into an actionable roadmap.
      • Build an ERP Strategy and Roadmap – Phases 1-4
      • ERP Strategy Report Template
      [infographic]

      Workshop: Build an ERP Strategy and Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Introduction to ERP

      The Purpose

      To build understanding and alignment between business and IT on what an ERP is and the goals for the project

      Key Benefits Achieved

      Clear understanding of how the ERP supports the organizational goals

      What business processes the ERP will be supporting

      An initial understanding of the effort involved

      Activities

      1.1 Introduction to ERP

      1.2 Background

      1.3 Expectations and goals

      1.4 Align business strategy

      1.5 ERP vision and guiding principles

      1.6 ERP strategy model

      1.7 ERP operating model

      Outputs

      ERP strategy model

      ERP Operating model

      2 Build the ERP operation model

      The Purpose

      Generate an understanding of the business processes, challenges, and application portfolio currently supporting the organization.

      Key Benefits Achieved

      An understanding of the application portfolio supporting the business

      Detailed understanding of the business operating processes and pain points

      Activities

      2.1 Build application portfolio

      2.2 Map the level 1 ERP processes including identifying stakeholders, pain points, and key success indicators

      2.3 Discuss process and technology maturity for each level 1 process

      Outputs

      Application portfolio

      Mega-processes with level 1 process lists

      3 Project set up

      The Purpose

      A project of this size has multiple stakeholders and may have competing priorities. This section maps those stakeholders and identifies their possible conflicting priorities.

      Key Benefits Achieved

      A prioritized list of ERP mega-processes based on process rigor and strategic importance

      An understanding of stakeholders and competing priorities

      Initial compilation of the risks the organization will face with the project to begin early mitigation

      Activities

      3.1 ERP process prioritization

      3.2 Stakeholder mapping

      3.3 Competing priorities review

      3.4 Initial risk register compilation

      Outputs

      Prioritized ERP operating model

      Stakeholder map.

      Competing priorities list.

      Initial risk register.

      4 Roadmap and presentation review

      The Purpose

      Select a future state and build the initial roadmap to set expectations and accountabilities.

      Key Benefits Achieved

      Identification of the future state

      Initial roadmap with expectations on accountability and timelines

      Activities

      4.1 Discuss future state options

      4.2 Build initial roadmap

      4.3 Review of final deliverable

      Outputs

      Future state options

      Initiative roadmap

      Draft final deliverable

      Further reading

      Build an ERP Strategy and Roadmap

      Align business and IT to successfully deliver on your ERP initiative

      Table of Contents

      Analyst Perspective

      Phase 3: Plan Your Project

      Executive Summary

      Step 3.1: Stakeholders, risk, and value

      Phase 1: Build Alignment and Scope

      Step 3.2: Project set up

      Step 1.1: Aligning Business and IT

      Phase 4: Next Steps

      Step 1.2: Scope and Priorities

      Step 4.1: Build your roadmap

      Phase 2: Define Your ERP

      Step 4.2: Wrap up and present

      Step 2.1: ERP business model

      Summary of Accomplishment

      Step 2.2: ERP processes and supporting applications

      Research Contributors

      Step 2.3: Process pains, opportunities, and maturity

      Related Info-Tech Research

      Bibliography

      Build an ERP Strategy and Roadmap

      Align business and IT to successfully deliver on your ERP initiative

      EXECUTIVE BRIEF

      Analyst Perspective

      A foundational ERP strategy is critical to decision making.

      Photo of Robert Fayle, Research Director, Enterprise Applications, Info-Tech Research Group.

      Enterprise resource planning (ERP) is a core tool that the business leverages to accomplish its goals. An ERP that is doing its job well is invisible to the business. The challenges come when the tool is no longer invisible. It has become a source of friction in the functioning of the business

      ERP systems are expensive, their benefits are difficult to quantify, and they often suffer from poor user satisfaction. Post-implementation, technology evolves, organizational goals change, and the health of the system is not monitored. This is complicated in today’s digital landscape with multiple integration points, siloed data, and competing priorities.

      Too often organizations jump into selecting replacement systems without understanding the needs of the organization. Alignment between business and IT is just one part of the overall strategy. Identifying key pain points and opportunities, assessed in the light of organizational strategy, will provide a strong foundation to the transformation of the ERP system.

      Robert Fayle
      Research Director, Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Organizations often do not know where to start with an ERP project. They focus on tactically selecting and implementing the technology but ignore the strategic foundation that sets the ERP system up for success. ERP projects are routinely reported as going over budget, over schedule, and they fail to realize any benefits.

      Common Obstacles

      ERP projects impact the entire organization – they are not limited to just financial and operating metrics. The disruption is felt during both implementation and in the production environment.

      Missteps early on can cost time, financial resources, and careers. Roughly 55% of ERP projects reported being over budget, and two-thirds of organizations implementing ERP realized less than half of their anticipated benefits.

      Info-Tech’s Approach

      Obtain organizational buy-in and secure top management support. Set clear expectations, guiding principles, and critical success factors.

      Build an ERP operating model/business model that identifies process boundaries, scope, and prioritizes requirements. Assess stakeholder involvement, change impact, risks, and opportunities.

      Understand the alternatives your organization can choose for the future state of ERP. Develop an actionable roadmap and meaningful KPIs that directly align with your strategic goals.

      Info-Tech Insight

      Accountability for ERP success is shared between IT and the business. There is no single owner of an ERP. A unified approach to building your strategy promotes an integrated roadmap so all stakeholders have clear direction on the future state.

      Insight summary

      Enterprise resource planning (ERP) systems facilitate the flow of information across business units. It allows for the seamless integration of systems and creates a holistic view of the enterprise to support decision making.

      In many organizations, the ERP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow.

      A measured and strategic approach to change will help mitigate many of the risks associated with ERP projects, which will avoid the chances of these changes becoming the dreaded “career killers.”

      A business led, top management supported initiative partnered with IT has the greatest chance of success.

      • A properly scoped ERP project reduces churn and provides all parts of the business with clarity.
      • This blueprint provides the business and IT the methodology to get the right level of detail for the business processes that the ERP supports so you can avoid getting lost in the details.
      • Build a successful ERP Strategy and roadmap by:
        • Aligning and prioritizing key business and technology drivers.
        • Clearly defining what is in and out of scope for the project.
        • Providing a clear picture of how the business process and underlying applications support the business strategic priorities.
        • Pulling it all together into an actionable roadmap.

      Enterprise Resource Planning (ERP)

      What is ERP?

      Enterprise resource planning (ERP) systems facilitate the flow of information across business units. They allow for the seamless integration of systems and create a holistic view of the enterprise to support decision making.

      In many organizations, the ERP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow.

      An ERP system:

      • Automates processes, reducing the amount of manual, routine work.
      • Integrates with core modules, eliminating the fragmentation of systems.
      • Centralizes information for reporting from multiple parts of the value chain to a single point.

      A diagram visualizing the many aspects of ERP and the categories they fall under. Highlighted as 'Supply Chain Management' are 'Supply Chain: Procure to Pay' and 'Distribution: Forecast to Delivery'. Highlighted as 'Customer Relationship Management' are 'Sales: Quote to Cash', 'CRM: Market to Order', and 'Customer Service: Issue to Resolution'.

      ERP use cases:

      • Product-Centric
        Suitable for organizations that manufacture, assemble, distribute, or manage material goods.
      • Service-Centric
        Suitable for organizations that provide and manage field services and/or professional services.

      ERP by the numbers

      50-70%
      Statistical analysis of ERP projects indicates rates of failure vary from 50 to 70%. Taking the low end of those analyst reports, one in two ERP projects is considered a failure. (Source: Saxena and Mcdonagh)

      85%
      Companies that apply the principles of behavioral economics outperform their peers by 85% in sales growth and more than 25% in gross margin. (Source: Gallup)

      40%
      Nearly 40% of companies said functionality was the key driver for the adoption of a new ERP. (Source: Gheorghiu)

      ERP dissatisfaction

      Drivers of Dissatisfaction
      Business
      • Misaligned objectives
      • Product fit
      • Changing priorities
      • Lack of metrics
      Data
      • Access to data
      • Data hygiene
      • Data literacy
      • One view of the customer
      People and teams
      • User adoption
      • Lack of IT support
      • Training (use of data and system)
      • Vendor relations
      Technology
      • Systems integration
      • Multi-channel complexity
      • Capability shortfall
      • Lack of product support

      Finance, IT, Sales, and other users of the ERP system can only optimize ERP with the full support of each other. The cooperation of the departments is crucial when trying to improve ERP technology capabilities and customer interaction.

      Info-Tech Insight

      While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder-to-shoulder with the business to develop a technology framework for ERP.

      Info-Tech’s methodology for developing a foundational ERP strategy and roadmap

      1. Build alignment and scope 2. Define your ERP 3. Plan your project 4. Next Steps
      Phase Steps
      1. Aligning business and IT
      2. Scope and priorities
      1. ERP Business Model
      2. ERP processes and supporting applications
      3. Process pains, opportunities & maturity
      1. Stakeholders, risk & value
      2. Project set up
      1. Build your roadmap
      2. Wrap up and present
      Phase Outcomes Discuss organizational goals and how to advance those using the ERP system. Establish the scope of the project and ensure that business and IT are aligned on project priorities. Build the ERP business model then move on to the top level (mega) processes and an initial list of the sub-processes. Generate a list of applications that support the identified processes. Conclude with a complete view of the mega-processes and their sub-processes. Map out your stakeholders to evaluate their impact on the project, build an initial risk register and discuss group alignment. Conclude the phase by setting the initial core project team and their accountabilities to the project. Review the different options to solve the identified pain points then build out a roadmap of how to get to that solution. Build a communication plan as part of organizational change management, which includes the stakeholder presentation.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Sample of the Key Deliverable 'ERP Strategy Report'.

      ERP Strategy Report

      Complete an assessment of processes, prioritization, and pain points, and create an initiative roadmap.

      Samples of blueprint deliverables related to 'ERP Strategy Report'.

      ERP Business Model
      Align your business and technology goals and objectives in the current environment.
      Sample of the 'ERP Business Model' blueprint deliverable.
      ERP Operating Model
      Identify and prioritize your ERP top-level processes.
      Sample of the 'ERP Operating Model' blueprint deliverable.
      ERP Process Prioritization
      Assess ERP processes against the axes of rigor and strategic importance.
      Sample of the 'ERP Process Prioritization' blueprint deliverable.
      ERP Strategy Roadmap
      A data-driven roadmap of how to address the ERP pain points and opportunities.
      Sample of the 'ERP Strategy Roadmap' blueprint deliverable.

      Executive Brief Case Study

      INDUSTRY: Aerospace
      SOURCE: Panorama, 2021

      Aerospace organization assesses ERP future state from opportunities, needs, and pain points

      Challenge

      Several issues plagued the aerospace and defense organization. Many of the processes were ad hoc and did not use the system in place, often relying on Excel. The organization had a very large pain point stemming from its lack of business process standardization and oversight. The biggest gap, however, was from the under-utilization of the ERP software.

      Solution

      By assessing the usage of the system by employees and identifying key workarounds, the gaps quickly became apparent. After assessing the organization’s current state and generating recommendations from the gaps, it realized the steps needed to achieve its desired future state. The analysis of the pain points generated various needs and opportunities that allowed the organization to present and discuss its key findings with executive leadership to set milestones for the project.

      Results

      The overall assessment led the organization to the conclusion that in order to achieve its desired future state and maximize ROI from its ERP, the organization must address the internal issues prior to implementing the upgraded software.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between eight to twelve calls over the course of four to six months.

      Phase 1

      • Call #1: Scoping call to understand the current situation.
      • Call #2: Establish business & IT alignment and project scope.

      Phase 2

      • Call #3: Discuss the ERP Strategy business model and mega-processes.
      • Call #4: Begin the drill down on the level 1 processes.

      Phase 3

      • Call #5: Establish the stakeholder map and project risks.
      • Call #6: Discuss project setup including stakeholder commitment and accountability.

      Phase 4

      • Call #7: Discuss resolution paths and build initial roadmap.
      • Call #8: Summarize results and plan next steps.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Activities
      Introduction to ERP

      1.1 Introduction to ERP

      1.2 Background

      1.3 Expectations and goals

      1.4 Align business strategy

      1.5 ERP vision and guiding principles

      1.6 ERP strategy model

      1.7 ERP operating model

      Build the ERP operating model

      2.1 Build application portfolio

      2.2 Map the level 1 ERP processes including identifying stakeholders, pain points, and key success indicators

      2.3 Discuss process and technology maturity for each level 1 process

      Project set up

      3.1 ERP process prioritization

      3.2 Stakeholder mapping

      3.3 Competing priorities review

      3.4 Initial risk register compilation

      3.5 Workshop retrospective

      Roadmap and presentation review

      4.1 Discuss future state options

      4.2 Build initial roadmap

      4.3 Review of final deliverable

      Next Steps and wrap-up (offsite)

      5.1 Complete in-progress deliverables from previous four days

      5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables
      1. ERP strategy model
      2. ERP operating model
      1. Application portfolio
      2. Mega-processes with level 1 process lists
      1. Prioritized ERP operating model
      2. Stakeholder map
      3. Competing priorities list
      4. Initial risk register
      1. Future state options
      2. Initiative roadmap
      3. Draft final deliverable
      1. Completed ERP strategy template
      2. ERP strategy roadmap

      Build an ERP Strategy and Roadmap

      Phase 1

      Build alignment and scope

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      Build a common language to ensure clear understanding of the organizational needs. Define a vision and guiding principles to aid in decision making and enumerate how the ERP supports achievement of the organizational goals. Define the initial scope of the ERP project. This includes the discussion of what is not in scope.

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Create a compelling case that addresses strategic business objectives

      When someone at the organization asks you WHY, you need to deliver a compelling case. The ERP project will receive pushback, doubt, and resistance; if you can’t answer the question WHY, you will be left back-peddling.

      When faced with a challenge, prepare for the WHY.

      • Why do we need this?
      • Why are we spending all this money?
      • Why are we bothering?
      • Why is this important?
      • Why did we do it this way?
      • Why did we choose this vendor?

      Most organizations can answer “What?”
      Some organizations can answer “How?”
      Very few organizations have an answer for “Why?”

      Each stage of the project will be difficult and present its own unique challenges and failure points. Re-evaluate if you lose sight of WHY at any stage in the project.

      Step 1.1

      Aligning business and IT

      Activities
      • 1.1.1 Build a glossary
      • 1.1.2 ERP Vision and guiding principles
      • 1.1.3 Corporate goals and ERP benefits

      This step will walk you through the following activities:

      • Building a common language to ensure a clear understanding of the organization’s needs.
      • Creating a definition of your vision and identifying the guiding principles to aid in decision making.
      • Defining how the ERP supports achievement of the organizational goals.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      Business and IT have a shared understanding of how the ERP supports the organizational goals.

      Are we all talking about the same thing?

      Every group has their own understanding of the ERP system, and they may use the same words to describe different things. For example, is there a difference between procurement of office supplies and procurement of parts to assemble an item for sale? And if they are different, do your terms differ (e.g., procurement versus purchasing)?

      Term(s) Definition
      HRMS, HRIS, HCM Human Resource Management System, Human Resource Information System, Human Capital Management. These represent four capabilities of HR: core HR, talent management, workforce management, and strategic HR.
      Finance Finance includes the core functionalities of GL, AR, and AP. It also covers such items as treasury, financial planning and analysis (FP&A), tax management, expenses, and asset management.
      Supply Chain The processes and networks required to produce and distribute a product or service. This encompasses both the organization and the suppliers.
      Procurement Procurement is about getting the right products from the right suppliers in a timely fashion. Related to procurement is vendor contract management.
      Distribution The process of getting the things we create to our customers.
      CRM Customer Relationship Management, the software used to maintain records of our sales and non-sales contact with our customers.
      Sales The process of identifying customers, providing quotes, and converting those quotes to sales orders to be invoiced.
      Customer Service This is the process of supporting customers with challenges and non-sales questions related to the delivery of our products/services.
      Field Service The group that provides maintenance services to our customers.

      Activity 1.1.1 Build a glossary

      1 hour
      1. As a group, discuss the organization’s functional areas, business capabilities, value streams, and business processes.
      2. Ask each of the participants if there are terms or “jargon” that they hear used that they may be unclear on or know that others may not be aware of. Record these items in the table along with a description.
        • Acronyms are particularly important to document. These are often bandied about without explanation. For example, people outside of finance may not understand that FP&A is short for Financial Planning and Analysis.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Glossary'.

      Download the ERP Strategy Report Template

      Activity 1.1.1 Working slide

      Example/working slide for your glossary. Consider this a living document and keep it up to date.

      Term(s) Definition
      HRMS, HRIS, HCM Human Resource Management System, Human Resource Information System, Human Capital Management. These represent four capabilities of HR: core HR, talent management, workforce management, and strategic HR.
      Finance Finance includes the core functionalities of GL, AR, and AP. It also covers such items as treasury, financial planning and analysis (FP&A), tax management, expenses, and asset management.
      Supply Chain The processes and networks required to produce and distribute a product or service. This encompasses both the organization and the suppliers.
      Procurement Procurement is about getting the right products from the right suppliers in a timely fashion. Related to procurement is vendor contract management.
      Distribution The process of getting the things we create to our customers.
      CRM Customer Relationship Management, the software used to maintain records of our sales and non-sales contact with our customers.
      Sales The process of identifying customers, providing quotes, and converting those quotes to sales orders to be invoiced.
      Customer Service This is the process of supporting customers with challenges and non-sales questions related to the delivery of our products/services.
      Field Service The group that provides maintenance services to our customers.

      Vision and Guiding Principles

      GUIDING PRINCIPLES

      Guiding principles are high-level rules of engagement that help to align stakeholders from the outset. Determine guiding principles to shape the scope and ensure stakeholders have the same vision.

      Creating Guiding Principles

      Guiding principles should be constructed as full sentences. These statements should be able to guide decisions.

      EXAMPLES

      • [Organization] is implementing an ERP system to streamline processes and reduce redundancies, saving time and money.
      • [Organization] is implementing an ERP to integrate disparate systems and rationalize the application portfolio.
      • [Organization] is aiming at taking advantage of best industry practices and strives to minimize the level of customization required in solution.

      Questions to Ask

      1. What is a strong statement that will help guide decision making throughout the life of the ERP project?
      2. What are your overarching requirements for business processes?
      3. What do you ultimately want to achieve?
      4. What is a statement that will ensure all stakeholders are on the same page for the project?

      Activity 1.1.2 – ERP Vision and Project Guiding Principles

      1 hour

      1. As a group, discuss whether you want to create a separate ERP vision statement or re-state your corporate vision and/or goals.
        • An ERP vision statement will provide project-guiding principles, encompass the ERP objectives, and give a rationale for the project.
        • Using the corporate vision/goals will remind the business and IT that the project is to find an ERP solution that supports and enhances the organizational objectives.
      2. Review each of the sample guiding principles provided and ask the following questions:
        1. Do we agree with the statement?
        2. Is this statement framed in the language we used internally? Does everyone agree on the meaning of the statement?
        3. Will this statement help guide our decision-making process?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Guiding Principles.

      Download the ERP Strategy Report Template

      Activity 1.1.2 – ERP Vision and Project Guiding Principles

      We, [Organization], will select and implement an integrated software suite that enhances the growth and profitability of the organization through streamlined global business processes, real time data-driven decisions, increased employee productivity, and IT investment protection.

      • Support Business Agility: A flexible and adaptable integrated business system providing a seamless user experience.
      • Utilize ERP best practices: Do not recreate or replicate what we have today, focus on modernization. Exercise customization governance by focusing on those customizations that are strategically differentiating.
      • Automate: Take manual work out where we can, empowering staff and improving productivity through automation and process efficiencies.
      • Stay focused: Focus on scope around core business capabilities. Maintain scope control. Prioritize demand in line with the strategy.
      • Strive for “One Source of Truth”: Unify data model and integrate processes where possible. Assess integration needs carefully.

      Align the ERP strategy with the corporate strategy

      Corporate Strategy Unified Strategy ERP Strategy
      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.
      • ERP optimization can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives.
      • Communicates the organization’s budget and spending on ERP.
      • Identifies IT initiatives that will support the business and key ERP objectives.
      • Outlines staffing and resourcing for ERP initiatives.

      Info-Tech Insight

      ERP projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with ERP capabilities. Effective alignment between IT and the business should happen daily. Alignment doesn’t just to occur at the executive level alone, but at each level of the organization.

      1.1.3 – Corporate goals and ERP benefits

      1-2 hours

      1. Discuss the business objectives. Identify two or three objectives that are a priority for this year.
      2. Produce several ways a new ERP system will meet each objective.
      3. Think about the modules and ERP functions that will help you realize these benefits.

      Cost Reduction

      • Decrease Total Cost: Reduce total costs by five percent by January 2022.
      • Decrease Specific Costs: Reduce costs of “x” business unit by ten percent by Jan. next year.

      ERP Benefits

      • Reduce headcount
      • Reallocate workers
      • Reduce overtime
      • Increased compliance
      • Streamlined audit process
      • Less rework due to decrease in errors

      Download the ERP Strategy Report Template

      Activity 1.1.3 – Corporate goals and ERP benefits

      Corporate Strategy ERP Benefits
      End customer visibility (consumer experience)
      • Help OEM’s target customers
      • Keep customer information up-to-date, including contact choices
      • [Product A] process support improvements
      • Ability to survey and track responses
      • Track and improve renewals
      • Service support – improve cycle times for claims, payment processing, and submission quality
      Social responsibility
      • Reduce paper internally and externally
      • Facilitating tracking and reporting of EFT
      • One location for all documents
      New business development
      • Track all contacts
      • Measure where in process the contact is
      • Measure impact of promotions
      Employee experience
      • Improve integration of systems reducing manual processes through automation
      • Better tracking of sales for employee comp
      • Ability to survey employees

      Step 1.2

      Scope and priorities

      Activities
      • 1.2.1 Project scope
      • 1.2.2 Competing priorities

      This step will walk you through the following activities:

      • Define the initial scope of the ERP project. This includes the discussion of what is not in scope. For example, a stand-alone warehouse management system may be out of scope while an existing HRMS could be in scope.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      A project scope statement and a prioritized list of projects that may compete for organizational resources.

      Understand the importance of setting expectations with a scope statement

      Be sure to understand what is in scope for an ERP strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling MMS or BI under ERP.

      A diamond shape with three layers. Inside is 'In Scope', middle is 'Scope Creep', and outside is 'Out of Scope'.

      Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of ERP will be based on the scope statement.

      Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. HRIS, CRM, PLM etc.) rather than granular requirements that would lead to vendor application selection (e.g. SAP, Microsoft, Oracle, etc.).

      Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration.

      In Scope Out of Scope
      Strategy High-level ERP requirements, strategic direction
      Software selection Vendor application selection, Granular system requirements

      Activity 1.2.1 – Define scope

      1 hour

      1. Formulate a scope statement. Decide which people, processes, and functions the ERP strategy will address. Generally, the aim of this project is to develop strategic requirements for the ERP application portfolio – not to select individual vendors.
      2. To assist in forming your scope statement, answer the following questions:
        • What are the major coverage points?
        • Who will be using the systems?
        • How will different users interact with the systems?
        • What are the objectives that need to be addressed?
        • Where do we start?
        • Where do we draw the line?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Scope Statements'.

      Download the ERP Strategy Report Template

      Activity 1.2.1 – Define scope

      Scope statements

      The following systems are considered in scope for this project:

      • Finance
      • HRMS
      • CRM
      • Supply chain

      The following systems are out of scope for this project:

      • PLM – product lifecycle management
      • Project management
      • Contract management

      The following systems are in scope, in that they must integrate into the new system. They will not change.

      • Payroll processing
      • Bank accounts
      • EDI software

      Know your competing priorities

      Organizations typically have multiple projects on the table or in flight. Each of those projects requires resources and attention from business and/or the IT organization.

      Don’t let poor prioritization hurt your ERP implementation.
      BNP Paribas Fortis had multiple projects that were poorly prioritized resulting in the time to bring products to market to double over a three-year period. (Source: Neito-Rodriguez, 2016)

      Project Timeline Priority notes Implications
      Warehouse management system upgrade project Early 2022 implementation High Taking IT staff and warehouse team, testing by finance
      Microsoft 365 October 2021-March 2022 High IT Staff, org impacted by change management
      Electronic Records Management April 2022 – Feb 2023 High Legislative requirement, org impact due to record keeping
      Web site upgrade Early fiscal 2023

      Activity 1.2.2 – Competing priorities

      1 hour

      1. As a group, discuss the projects that are currently in flight as well as any known projects including such things as territory expansion or new regulation compliance.
      2. For each project discuss and record the following items:
        • The project timeline. When does it start and how long is it expected to run?
        • How important is this project to the organization? A lot of high priority projects are going to require more attention from the staff involved.
        • What are the implications of this project?
          • What staff will be impacted? What business users will be impacted, and what is the IT involvement?
          • To what extent will the overall organization be impacted? Is it localized to a location or is it organization wide?
          • Can the project be deferred?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Priorities'.

      Download the ERP Strategy Report Template

      Activity 1.2.2 – Competing priorities

      List all your known projects both current and proposed. Discuss the prioritization of those projects, whether they are more or less important than your ERP project.

      Project Timeline Priority notes Implications
      Warehouse management system upgrade project Early 2022 implementation High Taking IT staff and warehouse team, testing by finance
      Microsoft 365 October 2021-March 2022 High IT Staff, org impacted by change management
      Electronic Records Management April 2022 – Feb 2023 High Legislative requirement, org impact due to record keeping
      Web site upgrade Early fiscal 2023 Medium
      Point of Sale replacement Oct 2021– Mar 2022 Medium
      ERP utilization and training on unused systems Friday, Sept 17 Medium Could impact multiple staff
      Managed Security Service RFP This calendar year Medium
      Mental Health Dashboard In research phase Low

      Build an ERP Strategy and Roadmap

      Phase 2

      Define your ERP

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Build the ERP business model then move on to the top level (mega) processes and an initial list of the sub-processes
      • Generate a list of applications that support the identified processes
      • Assign stakeholders, discuss pain points, opportunities, and key success indicators
      • Assign process and technology maturity to each stakeholder

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Step 2.1

      ERP business model

      Activities
      • 2.1.1 Environmental factors, technology drivers, and business needs
      • 2.1.2 Challenges, pain points, enablers, and organizational goals

      This step will walk you through the following activities:

      • Identify ERP drivers and objectives
      • Explore ERP challenges and pain points
      • Discuss the ERP benefits and opportunities

      This step involves the following participants:

      • ERP implementation team
      • Business stakeholders

      Outcomes of this step

      • ERP business model

      Explore environmental factors and technology drivers

      1. Identify business drivers that are contributing to the organization’s need for ERP.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization.
      3. Consider external considerations, organizational drivers, technology drivers, and key functional requirements
      The ERP Business Model with 'Business Needs', 'Environmental Factors', and 'Technology Drivers' highlighted. At the center is 'ERP Strategy' with 'Barriers' above and 'Enablers' below. Surrounding and feeding into the center group are 'Business Needs', 'Environmental Factors', 'Technology Drivers', and 'Organizational Goals'.
      External Considerations
      • Regulations
      • Elections
      • Availability of resources
      • Staff licensing and certifications
      Organizational Drivers
      • Compliance
      • Scalability
      • Operational efficiency
      • Union agreements
      • Self service
      • Role appropriate dashboards and reports
      • Real time data access
        • Use of data in the system (no exports)
      Technology Considerations
      • Data accuracy
      • Data quality
      • Better reporting
      Functional Requirements
      • Information availability
      • Integration between systems
      • Secure data

      Activity 2.1.1 – Explore environmental factors and technology drivers

      1 hour

      1. Identify business drivers that are contributing to the organization’s need for ERP.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard or flip charts and markers to capture key findings.
      3. Consider External Considerations, Organizational Drivers, Technology Drivers, and Key Functional Requirements.

      Record this information in the ERP Strategy Report Template.

      Sample of the next slide, 'ERP Business Model', with an iconized ERP Business Model and a table highlighting 'Environmental Factors', 'Technology Drivers', and 'Business Needs'.

      Download the ERP Strategy Report Template

      ERP Business Model A iconized version of the ERP Business Model.

      Environmental FactorsTechnology DriversBusiness Needs
      • Regulations
      • Elections
      • Availability of resources
      • Staff licensing and certifications
      • Document storage
      • Cloud security standards
      • Functionality based on deployment
      • Cloud-first based on above
      • Integration with external data suppliers
      • Integration with internal systems (Elite?)
      • Compliance
      • Scalability
      • Operational efficiency
      • Union agreements
      • Self service
      • Role appropriate dashboards and reports
      • Real time data access
      • Use of data in the system (no exports)
      • CapEx vs. OpEx

      Discuss challenges, pain points, enablers and organizational goals

      1. Identify challenges with current systems and processes.
      2. Brainstorm potential barriers to successful ERP selection and implementation. Use a whiteboard and marker to capture key findings.
      3. Consider organizational goals along with barriers and enablers to ERP success.
      The ERP Business Model with 'Organizational Goals', 'Enablers', and 'Barriers' highlighted. At the center is 'ERP Strategy' with 'Barriers' above and 'Enablers' below. Surrounding and feeding into the center group are 'Business Needs', 'Environmental Factors', 'Technology Drivers', and 'Organizational Goals'.
      Functional Gaps
      • No online purchase order requisition
      Technical Gaps
      • Inconsistent reporting – data quality concerns
      Process Gaps
      • Duplication of data
      • Lack of system integration
      Barriers to Success
      • Cultural mindset
      • Resistance to change
      Business Benefits
      • Business-IT alignment
      IT Benefits
      • Compliance
      • Scalability
      Organizational Benefits
      • Data accuracy
      • Data quality
      Enablers of Success
      • Change management
      • Alignment to strategic objectives

      Activity 2.1.2 – Discuss challenges, pain points, enablers, and organizational goals

      1 hour

      1. Identify challenges with the current systems and processes.
      2. Brainstorm potential barriers to successful ERP selection and implementation. Use a whiteboard or flip chart and markers to capture key findings.
      3. Consider functional gaps, technical gaps, process gaps, and barriers to ERP success.
      4. Identify the opportunities and benefits from an integrated system.
      5. Brainstorm potential enablers for successful ERP selection and implementation. Use a whiteboard and markers to capture key findings.
      6. Consider business benefits, IT benefits, organizational benefits, and enablers of success.

      Record this information in the ERP Strategy Report Template.

      Sample of the next slide, 'ERP Business Model', with an iconized ERP Business Model and a table highlighting 'Organizational Goals', 'Enablers', and 'Barriers'.

      Download the ERP Strategy Report Template

      ERP Business Model A iconized version of the ERP Business Model.

      Organizational Goals Enablers Barriers
      • Efficiency
      • Effectiveness
      • Integrity
      • One source of truth for data
      • One team
      • Customer service, external and internal
      • Cross-trained employees
      • Desire to focus on value-add activities
      • Collaborative
      • Top level executive support
      • Effective change management process
      • Organizational silos
      • Lack of formal process documentation
      • Funding availability
      • What goes first? Organizational priorities

      Step 2.2

      ERP processes and supporting applications

      Activities
      • 2.2.1 ERP process inventory
      • 2.2.2 Application portfolio

      This step will walk you through the following activities:

      • Identify the top-level (mega) processes and create an initial list of the sub-processes
      • Generate a list of applications that support the identified processes

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Outcomes of this step

      • A list of in scope business processes
      • A list of current applications and services supporting the business processes

      Process Inventory

      In business architecture, the primary view of an organization is known as a business capability map.

      A business capability defines what a business does to enable value creation rather than how.

      Business capabilities:

      • Represent stable business functions
      • Are unique and independent of each other
      • Will typically have a defined business outcome

      A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

      A process map titled 'Business capability map (Level 0)' with many processes sectioned off into sections and subsections. The top-left section is 'Products and Services Development' with subsections 'Design'(6 processes) and 'Manufacturing'(3 processes). The top-middle section is 'Revenue Generation'(3 processes) and below that is 'Sourcing'(2 processes). The top-right section is 'Demand Fulfillment'(9 processes). Along the bottom is the section 'Enterprise Management and Planning' with subsections 'Human Resources'(4 processes), 'Business Direction'(4 processes), and 'Finance'(4 processes).

      If you do not have a documented process model, you can use the APQC Framework to help define your inventory of business processes.

      APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      APQC’s Process Classification Framework

      Activity 2.2.1 – Process inventory

      2-4 hours

      1. As a group, discuss the business capabilities, value streams, and business processes.
      2. For each capability determine the following:
        • Is this capability applicable to our organization?
        • What application, if any, supports this capability?
      3. Are there any missing capabilities to add?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Process Inventory' table on the next slide.

      Download the ERP Strategy Report Template

      Activity 2.2.1 – Process inventory

      Core Finance Core HR Workforce Management Talent Management Warehouse Management Enterprise Asset Management
      Process Technology Process Technology Process Technology Process Technology Process Technology Process Technology
      • General ledger
      • Accounts payable
      • Accounts receivable
      • GL consolidation
      • Cash management
      • Billing and invoicing
      • Expenses
      • Payroll accounting
      • Tax management
      • Reporting
      • Payroll administration
      • Benefits administration
      • Position management
      • Organizational structure
      • Core HR records
      • Time and attendance
      • Leave management
      • Scheduling
      • Performance management
      • Talent acquisition
      • Offboarding & onboarding
      • Plan layout
      • Manage inventory
      • Manage loading docks
      • Pick, pack, ship
      • Plan and manage workforce
      • Manage returns
      • Transfer product cross-dock
      • Asset lifecycle management
      • Supply chain management
      • Maintenance planning & scheduling
      Planning & Budgeting Strategic HR Procurement Customer Relationship Management Facilities Management Project Management
      Process Technology Process Technology Process Technology Process Technology Process Technology Process Technology
      • Budget reporting
      • Variance analysis
      • Multi-year operating plan
      • Monthly forecasting
      • Annual operating plan
      • Compensation planning
      • Workforce planning
      • Succession planning
      • Supplier management
      • Purchase order management
      • Workflow approvals
      • Contract / tender management
      • Contact management
      • Activity management
      • Analytics
      • Plan and acquire
      • Asset maintenance
      • Disposal
      • Project management
      • Project costing
      • Budget control
      • Document management

      Complete an inventory collection of your application portfolio

      MANAGED vs. UNMANAGED APPLICATION ENVIRONMENTS

      • Managed environments make way for easier inventory collection since there is significant control as to what applications can be installed on a company asset. Organizations will most likely have a comprehensive list of supported and approved applications.
      • Unmanaged environments are challenging to control because users are free to install any applications on company assets, which may or may not be supported by IT.
      • Most organizations fall somewhere in between – there is usually a central repository of applications and several applications that are exceptions to the company policies. Ensure that all applications are accounted for.

      Determine your inventory collection method:

      MANUAL INVENTORY COLLECTION
      • In its simplest form, a spreadsheet is used to document your application inventory.
      • For large organizations, reps interview all business domains to create a list of installed applications.
      • Conducting an end-user survey within your business domains is one way to gather your application inventory and assess quality.
      • This manual approach is most appropriate for smaller organizations with small application portfolios across domains.
      AUTOMATED INVENTORY COLLECTION
      • Using inventory collection compatibility tools, discover all of the supported applications within your organization.
      • This approach may not capture all applications, depending on the parameters of your automated tool.
      • This approach works well in a managed environment.

      Activity 2.2.2 – Understand the current application portfolio

      1-2 hours

      1. Brainstorm a list of the applications that support the ERP business processes inventoried in Activity 2.2.1. If an application has multiple instances, list each instance as a separate line item.
      2. Indicate the following for each application:
        1. User satisfaction. This may be more than one entry as different groups – e.g., IT vs. business – may differ.
        2. Processes supported. Refer to processes defined in Activity 2.2.1. Update 2.2.1 if additional processes are identified during this exercise.
        3. Define a future disposition: Keep, Update, Replace. It is possible to have more than one disposition, e.g., Update or Replace is a valid disposition.
      3. [Optional] Collect the following information about each application. This information can be used to calculate the cost per application and total cost per user:
        1. Number of users or user groups
        2. Estimated maintenance costs
        3. Estimated capital costs
        4. Estimated licensing costs
        5. Estimated support costs

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Application Portfolio' table on the next slide.

      Download the ERP Strategy Report Template

      2.2.2 - Application portfolio

      Inventory your applications and assess usage, satisfaction, and disposition

      Application Name Satisfaction Processes Supported Future Disposition
      PeopleSoft Financials Medium and declining ERP – shares one support person with HR Update or Replace
      Time Entry (custom) Low Time and Attendance Replace
      PeopleSoft HR Medium Core HR Update or Replace
      ServiceNow High ITSM
      CSM: Med-Low
      ITSM and CSM
      CSM – complexity and process changes
      Update
      Data Warehouse High IT
      Business: Med-Low
      BI portal – Tibco SaaS datamart Keep
      Regulatory Compliance Medium Regulatory software – users need training Keep
      ACL Analytics Low Audit Replace
      Elite Medium Supply chain for wholesale Update (in progress)
      Visual Importer Med-High Customs and taxes Keep
      Custom Reporting application Med-High Reporting solution for wholesale (custom for old system, patched for Elite) Replace

      2.3.1 – Visual application portfolio [optional]

      A diagram of applications and how they connect to each other. There are 'External Systems' and 'Internal Systems' split into three divisions, 'Retail Division', 'Wholesale Division', and 'Corporate Services'. Example external systems are 'Moneris', 'Freight Carriers', and 'Banks'. Example internal systems are 'Retail ERP/POS', 'Elite', and 'Excel'.

      Step 2.3

      Process pains, opportunities, and maturity

      Activities
      • 2.3.1 Level one process inventory with stakeholders
      • 2.3.2 Process pain points and opportunities
      • 2.3.3 Process key success indicators
      • 2.3.4 Process and technology maturity
      • 2.3.5 Mega-process prioritization

      This step will walk you through the following activities:

      • Assign stakeholders, discuss pain points, opportunities, and key success indicators for the mega-processes identified in Step 2.1
      • Assign process and technology maturity to each prioritizing the mega-processes

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Outcomes of this step

      For each mega-process:

      • Level 1 processes with process and technology maturity assigned
      • Stakeholders identified
      • Process pain points, opportunities, and key success indicators identified
      • Prioritize the mega-processes

      Building out the mega-processes

      Congratulations, you have made it to the “big lift” portion of the blueprint. For each of the processes that were identified in exercise 2.2.1, you will fill out the following six details:

      1. Primary stakeholder(s)
      2. A description of the process
      3. hat level 1 processes/capabilities the mega-process is composed of
      4. Problems the new system must solve
      5. What success will look like when the new system is implemented
      6. The process and technological maturity of each level 1 process.

      Sample of the 'Core Finance' slide in the ERP Strategy Report, as shown on the next slide, with numbers corresponding to the ordered list above. 1 is on a list of 'Stakeholders', 2 is by the 'Description' box, 3 is on the 'Capability' table column, 4 is on the 'Current Pain Points' box, 5 is on the 'Key Success Factors' box, and 6 is on the 'Maturity' ratings column.

      It will take one to three hours per mega-process to complete the six different sections.

      Note:
      For each mega-process identified you will create a separate slide in the ERP Strategy Report. Default slides have been provided. Add or delete as necessary.

      Sample of the 'Core Finance' slide in the ERP Strategy Report. Note on the list of stakeholders reads 'Primary Stakeholders'. Note on the title, Core Finance, reads 'Mega-process name'. Note on the description box reads 'Description of the process'. Note on the 'Key Success Factors' box reads 'What success looks like'. Note on the 'Current Pain Points' box reads 'Problems the new system must solve'. Below is a capability table with columns 'Capability', 'Maturity', and a blank on for notes. Note on the 'Capability' table column reads 'Level 1 process'. Note on the 'Maturity' ratings column reads 'Level 1 process maturity of process and technology'. Note on the notes column reads 'Level 1 process notes'.

      An ERP project is most effective when you follow a structured approach to define, select, implement, and optimize

      Top-down approach

      ERP Strategy
      • Operating Model – Define process strategy, objectives, and operational implications.
      • Level 1 Processes –Define process boundaries, scope at the organization level; the highest level of mega-process.

      • Level 2 Processes – Define processes by function/group which represent the next level of process interaction in the organization.
      • Level 3 Processes – Decompose process by activity and role and identify suppliers, inputs, outputs, customers, metrics, and controls.
      • Functional Specifications; Blueprint and Technical Framework – Refine how the system will support and enable processes; includes functional and technical elements.
      • Org Structure and Change Management – Align org structure and develop change mgmt. strategy to support your target operating model.
      • Implementation and Transition to Operations – Execute new methods, systems, processes, procedures, and organizational structure.
      • ERP Optimization and Continuous Improvement – Establish a program to monitor, govern, and improve ERP systems and processes.

      *A “stage gate” approach should be used: the next level begins after consensus is achieved for the previous level.

      Activity 2.3.1 – Level 1 process inventory with stakeholders

      1 hour per mega-process

      1. Identify the primary stakeholder for the mega-process. The primary stakeholder is usually the process owner. For example, for core finance the CFO is the process owner/primary stakeholder. Name a maximum of three stakeholders.
      2. In the lower section, detail all the capabilities/processes associated with the mega-process. Be careful to remain at the level 1 process level as it is easy to start identifying the “How” of a process. The “How” is too deep.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Stakeholders' list and 'Capability' table column highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.2 – Process pain points and opportunities

      30+ minutes per mega-process

      1. As a group, write a clear description of the mega-process. This helps establish alignment on the scope of the mega-process.
      2. Start with the discussion of current pain points with the various capabilities. These pain points will be items that the new solution will have to resolve.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Description', 'Key Success Factors', and 'Current Pain Points' boxes highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.3 – Key success indicators

      30 minutes per mega-process

      1. Document key success factors that should be base-lined in the existing system to show the overall improvement once the new system is implemented. For example, if month-end close takes 12 days in the current system, target three days for month-end close in the new system.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Description', 'Key Success Factors', and 'Current Pain Points' boxes highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.4 – Process and technology maturity

      1 hour

      1. For each capability/level 1 process identified determine you level of process maturity:
        • Weak – Ad hoc processes without documentation
        • Moderate – Documented processes that are often executed consistently
        • Strong – Documented processes that include exception handling that are rigorously followed
        • Payroll is an example of a strong process, even if every step is manual. The process is executed the same every time to ensure staff are paid properly and on time.
      2. For each capability/level 1 process identified determine you level of technology maturity:
        • Weak – manual execution and often paper-based
        • Moderate – Some technology support with little automation
        • Strong – The process executed entirely within the technology stack with no manual processes

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Maturity' and notes columns highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.5 – Mega-process prioritization

      1 hour

      1. For the mega-processes identified, map each process’s current state in terms of process rigor versus organizational importance.
        • For process rigor, refer to your process maturity in the previous exercises.
      2. Now, as a group discuss how you want to “move the needle” on each of the processes. Remember that you have a limited capacity so focus on the processes that are, or will be, of strategic importance to the organization. The processes that are placed in the top right quadrant are the ones that are likely the strategic differentiators.

      Record this information in the ERP Strategy Report Template.

      A smaller version of the process prioritization map on the next slide.

      Download the ERP Strategy Report Template.

      ERP Process Prioritization

      Establishing an order of importance can impact vendor selection and implementation roadmap; high priority areas are critical for ERP success.

      A prioritization map placing processes by 'Rigor' and 'Organizational Importance' They are numbered 1-9, 0, A, and B and are split into two colour-coded sets for 'Future (green)' and 'Current(red)'. On the x-axis 'Organizational Importance' ranges from 'Operational' to 'Strategic' and on the y-axis 'Process Rigor' ranges from 'Get the Job Done' to 'Best Practice'. Comparing 'Current' to 'Future', they have all moved up from 'Get the Job Done' into 'Best Practice' territory and a few have migrated over from 'Operational' to 'Strategic'. Processes are 1. Core Finance, 2. Core HR, 3. Workforce Management, 4.Talent Management, 5. Employee Health and Safety, 6. Enterprise Asset Management, 7.Planning & Budgeting, 8. Strategic HR, 9. Procurement Mgmt., 0. CRM, A. Facilities, and B. Project Management.

      Build an ERP Strategy and Roadmap

      Phase 3

      Plan your project

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Map out your stakeholders to evaluate their impact on the project
      • Build an initial risk register and ensure the group is aligned
      • Set the initial core project team and their accountabilities and get them started on the project

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Step 3.1

      Stakeholders, risk, and value

      Activities
      • 3.1.1 Stakeholder analysis
      • 3.1.2 Potential pitfalls and mitigation strategies
      • 3.1.3 Project value [optional]

      This step will walk you through the following activities:

      • Map out your stakeholders to evaluate their impact on the project
      • Build an initial risk register and ensure the group is aligned

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • An understanding of the stakeholders and their project influence
      • An initial risk register
      • A consensus on readiness to proceed

      Understand how to navigate the complex web of stakeholders in ERP

      Identify which stakeholders to include and what their level of involvement should be during requirements elicitation based on relevant topic expertise.

      Sponsor End User IT Business
      Description An internal stakeholder who has final sign-off on the ERP project. Front-line users of the ERP technology. Back-end support staff who are tasked with project planning, execution, and eventual system maintenance. Additional stakeholders that will be impacted by any ERP technology changes.
      Examples
      • CEO
      • CIO/CTO
      • COO
      • CFO
      • Warehouse personnel
      • Sales teams
      • HR admins
      • Applications manager
      • Vendor relationship manager(s)
      • Director, Procurement
      • VP, Marketing
      • Manager, HR
      Value Executive buy-in and support is essential to the success of the project. Often, the sponsor controls funding and resource allocation. End users determine the success of the system through user adoption. If the end user does not adopt the system, the system is deemed useless and benefits realization is poor. IT is likely to be responsible for more in-depth requirements gathering. IT possesses critical knowledge around system compatibility, integration, and data. Involving business stakeholders in the requirements gathering will ensure alignment between HR and organizational objectives.

      Large-scale ERP projects require the involvement of many stakeholders from all corners and levels of the organization, including project sponsors, IT, end users, and business stakeholders. Consider the influence and interest of stakeholders in contributing to the requirements elicitation process and involve them accordingly.

      An example stakeholder map, categorizing stakeholders by amount of influence and interest.

      Activity 3.1.1 – Map your stakeholders

      1 hour

      1. As a group, identify all the ERP stakeholders. A stakeholder may be an individual such as the CEO or CFO, or it may be a group such as front-line employees.
      2. Map each stakeholder on the quadrant based on their expected Influence and Involvement in the project
      3. [Optional] Color code the users using the scale below to quickly identify the group that the stakeholder belongs to.
        • Sponsor – An internal stakeholder who has final sign-off on the ERP project.
        • End User – Front-line users of the ERP technology.
        • IT – Back-end support staff who are tasked with project planning, execution, and eventual system maintenance.
        • Business – Additional stakeholders that will be impacted by any ERP technology changes.

      Record this information in the ERP Strategy Report Template.

      Preview of the next slide.

      Download the ERP Strategy Report Template

      Slide titled 'Map the organization's stakeholders with a more in-depth example of a stakeholder map and long 'List of Stakeholders'. The quadrants that stakeholders are sorted into by influence and involvement are labelled 'Keep Satisfied (1)', 'Involve Closely (2)', 'Monitor (3)', and 'Keep Informed (4)'.

      Prepare contingency plans to minimize time spent handling unexpected risks

      Understanding the technical and strategic risks of a project can help you establish contingencies to reduce the likelihood of risk occurrence and devise mitigation strategies to help offset their impact if contingencies are insufficient.

      Risk Impact Likelihood Mitigation Effort
      Inadequate budget for additional staffing resources. 2 1 Use internal transfers and role-sharing rather than external hiring.
      Push-back on an ERP solution. 2 2 Use formal communication plans, an ERP steering committee, and change management to overcome organizational readiness.
      Overworked resources. 1 1 Create a detailed project plan that outlines resources and timelines in advance.
      Rating Scale:
      Impact: 1- High Risk 2- Moderate Risk 3- Minimal Risk
      Likelihood: 1- High/Needs Focus 2- Can Be Mitigated 3- Remote Likelihood

      Remember

      The biggest sources of risk in an ERP strategy are lack of planning, poorly defined requirements, and lack of governance.

      Apply the following mitigation tips to avoid pitfalls and delays.

      Risk Mitigation Tips

      • Upfront planning
      • Realistic timelines
      • Resource support
      • Managing change
      • Executive sponsorship
      • Sufficient funding
      • Setting the right expectations

      Activity 3.1.2 – Identify potential project pitfalls and mitigation strategies

      1-2 hours

      1. Discuss what “Impact” and “Likelihood” mean to your organization. For example, define Impact by what is important to your organization – financial loss, reputational impact, employee loss, and process impairment are all possible factors.
      2. Identify potential risks that may impede the successful completion of each work initiative. Risks may include predictable factors such as low resource capability, or unpredictable factors such as a change in priorities leading to withdrawn buy-in.
      3. For each risk, identify mitigation tactics. In some cases, mitigation tactics might take the form of standalone work initiative. For example, if a risk is lack of end-user buy-in, a work initiative to mitigate that risk might be to build an end-user communication plan.

      Record this information in the ERP Strategy Report Template.

      Preview of the next slide.

      Download the ERP Strategy Report Template

      Risks

      Risk Impact Likelihood Mitigation Effort
      Inadequate budget for additional staffing resources. 2 1 Use internal transfers and role-sharing rather than external hiring.
      Push-back on an ERP solution. 2 2 Use formal communication plans, an ERP steering committee, and change management to overcome organizational readiness.
      Overworked resources. 1 1 Create a detailed project plan that outlines resources and timelines in advance.
      Project approval 1 1 Build a strong business case for project approval and allow adequate time for the approval process
      Software does not work as advertised resulting in custom functionality with associated costs to create/ maintain 1 2 Work with staff to change processes to match the software instead of customizing the system thorough needs analysis prior to RFP creation
      Under estimation of staffing levels required, i.e. staff utilized at 25% for project when they are still 100% on their day job 1 2 Build a proper business case around staffing (be somewhat pessimistic)
      EHS system does not integrate with new HRMS/ERP system 2 2
      Selection of an ERP/HRMS that does not integrate with existing systems 2 3 Be very clear in RFP on existing systems that MUST be integrated to
      Rating Scale:
      Impact: 1- High Risk 2- Moderate Risk 3- Minimal Risk
      Likelihood: 1- High/Needs Focus 2- Can Be Mitigated 3- Remote Likelihood

      Is the organization committed to the ERP project?

      A recent study of critical success factors to an ERP implementation identified top management support and interdepartmental communication and cooperation as the top two success factors.

      By answering the seven questions the key stakeholders are indicating their commitment. While this doesn’t guarantee that the top two critical success factors have been met, it does create the conversation to guide the organization into alignment on whether to proceed.

      A table of example stakeholder questions with options 1-5 for how strongly they agree or disagree. 'Strongly disagree - 1', 'Somewhat disagree - 2', 'Neither agree or disagree - 3', 'Somewhat agree - 4', 'Strongly agree - 5'.

      Activity 3.1.3 – Project value (optional)

      30 minutes

      1. As a group, discuss the seven questions in the table. Ensure everyone agrees on what the questions are asking. If necessary, modify the language so that the meaning is clear to everyone.
      2. Have each stakeholder answer the seven questions on their own. Have someone compile the answers looking for:
        1. Any disagrees, strongly, somewhat, or neither as this indicates a lack of clarity. Endeavour to discover what additional information is required.
        2. [Optional] Have the most positive and most negative respondents present their points of view for the group to discuss. Is someone being overly optimistic, or pessimistic? Did the group miss something?

      There are no wrong answers. It should be okay to disagree with any of these statements. The goal of the exercise is to generate conversation that leads to support of the project and collaboration on the part of the participants.

      Record this information in the ERP Strategy Report Template.

      A preview of the next slide.

      Download the ERP Strategy Report Template

      Ask the right questions now to determine the value of the project to the organization

      Please indicate how much you agree or disagree with each of the following statements.

      Question # Question Strongly disagree Somewhat disagree Neither agree nor disagree Somewhat agree Strongly agree
      1. I have everything I need to succeed. 1 2 3 4 5
      2. The right people are involved in the project. 1 2 3 4 5
      3. I understand the process of ERP selection. 1 2 3 4 5
      4. My role in the project is clear to me. 1 2 3 4 5
      5. I am clear about the vision for this project. 1 2 3 4 5
      6. I am nervous about this project. 1 2 3 4 5
      7. There is leadership support for the project. 1 2 3 4 5

      Step 3.2

      Project set up

      Activities
      • 3.2.1 Create the project team
      • 3.2.2 Set the project RACI

      This step will walk you through the following activities:

      • Set the initial core project team and their accountabilities to the project.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • Identify the core team members and their time commitments.
      • Assign responsibility, accountability or communication needs.

      Identify the right stakeholders for your project team

      Consider the core team functions when composing the project team. It is essential to ensure that all relevant perspectives (business, IT, etc.) are evaluated to create a well-aligned and holistic ERP strategy.

      PROJECT TEAM ROLES

      • Project champion
      • Project advisor
      • Steering committee
      • Project manager
      • Project team
      • Subject matter experts
      • Change management specialist

      PROJECT TEAM FUNCTIONS

      • Collecting all relevant inputs from the business.
      • Gathering high-level requirements.
      • Creating a roadmap.

      Info-Tech Insight

      There may be an inclination towards a large project team when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units like HR and Finance, as well as IT.

      Activity 3.2.1 – Project team

      1 hour

      1. Considering your ERP project scope, discuss the resources and capabilities necessary, and generate a complete list of key stakeholders considering each of the roles indicated on the chart to the right.
      2. Using the list previously generated, identify a candidate(s) for each role and determine their responsibility in the ERP strategy and their expected time commitment.

      Record this information in the ERP Strategy Report Template.

      Preview of the table on the next slide.

      Download the ERP Strategy Report Template

      Project team

      Of particular importance for this table is the commitment column. It is important that the organization understands the level of involvement for all roles. Failure to properly account for the necessary involvement is a major risk factor.

      Role Candidate Responsibility Commitment
      Project champion John Smith
      • Provide executive sponsorship.
      20 hours/week
      Steering committee
      • Establish goals and priorities.
      • Define scope and approve changes.
      • Provide adequate resources and resolve conflict.
      • Monitor project milestones.
      10 hours/week
      Project manager
      • Prepare and manage project plan.
      • Monitor project team progress.
      • Conduct project team meetings.
      40 hours/week
      Project team
      • Drive day-to-day project activities.
      • Coordinate department communication.
      • Make process and design decisions.
      40 hours/week
      Subject matter experts by area
      • Attend meetings as needed.
      • Respond to questions and inquiries.
      5 hours/week

      Define project roles and responsibilities to improve progress tracking

      Build a list of the core ERP strategy team members and then structure a RACI chart with the relevant categories and roles for the overall project.

      • Responsible – Conducts work to achieve the task
      • Accountable – Answerable for completeness of task
      • Consulted – Provides input for the task
      • Informed – Receives updates on the task

      Benefits of assigning RACI early:

      • Improve project quality by assigning the right people to the right tasks.
      • Improve chances of project task completion by assigning clear accountabilities.
      • Improve project buy-in by ensuring stakeholders are kept informed of project progress, risks, and successes.

      Activity 3.2.2 – Project RACI

      1 hour

      1. The ERP strategy will require a cross-functional team within IT and business units. Make sure the responsibilities are clearly communicated to the selected project sponsor.
      2. Modify the left-hand column to match the activities expected in your project.

      Record this information in the ERP Strategy Report Template.

      Preview of the RACI chart on the next slide.

      Download the ERP Strategy Report Template

      3.2.2 – Project RACI

      Project champion Project advisor Project steering committee Project manager Project team Subject matter experts
      Determine project scope & vision I C A R C C
      Document business goals I I A R I C
      Inventory ERP processes I I A C R R
      Map current state I I A R I R
      Assess gaps and opportunities I C A R I I
      Explore alternatives R R A I I R
      Build a roadmap R A R I I R
      Create a communication plan R A R I I R
      Present findings R A R I I R

      Build an ERP Strategy and Roadmap

      Phase 4

      Next steps

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Review the different options to solve the identified pain points
      • Build out a roadmap showing how you will get to those solutions
      • Build a communication plan that includes the stakeholder presentation

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Step 4.1

      Build your roadmap

      Activities
      • 4.1.1 Pick your path
      • 4.1.2 Build your roadmap
      • 4.1.3 Visualize your roadmap (optional)

      This step will walk you through the following activities:

      • Review the different options to solve the identified pain points then build out a roadmap of how to get to that solution.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • A strategic direction is set
      • An initial roadmap is laid out

      Choose the right path for your organization

      There are several different paths you can take to achieve your ideal future state. Make sure to pick the one that suits your needs as defined by your current state.

      A diagram of strategies. At the top is 'Current State', at the bottom is 'Future State', and listed strategies are 'Maintain Current System', 'Augment Current System', 'Optimize', and 'Transform'.

      Explore the options for achieving your ideal future state

      CURRENT STATE STRATEGY
      Your existing application satisfies both functionality and integration requirements. The processes surrounding it likely need attention, but the system should be considered for retention. MAINTAIN CURRENT SYSTEM
      Your existing application is, for the most part, functionally rich, but may need some tweaking. Spend time and effort building and enhancing additional functionalities or consolidating and integrating interfaces. AUGMENT CURRENT SYSTEM
      Your ERP application portfolio consists of multiple apps serving the same functions. Consolidating applications with duplicate functionality is more cost efficient and makes integration and data sharing simpler. OPTIMIZE: CONSOLIDATE AND INTEGRATE SYSTEMS
      Your existing system offers poor functionality and poor integration. It would likely be more cost and time efficient to replace the application and its surrounding processes altogether. TRANSFORM: REPLACE CURRENT SYSTEM

      Option: Maintain your current system

      Resolve your existing process and people pain points

      MAINTAIN CURRENT SYSTEM

      Keep the system, change the process.

      Your existing application satisfies both functionality and integration requirements. The processes surrounding it likely need attention, but the system should be considered for retention.

      Maintaining your current system entails adjusting current processes and/or adding new ones, and involves minimal cost, time, and effort.

      INDICATORS POTENTIAL SOLUTIONS
      People Pain Points
      • Lack of training
      • Low user adoption
      • Lack of change management
      • Contact vendor to inquire about employee training opportunities
      • Build a change management strategy
      Process Pain Points
      • Legacy processes
      • Workarounds and shortcuts
      • Highly specialized processes
      • Inconsistent processes
      • Explore process reengineering and process improvement opportunities
      • Evaluate and standardize processes

      Option: Augment your current system

      Use augmentation to resolve your existing technology and data pain points

      AUGMENT CURRENT SYSTEM

      Add to the system.

      Your existing application is for the most part functionally rich but may need some tweaking. Spend time and effort enhancing your current system.

      You will be able to add functions by leveraging existing system features. Augmentation requires limited investment and less time and effort than a full system replacement.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Lack of reporting functions.
      • Lacking functional depth in key process areas.
      • Add point solutions or enable modules to address missing functionality.
      Data Pain Points
      • Poor data quality
      • Lack of data for processing and reporting
      • Single-source data entry
      • Add modules or augment processes to capture data

      Option: Consolidate and integrate

      Consolidate and integrate your current systems to address your technology and data pain points

      CONSOLIDATE AND INTEGRATE SYSTEMS

      Get rid of one system, combine two, or connect many.

      Your ERP application portfolio consists of multiple apps serving the same functions.

      Consolidating your systems eliminates the need to manage multiple pieces of software that provide duplicate functionality. Reducing the number of ERP applications makes integration and data sharing simpler.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Disparate and disjointed systems
      • Multiple systems supporting the same function
      • Unused software licenses
      • System consolidation
      • System and module integration
      • Assess usage and consolidate licensing
      Data Pain Points
      • Multiple versions of same data
      • Duplication of data entry in different modules or systems
      • Poor data quality
      • Centralize core records
      • Assign data ownership
      • Single-source data entry

      Option: Replace your current system

      Replace your system to address gaps in your existing processes and various pain points

      REPLACE CURRENT SYSTEM

      Start from scratch.

      You’re transitioning from an end-of-life legacy system. Your existing system offers poor functionality and poor integration. It would likely be more cost and time efficient to replace the application and its surrounding processes all together.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Lack of functionality and poor integration.
      • Obsolete technology.
      • Not aligned with technology direction or enterprise architecture plans.
      • Evaluate the ERP technology landscape.
      • Determine if you need to replace the current system with a point solution or an all-in-one solution.
      • Align ERP technologies with enterprise architecture.
      Data Pain Points
      • Limited capability to store and retrieve data.
      • Understand your data requirements.
      Process Pains
      • Insufficient tools to manage workflow.
      • Review end-to-end processes.
      • Assess user satisfaction.

      Activity 4.1.1 – Path to future state

      1+ hour
      1. Discuss the four options and the implications for your organization.
      2. Come to an agreement on your chosen path.

      The same diagram of strategies. At the top is 'Current State', at the bottom is 'Future State', and listed strategies are 'Maintain Current System', 'Augment Current System', 'Optimize', and 'Transform'.

      Activity 4.1.2 – Build a roadmap

      1-2 hours

      1. Start your roadmap with the stakeholder presentation. This is your mark in the sand to launch the project.
      2. For each item on your roadmap assign an owner who will be accountable to the completion of the roadmap item.
      3. Wherever possible, assign a start date, month, or quarter. The more specific you can be the better.
      4. Identify completion dates to create a sense of urgency. If you are struggling with start dates, it can help to start with a finish date and “back in” to a start date based on estimated efforts.

      Record this information in the ERP Strategy Report Template.

      Note:
      Your roadmap should be treated as a living document that is updated and shared with the stakeholders on a regular schedule.

      Preview of the strategy roadmap table on the next slide.

      Download the ERP Strategy Report Template

      ERP Strategy roadmap

      Initiative Owner Start Date Completion Date
      Create final workshop deliverable Info-Tech 16 September, 2021
      Review final deliverable Workshop sponsor
      Present to executive team Oct 2021
      Build business case CFO, CIO, Directors 3 weeks to build
      3-4 weeks process time
      Build an RFI for initial costings 1-2 weeks
      Stage 1 approval for requirements gathering Executive committee Milestone
      Determine and acquire BA support for next step 1 week
      Requirements gathering – level 2 processes Project team 5-6 weeks effort
      Build RFP (based on informal approval) CFO, CIO, Directors 4th calendar quarter 2022 Possible completion January 2023
      2-4 weeks

      Activity 4.1.3 – Build a visual roadmap [optional]

      1 hour

      1. For some, a visual representation of a roadmap is easier to comprehend. Consider taking the roadmap built in 4.1.2 and creating a visual.

      Record this information in the ERP Strategy Report Template.

      Preview of the visual strategy roadmap chart on the next slide.

      Download the ERP Strategy Report Template

      ERP Strategy Roadmap

      A table set up similarly to the previous one, but instead of 'Start Date' and 'Completion Date' columns there are multiple small columns broken up by fiscal quarters (i.e.. FY2022: Q1, Q2, Q3, Q4). There is a key with a light blue diamond shape representing a 'Milestone' and a blue arrow representing a 'Work in progress'; they are placed the Quarters columns according to when each row item reached a milestone or began its progress.

      Step 4.2

      Wrap up and present

      Activities
      • 4.2.1 Communication plan
      • 4.2.2 Stakeholder presentation

      This step will walk you through the following activities:

      • Build a communication plan as part of organizational change management, which includes the stakeholder presentation

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • An initial communication plan for organizational change management
      • A stakeholder presentation

      Effectively communicate the changes an ERP foundation strategy will impose

      A communication plan is necessary because not everyone will react positively to change. Therefore, you must be prepared to explain the rationale behind any initiatives that are being rolled out.

      Steps:

      1. Start by building a sound communication plan.
      2. The communication plan should address all stakeholders that will be subject to change, including executives and end users.
      3. Communicate how a specific initiative will impact the way employees work and the work they do.
      4. Clearly convey the benefits of the strategy to avoid resistance.

      “The most important thing in project management is communication, communication, communication. You have to be able to put a message into business terms rather than technical terms.” (Lance Foust, I.S. Manager, Plymouth Tube Company)

      Project Goals Communication Goals Required Resources Communication Channels
      Why is your organization embarking on an ERP project? What do you want employees to know about the project? What resources are going to be utilized throughout the ERP strategy? How will your project team communicate project updates to the employees?
      Streamline processes and achieve operational efficiency. We will focus on mapping and gathering requirements for (X) mega-processes. We will be hiring process owners for each mega-process. You will be kept up to date about the project progress via email and intranet. Please feel free to contact the project owner if you have any questions.

      Activity 4.2.1 – Communication plan

      1 hour

      1. List the types of communication events and documents you will need to produce and distribute.
      2. Indicate the purpose of the event or document, who the audience is, and who is responsible for the communication.
      3. Identify who will be responsible for the development and delivery of the communication plan.

      Record this information in the ERP Strategy Report Template.

      Preview of the Communication Plan table on the next slide.

      Download the ERP Strategy Report Template

      Communication plan

      Use the communication planning template to track communication methods needed to convey information regarding ERP initiatives.

      This is designed to help your organization make ERP initiatives visible and create stakeholder awareness.

      Audience Purpose Delivery/ Format Communicator Delivery Date Status/Notes
      Front-line employees Highlight successes Bi-weekly email CEO Mondays
      Entire organization Highlight successes
      Plans for next iteration
      Monthly townhall Senior leadership Last Thursday of every month Recognize top contributors from different parts of the business. Consider giving out prizes such as coffee mugs
      Iteration demos Show completed functionality to key stakeholders Iteration completion web conference Delivery lead Every other Wednesday Record and share the demonstrations to all employees

      Conduct a presentation of the final deliverable for stakeholders

      After completing the activities and exercises within this blueprint, the final step of the process is to present the deliverable to senior management and stakeholders.

      Know Your Audience

      • Decide what needs to be presented and to whom. The purpose and format for communicating initiatives varies based on the audience. Identify the audience first to ensure initiatives are communicated appropriately.
      • IT and the business speak different languages. The business may not have the patience to try to understand IT, so it is up to IT to learn and use the language of business. Failing to put messages into language that resonates with the business will create disengagement and resistance.
      • Effective communication takes preparation to get the right content and tone to convey your real message.

      Learn From Other Organizations

      “When delivering the strategy and next steps, break the project down into consumable pieces. Make sure you deliver quick wins to retain enthusiasm and engagement.

      By making it look like a different project you keep momentum and avoid making it seem unattainable.” (Scott Clark, Innovation Credit Union)

      “To successfully sell the value of ERP, determine what the high-level business problem is and explain how ERP can be the resolution. Explicitly state which business areas ERP is going to touch. The business often has a very narrow view of ERP and perceives it as just a financial system. The key part of the strategy is that the organization sees the broader view of ERP.” (Scott Clark, Innovation Credit Union)

      Activity 4.2.2 – Stakeholder presentation

      1 hour

      1. The following sections of the ERP Strategy Report Template are designed to function as the stakeholder presentation:
        1. Workshop Overview
        2. ERP Models
        3. Roadmap
      2. You can use the Template as your presentation deck or extract the above sections to create a stand-alone stakeholder presentation.
      3. Remember to take your audience into account and anticipate the questions they may have.

      Samples of the ERP Strategy Report Template.

      Download the ERP Strategy Report Template

      Summary of Accomplishment

      Get the Most Out of Your ERP

      ERP technology is critical to facilitating an organization’s flow of information across business units. It allows for seamless integration of systems and creates a holistic view of the enterprise to support decision making. ERP implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.

      Build an ERP Strategy and Roadmap allows organizations to proactively implement continuous assessment and optimization of their enterprise resource planning system, including:

      • Alignment and prioritization of key business and technology drivers.
      • Identification of ERP processes, including classification and gap analysis.
      • Measurement of user satisfaction across key departments.
      • Improved vendor relations.
      • Data quality initiatives.

      This formal ERP optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Research Contributors

      Name Title Organization
      Anonymous Anonymous Software industry
      Anonymous Anonymous Pharmaceutical industry
      Boris Znebel VP of Sales Second Foundation
      Brian Kudeba Director, Administrative Systems Fidelis Care
      David Lawrence Director, ERP Allegheny Technologies Inc.
      Ken Zima CIO Aquarion Water Company
      Lance Foust I.S. Manager Plymouth Tube Company
      Pooja Bagga Head of ERP Strategy & Change Transport for London
      Rob Schneider Project Director, ERP Strathcona County
      Scott Clark Innovation Credit Union
      Tarek Raafat Manager, Application Solutions IDRC
      Tom Walker VP, Information Technology StarTech.com

      Related Info-Tech Research

      Bibliography

      Gheorghiu, Gabriel. "The ERP Buyer’s Profile for Growing Companies." Selecthub. 2018. Accessed 21 Feb. 2021.

      "Maximizing the Emotional Economy: Behavioral Economics." Gallup. n.d. Accessed 21 Feb. 2021.

      Neito-Rodriguez, Antonio. Project Management | How to Prioritize Your Company's Projects. 13 Dec. 2016. Accessed 29 Nov 2021. Web.

      "A&D organization resolves organizational.“ Case Study. Panorama Consulting Group. 2021. PDF. 09 Nov. 2021. Web.

      "Process Frameworks." APQC. n.d. Accessed 21 Feb. 2021.

      Saxena, Deepak and Joe Mcdonagh. "Evaluating ERP Implementations: The Case for a Lifecycle-based Interpretive Approach." The Electronic Journal of Information Systems Evaluation, 29-37. 22 Feb. 2019. Accessed 21 Feb. 2021.

      Evolve Your Business Through Innovation

      • Buy Link or Shortcode: {j2store}330|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Innovation teams are tasked with the responsibility of ensuring that their organizations are in the best position to succeed while the world is in a period of turmoil, chaos, and uncertainty.
      • CIOs have been expected to help the organization transition to remote work and collaboration instantaneously.
      • CEOs are under pressure to redesign, and in some cases reinvent, their business model to cope with and compete in a new normal.

      Our Advice

      Critical Insight

      It is easy to get swept up during a crisis and cling to past notions of normal. Unfortunately, there is no controlling the fact that things have changed fundamentally, and it is now incumbent upon you to help your organization adapt and evolve. Treat this as an opportunity because that is precisely what this is.

      Impact and Result

      There are some lessons we can learn from innovators who have succeeded through past crises and from those who are succeeding now.

      There are a number of tactics an innovation team can employ to help their business evolve during this time:

      1. Double down on digital transformation (DX)
      2. Establish a foresight capability
      3. Become a platform for good

      Evolve Your Business Through Innovation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evolve your business through innovation

      Download our guide to learn what you can do to evolve your business and innovate your way through uncertainty.

      • Evolve Your Business Through Innovation Storyboard
      [infographic]

      Effective IT Communications

      • Buy Link or Shortcode: {j2store}429|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Lead
      • Parent Category Link: /lead

      IT communications are often considered ineffective. This is demonstrated by:

      • A lack of inclusion or time to present in board meetings.
      • Confusion around IT priorities and how they align to organizational objectives.
      • Segregating IT from the rest of the organization.
      • The inability to secure the necessary funding for IT-led initiatives.
      • IT employees not feeling supported or engaged.

      Our Advice

      Critical Insight

      • No one is born a good communicator. Every IT employee needs to spend the time and effort to grow their communication skills; with constant change and worsening IT crises, IT cannot afford to communicate poorly anymore.
      • The skills needed to communicate effectively as a front=line employee or CIO are the same. It is important to begin the development of these skills from the beginning of one's career.
      • Time is a non-renewable resource. Any communication needs to be considered valuable and engaging by the audience or they will be unforgiving.

      Impact and Result

      Communications is a responsibility of all members of IT. This is demonstrated through:

      • Engaging in two-way communications that are continuous and evolving.
      • Establishing a communications strategy – and following the plan.
      • Increasing the skills of all IT employees when it comes to communications.
      • Identifying audiences and their preferred means of communication.

      Effective IT Communications Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Effective IT Communications Capstone Deck – A resource center to ensure you never start communications from a blank page again.

      This capstone blueprint highlights the components, best practices, and importance of good communication for all IT employees.

      • Effective IT Communications Storyboard

      2. IT Townhall Template – A ready-to-use template to help you engage with IT employees and ensure consistent access to information.

      IT town halls must deliver value to employees, or they will withdraw and miss key messages. To engage employees, use well-crafted communications in an event that includes crowd-sourced contents, peer involvement, recognition, significant Q&A time allotment, organizational discussions, and goal alignment.

      • IT Townhall Template

      3. IT Year in Review Template – A ready-to-use template to help communicate IT successes and future objectives.

      This template provides a framework to build your own IT Year In Review presentation. An IT Year In Review presentation typically covers the major accomplishments, challenges, and initiatives of an organization's information technology (IT) department over the past year.

      • IT Year in Review Template

      Infographic

      Further reading

      Effective IT Communications

      Empower IT employees to communicate well with any stakeholder across the organization.

      Analyst perspective

      There has never been an expectation for IT to communicate well.

      Brittany Lutes

      Brittany Lutes
      Research Director
      Info-Tech Research Group

      Diana MacPherson

      Diana MacPherson
      Senior Research Analyst
      Info-Tech Research Group

      IT rarely engages in proper communications. We speak at, inform, or tell our audience what we believe to be important. But true communications seldom take place.

      Communications only occur when channels are created to ensure the continuous opportunity to obtain two-way feedback. It is a skill that is developed over time, with no individual having an innate ability to be better at communications. Each person in IT needs to work toward developing their personal communications style. The problem is we rarely invest in development or training related to communications. Information and technology fields spend time and money developing hard skills within IT, not soft ones.

      The benefits associated with communications are immense: higher business satisfaction, funding for IT initiatives, increased employee engagement, better IT to business alignment, and the general ability to form ongoing partnerships with stakeholders. So, for IT departments looking to obtain these benefits through true communications, develop the necessary skills.

      Executive summary

      Your Challenge Common Obstacles Info-Tech’s Approach
      IT communications are often considered ineffective. This is demonstrated by:
      • A lack of inclusion or time to present in board meetings.
      • Confusion around IT priorities and how they align to organizational objectives.
      • Segregating IT from the rest of the organization.
      • An inability to secure the necessary funding for IT-led initiatives.
      • IT employees not feeling supported or engaged.
      Frequently, these barriers have prevented IT communications from being effective:
      • Using technical jargon when a universal language is needed.
      • Speaking at organization stakeholders rather than engaging through dialogue.
      • Understanding the needs of the audience.
      Overall, IT has not been expected to engage in good communications or taken a proactive approach to communicate effectively.
      Communications is a responsibility of all members of IT. This is demonstrated through:
      • Engaging in two-way communications that are continuous and evolving.
      • Establishing a communications strategy – and following the plan.
      • Increasing the skills of all IT employees when it comes to communications.
      • Identifying audiences and their preferred means of communication.

      Info-Tech Insight
      No one is born a good communicator. Every IT employee needs to spend the time and effort to grow their communication skills as constant change and worsening IT crises mean that IT cannot afford to communicate poorly anymore.

      Your challenge

      Overall satisfaction with IT is correlated to satisfaction with IT communications

      Chart showing satisfaction with it and communications

      The bottom line? For every 10% increase in communications there 8.6% increase in overall IT satisfaction. Therefore, when IT communicates with the organization, stakeholders are more likely to be satisfied with IT overall.

      Info-Tech Diagnostic Programs, N=330 organizations

      IT struggles to communicate effectively with the organization:

      • CIOs are given minimal time to present to the board or executive leaders about IT’s value and alignment to business goals.
      • IT initiatives are considered complicated and confusing.
      • The frequency and impact of IT crises are under planned for, making communications more difficult during a major incident.
      • IT managers do not have the skills to communicate effectively with their team.
      • IT employees do not have the skills to communicate effectively with one another and end users.

      Common obstacles

      IT is prevented from communicating effectively due to these barriers:

      • Difficulty assessing the needs of the audience to inform the language and means of communication that should be used.
      • Using technical jargon rather than translating the communication into commonly understood terms.
      • Not receiving the training required to develop communication skills across IT employees.
      • Frequently speak at organization stakeholders rather than engaging through dialogue.
      • Beginning many communications from a blank page, especially crisis communications.
      • Difficulty presenting complex concepts in a short time to an audience in a digestible and concise manner without diluting the point.

      Effective IT communications are rare:

      53% of CXOs believe poor communication between business and IT is a barrier to innovation.
      Source: Info-Tech CEO-CIO Alignment Survey, 2022

      69% of those in management positions don’t feel comfortable even communicating with their staff.”
      Source: TeamStage, 2022

      Info-Tech’s approach

      Effective communications is not a broadcast but a dialogue between communicator and audience in a continuous feedback loop.

      Continuous loop of dialogue

      The Info-Tech difference:

      1. Always treat every communication as a dialogue, enabling the receiver of the message to raise questions, concerns, or ideas.
      2. Different audiences will require different communications. Be sure to cater the communication to the needs of the receiver(s).
      3. Never assume the communication was effective. Create measures and adjust the communications to get the desired outcome.

      Common IT communications

      And the less common but still important communications

      Communicating Up to Board or Executives

      • Board Presentations
      • Executive Leadership Committee Meetings
      • Technology Updates
      • Budget Updates
      • Risk Updates
      • Year in Review

      Communicating Across the Organization

      • Townhalls – external to IT
      • Year in Review
      • Crisis Email
      • Intranet Communication
      • Customer/Constituent Requests for Information
      • Product Launches
      • Email
      • Watercooler Chat

      Communicating Within IT

      • Townhalls – internal to IT
      • Employee 1:1s
      • Team Meetings
      • Project Updates
      • Project Collaboration Sessions
      • Year in Review
      • All-Hands Meeting
      • Employee Interview
      • Onboarding Documentation
      • Vendor Negotiation Meetings
      • Vendor Product Meetings
      • Email
      • Watercooler Chat

      Insight Summary

      Overarching insight
      IT cannot afford to communicate poorly given the overwhelming impact and frequency of change related to technology. Learn to communicate well or get out of the way of someone who can.

      Insight 1: The skills needed to communicate effectively as a frontline employee or a CIO are the same. It’s important to begin the development of these skills from the beginning of one’s career.
      Insight 2: Time is a non-renewable resource. Any communication needs to be considered valuable and engaging by the audience or they will be unforgiving.
      Insight 3: Don’t make data your star. It is a supporting character. People can argue about the collection methods or interpretation of the data, but they cannot argue the story you share.
      Insight 4: Measure if the communication is being received and resulting in the desired outcome. If not, modify what and how the message is being expressed.
      Insight 5: Messages are also non-verbal. Practice using your voice and body to set the right tone and impact your audience.

      Communication principles

      Follow these principles to support all IT communications.

      Two-Way

      Incorporate feedback loops into your communication efforts. Providing stakeholders with the opportunity to voice their opinions and ideas will help gain their commitment and buy-in.

      Timely

      Frequent communications mitigate rumors and the spread of misinformation. Provide warning before the implementation of any changes whenever possible. Communicate as soon as possible after decisions have been made.

      Consistent

      Make sure the messaging is consistent across departments, mediums, and presenters. Provide managers with key phrases to support the consistency of messages.

      Open & Honest

      Transparency is a critical component of communication. Always tell employees that you will share information as soon as you can. This may not be as soon as you receive the information but as soon as sharing it is acceptable.

      Authentic

      Write messages in a way that embodies the personality of the organization. Don’t spin information; position it within the wider organizational context.

      Targeted

      Use your target audience profiles to determine which audiences need to consume which messages and what mediums should be employed.

      Importance of IT being a good communicator

      Don’t pay the price for poor communication.

      IT needs to communicate well because:

      • IT risk mitigation and technology initiative funding are dependent on critical stakeholders comprehending the risk impact and initiative benefit in easy-to-understand terms.
      • IT employees need clear and direct information to feel empowered and accountable to do their jobs well.
      • End users who have a good experience engaging in communications with IT employees have an overall increase in satisfaction with IT.
      • Continuously demonstrating IT’s value to the organization comes when those initiatives are clearly aligned to overall objectives.
      • Communication prevents assumptions and further miscommunication from happening among IT employees who are usually impacted and fear change the most.

      “Poor communication results in employee misunderstanding and errors that cost approximately $37 billion.”
      – Intranet Connections, 2019

      Effective communication enables organizational strategy and facilitates a two-way exchange

      Effective communication facilitates a two-way exchange

      What makes internal communications effective?

      To be effective, internal communications must be strategic. They should directly support organizational objectives, reinforce key messages to make sure they drive action, and facilitate two-way dialogue, not just one-way messaging.

      Measure the value of the communication

      Communication effectiveness can be measured through a variety of metrics:

      • Increase in Productivity
      • “When employees are offered better communication technology and skills, productivity can increase by up to 30%” (Expert Market, 2022).
      • Increase in Understanding Decision Rationale
      • Employees who report understanding the rationale behind the business decisions made by the executive leadership team (ELT) are 3.6x more likely to be engaged, compared to those who were not (McLean & Company Engagement Survey Database, 2022; N=133,167 responses, 187 organizations).
      • Increase in Revenue
      • Collaboration amongst C-suite executives led to a 27% increase in revenue compared to low collaborating C-suites (IBM, 2021).
      • Increase in End-User Satisfaction
      • 80.9% of end users are satisfied with IT’s ability to communicate with them regarding the information they need to perform their job (Info-Tech’s End-User Satisfaction Survey Database, N=20,617 end users from 126 organizations).

      Methods to determine effectiveness:

      • CIO Business Vision Survey
      • Engagement surveys
      • Focus groups
      • Suggestion boxes
      • Team meetings
      • Random sampling
      • Informal feedback
      • Direct feedback
      • Audience body language
      • Repeating the message back

      How to navigate the research center

      This research center is intended to ensure that IT never starts their communications from a blank page again:

      Tools to help IT be better communicators

      “‘Effectiveness’ can mean different things, and effectiveness for your project is going to look different than it would for any other project.”
      – Gale McCreary in WikiHow, 2022

      Audience: Organizational leadership

      Speaking with Board and executive leaders about strategy, risk, and value

      Keep in mind:

      1 2 3
      Priorities Differ Words Matter The Power of Three
      What’s important to you as CIO is very different from what is important to a board or executive leadership team or even the individual members of these groups. Share only what is important or relevant to the stakeholder(s). Simplify the message into common language whenever possible. A good test is to ensure that someone without any technical background could understand the message. Keep every slide to three points with no more than three words. You are the one to translate this information into a worth-while story to share.

      “Today’s CIOs have a story to tell. They must change the old narrative and describe the art of the (newly) possible. A great leader rises to the occasion and shares a vision that inspires the entire organization.”
      – Dan Roberts, CIO, 2019

      Communications for board presentations

      Secure funding and demonstrate IT as a value add to business objectives.

      DEFINING INSIGHT

      Stop presenting what is important to you as the CIO and present to the board what is important to them.

      Why does IT need to communicate with the board?

      • To get their buy-in and funding for critical IT initiatives.
      • To ensure that IT risks are understood and receive the funding necessary to mitigate.
      • To change the narrative of IT as a service provider to a business enabler.

      FRAMEWORK

      Framework for board presentations

      CHECKLIST

      Do’s & Don’ts of Communicating Board Presentations:

      Do: Ensure you know all the members of the board and their strengths/areas of focus.

      Do: Ensure the IT objectives and initiatives align to the business objectives.

      Do: Avoid using any technical jargon.

      Do: Limit the amount of data you are using to present information. If it can’t stand alone, it isn’t a strong enough data point.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how the organization’s revenue is impacted by IT activities.

      Do: Tell a story that is compelling and excited.

      OUTCOME

      Organization Alignment

      • Approved organization objectives and IT objectives are aligned and supporting one another.

      Stakeholder Buy-In

      • Board members all understand what the future state of IT will look like – and are excited for it!

      Awareness on Technology Trends

      • It is the responsibility of the CIO to ensure the board is aware of critical technology trends that can impact the future of the organization/industry.

      Risks

      • Risks are understood, the impact they could have on the organization is clear, and the necessary controls required to mitigate the risk are funded.

      Communications for business updates

      Continuously build strong relationships with all members of business leadership.

      DEFINING INSIGHT

      Business leaders care about themselves and their goals – present ideas and initiatives that lean into this self-interest.

      Why does IT need to communicate business updates?

      • The key element here is to highlight how IT is impacting the organization’s overall ability to meet goals and targets.
      • Ensure all executive leaders know about and understand IT’s upcoming initiatives – and how they will be involved.

      FRAMEWORK

      Framework for business updates

      CHECKLIST

      Do’s & Don’ts of Communicating Business Updates:

      Do: Ensure IT is given sufficient time to present with the rest of the business leaders.

      Do: Ensure the goals of IT are clear and can be depicted visually.

      Do: Tie every IT goal to the objectives of different business leaders.

      Do: Avoid using any technical jargon.

      Do: Reinforce the positive benefits business leaders can expect.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how IT is driving the digital transformation of the organization.

      OUTCOME

      Better Reputation

      • Get other business leaders to see IT as a value add to any initiative, making IT an enabler not an order taker.

      Executive Buy-In

      • Executives are concerned about their own budgets; they want to embrace all the innovation but within reason and minimal impact to their own finances.

      Digital Transformation

      • Indicate and commit to how IT can help the different leaders deliver on their digital transformation activities.

      Relationship Building

      • Establish trust with the different leaders so they want to engage with you on a regular basis.

      Audience: Organization wide

      Speaking with all members of the organization about the future of technology – and unexpected crises.

      1 2 3
      Competing to Be Heard Measure Impact Enhance the IT Brand
      IT messages are often competing with a variety of other communications simultaneously taking place in the organization. Avoid the information-overload paradox by communicating necessary, timely, and relevant information. Don’t underestimate the benefit of qualitative feedback that comes from talking to people within the organization. Ensure they read/heard and absorbed the communication. IT might be a business enabler, but if it is never communicated as such to the organization, it will only be seen as a support function. Use purposeful communications to change the IT narrative.

      Less than 50% of internal communications lean on a proper framework to support their communication activities.
      – Philip Nunn, iabc, 2020

      Communications for strategic IT initiatives

      Communicate IT’s strategic objectives with all business stakeholders and users.

      DEFINING INSIGHT

      IT leaders struggle to communicate how the IT strategy is aligned to the overall business objectives using a common language understood by all.

      Why does IT need to communicate its strategic objectives?

      • To ensure a clear and consistent view of IT strategic objectives can be understood by all stakeholders within the organization.
      • To demonstrate that IT strategic objectives are aligned with the overall mission and vision of the organization.

      FRAMEWORK

      Framework for IT strategic initiatives

      CHECKLIST

      Do’s & Don’ts of Communicating IT Strategic Objectives:

      Do: Ensure all IT leaders are aware of and understand the objectives in the IT strategy.

      Do: Ensure there is a visual representation of IT’s goals.

      Do: Ensure the IT objectives and initiatives align to the business objectives.

      Do: Avoid using any technical jargon.

      Do: Provide metrics if they are relevant, timely, and immediately understandable.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how the future of the organization will benefit from IT initiatives.

      OUTCOME

      Organization Alignment

      • All employees recognize the IT strategy as being aligned, even embedded, into the overall organization strategy.

      Stakeholder Buy-In

      • Business and IT stakeholders alike understand what the future state of IT will look like – and are excited for it!

      Role Clarity

      • Employees within IT are clear on how their day-to-day activities impact the overall objectives of the organization.

      Demonstrate Growth

      • Focus on where IT is going to be maturing in the coming one to two years and how this will benefit all employees.

      Communications for crisis management

      Minimize the fear and chaos with transparent communications.

      DEFINING INSIGHT

      A crisis communication should fit onto a sticky note. If it’s not clear, concise, and reassuring, it won’t be effectively understood by the audience.

      Why does IT need to communicate when a crisis occurs?

      • To ensure all members of the organization have an understanding of what the crisis is, how impactful that crisis is, and when they can expect more information.
      • “Half of US companies don’t have a crisis communication plan” (CIO, 2017).

      FRAMEWORK

      Framework for crisis management

      CHECKLIST

      Do’s & Don’ts of Communicating During a Crisis:

      Do: Provide timely and regular updates about the crisis to all stakeholders.

      Do: Involve the Board or ELT immediately for transparency.

      Do: Avoid providing too much information in a crisis communication.

      Do: Have crisis communication statements ready to be shared at any time for possible or common IT crises.

      Do: Highlight that employee safety and wellbeing is top priority.

      Do: Work with members of the public relations team to prepare any external communications that might be required.

      OUTCOME

      Ready to Act

      • Holding statements for possible crises will eliminate the time and effort required when the crisis does occur.

      Reduce Fears

      • Prevent employees from spreading concerns and not feeling included in the crisis.

      Maintain Trust

      • Ensure Board and ELT members trust IT to respond in an appropriate manner to any crisis or major incident.

      Eliminate Negative Reactions

      • Any crisis communication should be clear and concise enough when done via email.

      Audience: IT employees

      IT employees need to receive and obtain regular transparent communications to better deliver on their expectations.

      Keep in mind:

      1 2 3
      Training for All Listening Is Critical Reinforce Collaboration
      From the service desk technician to CIO, every person within IT needs to have a basic ability to communicate. Invest in the training necessary to develop this skill set. It seems simple, but as humans we do an innately poor job at listening to others. It’s important you hear employee concerns, feedback, and recommendations, enabling the two-way aspect of communication. IT employees will reflect the types of communications they see. If IT leaders and managers cannot collaborate together, then teams will also struggle, leading to productivity and quality losses.

      “IT professionals who […] enroll in communications training have a chance to both upgrade their professional capabilities and set themselves apart in a crowded field of technology specialists.”
      – Mark Schlesinger, Forbes, 2021

      Communications for IT activities and tactics

      Get IT employees aligned and clear on their daily objectives.

      DEFINING INSIGHT

      Depending on IT goals, the structure might need to change to support better communication among IT employees.

      Why does IT need to communicate IT activities?

      • To ensure all members of the project team are aligned with their tasks and responsibilities related to the project.
      • To be able to identify, track, and mitigate any problems that are preventing the successful delivery of the project.

      FRAMEWORK

      Framework for IT activities & tactics

      CHECKLIST

      Do’s & Don’ts of Communicating IT Activities:

      Do: Provide metrics that define how success of the project will be measured.

      Do: Demonstrate how each project aligns to the overarching objectives of the organization.

      Do: Avoid having large meetings that include stakeholders from two or more projects.

      Do: Consistently create a safe space for employees to communicate risks related to the project(s).

      Do: Ensure the right tools are being leveraged for in-office, hybrid, and virtual environments to support project collaboration.

      Do: Leverage a project management software to reduce unnecessary communications.

      OUTCOME

      Stakeholder Adoption

      • Create a standard communication template so stakeholders can easily find and apply communications.

      Resource Allocation

      • Understand what the various asks of IT are so employees can be adequately assigned to tasks.

      Meet Responsibly

      • Project status meetings are rarely valuable or insightful. Use meetings for collaboration, troubleshooting, and knowledge sharing.

      Encourage Engagement

      • Recognize employees and their work against critical milestones, especially for projects that have a long timeline.

      Communications for everyday IT

      Engage employees and drive results with clear and consistent communications.

      DEFINING INSIGHT

      Employees are looking for empathy to be demonstrated by those they are interacting with, from their peers to managers. Yet, we rarely provide it.

      Why does IT need to communicate on regularly with itself?

      • Regular communication ensures employees are valued, empowered, and clear about their expectations.
      • 97% of employees believe that their ability to perform their tasks efficiently is impacted by communication (Expert Market, 2022).

      FRAMEWORK

      Framework for everyday IT

      CHECKLIST

      Do’s & Don’ts of Communicating within IT:

      Do: Have responses for likely questions prepared and ready to go.

      Do: Ensure that all leaders are sharing the same messages with their teams.

      Do: Avoid providing irrelevant or confusing information.

      Do: Speak with your team on a regular basis.

      Do: Reinforce the messages of the organization every chance possible.

      Do: Ensure employees feel empowered to do their jobs effectively.

      Do: Engage employees in dialogue. The worst employee experience is when they are only spoken at, not engaged with.

      OUTCOME

      Increased Collaboration

      • Operating in a vacuum or silo is no longer an option. Enable employees to successfully collaborate and deliver holistic results.

      Role Clarity

      • Clear expectations and responsibilities eliminate confusion and blame game. Engage employees and create a positive work culture with role clarity.

      Prevent Rumors

      • Inconsistent communication often leads to information sharing and employees spreading an (in)accurate narrative.

      Organizational Insight

      • Employees trust the organization’s direction because they are aware of the different activities taking place and provided with a rationale about decisions.

      Case Study

      Amazon

      INDUSTRY
      E-Commerce

      SOURCE
      Harvard Business Review

      Jeff Bezos has definitely taken on unorthodox approaches to business and leadership, but one that many might not know about is his approach to communication. Some of the key elements that he focused on in the early 2000s when Amazon was becoming a multi-billion-dollar empire included:

      • Banning PowerPoint for all members of the leadership team. They had to learn to communicate without the crutch of the most commonly used presentation tool.
      • Leveraging memos that included specific action steps and clear nouns
      • Reducing all communication to an eighth-grade reading level, including pitches for new products (e.g. Kindle).

      Results

      While he was creating the Amazon empire, 85% of Jeff Bezos’ communication was written in a way that an eighth grader could read. Communicating in a way that was easy to understand and encouraging his leadership team to do so as well is one of the many reasons this business has grown to an estimated value of over $800B.

      “If you cannot simplify a message and communicate it compellingly, believe me, you cannot get the masses to follow you.”
      – Indra Nooyi, in Harvard Business Review, 2022

      Communication competency expectations

      Communication is a business skill; not a technical skill.

      Demonstrated Communication Behavior
      Level 1: Follow Has sufficient communication skills for effective dialogue with others.
      Level 2: Assist Has sufficient communication skills for effective dialogue with customers, suppliers, and partners.
      Level 3: Apply Demonstrates effective communication skills.
      Level 4: Enable Communicates fluently, orally, and in writing and can present complex information to both technical and non-technical audiences.
      Level 5: Ensure, Advise Communicates effectively both formally and informally.
      Level 6: Initiate, Influence Communicates effectively at all levels to both technical and non-technical audiences.
      Level 7: Set Strategy, Inspire, Mobilize Understands, explains, and presents complex ideas to audiences at all levels in a persuasive and convincing manner.

      Source: Skills Framework for the Information Age, 2021

      Key KPIs for communication with any stakeholder

      Measuring communication is hard; use these to determine effectiveness.

      Goal Key Performance Indicator (KPI) Related Resource
      Obtain board buy-in for IT strategic initiatives X% of IT initiatives that were approved to be funded. Number of times technical initiatives were asked to be explained further. Using our Board Presentation Review service
      Establish stronger relationships with executive leaders X% of business leadership satisfied with the statement “IT communicates with your group effectively.” Using the CIO Business Vision Diagnostic
      Organizationally, people know what products and services IT provides X% of end users who are satisfied with communications around changing services or applications. Using the End-User Satisfaction Survey
      Organizational reach and understanding of the crisis. Number of follow-up tickets or requests related to the crisis after the initial crisis communication was sent. Using templates and tools for crisis communications
      Project stakeholders receive sufficient communication throughout the initiative. X% overall satisfaction with the quality of the project communications. Using the PPM Customer Satisfaction Diagnostic
      Employee feedback is provided, heard, and acted on X% of satisfaction employees have with managers or IT leadership to act on employee feedback. Using the Employee Engagement Diagnostic Program

      Standard workshop communication activities

      Introduction
      Communications overview.

      Plan
      Plan your communications using a strategic tool.

      Compose
      Create your own message.

      Deliver
      Practice delivering your own message.

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Research contributors and experts

      Anuja Agrawal, National Communications Director, PwC

      Anuja Agrawal
      National Communications Director
      PwC

      Anuja is an accomplished global communications professional, with extensive experience in the insurance, banking, financial, and professional services industries in Asia, the US, and Canada. She is currently the National Communications Director at PwC Canada. Her prior work experience includes communication leadership roles at Deutsche Bank, GE, Aviva, and Veritas. Anuja works closely with senior business leaders and key stakeholders to deliver measurable results and effective change and culture building programs. Anuja has experience in both internal and external communications, including strategic leadership communication, employee engagement, PR and media management, digital and social media, and M&A/change and crisis management. Anuja believes in leveraging digital tools and technology-enabled solutions, combined with in-person engagement, to help improve the quality of dialogue and increase interactive communication within the organization to help build an inclusive culture of belonging.

      Nastaran Bisheban, Chief Technology Officer, KFC Canada

      Nastaran Bisheban
      Chief Technology Officer
      KFC Canada

      A passionate technologist, and seasoned transformational leader. A software engineer and computer scientist by education, a certified Project Manager that holds an MBA in Leadership with Honors and Distinction from University of Liverpool. A public speaker on various disciplines of technology and data strategy with a Harvard Business School executive leadership program training to round it all. Challenges status quo and conventional practices; is an advocate for taking calculated risk and following the principle of continuous improvement. With multiple computer software and project management publications she is a strategic mentor and board member on various non-profit organizations. Nastaran sees the world as a better place only when everyone has a seat at the table and is an active advocate for diversity and inclusion.

      Heidi Davidson, Co-Founder & CEO, Galvanize Worldwide and Galvanize On Demand

      Heidi Davidson
      Co-Founder & CEO
      Galvanize Worldwide and Galvanize On Demand

      Dr. Heidi Davidson is the co-founder and CEO of Galvanize Worldwide, the largest distributed network of marketing and communications experts in the world. She also is the co-founder and CEO of Galvanize On Demand, a tech platform that matches marketing and communications freelancers with client projects. Now with 167 active experts, the Galvanize team delivers startup advisory work, outsourced marketing, training, and crisis communications to organizations of all sizes. Before Galvanize, Heidi spent four years as part of the turnaround team at BlackBerry as the Chief Communications Officer and SVP of Corporate Marketing, where she helped the company move from a device manufacturer to a security software provider.

      Eli Gladstone, Co-Founder, Speaker Labs

      Eli Gladstone
      Co-Founder
      Speaker Labs

      Eli is a co-founder of Speaker Labs. He has spent over six years helping countless individuals overcome their public speaking fears and communicate with clarity and confidence. When he’s not coaching others on how to build and deliver the perfect presentation, you’ll probably find him reading some weird books, teaching his kids how to ski or play tennis, or trying to develop a good-enough jumpshot to avoid being a liability on the basketball court.

      Francisco Mahfuz, Keynote Speaker & Storytelling Coach

      Francisco Mahfuz
      Keynote Speaker & Storytelling Coach

      Francisco Mahfuz has been telling stories in front of audiences for a decade and even became a National Champion of public speaking. Today, Francisco is a keynote speaker and storytelling coach and offers communication training to individuals and international organizations and has worked with organizations like Pepsi, HP, the United Nations, Santander, and Cornell University. He’s the author of Bare: A Guide to Brutally Honest Public Speaking and the host of The Storypowers Podcast, and he’s been part of the IESE MBA communications course since 2020. He’s received a BA in English Literature from Birkbeck University in London.

      Sarah Shortreed, EVP & CTO, ATCO Ltd.

      Sarah Shortreed
      EVP & CTO
      ATCO Ltd.

      Sarah Shortreed is ATCO’s Executive Vice President and Chief Technology Officer. Her responsibilities include leading ATCO’s Information Technology (IT) function as it continues to drive agility and collaboration throughout ATCO’s global businesses and expanding and enhancing its enterprise IT strategy, including establishing ATCO’s technology roadmap for the future. Ms. Shortreed’s skill and expertise are drawn from her more than 30-year career that spans many industries and includes executive roles in business consulting, complex multi-stakeholder programs, operations, sales, customer relationship management, and product management. She was recently the Chief Information Officer at Bruce Power and has previously worked at BlackBerry, IBM, and Union Gas. She sits on the Board of Governors for the University of Western Ontario and is the current Chair of the Chief Information Officer (CIO) Committee at the Conference Board of Canada.

      Eric Silverberg, Co-Founder, Speaker Labs

      Eric Silverberg
      Co-Founder
      Speaker Labs

      Eric is a co-founder of Speaker Labs and has helped thousands of people build their public speaking confidence and become more dynamic and engaging communicators. When he’s not running workshops to help people grow in their careers, there’s a good chance you’ll find him with his wife and dog, drinking Diet Coke, and rewatching iconic episodes of the reality TV show Survivor! He’s such a die-hard fan, that you’ll probably see him playing the game one day.

      Stephanie Stewart, Communications Officer & DR Coordinator, Info Security Services Simon Fraser University

      Stephanie Stewart
      Communications Officer & DR Coordinator
      Info Security Services Simon Fraser University

      Steve Strout, President, Miovision Technologies

      Steve Strout
      President
      Miovision Technologies

      Mr. Strout is a recognized and experienced technology leader with extensive experience in delivering value. He has successfully led business and technology transformations by leveraging many dozens of complex global SFDC, Oracle, and SAP projects. He is especially adept at leading what some call “Project Rescues” – saving people’s careers where projects have gone awry; always driving “on-time and on-budget.” Mr. Strout is the current President of Miovision Technologies and the former CEO and board member of the Americas’ SAP Users” Group (ASUG). His wealth of practical knowledge comes from 30 years of extensive experience in many CxO and executive roles at some prestigious organizations such as Vonage, Sabre, BlackBerry, Shred-it, The Thomson Corporation (now Thomson Reuters), and Morris Communications. He has served on boards including Customer Advisory Boards of Apple, AgriSource Data, Dell, Edgewise, EMC, LogiSense, Socrates.ai, Spiro Carbon Group, and Unifi.

      Info-Tech Research Group Contributors:

      Sanchia Benedict, Research Lead
      Antony Chan Executive Counsellor
      Janice Clatterbuck, Executive Counsellor
      Ahmed Jowar, Research Specialist
      Dave Kish, Practice Lead
      Nick Kozlo, Senior Research Analyst
      Heather Leier Murray, Senior Research Analyst
      Amanda Mathieson, Research Director
      Carlene McCubbin, Practice Lead
      Joe Meier, Executive Counsellor
      Andy Neill, AVP Research
      Thomas Randall, Research Director

      Plus an additional two contributors who wish to remain anonymous.

      Related Info-Tech Research

      Boardroom Presentation Review

      • You will come away with a clear, concise, and compelling board presentation that IT leaders can feel confident presenting in front of their board of directors.
      • Add improvements to your current board presentation in terms of visual appeal and logical flow to ensure it resonates with your board of directors.
      • Leverage a best-of-breed presentation template.

      Build a Better Manager

      • Management skills training is needed, but organizations are struggling to provide training that makes a long-term difference in the skills managers actually use in their day to day.
      • Many training programs are ineffective because they offer the wrong content, deliver it in a way that is not memorable, and are not aligned with the IT department’s business objectives.

      Crisis Communication Guides

      During a crisis it is important to communicate to employees through messages that convey calm and are transparent and tailored to your audience. Use the Crisis Communication Guides to:

      • Draft a communication strategy.
      • Tailor messages to your audience.
      • Draft employee crisis communications.
      Use this guide to equip leadership to communicate in times of crisis.

      Bibliography

      “Communication in the Workplace Statistics: Importance and Effectiveness in 2022.” TeamStage, 2022.

      Gallo, Carmine. “How Great Leaders Communicate.” Harvard Business Review, 23 November 2022

      Guthrie, Georgina. “Why Good Internal Communications Matter Now More than Ever.” Nulab, 15 December 2021.

      Lambden, Duncan. “The Importance of Effective Workplace Communication – Statistics for 2022.” Expert Market, 13 June 2022.

      “Mapping SFIA Levels of Responsibilities to Behavioural Factors.” Skills Framework for the Information Age, 2021.

      McCreary, Gale. “How to Measure the Effectiveness of Communication: 14 Steps.” WikiHow, 31 March 2023.

      Nowak, Marcin. “Top 7 Communication Problems in the Workplace.” MIT Enterprise Forum CEE, 2021.

      Nunn, Philip. “Messaging That Works: A Unique Framework to Maximize Communication Success.” iabc, 26 October 2020.

      Picincu, Andra. “How to Measure Effective Communications.” Small Business Chron. 12 January 2021.

      Price. David A. “Pixar Story Rules.” Stories From the Frontiers of Knowledge, 2011.

      Roberts, Dan. “How CIOs Become Visionary Communicators.” CIO, 2019.

      Schlesinger, Mark. “Why building effective communication skill in IT is incredibly important.” Forbes, 2021.

      Stanten, Andrew. “Planning for the Worst: Crisis Communications 101.” CIO, 25 May 2017.

      State of the American Workplace Report. Gallup, 6 February 2020.

      “The CIO Revolution.” IBM, 2021.

      “The State of High Performing Teams in Tech 2022.” Hypercontex, 2022.

      Walters, Katlin. “Top 5 Ways to Measure Internal Communication.” Intranet Connections, 30 May 2019.

      Create an Effective SEO Keyword Strategy

      • Buy Link or Shortcode: {j2store}568|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      Digital Marketers working with an outdated or bad SEO strategy often see:

      • Declining keyword ranking and traffic
      • Poor keyword strategy
      • On-page errors

      Our Advice

      Critical Insight

      Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

      Impact and Result

      Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

      • Competitive keyword research and identification of opportunities
      • On-page keyword strategy

      Create an Effective SEO Keyword Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an Effective SEO Keyword Strategy

      Update your on-page SEO strategy with competitively relevant keywords.

      • Create an Effective SEO Keyword Strategy Storyboard
      [infographic]

      Further reading

      Create an Effective SEO Keyword Strategy
      Update your on-page SEO strategy with competitively relevant keywords.

      Analyst Perspective

      Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

      Leading search engine optimization methods focus on creating and posting relevant keyword-rich content, not just increasing page rank. Content and keywords should move a buyer along their journey, close a sale, and develop long-term relationships. Unfortunately, many SEO specialists focus on computers, not the buyer. What's even more concerning is that up to 70% of SaaS businesses have already been impacted by outdated and inefficient SEO techniques. Poor strategies often focus on ballooning SEO metrics in the short-term instead of building the company's long-term PageRank.

      Best-in-class digital marketers stop chasing the short-term highs and focus on long-term growth. This starts with developing a competitive keyword strategy and updating website content with the new keywords.

      SEO is a large topic, so we have broken the strategy into small, easy-to-implement steps, taking the guesswork out of how to use the data from SEO tools and giving CMOs a solid path to increase their SEO results.

      This is a picture of Terra Higginson

      Terra Higginson
      Marketing Research Director
      SoftwareReviews

      Executive Summary

      Your Challenge

      Digital marketers working with an outdated or bad SEO strategy often see:

      • Declining keyword ranking and traffic
      • Poor keyword strategy
      • On-page errors

      Search algorithms change all the time, which means that the strategy is often sitting on the sifting sands of technology, making SEO strategies quickly outdated.

      Common Obstacles

      Digital marketers are responsible for developing and implementing a competitive SEO strategy but increasingly encounter the following obstacles:

      • SEO practitioners that focus on gaming the system
      • Ever-changing SEO technology
      • Lack of understanding of the best SEO techniques
      • SEO techniques focus on the needs of computers, not people
      • Lack of continued investment

      SoftwareReviews' Approach

      Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

      • Competitive keyword research and identification of opportunities
      • On-page keyword strategy

      Our methodology will take a focused step-by-step strategy in a series of phases that will increase PageRank and competitive positioning.

      SoftwareReviews' SEO Methodology

      In this blueprint, we will cover:

      Good SEO vs. Poor SEO Techniques

      The difference between good and bad SEO techniques.

      Common Good
      SEO Techniques

      Common Poor
      SEO Techniques

      • Writing content for people, not machines.
      • Using SEO tools to regularly adjust and update SEO content, keywords, and backlinks.
      • Pillar and content cluster strategy in addition to a basic on- and off-page strategy.
      • Keyword stuffing and content duplication.
      • A strategy that focuses on computers first and people second.
      • Low-quality or purchased backlinks.

      Companies With Great SEO…

      Keyword Strategy

      • Have identified a keyword strategy that carves out targets within the white space available between themselves and the competition.

      Error-Free Site

      • Have error-free sites without duplicate content. Their URLs and redirects are all updated. Their site is responsive, and every page loads in under two seconds.

      Pillar & Content Clusters

      • Employ a pillar and content cluster strategy to help move the buyer through their journey.

      Authentic Off-Page Strategy

      • Build an authentic backlink strategy that incorporates the right information on the right sites to move the buyer through their journey.

      SEO Terms Defined

      A glossary to define common Phase 1 SEO terms.

      Search Volume: this measures the number of times a keyword is searched for in a certain time period. Target keywords with a volume of between 100-100,000. A search volume greater than 100,000 will be increasingly difficult to rank (A Beginner's Guide to Keyword Search Volume, 2022, Semrush).

      Keyword Difficulty: the metric that quantifies how difficult it will be to rank for a certain keyword. The keyword difficulty percentage includes the number of competitors attempting to rank for the same keyword, the quality of their content, the search intent, backlinks, and domain authority (Keyword Difficulty: What Is It and Why Is It Important? 2022, Semrush).

      Intent: this metric focuses on the intent of the user's search. All search intent is categorized into Informational, Commercial, Navigational, and Transactional (What Is Search Intent? A Complete Guide, 2022, Semrush).

      On-Page SEO: refers to the practice of search engine optimizing elements of your site such as title tags, internal links, HTML code, URL optimization, on-page content, images, and user experience.

      Off-Page SEO: refers to the practice of optimizing brand awareness (What Is Off-Page SEO? A Comprehensive Guide, 2022, Semrush).

      H1: HTML code that tells a search engine the title of the page (neilpatel.com).

      SEO Tool: A subscription-based all-in-one search engine optimization MarTech tool.

      Google's mission is to organize the world's information and make it universally accessible and useful… We believe Search should deliver the most relevant and reliable information available.
      – An excerpt from Google's mission statement

      Your Challenge

      Google makes over 4.5k algorithm changes per year1, directly impacting digital marketing search engine optimization efforts.

      Digital marketers with SEO problems will often see the following issues:

      • Keyword ranking – A decline in keyword ranking is alarming and results in decreased PageRank.
      • Bounce rate – Attracting the wrong audience to your site will increase the bounce rate because the H1 doesn't resonate with your audience.
      • Outdated keywords – Many companies are operating on a poor keyword strategy, or even worse, no keyword strategy. In addition, many marketers haven't updated their strategy to include pillar and cluster content.
      • Errors – Neglected sites often have a large number of errors.
      • Bad backlinks – Neglected sites often have a large number of toxic backlinks.

      The best place to hide a dead body is on page two of the search results.
      – Huffington Post

      Common Obstacles

      Digital marketers are responsible for developing and executing a competitive SEO strategy but increasingly encounter the following obstacles:

      • Inefficient and ineffective SEO practitioners.
      • Changing SEO technology and search engine algorithms.
      • Lack of understanding of the best-in-class SEO techniques.
      • Lack of a sustainable plan to manage the strategy and invest in SEO.

      SEO is a helpful activity when it's applied to people-first content. However, content created primarily for search engine traffic is strongly correlated with content that searchers find unsatisfying.
      – Google Search Central Blog

      Benefits of Proper SEO

      A good SEO keyword strategy will create long-term, sustainable SEO growth:

      • Write content for people, not algorithms – Good SEO prioritizes the needs of humans over the needs of computers, being ever thoughtful of the meaning of content and keywords.
      • Content that aligns with intent – Content and keyword intent will align with the buyer journey to help move prospects through the funnel.
      • Competitive keyword strategy – Find keyword white space for your brand. Keywords will be selected to optimize your ranking among competition with reasonable and sustainable targets.
      • Actionable and impactful fixes – By following the SoftwareReviews phases of SEO, you will be able to take a very large task and divide it into conquerable actions. Small improvements everyday lead to very large improvements over time.

      Digital Marketing SEO Stats

      61%
      61% of marketers believe that SEO is the key to online success.
      Source: Safari Digital

      437%
      Updating an existing title tag with an SEO optimised one can increase page clicks by more than 437%.
      Source: Safari Digital

      Good SEO Aligns With Search Intent

      What type of content is the user searching for? Align your keyword to the logical search objective.

      Informational

      This term categorizes search intent for when a user wants to inform or educate themselves on a specific topic.

      Commercial

      This term categorizes search intent for when a user wants to do research before making a purchase.

      Transactional

      This term categorizes search intent for when a user wants to purchase something.

      Navigational

      This term categorizes search intent for when a user wants to find a specific page.

      SoftwareReviews' Methodology toCreate an Effective SEO Strategy

      1. Competitive Analysis & Keyword Discovery 2. On-Page Keyword Optimization
      Phase Steps
      1. Make a list of keywords in your current SEO strategy – including search volume, keyword difficulty percentage, intent.
      2. Research the keywords of top competitors.
      3. Make a list of target keywords you would like to own – including the search volume, keyword difficulty percentage, and intent. Make sure that these keywords align with your buyer persona.
      1. List product and service pages, along with the URL and current ranking(s) for the keyword(s) for that URL.
      2. Create a new individual page strategy for each URL. Record the current keyword, rank, title tag, H1 tag, and meta description. Then, with keyword optimization in mind, develop the new title tag, new H1 tag, and new meta description. Build the target keywords into the pages and tags.
      3. Record the current ranking for the pages' keywords then reassess after three to six months.
      Phase Outcomes
      • Understanding of competitive landscape for SEO
      • A list of target new keywords
      • Keyword optimized product and service pages

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Identify your current SEO keyword strategy.

      Call #2: Discuss how to start a competitive keyword analysis.

      Call #4: Discuss how to build the list of target keywords.

      Call #6: Discuss keyword optimization of the product & services pages.

      Call #8: (optional)

      Schedule a call to update every three to six months.

      Call #3: Discuss the results of the competitive keyword analysis.

      Call #5: Discuss which pages to update with new target keywords.

      Call #7: Review final page content and tags.

      Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Identify your current SEO keyword strategy.

      Call #2: Discuss how to start a competitive keyword analysis.

      Call #4: Discuss how to build the list of target keywords.

      Call #6: Discuss keyword optimization of the product & services pages.

      Call #8: (optional)

      Schedule a call to update every three to six months.

      Call #3: Discuss the results of the competitive keyword analysis.

      Call #5: Discuss which pages to update with new target keywords.

      Call #7: Review final page content and tags.

      Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

      SoftwareReviews offers various levels of support to best suit your needs

      Included Within an Advisory Membership Optional Add-Ons
      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Insight Summary

      People-First Content

      Best-in-class SEO practitioners focus on people-first content, not computer-first content. Search engine algorithms continue to focus on how to rank better content first, and a strategy that moves your buyers through the funnel in a logical and cohesive way will beat any SEO trick over the long run.

      Find White Space

      A good SEO strategy uses competitive research to carve out white space and give them a competitive edge in an increasingly difficult ranking algorithm. An understanding of the ideal client profile and the needs of their buyer persona(s) sit as a pre-step to any good SEO strategy.

      Optimize On-Page Keywords

      By optimizing the on-page strategy with competitively relevant keywords that target your ideal client profile, marketers are able to take an easy first step at improving the SEO content strategy.

      Understand the Strategy

      If you don't understand the strategy of your SEO practitioner, you are in trouble. Marketers need to work hand in hand with their SEO specialists to quickly uncover gaps, create a strategy that aligns with the buyer persona(s), and execute the changes.

      Quality Trumps Quantity

      The quality of the prospect that your SEO efforts bring to your site is more important than the number of people brought to your site.

      Stop Here and Ask Yourself:

      • Do I have an updated (completed within the last two years) buyer persona and journey?
      • Do I know who the ICP (ideal client profile) is for my product or company?

      If not, stop here, and we can help you define your buyer persona and journey, as well as your ideal client profile before moving forward with SEO Phase 1.

      The Steps to SEO Phase 1

      The Keyword Strategy

      1. Current Keywords
        • Identify the keywords your SEO strategy is currently targeting.
      2. Competitive Analysis
        • Research the keywords of competitor(s). Identify keyword whitespace.
      3. New Target Keywords
        • Identify and rank keywords that will result in more quality leads and less competition.
      4. Product & Service Pages
        • Identify your current product and service pages. These pages represent the easiest content to update on your site.
      5. Individual Page Update
        • Develop an SEO strategy for each of your product and service pages, include primary target keyword, H1, and title tags, as well as keyword-rich description.

      Resources Needed for Search Engine Optimization

      Consider the working skills required for search engine optimization.

      Required Skills/Knowledge

      • SEO
      • Web development
      • Competitive analysis
      • Content creation
      • Understanding of buyer persona and journey
      • Digital marketing

      Suggested Titles

      • SEO Analyst
      • Competitive Intelligence Analyst
      • Content Marketing Manager
      • Website Developer
      • Digital Marketing Manager

      Digital Marketing Software

      • CMS that allows you to easily access and update your content

      SEO Software

      • SEO tool

      Step 1: Current Keywords

      Use this sheet to record your current keyword research.

      Use your SEO tool to research keywords and find the following:
      Use a quality tool like SEMRush to obtain SEO data.

      1. Keyword difficulty
      2. Search volume
      3. Search intent

      This is a screenshot of the SEO tool SEMRush, which can be used to identify current keywords.

      Step 2: Competitive Analysis

      Use this sheet to guide the research on your competitors' keywords.

      Use your SEO tool to find the following:

      1. Top organic keywords
      2. Ranking of keywords
      3. Domain authority and trust
      4. Position changes

      This is a screenshot of the SEO tool SEMRush, which can be used to perform an competitive analysis

      Step 3: New Target Keywords

      Use this sheet to record target keywords that have a good volume but are less competitive. The new target keywords should align with your buyer persona and their journey.

      Use your SEO tool to research keywords and find the following:
      Use a quality tool like SEMRush to obtain SEO data.

      1. Keyword difficulty
      2. Search volume
      3. Search intent

      This is a screenshot of the SEO tool SEMRush, which can be used to identify new target keywords.

      Step 4: Product & Service Pages

      Duplicate this page so that you have a separate page for each URL from Step 4

      Use this sheet to identify your current product and service pages.

      Use your SEO tool to find the following:

      1. Current rank
      2. Current keywords

      This is a screenshot of the SEO tool SEMRush, showing where you can display product and service pages.

      Step 5: Individual Page Strategy

      Develop a keyword strategy for each of your product and service pages. Use a fresh page for each URL.

      Date last optimized:
      mm/dd/yyyy

      This is a screenshot of the SEO tool SEMRush, with an example of how you can use an individual page strategy to develop a keyword strategy.

      Bibliography

      Council, Y. "Council Post: The Rundown On Black Hat SEO Techniques And Why You Should Avoid Them." Forbes, 2022. Accessed September 2022.

      "Our approach – How Google Search works." Google Search. Accessed September 2022.

      "The Best Place to Hide a Dead Body is Page Two of Google." HuffPost, 2022. Accessed September 2022.

      Patel, Neil. "How to Create the Perfect H1 Tag for SEO." neilpatel.com. Accessed September 2022.

      Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

      Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

      Terms of use

       These Terms of Use state the terms and conditions under which you may use this website and the Services, which are the property of Tymans Group BV. ("TY"). Your use of this site and the Services constitutes acceptance of these Terms of Use.
      1. General Use Restrictions

      TY services, advice, materials, products, websites, and networks (collectively the "Services") are to be used for the User (meaning a named individual user that uses the publicly available Services or is authorized by TY in a service agreement to use the Services that require paid access) use and benefit only pursuant to the terms and limitations of the paid subscription and may not be disclosed, disseminated or distributed to any other party, except as TY otherwise agrees in writing. The User will not circumvent any encryption or otherwise gain access to Services for which the User has not been expressly granted the appropriate rights of access.

      The User will not use the Services for or knowingly transmit to TY or upload to any TY site or network any illegal, improper, or unacceptable material or use them for illegal, improper, or unacceptable practices, including without limitation the dissemination of any defamatory, fraudulent, infringing, abusive, lewd, obscene or pornographic material, viruses, trojan horses, time bombs, worms, or other harmful code designed to interrupt, destroy, or limit the functionality of any software, hardware or communications equipment, unsolicited mass email or other internet-based advertising campaigns, privacy breaches, denial of use attacks, spoofing, or impersonation.

      1. Copyright

      The Services are © Tymans Group BV. All rights reserved.

      The Services are owned by and copyrighted by TY and other parties and may contain trademarks of TY or others. They are protected by Canadian, US, and international copyright and trademark laws and conventions.

      User may use the Services solely for his or their own information purposes pursuant to the terms and limitations of the paid subscription. The User may download any of the Service's tools or templates for his or her individual use but may not distribute any articles, tools, templates, or blueprints internally, subject to the exceptions below. The User may create derivative works from the Service's tools or templates and distribute these for internal use but may not distribute these derivative works externally for any commercial or resale purposes.

      Any other reproduction or dissemination of the Services in any form or by any means is forbidden without TY's written permission, and without limiting the generality of the foregoing, the User will not:

      • A. record and re-transmit the Service over any network (including any local area network), except as otherwise stated above;
      • B. use any Service in any timesharing, service bureau, bulletin board, or similar arrangement or public display;
      • C. post any Service to any other online service (including bulletin boards or the internet);
      • D. sublicense, lease, sell, offer for sale or assign the Service; or
      • E. use TY's name or any excerpts from the Services in the promotion of its products or services.
      1. Users

      Users must be authorized to use the Services by TY. Users must maintain and protect the confidentiality of any password(s) and are responsible for ensuring that the passwords are effective. Users shall advise TY immediately if they discover that their password has been compromised at the following number: 1-888-670-8889. If you are an organization that is party to a service agreement with TY, references in these Terms of Use to "User(s)" include you, and you are responsible for compliance by named individual Users within your organization with these Terms of Use.

      1. User Perspective

      For the benefit of all Users, TY's research services include the ability for Users to (i) participate in the creation of research by contributing User perspectives for publication on TY's websites and (ii) participate in industry-specific community groups and other forums by contributing discussion posts. All such contributions are voluntary with the full consent of the User. If your account is used to contribute content to TY's websites (collectively, "User Contributions"), you agree to accept sole responsibility for those User Contributions, including the information, statements, facts, and material contained in any form or medium (e.g., text, audio, video, and photographic) therein. To the extent Users contribute any feedback to TY (as User Contributions or otherwise), TY may use that feedback to assess, improve, and market its products. To the extent Users contribute to research, TY may incorporate those contributions within the research Services without the necessity of attribution. You grant us and our affiliates a worldwide, irrevocable, royalty-free, nonexclusive license to use, reproduce, create derivative works of, distribute publicly display, and publish User Contributions. You agree you will not attempt to enforce any so-called "moral rights" in User Contributions against us or our affiliates.

      By using TY's research services, you agree that none of your User Contributions will:

      • Infringe on the intellectual property, trade secret, privacy, publicity, or other rights of others;
      • Contain false statements or misrepresentations that could damage TY or any third party;
      • Include obscene, libelous, defamatory, threatening, harassing, abusive, hateful, sexually explicit, sexually-oriented, profane, or embarrassing material, as determined by TY in its sole discretion;
      • Be illegal or otherwise objectionable;
      • Contain the personal information of any third party, including, without limitation, addresses, phone numbers, email addresses, Social Security numbers, and credit card numbers;
      • Encourage or facilitate insider trading or anti-competitive behavior;
      • Include commercial advertisements or solicitations; or
      • Purport to or actually provide legal or professional advice.

      BecauseTY's Web sites are available to the public, User Contributions on TY's Web sites are not Confidential Information.

      Although you are solely responsible for the content you provide, and we do not have a policy of reviewing or monitoring all User Contributions, we reserve the right to pre-screen and/or monitor User Contributions. If we become aware of User Contributions that violate these Terms of Service or that we believe to be otherwise objectionable, we may reject or delete them or take other action without notice to you and at our sole discretion.

      If you believe that any User Contributions appear to violate these Terms of Service, or if you believe any other user is engaged in illegal, harassing, or objectionable behavior, please contact us.

      1. Non-Disclosure of Confidential Information

      In these Terms of Use, "Confidential Information" means information of a commercially sensitive or proprietary character that is marked as confidential or that a reasonable person would understand to be confidential. The "Disclosing Party" is the party disclosing Confidential Information, and the "Receiving Party" is the party receiving Confidential Information. However, Confidential Information does not include information that:

      • was in the public domain at the time of communication to the Receiving Party or is later placed in the public domain by the Disclosing Party;
      • entered the public domain through no fault of the Receiving Party subsequent to the time of disclosure hereunder to the Receiving Party;
      • was in the Receiving Party's possession free of any obligation of confidence prior to disclosure hereunder; or
      • was developed by employees or agents of the Receiving Party independently of and without reference to any Confidential Information.

      The Receiving Party shall not disclose, publish or communicate the Confidential Information to any third party without the prior written consent of the Disclosing Party. However, the Receiving Party may disclose the Confidential Information to a third party who has a need to know the Confidential Information and (i) is an accountant, attorney, underwriter, or advisor under a duty of confidentiality; or (ii) is under a written obligation of confidentiality at least as restrictive as this Agreement and to the extent required by law.

      TY may create or use anonymized data for purposes such as benchmarking, analytics, and other good-faith business purposes. Anonymized data is not the Confidential Information of Users.

      1. Term

      Many of the Services are "subscription" services that have a fixed Term and must be renewed in writing at the end of the term for services to continue. The contractual term of membership is generally one (1) to three (3) years in length and is agreed to by the parties in writing. Workshops purchased as part of membership expire without refund or credit at the end of the membership period covered by the purchase. Workshops purchased outside membership expire without refund or credit one (1) year after purchase. TY may terminate a User's access at any time if the User or the entity paying for the User's access violates the terms of use or subscription or any other agreement with TY.

      1. Cancellation

      As the Services are paid in advance for a committed membership term, a service agreement or membership cannot be terminated by a User for convenience during a contractual term.

      1. Changes

      TY strives to innovate. TY may update, upgrade or otherwise change or discontinue content, features, or other aspects of its Services. TY will not make changes that cumulatively degrade the quality of a paid subscription to the Services. TY also reserves the right to change the terms and conditions applicable to your use of the Services unless TY has otherwise agreed in a service agreement. Use of the Services after such changes shall be deemed to be acceptance by the User of such changes. These terms were last revised on June 8, 2022.

      1. Accuracy of Information and Warranty

      The information contained in the Services has been obtained from sources believed to be reliable, but TY does not warrant the completeness, timeliness, or accuracy of any information contained in the Services. The Services are intended to: help identify business risks; provide insights based on industry research; and help you focus on certain matters which may be affecting your business. TY does not provide legal, accounting, or other professional advice, nor should any advice from TY be construed as such. We encourage you to seek professional advice whenever necessary.

      TY expressly excludes and disclaims all express or implied conditions, representations, and warranties, including, without limitation, any implied warranties or conditions of merchantability or fitness for a particular purpose, to the extent allowable by law.

      Although TY takes reasonable steps to screen Services for infection by viruses, worms, Trojan horses, or other code manifesting contaminating or destructive properties before making the Services available, TY cannot guarantee that any Service will be free of infection.

      User assumes sole responsibility for the selection of the Services to achieve its intended results. The opinions expressed in the Services are subject to change without notice.

      TY does not endorse third-party products or services. TY assesses and analyzes the effectiveness and appropriateness of information technology in the context of a general business environment only unless specifically hired by a User to assess in the context of their own environment.

      1. Limitation of Liability

      In no event is TY liable for any special, indirect, consequential, incidental, punitive, or other damages however caused, whether in contract, tort, negligence, strict liability, operation of law, or otherwise (including without limitation damages for lost profits, business interruption or loss arising out of the use of or inability to use the Services, or any information provided in the Services, or claims attributable to errors, omissions or other inaccuracies in the Service or interpretations thereof), even if TY has been advised of the possibility of such damages. TY's total liability shall in no event exceed the amount paid by the User for the Service in question.

      The User acknowledges that TY has set its prices and sold the Services to it in reliance on the limitations of liability and disclaimers of warranties and damages set forth herein and that the same form a fundamental and essential basis of the bargain between the parties. They shall apply even if the contract between the User and TY is found to have failed in its fundamental or essential purpose or has been fundamentally breached.

      1. Links to Third-Party Sites

      Any third-party sites that are linked to the Services are not under TY's control. TY is not responsible for anything on the linked sites, including without limitation any content, links to other sites, any changes to those sites, or any policies those sites may have. TY provides links as a convenience only, and such links do not imply any endorsement by TY of those sites.

      1. Investment Advice

      The Services are not intended to be used for the purpose of, or as a basis for, making investment decisions or recommendations with respect to securities of any company or industry, and TY assumes no liability for decisions made, in whole or in part, on the basis of any information contained in the Services.

      1. Governing Law

      This site and any service agreement are governed by the laws of the Province of Ontario, Canada, excluding any conflicts of law provisions and excluding the United Nations Convention on Contracts for the International Sale of Goods. Any legal action against TY shall take place in the courts of the province of Antwerp, Belgium. The parties attorn to the non-exclusive jurisdiction of the courts of Ontario.

      1. Entire Agreement

      These standard terms of use, together with any service agreements and statements of work signed by the parties, contains the complete and exclusive statement of Agreement between the parties and supersedes all purchase order terms and conditions, understandings, proposals, negotiations, representations, or warranties of any kind whether written or oral.

      1. Privacy

      A User's right to privacy is of paramount importance to TY. See our Privacy Policy for more detail. The identity of our research clients is not considered personal or confidential information, and we may disclose that information for promotion and marketing purposes.

      1. Contact Information

      Attn: General Counsel

      legal@tymansgroup.com

      (US): 1-917-473-8669

      (BE): 32-468-142-754

      Release management

      • Buy Link or Shortcode: {j2store}9|cart{/j2store}
      • Related Products: {j2store}9|crosssells{/j2store}
      • Up-Sell: {j2store}9|upsells{/j2store}
      • member rating overall impact: 10.0/10
      • member rating average dollars saved: $35,731
      • member rating average days saved: 20
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Today's world requires frequent and fast deployments. Stay in control with release management.

      Implement Lean Management Practices That Work

      • Buy Link or Shortcode: {j2store}116|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement
      • Service delivery teams do not measure, or have difficulty demonstrating, the value they provide.
      • There is a lack of continuous improvement.
      • There is low morale within the IT teams leading to low productivity.

      Our Advice

      Critical Insight

      • Create a problem-solving culture. Frequent problem solving is the differentiator between sustaining Lean or falling back to old management methods.
      • Commit to employee growth. Empower teams to problem solve and multiply your organizational effectiveness.

      Impact and Result

      • Apply Lean management principles to IT to create alignment and transparency and drive continuous improvement and customer value.
      • Implement huddles and visual management.
      • Build team capabilities.
      • Focus on customer value.
      • Use metrics and data to make better decisions.
      • Systematically solve problems and improve performance.
      • Develop an operating rhythm to promote adherence to Lean.

      Implement Lean Management Practices That Work Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how a Lean management system can help you increase transparency, demonstrate value, engage your teams and customers, continuously improve, and create alignment.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand Lean concepts

      Understand what a Lean management system is, review Lean philosophies, and examine simple Lean tools and activities.

      • Implement Lean Management Practices That Work – Phase 1: Understand Lean Concepts
      • Lean Management Education Deck

      2. Determine the scope of your implementation

      Understand the implications of the scope of your Lean management program.

      • Implement Lean Management Practices That Work – Phase 2: Determine the Scope of Your Implementation
      • Lean Management Scoping Tool

      3. Design huddle board

      Examine the sections and content to include in your huddle board design.

      • Implement Lean Management Practices That Work – Phase 3: Design Huddle Board
      • Lean Management Huddle Board Template

      4. Design Leader Standard Work and operating rhythm

      Determine the actions required by leaders and the operating rhythm.

      • Implement Lean Management Practices That Work – Phase 4: Design Leader Standard Work and Operating Rhythm
      • Leader Standard Work Tracking Template
      [infographic]

      Workshop: Implement Lean Management Practices That Work

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Lean Concepts

      The Purpose

      Understand Lean management.

      Key Benefits Achieved

      Gain a common understanding of Lean management, the Lean management thought model, Lean philosophies, huddles, visual management, team growth, and voice of customer.

      Activities

      1.1 Define Lean management in your organization.

      1.2 Create training materials.

      Outputs

      Lean management definition

      Customized training materials

      2 Understand Lean Concepts (Continued) and Determine Scope

      The Purpose

      Understand Lean management.

      Determine the scope of your program.

      Key Benefits Achieved

      Understand metrics and performance review.

      Understand problem identification and continuous improvement.

      Understand Kanban.

      Understand Leader Standard Work.

      Define the scope of the Lean management program.

      Activities

      2.1 Develop example operational metrics

      2.2 Simulate problem section.

      2.3 Simulate Kanban.

      2.4 Build scoping tool.

      Outputs

      Understand how to use operational metrics

      Understand problem identification

      Understand Kanban/daily tasks section

      Defined scope for your program

      3 Huddle Board Design and Huddle Facilitation Coaching

      The Purpose

      Design the sections and content for your huddle board.

      Key Benefits Achieved

      Initial huddle board design.

      Activities

      3.1 Design and build each section in your huddle board.

      3.2 Simulate coaching conversations.

      Outputs

      Initial huddle board design

      Understanding of how to conduct a huddle

      4 Design and Build Leader Standard Work

      The Purpose

      Design your Leader Standard Work activities.

      Develop a schedule for executing Leader Standard Work.

      Key Benefits Achieved

      Standard activities identified and documented.

      Sample schedule developed.

      Activities

      4.1 Identify standard activities for leaders.

      4.2 Develop a schedule for executing Leader Standard Work.

      Outputs

      Leader Standard Work activities documented

      Initial schedule for Leader Standard Work activities

      Automate Work Faster and More Easily With Robotic Process Automation

      • Buy Link or Shortcode: {j2store}237|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on repetitive, routine manual data collection and processing work, and there is high stakeholder interest in automating them.
      • You’re investigating whether robotic process automation (RPA) is a suitable technological enabler for automating such processes.
      • Being a trending technology, especially with its association with artificial intelligence (AI), there is much marketing fluff, hype, and misunderstanding about RPA.
      • Estimating the potential impact of RPA on business is difficult, as the relevant industry statistics often conflict each other and you aren’t sure how applicable it is to your business.

      Our Advice

      Critical Insight

      • There are no physical robots in RPA. RPA is about software “bots” that interact with applications as if they were human users to perform routine, repetitive work in your place. It’s for any business in any industry, not just for manufacturing.
      • RPA is lightweight IT; it reduces the cost of entry, maintenance, and teardown of automation as well as the technological requirement of resources that maintain it, as it complements existing automation solutions in your toolkit.
      • RPA is rules-based. While AI promises to relax the rigidity of rules, it adds business risks that are poorly understood by both businesses and subject-matter experts. Rules-based “RPA 1.0” is mature and may pose a stronger business case than AI-enabled RPA.
      • RPA’s sweet spot is “swivel chair automation”: processes that require human workers to act as a conduit between several systems, moving between applications, manually keying, re-keying, copying, and pasting information. A bot can take their place.

      Impact and Result

      • Discover RPA and how it differentiates from other automation solutions.
      • Understand the benefits and risks of complementing RPA with AI.
      • Identify existing business processes best suited for automation with RPA.
      • Communicate RPA’s potential business benefits to stakeholders.

      Automate Work Faster and More Easily With Robotic Process Automation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should use RPA to automate routine, repetitive data collection and processing work, review Info-Tech’s methodology, and understand the ways we can support you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover robotic process automation

      Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 1: Discover Robotic Process Automation
      • Robotic Process Automation Communication Template

      2. Identify processes best suited for robotic process automation

      Identify and prioritize candidate processes for RPA.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 2: Identify Processes Best Suited for Robotic Process Automation
      • Process Evaluation Tool for Robotic Process Automation
      • Minimum Viable Business Case Document
      [infographic]

      Tech Trend Update: If Digital Ethics Then Data Equity

      • Buy Link or Shortcode: {j2store}100|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.

      Our Advice

      Critical Insight

      Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.

      Impact and Result

      There are some key considerations for businesses grappling with digital ethics:

      1. If partnering, set expectations.
      2. If building, invite criticism.
      3. If imbuing authority, consider the most vulnerable.

      Tech Trend Update: If Digital Ethics Then Data Equity Research & Tools

      Tech Trend Update: If Digital Ethics Then Data Equity

      Understand how to use data equity as an ethical guidepost to create technology that will benefit everyone.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Tech Trend Update: If Digital Ethics Then Data Equity Storyboard
      [infographic]

      Prepare for the Upgrade to Windows 11

      • Buy Link or Shortcode: {j2store}166|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Devices
      • Parent Category Link: /end-user-computing-devices
      • Windows 10 is going EOL in 2025.That is closer than you think.
      • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft initiated catastrophe?
      • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

      Our Advice

      Critical Insight

      Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system. Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      Impact and Result

      Windows 11 hardware requirements will result in devices that are not eligible for the upgrade. Companies will be left to spend money on replacement devices. Following the Info-Tech guidance will help clients properly budget for hardware replacements before Windows 10 is no longer supported by Microsoft. Eligible devices can be upgraded, but Info-Tech guidance can help clients properly plan the upgrade using the upgrade ring approach.

      Prepare for the Upgrade to Windows 11 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for the Upgrade to Windows 11 Deck – A look into some of the pros and cons of Microsoft’s latest desktop operating system, along with guidance on moving forward with this inevitable upgrade.

      Discover the reason for the release of Windows 11, what you require to be eligible for the upgrade, what features were added or updated, and what features were removed. Our guidance will assist you with a planned and controlled rollout of the Windows 11 upgrade. We also provide guidance on how to approach a device refresh plan if some devices are not eligible for Windows 11. The upgrade is inevitable, but you have time, and you have options.

      • Prepare for the Upgrade to Windows 11 Storyboard

      2. What Are My Options If My Devices Cannot Upgrade to Windows 11? – Build a Windows 11 Device Replacement budget with our Hardware Asset Management Budgeting Tool.

      This tool will help you budget for a hardware asset refresh and to adjust the budget as necessary to accommodate any unexpected changes. The tool can easily be modified to assist in developing and justifying the budget for hardware assets for a Windows 11 project. Follow the instructions on each tab and feel free to play with the HAM budgeting tool to fit your needs.

      • HAM Budgeting Tool
      [infographic]

      Further reading

      Prepare for the Upgrade to Windows 11

      The upgrade is inevitable, but you have time, and you have options.

      Analyst Perspective

      Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

      “You hear that Mr. Anderson? That is the sound of inevitability.” ("The Matrix Quotes" )

      The fictitious Agent Smith uttered those words to Keanu Reeves’ character, Neo, in The Matrix in 1999, and while Agent Smith was using them in a very sinister and figurative context, the words could just as easily be applied to the concept of upgrading to the Windows 11 operating system from Microsoft in 2022.

      There have been two common, recurring themes in the media since late 2019. One is the global pandemic and the other is cyber-related crime. Microsoft is not in a position to make an impact on a novel coronavirus, but it does have the global market reach to influence end-user technology and it appears that it has done just that. Windows 11 is a step forward in endpoint security and functionality. It also solidifies the foundation for future innovations in end-user operating systems and how they are delivered. Windows-as-a-Service (WAAS) is the way forward for Microsoft. Windows 10 is living on borrowed time, with a defined end of support date of October 14, 2025. Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

      It is inevitable!

      P.J. Ryan

      Research Director, Infrastructure & Operations

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Windows 10 is going EOL in 2025. That is closer than you think.
      • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft-initiated catastrophe?
      • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

      Common Obstacles

      • The difference between Windows 10 and Windows 11 is not clear. Windows 11 looks like Windows 10 with some minor changes, mostly cosmetic. Many online users don’t see the need. Why upgrade? What are the benefits?
      • The cost of upgrading devices just to be eligible for Windows 11 is high.
      • Your end users don’t like change. This is not going to go over well!

      Info-Tech's Approach

      • Spend wisely. Space out your endpoint replacements and upgrades over several years. You do not have to upgrade everything right away.
      • Be patient. Windows 11 contained some bugs when it was initially released. Microsoft fixed most of the issues through monthly quality updates, but you should ensure that you are comfortable with the current level of functionality before you upgrade.
      • Use the upgrade ring approach. Test your applications with a small group first, and then stage the rollout to increasingly larger groups over time.

      Info-Tech Insight

      There is a lot of talk about Windows 11, but this is only an operating system upgrade, and it is not a major one. Understand what is new, what is added, and what is missing. Check your devices to determine how many are eligible and ineligible. Many organizations will have to spend capital on endpoint upgrades. Solid asset management practices will help.

      Insight summary

      Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system.

      Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

      Many organizations will have to spend capital on endpoint upgrades.

      Microsoft now insists that modern hardware is required for Windows 11 for not only security but also for improved stability. That same hardware requirement will mean that many devices that are only three or four years old (as well as older ones) may not be eligible for Windows 11.

      Windows 11 is a virtualization challenge for some providers.

      The hardware requirements for physical devices are also required for virtual devices. The TPM module appears to be the biggest challenge. Oracle VirtualBox and Citrix Hypervisor as well as AWS and Google are unable to support Windows 11 virtual devices as of the time of writing.

      Windows 10 will be supported by Microsoft until October 2025.

      That will remove some of the pressure felt due to the ineligibility of many devices and the need to refresh them. Take your time and plan it out, keeping within budget constraints. Use the upgrade ring approach for systems that are eligible for the Windows 11 upgrade.

      New look and feel, and a center screen taskbar.

      Corners are rounded, some controls look a little different, but overall Windows 11 is not a dramatic shift from Windows 10. It is easier to navigate and find features. Oh, and yes, the taskbar (and start button) is shifted to the center of the screen, but you can move them back to the left if desired.

      The education industry gets extra attention with the release of Windows 11.

      Windows 11 comes with multiple subscription-based education offerings, but it also now includes a new lightweight SE edition that is intended for the K-8 age group. Microsoft also released a Windows 11 Education SE specific laptop, at a very attractive price point. Other manufacturers also offer Windows 11 SE focused devices.

      Why Windows 11?

      Windows 10 was supposed to be the final desktop OS from Microsoft, wasn’t it?

      Maybe. It depends who you ask.

      Jerry Nixon, a Microsoft developer evangelist, gained notoriety when he uttered these words while at a Microsoft presentation as part of Microsoft Ignite in 2015: “Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10,” (Hachman). Microsoft never officially made that statement. Interestingly enough, it never denied the comments made by Jerry Nixon either.

      Perhaps Microsoft released a new operating system as a financial grab, a way to make significant revenue?

      Nope.

      Windows 11 is a free upgrade or is included with any new computer purchase.

      Market share challenges?

      Doubtful.

      It’s true that Microsoft's market share of desktop operating systems is dropping while Apple OS X and Google Chrome OS are rising.

      In fact, Microsoft has relinquished over 13% of the market share since 2012 and Apple has almost doubled its market share. BUT:

      Microsoft is still holding 75.12% of the market while Apple is in the number 2 spot with 14.93% (gs.statcounter.com).

      The market share is worth noting for Microsoft but it hardly warrants a new operating system.

      New look and feel?

      Unlikely

      New start button and taskbar orientation, new search window, rounded corners, new visual look on some controls like the volume bar, new startup sound, new Windows logo, – all minor changes. Updates could achieve the same result.

      Security?

      Likely the main reason.

      Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

      The features are available on all Windows 11 physical devices, due to the common hardware requirements.

      Windows 11 hardware-based security

      These hardware options and features were available in Windows 10 but not enforced. With Windows 11, they are no longer optional. Below is a description and explanation of the main features.

      Feature What it is How it works
      TPM 2.0 (Trusted Platform Module) Chip TPM is a chip on the motherboard of the computer. It is used to store encryption keys, certificates, and passwords. TPM does this securely with tamper-proof prevention. It can also generate encryption keys and it includes its own unique encryption key that cannot be altered (helpdeskgeek.com). You do not need to enter your password once you setup Windows Hello, so the password is no longer easy to capture and steal. It is set up on a device per device basis, meaning if you go to a different device to sign in, your Windows Hello authentication will not follow you and you must set up your Hello pin or facial recognition again on that particular device. TPM (Trusted Platform Module) can store the credentials used by Windows Hello and encrypt them on the module.
      Windows Hello Windows Hello is an alternative to using a password for authentication. Users can use a pin, a fingerprint, or facial recognition to authenticate.
      Device Encryption Device encryption is only on when your device is off. It scrambles the data on your disk to make it unreadable unless you have the key to unscramble it. If your endpoint is stolen, the contents of the hard drive will remain encrypted and cannot be accessed by anyone unless they can properly authenticate on the device and allow the system to unscramble the encrypted data.
      UEFI Secure Boot Capable UEFI is an acronym for Unified Extensible Firmware Interface. It is an interface between the operating system and the computer firmware. Secure Boot, as part of the firmware interface, ensures that only unchangeable and approved software and drivers are loaded at startup and not any malware that may have infiltrated the system (Lumunge). UEFI, with Secure Boot, references a database containing keys and signatures of drivers and runtime code that is approved as well as forbidden. It will not let the system boot up unless the signature of the driver or run-time code that is trying to execute is approved. This UEFI Secure boot recognition process continues until control is handed over to the operating system.
      Virtualization Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI) VBS is security based on virtualization capabilities. It uses the virtualization features of the Windows operating system, specifically the Hyper-V hypervisor, to create and isolate a small chunk of memory that is isolated from the operating system. HVCI checks the integrity of code for violations. The Code Integrity check happens in the isolated virtual area of memory protected by the hypervisor, hence the acronym HVCI (Hypervisor Protected Code Integrity) (Murtaza). In the secure, isolated region of memory created by VBS with the hypervisor, Windows will run checks on the integrity of the code that runs various processes. The isolation protects the stored item from tampering by malware and similar threats. If they run incident free, they are released to the operating system and can run in the standard memory space. If issues are detected, the code will not be released, nor will it run in the standard memory space of the operating system, and damage or compromise will be prevented.

      How do all the hardware-based security features work?

      This scenario explains how a standard boot up and login should happen.

      You turn on your computer. Secure Boot authorizes the processes and UEFI hands over control to the operating system. Windows Hello works with TPM and uses a pin to authenticate the user and the operating systems gives you access to the Windows environment.

      Now imagine the same process with various compromised scenarios.

      You turn on your computer. Secure Boot does not recognize the signature presented to it by the second process in the boot sequence. You will be presented with a “Secure Boot Violation” message and an option to reboot. Your computer remains protected.

      You boot up and get past the secure boot process and UEFI passes control over to the Windows 11 operating system. Windows Hello asks for your pin, but you cannot remember the pin and incorrectly enter it three times before admitting temporary defeat. Windows Hello did not find a matching pin on the TPM and will not let you proceed. You cannot log in but in the eyes of the operating system, it has prevented an unauthorized login attempt.

      You power up your computer, log in without issue, and go about your morning routine of checking email, etc. You are not aware that malware has infiltrated your system and modified a page in system memory to run code and access the operating system kernel. VBS and HVCI check the integrity of that code and detect that it is malicious. The code remains isolated and prevented from running, protecting your system.

      TPM, Hello, UEFI with Secure Boot, VBS and HVCI all work together like a well-oiled machine.

      “Microsoft's rationale for Windows 11's strict official support requirements – including Secure Boot, a TPM 2.0 module, and virtualization support – has always been centered on security rather than raw performance.” – Andrew Cunningham, arstechnica.com

      “Windows 11 raises the bar for security by requiring hardware that can enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot. These features in combination have been shown to reduce malware by 60% on tested devices.” – Steven J. Vaughan-Nichols, Computerworld

      Can any device upgrade to Windows 11?

      In addition to the security-related hardware requirements listed previously, which may exclude some devices from Windows 11 eligibility, Windows 11 also has a minimum requirement for other hardware components.

      Windows 7 and Windows 10 were publicized as being backward compatible and almost any hardware would be able to run those operating systems. That changed with Windows 11. Microsoft now insists that modern hardware is required for Windows 11 for not only security but also improved stability.

      Software Requirement

      You must be running Windows 10 version 2004 or greater to be eligible for a Windows 11 upgrade (“Windows 11 Requirements”).

      Complete hardware requirements for Windows 11

      • 1 GHz (or faster) compatible 64-bit processor with two or more cores
      • 4 GB RAM
      • 64 GB or more of storage space
      • Compatible with DirectX 12 or later with WDDM 2.0 driver
        • DirectX connects the hardware in your computer with Windows. It allows software to display graphics using the video card or play audio, as long as that software is DirectX compatible. Windows 11 requires version 12 (“What are DirectX 12 compatible graphics”).
        • WDDM is an acronym for Windows Display Driver Model. WDDM is the architecture for the graphics driver for Windows (“Windows Display Driver Model”).
        • Version 2.0 of WDDM is required for Windows 11.
      • 720p display greater than 9" diagonally with 8 bits per color channel
      • UEFI Secure Boot capable
      • TPM 2.0 chip
      • (“Windows 11 Requirements”)

      Windows 11 may challenge your virtual environment

      When Windows 11 was initially released, some IT administrators experienced issues when trying to install or upgrade to Windows 11 in the virtual world.

      The Challenge

      The issues appeared to be centered around the Windows 11 hardware requirements, which must be detected by the Windows 11 pre-install check before the operating system will install.

      The TPM 2.0 chip requirement was indeed a challenge and not offered as a configuration option with Citrix Hypervisor, the free VMware Workstation Player or Oracle VM VirtualBox when Windows 11 was released in October 2021, although it is on the roadmap for Oracle and Citrix Hypervisor. VMware provides alternative products to the free Workstation Player that do support a virtual TPM. Oracle and Citrix reported that the feature would be available in the future and Windows 11 would work on their platforms.

      Short-Term Solutions

      VMware and Microsoft users can add a vTPM hardware type when configuring a virtual Windows 11 machine. Microsoft Azure does offer Windows 11 as an option as a virtual desktop. Citrix Desktop-As-A-Service (DAAS) will connect to Azure, AWS, or Google Cloud and is only limited by the features of the hosting cloud service provider.

      Additional Insight

      According to Microsoft, any VM running Windows 11 must meet the following requirements (“Virtual Machine Support”):

      • It must be a generation 2 VM, and upgrading a generation 1 VM to Windows 11 (in-place) is not possible
      • 64 GB of storage or greater
      • Secure Boot capable with the virtual TPM enabled
      • 4 GB of memory or greater
      • 2 or more virtual processors
      • The CPU of the physical computer that is hosting the VM must meet the Windows 11 (“Windows Processor Requirements”)

      What’s new or updated in Windows 11?

      The following two slides highlight some of the new and updated features in Windows 11.

      Security

      The most important change with Windows 11 is what you cannot see – the security. Windows 11 adds requirements and controls to make the user and device more secure, as described in previous slides.

      Taskbar

      The most prominent change in relation to the look and feel of Windows 11 is the shifting of the taskbar (and Start button) to the center of the screen. Some users may find this more convenient but if you do not and prefer the taskbar and start button back on the left of your screen, you can change it in taskbar settings.

      Updated Apps

      Paint, Photos, Notepad, Media Player, Mail, and other standard Windows apps have been updated with a new look and in some cases minor enhancements.

      User Interface

      The first change users will notice after logging in to Windows 11 is the new user interface – the look and feel. You may not notice the additional colors added to the Windows palette, but you may have thought that the startup sound was different, and the logo also looks different. You would be correct. Other look-and-feel items that changed include the rounded corners on windows, slightly different icons, new wallpapers, and controls for volume and brightness are now a slide bar. File explorer and the settings app also have a new look.

      Microsoft Teams

      Microsoft Teams is now installed on the taskbar by default. Note that this is for a personal Microsoft account only. Teams for Work or School will have to be installed separately if you are using a work or school account.

      What’s new or updated in Windows 11?

      Snap Layouts

      Snap layouts have been enhanced and snap group functionality has been added. This will allow you to quickly snap one window to the side of the screen and open other Windows in the other side. This feature can be accessed by dragging the window you wish to snap to the left or right edge of the screen. The window should then automatically resize to occupy that half of the screen and allow you to select other Windows that are already open to occupy the remaining space on the screen. You can also hover your mouse over the maximize button in the upper right-hand corner of the window. A small screen with multiple snap layouts will appear for your selection. Multiple snapped Windows can be saved as a “Snap Group” that will open together if one of the group windows are snapped in the future.

      Widgets

      Widgets are expanding. Microsoft started the re-introduction of widgets in Windows 10, specifically focusing on the weather. Widgets now include other services such as news, sports, stock prices, and others.

      Android Apps

      Android apps can now run in Windows 11. You will have to use the Amazon store to access and install Android apps, but if it is available in the Amazon store, you can install it on Windows 11.

      Docking

      Docking has improved with Windows 11. Windows knows when you are docked and will minimize apps when you undock so they are not lost. They will appear automatically when you dock again.

      This is not intended to be an inclusive list but does cover some of the more prominent features.

      What’s missing from Windows 11?

      The following features are no longer found in Windows 11:

      • Backward compatibility
        • The introduction of the hardware requirements for Windows 11 removed the backward compatibility (from a hardware perspective) that made the transition from previous versions of Windows to their successor less of a hardware concern. If a computer could run Windows 7, then it could also run Windows 10. That does not automatically mean it can also run Windows 11.
      • Internet Explorer
        • Internet Explorer is no longer installed by default in Windows 11. Microsoft Edge is now the default browser for Windows. Other browsers can also be installed if preferred.
      • Tablet mode
        • Windows 11 does not have a "tablet" mode, but the operating system will maximize the active window and add more space between icons to make selecting them easier if the 2-in-1 hardware detects that you wish to use the device as a tablet (keyboard detached or device opened up beyond 180 degrees, etc.).
      • Semi-annual updates
        • It may take six months or more to realize that semi-annual feature updates are missing. Microsoft moved to an annual feature update schema but continued with monthly quality updates with Windows 11.
      • Specific apps
        • Several applications have been removed (but can be manually added from the Microsoft Store by the user). They include:
          • OneNote for Windows 10
          • 3D Viewer
          • Paint 3D
          • Skype
      • Cortana (by default)
        • Cortana is missing from Windows 11. It is installed but not enabled by default. Users can turn it on if desired.

      Microsoft included a complete list of features that have been removed or deprecated with Windows 11, which can be found here Windows 11 Specs and System Requirements.

      Windows 11 editions

      • Windows 11 is offered in several editions:
        • Windows 11 Home
        • Windows 11 Pro
        • Windows 11 Pro for Workstations
        • Windows 11 Enterprise Windows 11 for Education
        • Windows 11 SE for Education
      • Windows 11 hardware requirements and security features are common throughout all editions.
      • The new look and feel along with all the features mentioned previously are common to all editions as well.
      • Windows Home
        • Standard offering for home users
      • Pro versus Pro for Workstations
        • Windows 11 Pro and Pro for Workstations are both well suited for the business environment with available features such as support for Active Directory or Azure Active Directory, Windows Autopilot, OneDrive for Business, etc.
        • Windows Pro for Workstations is designed for increased demands on the hardware with the higher memory limits (2 TB vs. 6 TB) and processor count (2 CPU vs. 4 CPU).
        • Windows Pro for Workstations also features Resilient File System, Persistent Memory, and SMB Direct. Neither of these features are available in the Windows 11 Pro edition.
        • Windows 11 Pro and Pro for Workstations are both very business focused, although Pro may also be a common choice for non-business users (Home and Education).
      • Enterprise Offerings
        • Enterprise licenses are subscription based and are part of the Microsoft 365 suite of offerings.
        • Windows 11 Enterprise is Windows 11 Pro with some additional addons and functionality in areas such as device management, collaboration, and security services.
        • The level of the Microsoft 365 Enterprise subscription (E3 or E5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the E5 subscription.

      Windows 11 Education Editions

      With the release of a laptop targeted specifically at the education market, Microsoft must be taking notice of the Google Chrome educational market penetration, especially with headlines like these.

      “40 Million Chromebooks in Use in Education” (Thurrott)

      “The Unprecedented Growth of the Chromebook Education Market Share” (Carklin)

      “Chromebooks Gain Market Share as Education Goes Online” (Hruska)

      “Chromebooks Gain Share of Education Market Despite Shortages” (Mandaro)

      “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand” (Duke)

      • Education licenses are subscription based and are part of the Microsoft 365 suite of offerings. Educational pricing is one benefit of the Microsoft 365 Education model.
      • Windows 11 Education is Windows 11 Pro with some additional addons and functionality similar to the Enterprise offerings for Windows 11 in areas such as device management, collaboration, and security services. Windows 11 Education also adds some education specific settings such as Classroom Tools, which allow institutions to add new students and their devices to their own environment with fewer issues, and includes OneNote Class Notebook, Set Up School PCs app, and Take a Test app.
      • The level of the Microsoft 365 Education subscription (A3 or A5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the A5 subscription.
      • Windows 11 SE for Education:
        • A cloud-first edition of Windows 11 specifically designed for the K-8 education market.
        • Windows 11 SE is a light version of Windows 11 that is designed to run on entry-level devices with better performance and security on that hardware.
        • Windows 11 SE requires Intune for Education and only IT admins can install applications.
      • Microsoft and others have come out with Windows SE specific devices at a low price point.
        • The Microsoft Surface Laptop SE comes pre-loaded with Windows 11 SE and can be purchased for US$249.00.
        • Dell, Asus, Acer, Lenovo, and others also offer Windows 11 SE specific devices (“Devices for Education”).

      Initial Reactions

      Below you can find some actual initial reactions to Windows 11.

      Initial reactions are mixed, as is to be expected with any new release of an operating system. The look and feel is new, but it is not a huge departure from the Windows 10 look and feel. Some new features are well received such as the snap feature.

      The shift of the taskbar (and start button) is the most popular topic of discussion online when it comes to Windows 11 reactions. Some love it and some do not. The best part about the shift of the taskbar is that you can adjust it in settings and move it back to its original location.

      The best thing about reactions is that they garner attention, and thanks in part to all the online reactions and comments, Microsoft is continually improving Windows 11 through quality updates and annual feature releases.

      “My 91-year-old Mum has found it easy!” Binns, Paul ITRG

      “It mostly looks quite nice and runs well.” Jmbpiano, Reddit user

      “It makes me feel more like a Mac user.” Chang, Ben Info-Tech

      “At its core, Windows 11 appears to be just Windows 10 with a fresh coat of paint splashed all over it.” Rouse, Rick RicksDailyTips.com

      “Love that I can snap between different page orientations.” Roberts, Jeremy Info-Tech

      “I finally feel like Microsoft is back on track again.” Jawed, Usama Neowin

      “A few of the things that seemed like issues at first have either turned out not to be or have been fixed with patches.” Jmbpiano, Reddit user

      “The new interface is genuinely intuitive, well-designed, and colorful.” House, Brett AnandTech

      “No issues. Have it out on about 50 stations.” Sandrews1313, Reddit User

      “The most striking change is to the Start menu.” Grabham, Dan pocket-lint.com

      How do I upgrade to Windows 11?

      The process is very similar to applying updates in Windows 10.

      • Windows 11 is offered as an upgrade through the standard Windows 10 update procedure. Windows Update will notify you when the Windows 11 upgrade is ready (assuming your device is eligible for Windows 11).
        • Allow the update (upgrade in this case) to proceed, reboot, and your endpoint will come back to life with Windows 11 installed and ready for you.
      • A fresh install can be delivered by downloading the required Windows 11 installation media from the Microsoft Software Download site for Windows 11.
      • Business users can control the timing and schedule of the Windows 11 rollout to corporate endpoints using Microsoft solutions such as WSUS, Configuration Manager, Intune and Endpoint Manager, or by using other endpoint management solutions.
      • WSUS and Configuration Manager will have to sync the product category for Windows 11 to manage the deployment.
      • Windows Update for Business policies will have to use the target version capability rather than using the feature update referrals alone.
      • Organizations using Intune and a Microsoft 365 E3 license will be able to use the Feature Update Deployments page to select Windows 11.
      • Other modern endpoint management solutions may also allow for a controlled deployment.

      Info-Tech Insight

      The upgrade itself may be a simple process but be prepared for the end-user reactions that will follow. Some will love it but others will despise it. It is not an optional upgrade in the long run, so everyone will have to learn to accept it.

      When can I upgrade to Windows 11?

      You can upgrade right now BUT there is no need to rush. Windows 11 was released in October 2021 but that doesn’t mean you have to upgrade everyone right away. Plan this out.

      • Build deployment rings into your Windows 11 upgrade approach: This approach, also referred to as Canary Releases or deployment rings, allows you to ensure that IT can support users if there's a major problem with the upgrade. Instead of disrupting all end users, you are only disrupting a portion of end users.
        • Deploy the initial update to your test environment.
        • After testing is successful or changes have been made, deploy Windows 11 to your pilot group of users.
        • After the pilot group gives you the thumbs up, deploy to the rest of production in phases. Phases are sometimes by office/location, sometimes by department, sometimes by persona (i.e. defer people that don't handle updates well), and usually by a combination of these factors.
        • Increase the size of each ring as you progress.
      • Always back up your data before any upgrade.

      Deployment Ring Example

      Pilot Ring - Individuals from all departments - 10 users

      Ring #1 - Dev, Finance - 20 Users

      Ring #2 - Research - 100 Users

      Ring #3 - Sales, IT, Marketing - 500 Users

      Upgrade your eligible devices and users to Windows 11

      Build Windows 11 Deployment Rings

      Instructions:

      1. Identify who will be in the pilot group. Use individuals instead of user groups.
      2. Identify how many standard rings you need. This number will be based on the total number of employees per office.
      3. Map groups to rings. Define which user groups will be in each ring.
      4. Allow some time to elapse between upgrades. Allow the first group to work with Windows 11 and identify any potential issues that may arise before upgrading the next group.
      5. Track and communicate. Record all information into a spreadsheet like the one on the right. This will aid in communication and tracking.
      Ring Department or Group Total Users Delay Time Before Next Group
      Pilot Ring Individuals from all departments 10 Three weeks
      Ring 1 Dev Finance 20 Two weeks
      Ring 2 Research 100 One week
      Ring 3 Sales, IT Marketing 500 N/A

      What are my options if my devices cannot upgrade to Windows 11?

      Don’t rush out to replace all the ineligible endpoint devices. You have some time to plan this out. Windows 10 will be available and supported by Microsoft until October 2025.

      Use asset management strategies and budget techniques in your Windows 11 upgrade approach:

      • Start with current inventory and determine which devices will not be eligible for upgrade to Windows 11.
      • Prioritize the devices for replacement, taking device age, the role of the user the device supports, and delivery times for remote users into consideration.
      • Take this opportunity to review overall device offerings and end-user compute strategy. This will help decide which devices to offer going forward while improving end-user satisfaction.
      • Determine the cost for replacement devices:
        • Compare vendor offerings using an RFP process.
      • Use the hardware asset management planning spreadsheet on the next slide to budget for the replacements over the coming months leading up to October 2025.

      Leverage Info-Tech research to improve your end-user computing strategy and hardware asset management processes:

      New to End User Computing Strategies? Start with Modernize and Transform Your End-User Computing Strategy.

      New to IT asset management? Use Info-Tech’s Implement Hardware Asset Management blueprint.

      Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

      Build a Windows 11 Device Replacement Budget

      The link below will open up a hardware asset management (HAM) budgeting tool. This tool can easily be modified to assist in developing and justifying the budget for hardware assets for the Windows 11 project. The tool will allow you to budget for hardware asset refresh and to adjust the budget as needed to accommodate any changes. Follow the instructions on each tab to complete the tool.

      A sample of a possible Windows 11 budgeting spreadsheet is shown on the right, but feel free to play with the HAM budgeting tool to fit your needs.

      HAM Budgeting Tool

      Windows 11 Replacement Schedule
      2022 2023 2024 2025
      Department Total to replace Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Left to allocate
      Finance 120 20 20 20 10 10 20 20 0
      HR 28 15 13 0
      IT 30 15 15 0
      Research 58 8 15 5 20 5 5 0
      Planning 80 10 15 15 10 15 15 0
      Other 160 5 30 5 15 15 30 30 30 0
      Totals 476 35 38 35 35 35 35 38 35 50 35 35 35 35 0

      Related Info-Tech Research

      Modernize and Transform Your End-User Computing Strategy

      This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?

      Implement Hardware Asset Management

      This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

      Bibliography

      aczechowski, et al. “Windows 11 Requirements.” Microsoft, 3 June 2022. Accessed 13 June 2022.

      Binns, Paul. Personal interview. 07 June 2022.

      Butler, Sydney. “What Is Trusted Platform Module (TPM) and How Does It Work?” Help Desk Geek, 5 August 2021. Accessed 18 May 2022.

      Carklin, Nicolette. “The Unprecedented Growth of the Chromebook Education Market Share.” Parallels International GmbH, 26 October 2021. Accessed 19 May 2022.

      Chang, Ben. Personal interview. 26 May 2022.

      Cunningham, Andrew. “Why Windows 11 has such strict hardware requirements, according to Microsoft.” Ars Technica, 27 August 2021. Accessed 19 May 2022.

      Dealnd-Han, et al. “Windows Processor Requirements.” Microsoft, 9 May 2022. Accessed 18 May 2022.

      “Desktop Operating Systems Market Share Worldwide.” Statcounter Globalstats, June 2021–June 2022. Accessed 17 May 2022.

      “Devices for education.” Microsoft, 2022. Accessed 13 June 2022.

      Duke, Kent. “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand.” Android Police, 16 November 2020. Accessed 18 May 2022.

      Grabham, Dan. “Windows 11 first impressions: Our initial thoughts on using Microsoft's new OS.” Pocket-Lint, 24 June 2021. Accessed 3 June 2022.

      Hachman, Mark. “Why is there a Windows 11 if Windows 10 is the last Windows?” PCWorld, 18 June 2021. Accessed 17 May 2022.

      Howse, Brett. “What to Expect with Windows 11: A Day One Hands-On.” Anandtech, 16 November 2020. Accessed 3 June 2022.

      Hruska, Joel. “Chromebooks Gain Market Share as Education Goes Online.” Extremetech, 26 October 2020. Accessed 19 May 2022.

      Jawed, Usama. “I am finally excited about Windows 11 again.” Neowin, 26 February 2022. Accessed 3 June 2022.

      Jmbpiano. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

      Lumunge, Erick. “UEFI and Legacy boot.” OpenGenus, n.d. Accessed 18 May 2022.

      Bibliography

      Mandaro, Laura. “Chromebooks Gain Share of Education Market Despite Shortages.” The Information, 9 September 2020. Accessed 19 May 2022.

      Murtaza, Fawad. “What Is Virtualization Based Security in Windows?” Valnet Inc, 24 October 2021. Accessed 17 May 2022.

      Roberts, Jeremy. Personal interview. 27 May 2022.

      Rouse, Rick. “My initial thoughts about Windows 11 (likes and dislikes).” RicksDailyTips.com, 5 September 2021. Accessed 3 June 2022.

      Sandrews1313. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

      “The Matrix Quotes." Quotes.net, n.d. Accessed 18 May 2022.

      Thurrott, Paul.” Google: 40 Million Chromebooks in Use in Education.” Thurrott, 21 January 2020. Accessed 18 May 2022.

      Vaughan-Nichols, Steven J. “The real reason for Windows 11.” Computerworld, 6 July 2021, Accessed 19 May 2022.

      “Virtual Machine Support.” Microsoft,3 June 2022. Accessed 13 June 2022.

      “What are DirectX 12 compatible graphics and WDDM 2.x.” Wisecleaner, 20 August 2021. Accessed 19 May 2022.

      “Windows 11 Specs and System Requirements.” Microsoft, 2022. Accessed 13 June 2022.

      “Windows Display Driver Model.” MiniTool, n.d. Accessed 13 June 2022.

      Asset Management

      • Buy Link or Shortcode: {j2store}1|cart{/j2store}
      • Related Products: {j2store}1|crosssells{/j2store}
      • Up-Sell: {j2store}1|upsells{/j2store}
      • Download01-Title: Asset Management Executive Brief
      • Download-01: Visit Link
      • member rating overall impact: 9.1/10
      • member rating average dollars saved: $16,518
      • member rating average days saved: 19
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Asset management has a clear impact on the financials of your company. Clear insights are essential to keep your spending at the right level.

      Asset Management

      Execute an Emergency Remote Work Plan

      • Buy Link or Shortcode: {j2store}421|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Many organizations do not have developed plans for how to turn on-premises employees into remote workers in an emergency.
      • In an emergency situation, such as a pandemic, sending employees home to work remotely without time to prepare presents daunting challenges, such as trying to comprehend and prioritize the myriad of tasks that need accomplishing for human resources, the business, and IT in a VUCA (volatile, uncertain, complex, and ambiguous) world.
      • Security issues may arise from employees not used to working remotely. Indeed, employees sent home to work remotely in an emergency may not have been eligible otherwise. This creates security risks, including the proliferation of shadow IT.

      Our Advice

      Critical Insight

      • The emergency will restructure the business: make sure it’s done right. While your organization may need quick fixes for day one of an emergency remote work plan, these are not viable long-term solutions. The emergency will vividly reinforce to the business side that more resources need to be directed to IT to enable strong business continuity and employee safety. Make sure the right plan is put in place during the crucial first weeks. The next emergency is just around the corner.
      • Prioritize key business processes. Before getting into the details of a work from home policy, identify which crucial business processes need to continue for the company to survive. Build the remote work policy around supporting those workflows.
      • Where the “carrot” is not possible, emergencies may require the “stick.” To ensure secure endpoints and prevent proliferation of shadow IT, you may need to enforce certain rules through policy. However, disenfranchising employees is not a long-term solution: once the emergency subsides, use this basis to explore end-user requirements properly and ensure employee-driven adoption plans. Where possible, for this latter scenario, always use the carrot.

      Impact and Result

      • A prioritized plan for IT processes through Info-Tech’s cascading responsibility checklists for emergency remote work.
      • A codified emergency remote work policy document to better prepare for future emergencies.

      Execute an Emergency Remote Work Plan Research & Tools

      Start here

      Read our concise Executive Brief for why you need prioritized emergency remote work checklists and an accompanying policy document and review Info-Tech’s methodology.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Execute an Emergency Remote Work Plan Storyboard

      1. Day one preparations

      Prioritize key action items on day one of sending your employees home to remotely work during an emergency.

      • Emergency Remote Work Plan Checklists
      • Home Office Survey
      • Checklist for Securing Remote Workers
      • None
      • Remote Access Policy
      • Equipment Loan Policy
      • None
      • Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2
      • Remote Work Assignment Log
      • Wiki Collection for Collaboration Tools
      • Pandemic Preparation: The People Playbook

      2. One-to-two weeks preparations

      Address key action items in the one-to-two weeks following an emergency that forced your employees to work remotely.

      • None

      3. Codify an emergency remote work policy

      Turn your emergency remote work checklists into policy.

      • Emergency Remote Work Policy
      • Execute an Emergency Remote Work Plan Executive Presentation
      [infographic]

      Get the Most Out of Your SAP

      • Buy Link or Shortcode: {j2store}240|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $6,499 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • SAP systems are changed rarely and changing them has significant impact on an organization.
      • Research shows that even newly installed systems often fail to realize their full potential benefit to the organization.
      • Business process improvement is rarely someone’s day job.

      Our Advice

      Critical Insight

      A properly optimized SAP business process will reduce costs and increase productivity.

      Impact and Result

      • Build an ongoing optimization team to conduct application improvements.
      • Assess your SAP application(s) and the environment in which they exist. Take a business first strategy to prioritize optimization efforts.
      • Validate SAP capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy.
      • Pull this all together to develop a prioritized optimization roadmap.

      Get the Most Out of Your SAP Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get the Most Out of Your SAP Storyboard – A guide to optimize your SAP.

      SAP is a core tool that the business leverages to accomplish its goals. Use this blueprint to strategically re-align business goals, identify business application capabilities, complete a process assessment, evaluate user adoption, and create an optimization plan that will drive a cohesive technology strategy that delivers results.

      • Get the Most Out of Your SAP – Phases 1-4

      2. Get the Most Out of Your SAP Workbook – A tool to document and assist with optimizing your SAP.

      The Get the Most out of Your SAP Workbook serves as the holding document for the different elements for the Get the Most out of Your SAP blueprint. Use each assigned tab to input the relevant information for the process of optimizing your SAP.

      • Get the Most Out of Your SAP Workbook

      Infographic

      Workshop: Get the Most Out of Your SAP

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your SAP Application Vision

      The Purpose

      Get the most out of your SAP.

      Key Benefits Achieved

      Develop an ongoing SAP optimization team.

      Re-align SAP and business goals.

      Understand your current system state capabilities and processes.

      Validate user satisfaction, application fit, and areas of improvement to optimize your SAP.

      Take a 360-degree inventory of your SAP and related systems.

      Realign business and technology drivers. Assess user satisfaction.

      Review the SAP marketplace.

      Complete a thorough examination of capabilities and processes.

      Manage your vendors and data.

      Pull this all together to prioritize optimization efforts and develop a concrete roadmap.

      Activities

      1.1 Determine your SAP optimization team.

      1.2 Align organizational goals.

      1.3 Inventory applications and interactions.

      1.4 Define business capabilities.

      1.5 Explore SAP-related costs.

      Outputs

      SAP optimization team

      SAP business model

      SAP optimization goals

      SAP system inventory and data flow

      SAP process list

      SAP and related costs

      2 Map Current-State Capabilities

      The Purpose

      Map current-state capabilities.

      Key Benefits Achieved

      Complete an SAP process gap analysis to understand where the SAP is underperforming.

      Review the SAP application portfolio assessment to understand user satisfaction and data concerns.

      Undertake a software review survey to understand your satisfaction with the vendor and product.

      Activities

      2.1 Conduct gap analysis for SAP processes.

      2.2 Perform an application portfolio assessment.

      2.3 Review vendor satisfaction.

      Outputs

      SAP process gap analysis

      SAP application portfolio assessment

      ERP software reviews survey

      3 Assess SAP

      The Purpose

      Assess SAP.

      Key Benefits Achieved

      Learn the processes that you need to focus on.

      Uncover underlying user satisfaction issues to address these areas.

      Understand where data issues are occurring so that you can mitigate this.

      Investigate your relationship with the vendor and product, including that relative to others.

      Identify any areas for cost optimization (optional).

      Activities

      3.1 Explore process gaps.

      3.2 Analyze user satisfaction.

      3.3 Assess data quality.

      3.4 Understand product satisfaction and vendor management.

      3.5 Look for SAP cost optimization opportunities (optional).

      Outputs

      SAP process optimization priorities

      SAP vendor optimization opportunities

      SAP cost optimization

      4 Build the Optimization Roadmap

      The Purpose

      Build the optimization roadmap.

      Key Benefits Achieved

      Understanding where you need to improve is the first step, now understand where to focus your optimization efforts.

      Activities

      4.1 SAP process gap analysis

      4.2 SAP application portfolio assessment

      4.3 SAP software reviews survey

      Outputs

      ERP optimization roadmap

      Further reading

      Get the Most Out of Your SAP

      In today’s connected world, the continuous optimization of enterprise applications to realize your digital strategy is key.

      EXECUTIVE BRIEF

      Analyst Perspective

      Focus optimization on organizational value delivery.

      The image contains a picture of Chad Shortridge.

      Chad Shortridge

      Senior Research Director, Enterprise Applications

      Info-Tech Research Group

      The image contains a picture of Lisa Highfield.

      Lisa Highfield

      Research Director, Enterprise Applications

      Info-Tech Research Group

      Enterprise resource planning (ERP) is a core tool that the business leverages to accomplish its goals. An ERP that is doing its job well is invisible to the business. The challenges come when the tool is no longer invisible. It has become a source of friction in the functioning of the business.

      SAP systems are expensive, benefits can be difficult to quantify, and issues with the products can be difficult to understand. Over time, technology evolves, organizational goals change, and the health of these systems is often not monitored. This is complicated in today’s digital landscape with multiple integrations points, siloed data, and competing priorities.

      Too often organizations jump into selecting replacement systems without understanding the health of their systems. We can do better than this.

      IT leaders need to take a proactive approach to continually monitor and optimize their enterprise applications. Strategically re-align business goals, identify business application capabilities, complete a process assessment, evaluate user adoption, and create an optimization plan that will drive a cohesive technology strategy that delivers results.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Your SAP ERP systems are critical to supporting the organization’s business processes. They are expensive. Direct benefits and ROI can be hard to measure.

      SAP application portfolios are often behemoths to support. With complex integration points and unique business processes, stabilization is the norm.

      Application optimization is essential to staying competitive and productive in today’s digital environment.

      Balancing optimization with stabilization is one of the most difficult decisions for ERP application leaders.

      Competing priorities and often unclear ERP strategies make it difficult to make decisions about what, how, and when to optimize.

      Enterprise applications involve large numbers of processes, users, and evolving vendor roadmaps.

      Teams do not have a framework to illustrate, communicate, and justify the optimization effort in the language your stakeholders understand.

      In today’s rapidly changing SAP landscape it is imperative to evaluate your applications for optimization, no matter what your strategy is moving forward.

      Assess your SAP applications and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.

      Validate ERP capabilities, user satisfaction, issues around data, vendor management, and costs to build out an overall roadmap and optimization strategy.

      Pull this all together to prioritize optimization efforts and develop a concrete roadmap.

      Info-Tech Insight

      SAP ERP environments are changing, but we cannot stand still on our optimization efforts. Understand your product(s), processes, user satisfaction, integration points, and the availability of data to business decision makers. Examine these areas to develop a personalized SAP optimization roadmap that fits the needs of your organization. Incorporate these methodologies into an ongoing optimization strategy aimed at enabling the business, increasing productivity, and reducing costs.

      The image contains an Info-Tech Thought model on get the most out of your ERP.

      Insight summary

      Continuous assessment and optimization of your SAP ERP systems is critical to the success of your organization.

      • Applications and the environments in which they live are constantly evolving.
      • This blueprint provides business and application managers with a method to complete a health assessment of their ERP systems to identify areas for improvement and optimization.
      • Put optimization practices into effect by:
        • Aligning and prioritizing key business and technology drivers.
        • Identifying ERP process classification and performing a gap analysis.
        • Measuring user satisfaction across key departments.
        • Evaluating vendor relations.
        • Understanding how data plays into the mix.
        • Pulling it all together into an optimization roadmap.

      SAP enterprise resource planning (ERP) systems facilitate the flow of information across business units. It allows for the seamless integration of systems and creates a holistic view of the enterprise to support decision making. In many organizations, the SAP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow. ERP implementation should not be a one-and-done exercise. There needs to be ongoing optimization to enable business processes and optimal organizational results.

      SAP enterprise resource planning (ERP)

      The image contains a diagram of the SAP enterprise resource planning. The diagram includes a circle with smaller circles all around it. The inside of the circle contains SAP logos. The circles around the big circle are labelled: Human Resources Management, Sales, Marketing, Customer Service, Asset Management, Logistics, Supply Chain Management, Manufacturing, R&D and Engineering, and Finance.

      What is SAP?

      SAP ERP systems facilitate the flow of information across business units. They allow for the seamless integration of systems and create a holistic view of the enterprise to support decision making.

      In many organizations, the ERP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow.

      An ERP system:

      • Automates processes, reducing the amount of manual, routine work.
      • Integrates with core modules, eliminating the fragmentation of systems.
      • Centralizes information for reporting from multiple parts of the value chain to a single point.

      SAP use cases:

      Product-Centric

      Suitable for organizations that manufacture, assemble, distribute, or manage material goods.

      Service-Centric

      Suitable for organizations that provide and manage field services and/or professional services.

      SAP Fast Facts

      Product Description

      • SAP has numerous ERP products. Products can be found under ERP, Finance, Customer Relations and Experience, Supply Chain Management, Human Resources, and Technology Platforms.
      • SAP offers on-premises and cloud solutions for its ERP. In 2011, SAP released the HANA in-memory database. SAP ECC 6.0 reaches the end of life in 2027 (2030 extended support).
      • Many organizations are facing mandatory transformation. This is an excellent opportunity to examine ERP portfolios for optimization opportunities.
      • Now is the time to optimize to ensure you are prepared for the journey ahead.
      The image contains a timeline of the evolution of SAP ERP. The timeline is ordered: SAP R1-R3 1972-1992, SAP ECC 2003-2006, ERP Business Suite 2000+, SAP HANA In-Memory Database 2011, S/4 2015.

      Vendor Description

      • SAP SE was founded in 1972 by five former IBM employees.
      • The organization is focused on enterprise software that integrates all business processes and enables data processing in real-time.
      • SAP stands for Systems, Applications, and Products in Data Processing.
      • SAP offers more than 100 solutions covering all business functions.
      • SAP operates 65 data centers at 35 locations in 16 countries.

      Employees

      105,000

      Headquarters

      Walldorf, Baden-Württemberg, Germany

      Website

      sap.com

      Founded

      1972

      Presence

      Global, Publicly Traded

      SAP by the numbers

      Only 72% of SAP S/4HANA clients were satisfied with the product’s business value in 2022. This was 9th out of 10 in the enterprise resource planning category.

      Source: SoftwareReviews

      As of 2022, 65% of SAP customers have not made the move to S/4HANA. These customers will continue to need to optimize the current ERP to meet the demanding needs of the business.

      Source: Statista

      Organizations will need to continue to support and optimize their SAP ERP portfolios. As of 2022, 42% of ASUG members were planning a move to S/4HANA but had not yet started to move.

      Source: ASUG

      Your challenge

      This research is designed to help organizations who need to:

      • Understand the multiple deployment models and the roadmap to successfully navigate a move to S/4HANA.
      • Build a business case to understand the value behind a move.
      • Map functionality to ensure future compatibility.
      • Understand the process required to commercially navigate a move to S/4HANA.
      • Avoid a costly audit due to missed requirements or SAP whiteboarding sessions.

      HANA used to be primarily viewed as a commercial vehicle to realize legacy license model discounts. Now, however, SAP has built a roadmap to migrate all customers over to S/4HANA. While timelines may be delayed, the inevitable move is coming.

      30-35% of SAP customers likely have underutilized assets. This can add up to millions in unused software and maintenance.

      – Upperedge

      SAP challenges and dissatisfaction

      Drivers of Dissatisfaction

      Organizational

      People and teams

      Technology

      Data

      Competing priorities

      Knowledgeable staff/turnover

      Integration issues

      Access to data

      Lack of strategy

      Lack of internal skills

      Selecting tools and technology

      Data hygiene

      Budget challenges

      Ability to manage new products

      Keeping pace with technology changes

      Data literacy

      Lack of training

      Update challenges

      One view of the customer

      Finance, IT, Sales, and other users of the ERP system can only optimize ERP with the full support of each other. The cooperation of the departments is crucial when trying to improve ERP technology capabilities and customer interaction.

      Info-Tech Insight

      While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder-to-shoulder with the business to develop a technology framework for ERP.

      Where are applications leaders focusing?

      Big growth numbers

      Year-over-year call topic requests

      Other changes

      Year-over-year call topic requests

      The image contains a graph to demonstrate year-over-year call topic requests. Year 1 has 79%, Year 2 76%, Year 3 65% requests, and Year 4 has 124% requests. The image contains a graph to demonstrate other changes in year-over-year call topic requests. Year 1 has -25%, Year 2 has 4%, and Year 3 has 13%.

      We are seeing applications leaders’ priorities change year over year, driven by a shift in their approach to problem solving. Leaders are moving from a process-centric approach to a collaborative approach that breaks down boundaries and brings teams together.

      Software development lifecycle topics are tactical point solutions. Organizations have been “shifting left” to tackle the strategic issues such as product vision and Agile mindset to optimize the whole organization.

      The S/4HANA journey

      Optimization can play a role in your transition to S/4HANA.

      • The business does not stop. Satisfy ongoing needs for business enablement.
      • Build out a collaborative SAP optimization team across the business and IT.
      • Engage the business to understand requirements.
      • Discover applications and processes.
      • Explore current-state capabilities and future-state needs.
      • Evaluate optimization opportunities. Are there short-term wins? What are the long-term goals?
      • Navigate the path to S/4HANA and develop some timelines and stage gates.
      • Set your course and optimization roadmap.
      • Capitalize on the methodologies for an ongoing optimization effort that can be continued after the S/4HANA go-live date.

      Many organizations may be coming up against changes to their SAP ERP application portfolio.

      Some challenges organizations may be dealing with include:

      • Heavily customized instances
      • Large volumes of data
      • Lack of documentation
      • Outdated business processes
      • Looming end of life

      Application optimization is risky without a plan

      Avoid these common pitfalls:

      • Not pursuing optimization because you are migrating to S/4HANA.
      • Not considering how this plays into the short-, medium-, and long-term ERP strategy.
      • Not considering application optimization as a business and IT partnership, which requires the continuous formal engagement of all participants.
      • Not having a good understanding of your current state, including integration points and data.
      • Not adequately accommodating feedback and changes after digital applications are deployed and employed.
      • Not treating digital applications as a motivator for potential future IT optimization efforts and incorporating digital assets in strategic business planning.
      • Not involving department leads, management, and other subject-matter experts to facilitate the organizational change digital applications bring.

      “[A] successful application [optimization] strategy starts with the business need in mind and not from a technological point of view. No matter from which angle you look at it, modernizing a legacy application is a considerable undertaking that can’t be taken lightly. Your best approach is to begin the journey with baby steps.”

      – Medium

      Info-Tech’s methodology for getting the most out of your ERP

      1. Map Current-State Capabilities

      2. Assess Your Current State

      3. Identify Key Optimization Areas

      4. Build Your Optimization Roadmap

      Phase Steps

      1. Identify stakeholders and build your SAP optimization team.
      2. Build an SAP strategy model.
      3. Inventory current system state.
      4. Define business capabilities.
      1. Conduct a gap analysis for ERP processes.
      2. Assess user satisfaction.
      3. Review your satisfaction with the vendor and product.
      1. Identify key optimization areas.
      2. Evaluate product sustainability over the short, medium, and long term.
      3. Identify any product changes anticipated over short, medium, and long term.
      1. Prioritize optimization opportunities.
      2. Identify key optimization areas.
      3. Compile optimization assessment results.

      Phase Outcomes

      1. Stakeholder map
      2. SAP optimization team
      3. SAP business model
      4. Strategy alignment
      5. Systems inventory and diagram
      6. Business capabilities map
      7. Key SAP processes list
      1. Gap analysis for SAP-related processes
      2. Understanding of user satisfaction across applications and processes
      3. Insight into SAP data quality
      4. Quantified satisfaction with the vendor and product
      5. Understanding SAP costs
      1. List of SAP optimization opportunities
      1. SAP optimization roadmap

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Get the Most Out of Your SAP Workbook

      Identify and prioritize your SAP optimization goals.

      The image contains screenshots of the SAP Workbook.

      Application Portfolio Assessment

      Assess IT-enabled user satisfaction across your SAP portfolio.

      The image contains a screenshot of the Application Portfolio Assessment.

      Key deliverable:

      The image contains a screenshot of the SAP Organization Roadmap.

      SAP Optimization Roadmap

      Complete an assessment of processes, user satisfaction, data quality, and vendor management.

      The image contains screenshots further demonstrating SAP deliverables.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.

      Guided Implementation

      Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.

      Workshop

      We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.

      Consulting

      Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenge.

      Call #2:

      • Build the SAP team.
      • Align organizational goals.

      Call #3:

      • Map current state.
      • Inventory SAP capabilities and processes.
      • Explore SAP-related costs.

      Call #4: Understand product satisfaction and vendor management.

      Call #5: Review APA results.

      Call #6: Understand SAP optimization opportunities.

      Call #7: Determine the right SAP path for your organization.

      Call #8:

      Build out optimization roadmap and next steps.

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Define Your SAP Application Vision

      Map Current State

      Assess SAP

      Build Your Optimization Roadmap

      Next Steps and Wrap-Up (offsite)

      Activities

      1.1 Identify Stakeholders and Build Your Optimization Team

      1.2 Build an SAP Strategy Model

      1.3 Inventory Current System State

      1.4 Define Optimization Timeframe

      1.5 Understand SAP Costs

      2.1 Assess SAP Capabilities

      2.2 Review Your Satisfaction With the Vendor/Product and Willingness for Change

      3.1 Prioritize Optimization Opportunities

      3.2 Discover Optimization Initiatives

      4.1 Build Your Optimization Roadmap

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. SAP optimization team
      2. SAP business model
      3. SAP optimization goals
      4. System inventory and data flow
      5. Application and business capabilities list
      6. SAP optimization timeline
      1. SAP capability gap analysis
      2. SAP user satisfaction (application portfolio assessment)
      3. SAP SoftwareReviews survey results
      4. SAP current costs
      1. Product and vendor satisfaction opportunities
      2. Capability and feature optimization opportunities
      3. Process optimization opportunities
      4. Integration optimization opportunities
      5. Data optimization opportunities
      6. SAP cost-saving opportunities
      1. SAP optimization roadmap

      Phase 1

      Map Current-State Capabilities

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Identify Stakeholders and Build Your Optimization Team

      1.2 Build an SAP Strategy Model

      1.3 Inventory Current System State

      1.4 Define Optimization Timeframe

      1.5 Understand SAP Costs

      2.1 Assess SAP Capabilities

      2.2 Review Your Satisfaction With the Vendor/Product and Willingness for Change

      3.1 Prioritize Optimization Opportunities

      3.2 Discover Optimization Initiatives

      4.1 Build Your Optimization Roadmap

      This phase will guide you through the following activities:

      • Align your organizational goals
      • Gain a firm understanding of your current state
      • Inventory ERP and related applications
      • Confirm the organization’s capabilities

      This phase involves the following participants:

      • CFO
      • Department Leads – Finance, Procurement, Asset Management
      • Applications Director
      • Senior Business Analyst
      • Senior Developer
      • Procurement Analysts

      Step 1.1

      Identify Stakeholders and Build Your Optimization Team

      Activities

      1.1.1 Identify stakeholders critical to success

      1.1.2 Map your SAP optimization stakeholders

      1.1.3 Determine your SAP optimization team

      This step will guide you through the following activities:

      • Identify ERP drivers and objectives
      • Explore ERP challenges and pain points
      • Discover ERP benefits and opportunities
      • Align the ERP foundation with the corporate strategy

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Stakeholder map
      • SAP Optimization Team

      ERP optimization stakeholders

      • Understand the roles necessary to get the most out of your SAP.
      • Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.

      Title

      Role Within the Project Structure

      Organizational Sponsor

      • Owns the project at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with your organizational strategy
      • CIO, CFO, COO, or similar

      Project Manager

      • The IT individual(s) that oversee day-to-day project operations
      • Responsible for preparing and managing the project plan and monitoring the project team’s progress
      • Applications Manager or other IT Manager, Business Analyst, Business Process Owner, or similar

      Business Unit Leaders

      • Works alongside the IT Project Manager to ensure the strategy is aligned with business needs
      • In this case, likely to be a marketing, sales, or customer service lead
      • Sales Director, Marketing Director, Customer Care Director, or similar

      Optimization Team

      • Comprised of individuals whose knowledge and skills are crucial to project success
      • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions; can assist with persona and scenario development for ERP
      • Project Manager, Business Lead, ERP Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs

      Steering Committee

      • Comprised of the C-suite/management-level individuals that act as the project’s decision makers
      • Responsible for validating goals and priorities, defining the project scope, enabling adequate resourcing, and managing change
      • Project Sponsor, Project Manager, Business Lead, CFO, Business Unit SMEs, or similar

      Info-Tech Insight

      Do not limit project input or participation. Include subject-matter experts and internal stakeholders at stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to create your ERP optimization strategy.

      1.1.1 Identify SAP optimization stakeholders

      1 hour

      1. Hold a meeting to identify the SAP optimization stakeholders.
      2. Use next slide as a guide.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot from the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Understand how to navigate the complex web of stakeholders in ERP

      Identify which stakeholders to include and what their level of involvement should be during requirements elicitation based on relevant topic expertise.

      Sponsor

      End User

      IT

      Business

      Description

      An internal stakeholder who has final sign-off on the ERP project.

      Front-line users of the ERP technology.

      Back-end support staff who are tasked with project planning, execution, and eventual system maintenance.

      Additional stakeholders that will be impacted by any ERP technology changes.

      Examples

      • CEO
      • CIO/CTO
      • COO
      • CFO
      • Warehouse personnel
      • Sales teams
      • HR admins
      • Applications manager
      • Vendor relationship manager(s)
      • Director, Procurement
      • VP, Marketing
      • Manager, HR

      Value

      Executive buy-in and support is essential to the success of the project. Often, the sponsor controls funding and resource allocation.

      End users determine the success of the system through user adoption. If the end user does not adopt the system, the system is deemed useless and benefits realization is poor.

      IT is likely to be responsible for more in-depth requirements gathering. IT possesses critical knowledge around system compatibility, integration, and data.

      Involving business stakeholders in the requirements gathering will ensure alignment between HR and organizational objectives.

      Large-scale ERP projects require the involvement of many stakeholders from all corners and levels of the organization, including project sponsors, IT, end users, and business stakeholders. Consider the influence and interest of stakeholders in contributing to the requirements elicitation process and involve them accordingly.

      EXAMPLE: Stakeholder involvement during selection

      The image contains an example of stakeholder involvement during selection. The graph is comparing influence and interest. In the lowest section of both influence and interest, it is labelled Monitor. With low interest but high influence that is labelled Keep Satisfied. In low influence but high interest it is labelled Keep Informed. The section that is high in both interest and influence that is labelled Involve closely.

      Activity 1.1.2 Map your SAP optimization stakeholders

      1 hour

      1. Use the list of SAP optimization stakeholders.
      2. Map each stakeholder on the quadrant based on their expected influence and involvement in the project.
      3. [Optional] Color code the users using the scale below to quickly identify the group that the stakeholder belongs to.

      The image contains an example of a colour scheme. Sponsor is coloured blue, End user is purple, IT is yellow, and Business is light blue.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of an example map on organization's stakeholders.

      Download the Get the Most Out of Your SAP Workbook

      Map the organization’s stakeholders

      The image contains a larger version of the image from the previous slide where there is a graph comparing influence and involvement and has a list of stakeholders in a legend on the side.

      The SAP optimization team

      Consider the core team functions when putting together the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned ERP optimization strategy. Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as Marketing, Sales, Service, and Finance as well as IT.

      Required Skills/Knowledge

      Suggested Project Team Members

      Business

      • Department leads
      • Business process leads
      • Business analysts
      • Subject matter experts
      • SMEs/Business process leads –All functional areas; example: Strategy, Sales, Marketing, Customer Service, Finance, HR

      IT

      • Application development
      • Enterprise integration
      • Business processes
      • Data management
      • Product owner
      • ERP application manager
      • Business process manager
      • Integration manager
      • Application developer
      • Data stewards

      Other

      • Operations
      • Administrative
      • Change management
      • COO
      • CFO
      • Change management officer

      1.1.3 Determine your SAP optimization team

      1 hour

      1. Have the project manager and other key stakeholders discuss and determine who will be involved in the SAP optimization project.
      • The size of the team will depend on the initiative and size of your organization.
      • Key business leaders in key areas and IT representatives should be involved.

      Note: Depending on your initiative and the size of your organization, the size of this team will vary.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the section ERP Optimization Team in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Step 1.2

      Build an SAP Strategy Model

      Activities

      1.2.1 Explore environmental factors and technology drivers

      1.2.2 Consider potential barriers and challenges

      1.2.3 Discuss enablers of success

      1.2.4 Develop your SAP optimization goals

      This step will guide you through the following activities:

      • Identify ERP drivers and objectives
      • Explore ERP challenges and pain points
      • Discover ERP benefits and opportunities
      • Align the ERP foundation with the corporate strategy

      This step involves the following participants:

      • SAP Optimization Team

      Outcomes of this step

      • ERP business model
      • Strategy alignment

      Align your SAP strategy with the corporate strategy

      Corporate Strategy

      Unified ERP Strategy

      IT Strategy

      Your corporate strategy:

      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the desired future state.
      • The ideal ERP strategy is aligned with overarching organizational business goals and with broader IT initiatives.
      • Include all affected business units and departments in these conversations.
      • The ERP optimization can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives

      Your IT strategy:

      • Communicates the organization’s budget and spending on ERP.
      • Identifies IT initiatives that will support the business and key ERP objectives.
      • Outlines staffing and resourcing for ERP initiatives.

      ERP projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with ERP capabilities. Effective alignment between IT and the business should happen daily. Alignment doesn’t just need to occur just at the executive level but at each level of the organization.

      ERP Business Model Template

      The image contains a screenshot of a ERP Business Model Template.

      Conduct interviews to elicit the business context

      Stakeholder Interviews

      Begin by conducting interviews of your executive team. Interview the following leaders:

      1. Chief Information Officer
      2. Chief Executive Officer
      3. Chief Financial Officer
      4. Chief Revenue Officer/Sales Leader
      5. Chief Operating Officer/Supply Chain & Logistics Leader
      6. Chief Technology Officer/Chief Product Officer

      INTERVIEWS MUST UNCOVER

      1. Your organization’s top three business goals
      2. Your organization’s top ten business initiatives
      3. Your organization’s mission and vision

      Understand the ERP drivers and organizational objectives

      Business Needs

      Business Drivers

      Technology Drivers

      Environmental Factors

      Definition

      A business need is a requirement associated with a particular business process.

      Business drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance.

      Technology drivers are technological changes that have created the need for a new ERP enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge.

      These external considerations are factors that take place outside of the organization and impact the way business is conducted inside the organization. These are often outside the control of the business.

      Examples

      • Audit tracking
      • Authorization levels
      • Business rules
      • Data quality
      • Customer satisfaction
      • Branding
      • Time-to-resolution
      • Deployment model (i.e. SaaS)
      • Integration
      • Reporting capabilities
      • Fragmented technologies
      • Economic and political factors
      • Competitive influencers
      • Compliance regulations

      Info-Tech Insight

      One of the biggest drivers for ERP adoption is the ability to make quicker decisions from timely information. This driver is a result of external considerations. Many industries today are highly competitive, uncertain, and rapidly changing. To succeed under these pressures, there needs to be timely information and visibility into all components of the organization.

      1.2.1 Explore environmental factors and technology drivers

      30 minutes

      1. Identify business drivers that are contributing to the organization’s need for ERP.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard or flip charts and markers to capture key findings.
      3. Consider external considerations, organizational drivers, technology drivers, and key functional requirements.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a diagram on exploring the environmental factors and technology drivers.

      External Considerations

      Organizational Drivers

      Technology Considerations

      Functional Requirements

      • Funding constraints
      • Regulations
      • Compliance
      • Scalability
      • Operational efficiency
      • Data accuracy
      • Data quality
      • Better reporting
      • Information availability
      • Integration between systems
      • Secure data

      Download the Get the Most Out of Your SAP Workbook

      Create a realistic ERP foundation by identifying the challenges and barriers the project will bestow

      There are several different factors that may stifle the success of an ERP implementation. Organizations that are creating an ERP foundation must scan their current environment to identify internal barriers and challenges.

      Common Internal Barriers

      Management Support

      Organizational Culture

      Organizational Structure

      IT Readiness

      Definition

      The degree of understanding and acceptance toward ERP systems.

      The collective shared values and beliefs.

      The functional relationships between people and departments in an organization.

      The degree to which the organization’s people and processes are prepared for a new ERP system.

      Questions

      • Is an ERP project recognized as a top priority?
      • Will management commit time to the project?
      • Are employees resistant to change?
      • Is the organization highly individualized?
      • Is the organization centralized?
      • Is the organization highly formalized?
      • Is there strong technical expertise?
      • Is there strong infrastructure?

      Impact

      • Funding
      • Resources
      • Knowledge sharing
      • User acceptance
      • Flow of knowledge
      • Quality of implementation
      • Need for reliance on consultants

      ERP Business Model

      Organizational Goals

      Enablers

      Barriers

      • Efficiency
      • Effectiveness
      • Integrity
      • One source of truth for data
      • One team
      • Customer service, external and internal
      • Cross-trained employees
      • Desire to focus on value-add activities
      • Collaborative
      • Top-level executive support
      • Effective change management process
      • Organizational silos
      • Lack of formal process documentation
      • Funding availability
      • What goes first? Organizational priorities

      What does success look like?

      Top 15 critical success factors for ERP system implementation

      The image contains a graph that demonstrates the top 15 critical success factors for ERP system implementation. The top 15 are: Top management support and commitment, Interdepartmental communication and cooperations throughout the institution, Commitment to business process re-engineering to do away with redundant processes, Implementation project management from initiation to closing, Change management program to ensure awareness and readiness for possible changes, Project team competence, Education and training for stakeholders, Project champion to lead implementation, Project mission and goals for the system with clear objectives agreed upon, ERP expert consultant use to guide the implementation process, Minimum level of customization to use ERP functionalities to maximum, Package selection, Understanding the institutional culture, Use involvement and participation throughout implementation, ERP vendor support and partnership.

      Source: Epizitone and Olugbara, 2020; CC BY 4.0

      Info-Tech Insight

      Complement your ability to deliver on your critical success factors with the capabilities of your implementation partner to drive a successful ERP implementation.

      “Implementation partners can play an important role in successful ERP implementations. They can work across the organizational departments and layers creating a synergy and a communications mechanism.” – Ayogeboh Epizitone, Durban University of Technology

      1.2.2 Consider potential barriers and challenges

      1-3 hours

      • Open tab “1.2 Strategy & Goals,” in the Get the Most Out of Your SAP Workbook.
      • Identify barriers to ERP optimization success.
      • Review the ERP critical success factors and how they relate to your optimization efforts.
      • Discuss potential barriers to successful ERP optimization.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains the same diagram as shown previously, where it demonstrated the environmental factors in relation to the ERP strategy. The same diagram is used and highlights the barriers section.

      Functional Gaps

      Technical Gaps

      Process Gaps

      Barriers to Success

      • No online purchase order for requisitions
      • Inconsistent reporting – data quality concerns
      • Duplication of data
      • Lack of system integration
      • Cultural mindset
      • Resistance to change
      • Lack of training
      • Funding

      Download the Get the Most Out of Your SAP Workbook

      1.2.3 Discuss enablers of success

      1-3 hours

      1. Open tab “1.2 Strategy & Goals,” in the Get the Most Out of Your SAP Workbook.
      2. Identify barriers to ERP optimization success.
      3. Review the ERP critical success factors and how they relate to your optimization efforts.
      4. Discuss potential barriers to successful ERP optimization.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains the same diagram as shown previously, where it demonstrated the environmental factors in relation to the ERP strategy. The same diagram is used and highlights the enablers and organizational goals sections.

      Business Benefits

      IT Benefits

      Organizational Benefits

      Enablers of Success

      • Business-IT alignment
      • Compliance
      • Scalability
      • Operational efficiency
      • Data accuracy
      • Data quality
      • Better reporting
      • Change management
      • Training
      • Alignment with strategic objectives

      Download the Get the Most Out of Your SAP Workbook

      The Business Value Matrix

      Rationalizing and quantifying the value of SAP

      Benefits can be realized internally and externally to the organization or department and have different drivers of value.

      • Financial benefits refer to the degree to which the value source can be measured through monetary metrics and are often quite tangible.
      • Human benefits refer to how an application can deliver value through a user’s experience.
      • Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.
      • Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Organizational Goals

      • Increased Revenue
      • Application functions that are specifically related to the impact on your organization’s ability to generate revenue and deliver value to your customers.

      • Reduced Costs
      • Reduction of overhead. The ways in which an application limits the operational costs of business functions.

      • Enhanced Services
      • Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      • Reach Customers
      • Application functions that enable and improve the interaction with customers or produce market information and insights.

      Business Value Matrix

      The image contains a screenshot of a Business Value Matrix. It includes: Reach Customers, Increase Revenue or Deliver Value, Reduce Costs, and Enhance Services.

      Link SAP capabilities to organizational value

      The image contains screenshots that demonstrate linking SAP capabilities to organizational value.

      1.2.4 Define your SAP optimization goals

      30 minutes

      1. Discuss the ERP business model and ERP critical success factors.
      2. Through the lens of corporate goals and objectives think about supporting ERP technology. How can the ERP system bring value to the organization? What are the top things that will make this initiative a success?
      3. Develop five to ten optimization goals that will form the basis for the success of this initiative.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains an example of the activity describe above on defining your SAP optimization goals.

      Download the Get the Most Out of Your SAP Workbook

      Step 1.3

      Inventory Current System State

      Activities

      1.3.1 Inventory SAP applications and interactions

      1.3.2 Draw your SAP system diagram

      1.3.3 Inventory your SAP modules and business capabilities (or business processes)

      1.3.4 Define your key SAP optimization modules and business capabilities

      This step will guide you through the following activities:

      • Inventory of applications
      • Mapping interactions between systems

      This step involves the following participants:

      • SAP Optimization Team
      • Enterprise Architect
      • Data Architect

      Outcomes of this step

      • Systems inventory
      • Systems diagram

      1.3.1 Inventory SAP applications and interfaces

      1-3+ hours

      1. Enter your SAP systems, SAP extended applications, and integrated applications within scope.
      2. Include any abbreviated names or nicknames.
      3. List the application type or main function.
      4. List the modules the organization has licensed.
      5. List any integrations.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the SAP application inventory.

      Download the Get the Most Out of Your SAP Workbook

      ERP Data Flow

      The image contains an example ERP Data Flow with a legend.

      Be sure to include enterprise applications that are not included in the ERP application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

      ERP – enterprise resource planning

      Email – email system such as Microsoft Exchange

      Calendar – calendar system such as Microsoft Outlook

      WEM – web experience management

      ECM – enterprise content management

      When assessing the current application portfolio that supports your ERP, the tendency will be to focus on the applications under the ERP umbrella. These relate mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, ERP or similar applications.

      1.3.2 Draw your SAP system diagram

      1-3+ hours

      1. From the SAP application inventory, diagram your network.
      2. Include:

      • Any internal or external systems
      • Integration points
      • Data flow

      The image contains a screenshot of the example ERP Systems Diagram.

      Download the Get the Most Out of Your SAP Workbook

      Sample SAP and integrations map

      The image contains a screenshot of a sample SAP and integrations map.

      Business capability map (Level 0)

      The image contains a screenshot of the business capability map, level 0. The capability map includes: Products and Services Development, Revenue Generation, Demand Fulfillment, and Enterprise Management and Planning.

      In business architecture, the primary view of an organization is known as a business capability map. A business capability defines what a business does to enable value creation, rather than how.

      Business capabilities:

      • Represent stable business functions.
      • Are unique and independent of each other.
      • Will typically have a defined business outcome.

      A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

      ERP process mapping

      The image contains screenshots to demonstrate the ERP process mapping. One of the screenshots is of the business capability map, level 0, the second screenshot contains the objectives , value streams, capabilities, and processes. The third image contains a screenshot of the SAP screenshot with the circles around it as previously shown.

      The operating model

      An operating model is a framework that drives operating decisions. It helps to set the parameters for the scope of ERP and the processes that will be supported. The operating model will serve to group core operational processes. These groupings represent a set of interrelated, consecutive processes aimed at generating a common output. From your developed processes and your SAP license agreements you will be able to pinpoint the scope for investigation including the processes and modules.

      APQC Framework

      Help define your inventory of sales, marketing, and customer services processes.

      Operating Processes

      1. Develop vision and strategy 2. Develop and manage products and services 3. Market and sell products and services 4. Deliver physical products 5. Deliver services

      Management and Support Processes

      6.Manage customer service

      7. Develop and manage human capital

      8. Manage IT

      9. Manage financial resources

      10. Acquire, construct, and manage assets

      11. Manage enterprise risk, compliance, remediation, and resiliency

      12. Manage external relationships

      13. Develop and manage business capabilities

      Source: APQC

      If you do not have a documented process model, you can use the APQC Framework to help define your inventory of sales business processes. APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      APQC’s Process Classification Framework

      The value stream

      Value stream defined:

      Value Streams

      Design Product

      Produce Product

      Sell Product

      Customer Service

      • Manufacturers work proactively to design products and services that will meet consumer demand.
      • Products are driven by consumer demand and government regulations.
      • Production processes and labor costs are constantly analyzed for efficiencies and accuracies.
      • Quality of product and services are highly regulated through all levels of the supply chain.
      • Sales networks and sales staff deliver the product from the organization to the end consumer.
      • Marketing plays a key role throughout the value stream, connecting consumers’ wants and needs to the products and services offered.
      • Relationships with consumers continue after the sale of products and services.
      • Continued customer support and data mining is important to revenue streams.

      Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.

      There are two types of value streams: core value streams and support value streams.

      • Core value streams are mostly externally facing. They deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map.
      • Support value streams are internally facing and provide the foundational support for an organization to operate.

      An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.

      Process mapping hierarchy

      The image contains a screenshot of the PCF levels explained. The levels are 1-5. The levels are: Category, Process Group, Process, Activity, and Task.

      Source: APQC

      APQC provides a process classification framework. It allows organizations to effectively define their processes and manage them appropriately.

      APQC’s Process Classification Framework

      Cross-industry classification framework

      Level 1 Level 2 Level 3 Level 4

      Market and sell products and services

      Understand markets, customers, and capabilities

      Perform customer and market intelligence analysis

      Conduct customer and market research

      Market and sell products and services

      Develop a sales strategy

      Develop a sales forecast

      Gather current and historic order information

      Deliver services

      Manage service delivery resources

      Manage service delivery resource demand

      Develop baseline forecasts

      ? ? ? ?

      Info-Tech Insight

      Focus your initial assessment on the level 1 processes that matter to your organization. This allows you to target your scant resources on the areas of optimization that matter most to the organization and minimize the effort required from your business partners. You may need to iterate the assessment as challenges are identified. This allows you to be adaptive and deal with emerging issues more readily and become a more responsive partner to the business.

      SAP modules and process enablement

      Cloud/Hardware

      Fiori

      Analytics

      Integrations

      Extended Solutions

      R&D Engineering

      • Enterprise Portfolio and Project Management
      • Product Development Foundation
      • Enterprise Portfolio and Project Management
      • Product Lifecycle Management
      • Product Compliance
      • Enterprise Portfolio and Project Management
      • Product Safety and Stewardship
      • Engineering Record

      Sourcing and Procurement

      • Procurement Analytics
      • Sourcing & Contract Management
      • Operational Procurement
      • Invoice Management
      • Supplier Management

      Supply Chain

      • Inventory
      • Delivery & Transportation
      • Warehousing
      • Order Promising

      Asset Management

      • Maintenance Operations
      • Resource Scheduling
      • Env, Health and Safety
      • Maintenance Management
      The image contains a diagram of the SAP enterprise resource planning. The diagram includes a circle with smaller circles all around it. The inside of the circle contains SAP logos. The circles around the big circle are labelled: Human Resources Management, Sales, Marketing, Customer Service, Asset Management, Logistics, Supply Chain Management, Manufacturing, R&D and Engineering, and Finance.

      Finance

      • Financial Planning and Analysis
      • Accounting and Financial Close
      • Treasury Management
      • Financial Operations
      • Governance, Risk & Compliance
      • Commodity Management

      Human Resources

      • Core HR
      • Payroll
      • Timesheets
      • Organization Management
      • Talent Management

      Sales

      • Sales Support
      • Order and Contract Management
      • Agreement Management
      • Performance Management

      Service

      • Service Operations and Processes
      • Basic Functions
      • Workforce Management
      • Case Management
      • Professional Services
      • Service Master Data Management
      • Service Management

      Beyond the core

      The image contains a screenshot of a diagram to demonstrate beyond the core. In the middle of the image is S/4 Core, and the BTP: Business Technology Platform. Surrounding it are: SAP Fieldglass, SAP Concur, SAP Success Factors, SAP CRM SAO Hybris, SAP Ariba. On the left side of the image are: Business Planning and Consolidations, Transportation Management System, Integrated Business Planning, Extended Warehouse Management.

      1.3.3 Inventory your SAP modules and business capabilities

      1-3+ hours

      1. Look at the major functions or processes within the scope of ERP.
      2. From the inventory of current systems, choose the submodules or processes that you want to investigate and are within scope for this optimization initiative.
      3. Use tab 1.3 “SAP Capabilities” in Get the Most Out of Your SAP Workbook for a list of common SAP Level 1 and Level 2 modules/business capabilities.
      4. List the top modules, capabilities, or processes that will be within the scope of this optimization initiative.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of an example of what to do for the activity 1.3.3.

      Download the Get the Most Out of Your SAP Workbook

      1.3.4 Define your key SAP optimization modules and business capabilities

      1-3+ hours

      1. Look at the major functions or processes within the scope of ERP.
      2. From the inventory of current systems, choose the submodules or processes for this optimization initiative. Base this on those that are most critical to the business, those with the lowest levels of satisfaction, or those that perhaps need more knowledge around them.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the Key SAP Optimization Capabilities.

      Download the Get the Most Out of Your SAP Workbook

      Step 1.4

      Define Optimization Timeframe

      Activities

      1.4.1 Define SAP key dates and SAP optimization roadmap timeframe and structure

      This step will guide you through the following activities:

      • Defining key dates related to your optimization initiative
      • Identifying key building blocks for your optimization roadmap

      This step involves the following participants:

      • SAP Optimization Team
      • Vendor Management

      Outcomes of this step

      • Optimization Key Dates
      • Optimization Roadmap Timeframe and Structure

      1.4.1 Optimization roadmap timeframe and structure

      1-3+ hours

      1. Record key items and dates relevant to your optimization initiatives, such as any products reaching end of life or end of contract or budget proposal submission deadlines.
      2. Enter the expected Optimization Initiative Start Date.
      3. Enter the Roadmap Length. This is the total amount of time you expect to participate in the SAP optimization initiative.
      4. This includes short-, medium- and long-term initiatives.
      5. Enter your Roadmap Date markers: how you want dates displayed on the roadmap.
      6. Enter Column time values: what level of granularity will be helpful for this initiative?
      7. Enter the sprint or cycle timeframe; use this if following Agile.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the Optimization Roadmap Timeframe and Structure.

      Download the Get the Most Out of Your SAP Workbook

      Step 1.5

      Understand SAP Costs

      Activities

      1.5.1 Document costs associated with SAP

      This step will walk you through the following activities:

      • Define your SAP direct and indirect costs
      • List your SAP expense line items

      This step involves the following participants:

      • Finance Representatives
      • SAP Optimization Team

      Outcomes of this step

      • Current SAP and related costs

      1.5.1 Document costs associated with SAP

      1-3 hours

      Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

      1. Identify the types of technology costs associated with each current system:
        1. System Maintenance
        2. Annual Renewal
        3. Licensing
      2. Identify the cost of people associated with each current system:
        1. Full-Time Employees
        2. Application Support Staff
        3. Help Desk Tickets

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the activity 1.5.1 on documenting costs associated with SAP.

      Download the Get the Most Out of Your SAP Workbook

      Phase 2

      Assess Your Current State

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Identify Stakeholders and Build Your Optimization Team

      1.2 Build an SAP Strategy Model

      1.3 Inventory Current System State

      1.4 Define Optimization Timeframe

      1.5 Understand SAP Costs

      2.1 Assess SAP Capabilities

      2.2 Review Your Satisfaction With the Vendor/Product and Willingness for Change

      3.1 Prioritize Optimization Opportunities

      3.2 Discover Optimization Initiatives

      4.1 Build Your Optimization Roadmap

      This phase will walk you through the following activities:

      • Determine process relevance
      • Perform a gap analysis
      • Perform a user satisfaction survey
      • Assess software and vendor satisfaction

      This phase involves the following participants:

      • SAP Optimization Team
      • Users across functional areas of your ERP and related technologies

      Step 2.1

      Assess SAP Capabilities

      Activities

      2.1.1 Rate capability relevance to organizational goals

      2.1.2 Complete an SAP application portfolio assessment

      2.1.3 (Optional) Assess SAP process maturity

      This step will guide you through the following activities:

      • Capability relevance
      • Process gap analysis
      • Application Portfolio Assessment

      This step involves the following participants:

      • SAP Users

      Outcomes of this step

      • SAP Capability Assessment

      Benefits of the Application Portfolio Assessment

      The image contains a screenshot of the activity of assessing the health of the application portfolio.

      Assess the health of the application portfolio

      • Get a full 360-degree view of the effectiveness, criticality, and prevalence of all relevant applications to get a comprehensive view of the health of the applications portfolio.
      • Identify opportunities to drive more value from effective applications, retire nonessential applications, and immediately address at-risk applications that are not meeting expectations.
      The image contains a screenshot of the activity on providing targeted department feedback.

      Provide targeted department feedback

      • Share end-user satisfaction and importance ratings for core IT services, IT communications, and business enablement to focus on the right end-user groups or lines of business, and ramp up satisfaction and productivity.
      The image contains a screenshot of the activity on gaining insight into the state of data quality.

      Gain insight into the state of data quality

      • Data quality is one of the key issues causing poor CRM user satisfaction and business results. This can include the relevance, accuracy, timeliness, or usability of the organization’s data.
      • Targeted, open-ended feedback around data quality will provide insight into where optimization efforts should be focused.

      2.1.1 Complete a current-state assessment (via the Application Portfolio Assessment)

      3 hours

      Option 1: Use Info-Tech’s Application Portfolio Assessment to generate your user satisfaction score. This tool not only measures application satisfaction but also elicits great feedback from users regarding the support they receive from the IT team around SAP.

      1. Download the ERP Application Inventory Tool.
      2. Complete the “Demographics” tab (tab 2).
      3. Complete the “Inventory” tab (tab 3).
        1. Complete the inventory by treating each module within your SAP system as an application.
        2. Treat every department as a separate column in the department section. Feel free to add, remove, or modify department names to match your organization.
        3. Include data quality for all applications applicable.

      Option 2: Create a survey manually.

      1. Use tab (Reference) 2.1 “APA Questions” as a guide for creating your survey.
      2. Send out surveys to end users.
      3. Modify tab 2.1, “SAP Assessment,” if required.

      Record Results

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the Application Portfolio Assessment.

      Download the ERP Application Inventory Tool

      Download the Get the Most Out of Your SAP Workbook

      Sample Report from Application Portfolio Assessment.

      The image contains a screenshot of a sample report from the Application Portfolio Assessment.

      2.1.2 (Optional) Assess SAP process and technical maturity

      1-3 hours

      1. As with any ERP system, the issues encountered may not be related to the system itself but processes that have developed over time.
      2. Use this opportunity to interview key stakeholders to learn about deeper capability processes.
      • Identify key stakeholders.
      • Hold sessions to document deeper processes.
      • Discuss processes and technical enablement in each area.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains an example of the process maturity activity.

      Download the Get the Most Out of Your SAP Workbook

      Process Maturity Assessment

      The image contains a screenshot of the Process Maturity Assessment.

      Step 2.2

      Review Your Satisfaction With the Vendor/Product and Willingness for Change

      Activities

      2.2.1 Rate your vendor and product satisfaction

      2.2.2 Review SAP product scores (if applicable)

      2.2.3 Evaluate your product satisfaction

      2.2.4 Check your business process change tolerance

      This step will guide you through the following activities:

      • Rate your vendor and product satisfaction
      • Compare with survey data from SoftwareReviews

      This step involves the following participants:

      • SAP Product Owner(s)
      • Procurement Representative
      • Vendor Contracts Manager

      Outcomes of this step

      • Quantified satisfaction with vendor and product

      2.2.1 Rate your vendor and product satisfaction

      30 minutes

      Use Info-Tech’s vendor satisfaction survey to identify optimization areas with your ERP product(s) and vendor(s).

      1. Option 1 (recommended): Conduct a satisfaction survey using SoftwareReviews. This option allows you to see your results in the context of the vendor landscape.
      2. Option 2: Use the Get the Most Out of Your SAP Workbook to review your satisfaction with your SAP software.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the activity Vendor Optimization.

      SoftwareReviews’ Enterprise Resource Planning Category

      Download the Get the Most Out of Your SAP Workbook

      2.2.2 Review SAP product scores (if applicable)

      30 minutes

      1. Download the scorecard for your SAP product from the SoftwareReviews website. (Note: Not all products are represented or have sufficient data, so a scorecard may not be available.)
      2. Use the Get the Most Out of Your SAP Workbook tab 2.2 “Vend. & Prod. Sat” to record the scorecard results.
      3. Use your Get the Most Out of Your SAP Workbook to flag areas where your score may be lower than the product scorecard. Brainstorm ideas for optimization.

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of the activity 2.2.2 review SAP product scores.

      Download the Get the Most Out of Your SAP Workbook

      SoftwareReviews’ Enterprise Resource Planning Category

      2.2.3 How does your satisfaction compare with your peers?

      Use SoftwareReviews to explore product features, vendor experience, and capability satisfaction.

      The image contains two screenshots of SoftwareReviews. One is of the ERP Mid-Market, and the second is of the ERP Enterprise.

      Source: SoftwareReviews ERP Mid-Market, April 2022

      Source: SoftwareReviews ERP Enterprise, April 2022

      2.2.4 Check your business process change tolerance

      1 hours

      1. As a group, review the level 0 business capabilities on the previous slide.
      2. Assess the department’s willingness for change and the risk of maintaining the status quo.
      3. Color-code the level 0 business capabilities based on:
      • Green – Willing to follow best practices
      • Yellow – May be challenging or unique business model
      • Red – Low tolerance for change
    • For clarity, move to level 1 if specific areas need to be called out and use the same color code.
    • Input Output
      • Business process capability map
      • Heat map of risk areas that require more attention for validating best practices or minimizing customization
      Materials Participants
      • Whiteboard/flip charts
      • Get the Most Out of Your SAP Workbook
      • Implementation team
      • CIO
      • Key stakeholders

      Download Get the Most Out of Your SAP Workbook for additional process levels

      Heat map representing desire for best practice or those having the least tolerance for change

      The image contains a screenshot of a heat map to demonstrate desire for best practice or those having the least tolerance for change.

      Determine the areas of risk to conform to best practice and minimize customization. These will be areas needing focus from the vendor supporting change and guiding best practice. For example: Must be able to support our unique process manufacturing capabilities and enhance planning and visibility to detailed costing.

      Phase 3

      Identify Key Optimization Opportunities

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Identify Stakeholders and Build Your Optimization Team

      1.2 Build an SAP Strategy Model

      1.3 Inventory Current System State

      1.4 Define Optimization Timeframe

      1.5 Understand SAP Costs

      2.1 Assess SAP Capabilities

      2.2 Review Your Satisfaction With the Vendor/Product and Willingness for Change

      3.1 Prioritize Optimization Opportunities

      3.2 Discover Optimization Initiatives

      4.1 Build Your Optimization Roadmap

      This phase will walk you through the following activities:

      • Identify key optimization areas
      • Create an optimization roadmap

      This phase involves the following participants:

      • SAP Optimization Team

      Assessing application business value

      In this context…business value is

      the value of the business outcome that the application produces. Additionally, it is how effective the application is at producing that outcome.

      Business value is not

      the user’s experience or satisfaction with the application.

      The image contains a screenshot of a Venn Diagram. In the left circle, labelled The Business it contains the following text: Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the applications. In the right circle labelled IT, it contains the following text: Technical subject-matter experts of the applications they deliver and maintain. Each IT function works together to ensure quality applications are delivered to stakeholder expectations. The middle space is labelled: Business Value of Applications.

      First, the authorities on business value need to define and weigh their value drivers that describe the priorities of the organization. This will allow the applications team to apply a consistent, objective, and strategically aligned evaluation of applications across the organization.

      Brainstorm IT initiatives to enable high areas of opportunity to support the business

      Brainstorm ERP optimization initiatives in each area. Ensure you are looking for all-encompassing opportunities within the context of IT, the business, and SAP systems.

      Capabilities are what the system and business does that creates value for the organization. Optimization initiatives are projects with a definitive start and end date, and they enhance, create, maintain, or remove capabilities with the goal of increasing value.

      The image contains a Venn Diagram with 3 circles. The circles are labelled as: Process, Technology, and Organization.

      Info-Tech Insight

      Enabling a high-performing organization requires excellent management practices and continuous optimization efforts. Your technology portfolio and architecture are important, but we must go deeper. Taking a holistic view of ERP technologies in the environments in which they operate allows for the inclusion of people and process improvements – this is key to maximizing business results. Using a formal ERP optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

      Address process gaps:

      • ERP and related technologies are invaluable to the goal of organizational enablement, but they must have supported processes driven by business goals.
      • Identify areas where capabilities need to be improved and work toward optimization.

      Support user satisfaction:

      • The best technology in the world won’t deliver business results if it’s not working for the users who need it.
      • Understand concerns, communicate improvements, and support users in all roles.

      Improve data quality:

      • Data quality is unique to each business unit and requires tolerance, not perfection.
      • Implement data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.

      Proactively manage vendors:

      • Vendor management is a critical component of technology enablement and IT satisfaction.
      • Assess your current satisfaction against that of your peers and work toward building a process that is best fit for your organization.

      Step 3.1

      Prioritize Optimization Opportunities

      Activities

      3.1.1 Prioritize optimization capability areas

      This step will guide you through the following activities:

      • Explore existing process gaps
      • Identify the impact of processes on user satisfaction
      • Identify the impact of data quality on user satisfaction
      • Review your overall product satisfaction and vendor management

      This step involves the following participants:

      • SAP Optimization Team

      Outcomes of this step

      • Application optimization plan

      The Business Value Matrix

      Rationalizing and quantifying the value of SAP

      Benefits can be realized internally and externally to the organization or department and have different drivers of value.

      • Financial benefits refer to the degree to which the value source can be measured through monetary metrics and are often quite tangible.
      • Human benefits refer to how an application can deliver value through a user’s experience.
      • Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.
      • Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Organizational Goals

      • Increased Revenue
      • Application functions that are specifically related to the impact on your organization’s ability to generate revenue and deliver value to your customers.

      • Reduced Costs
      • Reduction of overhead. The ways in which an application limits the operational costs of business functions.

      • Enhanced Services
      • Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      • Reach Customers
      • Application functions that enable and improve the interaction with customers or produce market information and insights.

      Business Value Matrix

      The image contains a screenshot of a Business Value Matrix. It includes: Reach Customers, Increase Revenue or Deliver Value, Reduce Costs, and Enhance Services.

      Prioritize SAP optimization areas that will bring the most value to the organization

      Review your ERP capability areas and rate them according to relevance to organizational goals. This will allow you to eliminate optimization ideas that may not bring value to the organization.

      The image contains a screenshot of a graph that compares satisfaction by relevance to organizational goals to demonstrate high priority.

      3.1.1 Prioritize and rate optimization capability areas

      1-3 hours

      1. From the SAP capabilities, discuss areas of scope for the SAP optimization initiative.
      2. Discuss the four areas of the business value matrix and identify how each module, along with organizational goals, can bring value to the organization.
      3. Rate each of your SAP capabilities for the level of importance to your organization. The levels of importance are:
      • Crucial
      • Important
      • Secondary
      • Unimportant
      • Not applicable

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of activity 3.1.1.

      Download the Get the Most Out of Your SAP Workbook

      Step 3.2

      Discover Optimization Initiatives

      Activities

      3.2.1 Discover product and vendor satisfaction opportunities

      3.2.2 Discover capability and feature optimization opportunities

      3.2.3 Discover process optimization opportunities

      3.2.4 Discover integration optimization opportunities

      3.2.5 Discover data optimization opportunities

      3.2.6 Discover SAP cost-saving opportunities

      This step will guide you through the following activities:

      • Explore existing process gaps
      • Identify the impact of processes on user satisfaction
      • Identify the impact of data quality on user satisfaction
      • Review your overall product satisfaction and vendor management

      This step involves the following participants:

      • SAP Optimization Team

      Outcomes of this step

      • Application optimization plan

      Satisfaction with SAP product

      The image contains three screenshots to demonstrate satisfaction with sap product.

      Improving vendor management

      Create a right-size, right-fit strategy for managing the vendors relevant to your organization.

      The image contains a diagram to demonstrate lower strategic value, higher vendor spend/switching costs, higher strategic value, and lower vendor spend/switching costs.

      Info-Tech Insight

      A vendor management initiative (VMI) is an organization’s formalized process for evaluating, selecting, managing, and optimizing third-party providers of goods and services.

      The amount of resources you assign to managing vendors depends on the number and value of your organization’s relationships. Before optimizing your vendor management program around the best practices presented in Info-Tech’s Jump Start Your Vendor Management Initiative blueprint, assess your current maturity and build the process around a model that reflects the needs of your organization.

      Note: Info-Tech uses VMI interchangeably with the terms “vendor management office (VMO),” “vendor management function,” “vendor management process,” and “vendor management program.”

      Jump Start Your Vendor Management Initiative

      3.2.1 Discover product and vendor satisfaction

      1-2 hours

      1. Use tab 3.1 “Optimization Priorities” and tab 2.2 “Vend. & Prod. Sat” to review the capabilities and features of your SAP system.
      2. Answer the following questions:
        1. Document overall product satisfaction.
        2. How does your satisfaction compare with your peers?
        3. Is the overall system fit for use?
        4. Do you have a proactive vendor management strategy in place?
        5. Is the product dissatisfaction at the point that you need to evaluate if it is time to replace the product?
        6. Could your vendor or Systems Integrator help you achieve better results?
      3. Review the Value Effort Matrix for each initiative.

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Examples from Application Portfolio Assessment

      The image contains screenshots from the Application Portfolio Assessment.

      3.2.2 Discover capability and feature optimization opportunities

      1-2 hours

      1. Use tab 3.1 “Optimization Priorities” and tab 2.2 “Vend. & Prod. Sat” to review the capabilities and features of your SAP system.
      2. Answer the following questions:
        1. What capabilities and features are performing the worst?
        2. Do other organizations and users struggle with these areas?
        3. Why is it not performing well?
        4. Is there an opportunity for improvement?
        5. What are some optimization initiatives that could be undertaken?
      3. Review the Value Effort Matrix for each initiative.

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Process optimization: the hidden goldmine

      In ~90% of SAP business process analysis reports, SAP identified significant potential for improving the existing SAP implementation, i.e. the large majority of customers are not yet using their SAP Business Suite to the full extent.

      Goals of Process Improvement

      Process Improvement Sample Areas

      Improvement Possibilities

      • Optimize business and improve value drivers
      • Reduce TCO
      • Reduce process complexity
      • Eliminate manual processes
      • Increase efficiencies
      • Support digital transformation and enablement
      • Order to cash
      • Procure to pay
      • Order to replenish
      • Plan to produce
      • Request to settle
      • Make to order
      • Make to stock
      • Purchase to order
      • Increase number of process instances processed successfully end-to-end
      • Increase number of instances processed in time
      • Increase degree of process automation
      • Speed up cycle times of supply chain processes
      • Reduce number of process exceptions
      • Apply internal best practices across organizational units

      3.2.3 Discover process optimization opportunities

      1-2 hours

      1. Use exercise 2.13 and tab 2.1 “SAP Current State Assessment” to assess process optimization opportunities.
      2. List underperforming capabilities around process.
      3. Answer the following:
        1. What is the state of the current processes?
        2. Is there an opportunity for process improvement?
        3. What are some optimization initiatives that could be undertaken in this area?

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Integration provides long-term usability

      Balance the need for secure, compliant data availability with organizational agility.

      The Benefits of Integration

      The Challenges of Integration

      • The largest benefit is the extended use of data. The ERP data can be used in the enterprise-level business intelligence suite rather than the application-specific analytics.
      • Enhanced data security. Integrated approaches lend themselves to auditable processes such as sign-on and limiting the email movement of data.
      • Regulatory compliance. Large multi-site organizations have many layers of regulation. A clear understanding of where orders, deliveries, and payments were made streamlines the audit process.
      • Extending a single instance ERP to multiple sites. The challenge for data management is the same as any SaaS application. The connection and data replication present challenges.
      • Combining data from equally high-volume systems. For SAP it is recommended that one instance is set to primary and all other sites are read-only to maintain data integrity.
      • Incorporating data from the separate system(s). The proprietary and locked-in nature of the data collection and definitions for ERP systems often limit the movement of data between separate systems.

      Common integration and consolidation scenarios

      Financial Consolidation

      Data Backup

      Synchronization Across Sites

      Legacy Consolidation

      • Require a holistic view of data format and accounting schedules.
      • Use a data center as the main repository to ensure all geographic locations have equal access to the necessary data.
      • Set up synchronization schedules based on data usage, not site location.
      • Carefully define older transactions. Only active transactions should be brought in the ERP. Send older data to storage.
      • Problem: Controlling financial documentation across geographic regions.
        Most companies are required to report in each region where they maintain a presence. Stakeholders and senior management also need a holistic view. This leads to significant strain on the financial department to consolidate both revenue and budget allocations for cross-site projects across the various geographic locations on a regular basis.
      • Solution: For enterprises with a single vendor, SAP-only portfolios, SAP can offer integration tools. For those needing to integrate with other ERPs, the use of a connector may be required to send financial data to the main system. The format and accounting calendar for transactions should match the primary ERP system to allow consolidation. The local-specific format should be a role-based customization at the level of the site’s specific instance.
      • Problem: ERP systems generate high volumes of data. Most systems have a defined schedule of back-up during off-hours. Multi-instance brings additional issues through lack of defined off-hours, higher volume of data, and the potential for cross-site or instance data relationships. This leads to headaches for both the database administrator and business analysts.
      • Solution: The best solution is an off-site data center with high availability. This may include cloud storage or hosted data centers. Regardless of where the data is stored, centralize the data and replicate to each site. Ensure that the data center can mirror the database and binary large object (BLOB) storage that exists for each site.
      • Problem: Providing access to up-to-date transactions requires copying of both contextual information (permissions, timestamp, location, history) and the transaction itself across multiple sites to allow local copies to be used for analysis and audits. The sheer volume of information makes timely synchronization difficult.
      • Solution: Not all data needs to be synchronized in a timely fashion. In SAP, administrators can use NetWeaver to maintain and alter global data synchronization through the Master Data Management module. Permissions can be given to users to perform on-demand synchronization of data attached to that user.
      • The Problem: Subsidiaries and acquired companies often have a Tier 2 ERP product. Prior to fully consolidating the processes many enterprises will want to migrate data to their ERP system to build compliance and audit trails. Migration of data often breaks historical linkages between transactions.
      • Solution: SAP offers tools to integrate data across applications that can be used as part of a data migration strategy. The process of data migration should be combined with data warehousing to ensure a cost-effective process. For most enterprises, the lack of experience in data migration will necessitate the use of consultants and independent software vendors (ISV).

      For more information: Implement a Multi-site ERP

      3.2.4 Discover integration optimization opportunities

      1-2 hours

      1. Use tab 1.3.1 “SAP Application Inventory” to discuss integrations and how they are related to capability areas that are not performing well.
      2. List capabilities that might be affected by integration issues. Think about exercise 3.2.1 and discuss how integrations could be affecting overall product satisfaction.
      3. Answer the following:
        1. Are there some areas where integration could be improved?
        2. Is there an opportunity for process improvement?
        3. What are some optimization initiatives that could be undertaken in this area?

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      System and data optimization

      Consolidating your business and technology requires an overall system and data migration plan.

      The image contains a screenshot of a diagram that demonstrates three different integrations: system, organization, and data.

      Info-Tech Insight

      Have an overall data migration plan before beginning your systems consolidation journey to S/4HANA.

      Use a data strategy that fixes the enterprise-wide data management issues

      Your data management must allow for flexibility and scalability for future needs.

      IT has several concerns around ERP data and wide dissemination of that data across sites. Large organizations can benefit from building a data warehouse or at least adopting some of the principles of data warehousing. The optimal way to deal with the issue of integration is to design a metadata-driven data warehouse that acts as a central repository for all ERP data. They serve as the storage facility for millions of transactions, formatted to allow analysis and comparison.

      Key considerations:

      • Technical: At what stage does data move to the warehouse? Can processes be automated to dump data or to do a scheduled data movement?
      • Process: Data integration requires some level of historical context for all data. Ensure that all data has multiple metadata tags to future-proof the data.
      • People: Who will be accessing the data and what are the key items that users will need to adapt to the data warehouse process?

      Info-Tech Insight

      Data warehouse solutions can be expensive. See Info-Tech’s Build a Data Warehouse on a Solid Foundation for guidance on what options are available to meet your budget and data needs.

      Optimizing SAP data, additional considerations

      Data Quality Management

      Effective Data Governance

      Data-Centric Integration Strategy

      Extensible Data Warehousing

      • Prevention is ten times cheaper than remediation. Stop fixing data quality with band-aid solutions and start fixing at the source of the problem.
      • Data quality is unique to each business unit and requires tolerance, not perfection. If the data allows the business to operate at the desired level, don’t waste time fixing data that may not need to be fixed.
      • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
      • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
      • Build related practices with more confidence and less risk after achieving an appropriate level of data quality.
      • Data governance enables data-driven insight. Think of governance as a structure for making better use of data.
      • Collaboration is critical. The business may own the data, but IT understands the data. Data governance will not work unless the business and IT work together.
      • Data governance powers the organization up the data value chain through policies and procedures, master data management, data quality, and data architecture.
      • Create a roadmap to prioritize initiatives and delineate responsibilities among data stewards, data owners, and the data governance steering committee.
      • Ensure buy-in from business and IT stakeholders. Communicate initiatives to end users and executives to reduce resistance.
      • Every enterprise application involves data integration. Any change in the application and database ecosystem requires you to solve a data integration problem.
      • Data integration is becoming more and more critical for downstream functions of data management and for business operations to be successful. Poor integration holds back these critical functions.
      • Build your data integration practice with a firm foundation in governance and a reference architecture. Ensure that your process is scalable and sustainable.
      • Support the flow of data through the organization and meet the organization’s requirements for data latency, availability, and relevancy.
      • Data availability must be frequently reviewed and repositioned to continue to grow with the business.
      • A data warehouse is a project, but successful data warehousing is a program. An effective data warehouse requires planning beyond the technology implementation.
      • Governance, not technology, needs to be the core support system for enabling a data warehouse program.
      • Leverage an approach that focuses on constructing a data warehouse foundation that can address a combination of operational, tactical, and ad hoc business needs.
      • Invest time and effort to put together pre-project governance to inform and guide your data warehouse implementation.
      • Select the most suitable architecture pattern to ensure the data warehouse is “built right” at the very beginning.

      Restore Trust in Your Data Using a Business-Aligned Data Quality Management Approach

      Establish Data Governance

      Build a Data Integration Strategy

      Build an Extensible Data Warehouse Foundation

      Data Optimization

      Organizations are faced with challenges associated with changing data landscapes.

      Data migrations should not be taken lightly. It requires an overall data governance to assure data integrity for the move to S/4HANA and beyond.

      Have a solid plan before engaging S/4HANA Migration Cockpit.

      Develop a Master Data Management Strategy and Roadmap

      • Master data management (MDM) is complex in practice and requires investments in governance, technology, and planning.
      • Develop a MDM strategy and initiative roadmap using Info-Tech’s MDM framework, which takes data governance, architecture, and other critical data capabilities into consideration.

      Establish Data Governance

      • Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture.
      • Data governance must continuously align with the organization’s enterprise governance function. It should not be perceived as a pet project of IT but rather as an enterprise-wide, business-driven initiative.
      The image contains a screenshot of the S/4HANA Migration Cockpit.

      3.2.5 Discover data optimization opportunities

      1-2 hours

      1. Use your APA or user satisfaction survey to understand issues related to data.
        Note: Data issues happen for a number of reasons:
      • Poor underlying data in the system
      • More than one source of truth
      • Inability to consolidate data
      • Inability to measure KPIs effectively
      • Reporting that is cumbersome or non-existent
    • List underperforming capabilities related to data.
    • Answer the following:
      1. What are some underlying issues?
      2. Is there an opportunity for data improvement?
      3. What are some optimization initiatives that could be undertaken in this area?

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      SAP cost savings

      SAP cost savings does not have to be complicated.

      Look for quick wins:

      • Evaluate user licensing:
        • Ensure you are not double paying for employees or paying for employees who are no longer with the organization.
        • Verify user activity – if users are accessing the system very infrequently it does not make sense to license them as full users.
        • Audit your user classifications – ensure title positions and associated licenses are up to date.
      • Curb data sprawl.
      • Consolidate applications.

      30-35% of SAP customers likely have underutilized assets. This can add up to millions in unused software and maintenance.

      -Riley et al.

      20% Only 20 percent of companies manage to capture more than half the projected benefits from ERP systems.

      -McKinsey
      The image contains a screenshot of the Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk.

      Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk

      The image contains a screenshot of Secrets of SAP S/4HANA Licensing.

      Secrets of SAP S/4HANA Licensing

      License Optimization

      With the relatively slow uptake of the S/4HANA platform, the pressure is immense for SAP to maintain revenue growth.

      SAP’s definitions and licensing rules are complex and vague, making it extremely difficult to purchase with confidence while remaining compliant.

      Without having a holistic negotiation strategy, it is easy to hit a common obstacle and land into SAP’s playbook, requiring further spend.

      Price Benchmarking & Negotiation

      • Use price benchmarking and negotiation intelligence to secure a market-competitive price.
      • Understand negotiation tactics that can be used to better your deal.

      Secrets of SAP S/4HANA Licensing:

      • Build a business case to evaluate S/4HANA.
      • Understand the S/4HANA roadmap and map current functionality to ensure compatibility.

      SAP’s 2025 Support End of Life Date Delayed…As Predicted Here First

      • The math simply did not add up for SAP.
      • Extended support post 2027 is a mixed bag.

      3.2.6 Discover SAP cost-saving opportunities

      1-2 hours

      1. Use tab 1.5 “Current Costs” as an input for this exercise.
      2. Look for opportunities to cut SAP costs, both quick-wins and long-term strategy.
      3. Review Info-Tech’s SAP vendor management resources to understand cost-saving strategies:
      4. List cost-savings initiatives and opportunities.

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Other optimization opportunities

      There are many opportunities to improve your SAP portfolio. Choose the ones that are right for your business:

      • Artificial intelligence (AI) (and management of the AI lifecycle)
      • Machine learning (ML)
      • Augment business interactions
      • Automatically execute sales pipelines
      • Process mining
      • SAP application monitoring
      • Be aware of the SAP product roadmap
      • Implement and take advantage of SAP tools and product offerings

      Phase 4

      Build Your Optimization Roadmap

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Identify Stakeholders and Build Your Optimization Team

      1.2 Build an SAP Strategy Model

      1.3 Inventory Current System State

      1.4 Define Optimization Timeframe

      1.5 Understand SAP Costs

      2.1 Assess SAP Capabilities

      2.2 Review Your Satisfaction With the Vendor/Product and Willingness for Change

      3.1 Prioritize Optimization Opportunities

      3.2 Discover Optimization Initiatives

      4.1 Build Your Optimization Roadmap

      This phase will walk you through the following activities:

      • Review the different options to solve the identified pain points
      • Build out a roadmap showing how you will get to those solutions
      • Build a communication plan that includes the stakeholder presentation

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Get the Most Out of Your SAP

      Step 4.1

      4.1 Build Your Optimization Roadmap

      Activities

      4.1.1 Pick your path

      4.1.2 Pick the right SAP migration path

      4.1.3 Build a roadmap

      4.1.4 Build a visual roadmap

      This step will walk you through the following activities:

      • Review the different options to solve the identified pain points then build out a roadmap of how to get to that solution.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Outcomes of this step

      • A strategic direction is set
      • An initial roadmap is laid out

      Choose the right path for your organization

      There are several different paths you can take to achieve your ideal future state. Make sure to pick the one that suits your needs as defined by your current state.

      The image contains a diagram to demonstrate the different paths that can be taken. The pathways are: Optimize current system, augment current system, consolidate current systems, upgrade system, and replace system.

      Explore the options for achieving your ideal future state

      CURRENT STATE

      STRATEGY

      There is significant evidence of poor user satisfaction, inefficient processes, lack of data usage, poor integrations, and little vendor management. Look for opportunities to improve the system.

      OPTIMIZE CURRENT SYSTEM

      Your existing application is, for the most part, functionally rich but may need some tweaking. Spend time and effort building and enhancing additional functionalities or consolidating and integrating interfaces.

      AUGMENT CURRENT SYSTEM

      Your ERP application portfolio consists of multiple apps serving the same functions. Consolidating applications with duplicate functionality is more cost efficient and makes integration and data sharing simpler.

      CONSOLIDATE CURRENT SYSTEMS

      The current system is reaching end of life and the software vendor offers a fit-for-use upgrade or system to which you can migrate. Prepare your migration strategy to move forward on the product roadmap.

      UPGRADE SYSTEM

      The current SAP system and future SAP roadmap are not fit for use. Vendor satisfaction is at an all-time low. Revisit your ERP strategy as you move into requirements gathering and selection.

      REPLACE SYSTEM

      Option: Optimize your current system

      Look for process, workflow, data usage, and vendor relation improvements.

      MAINTAIN CURRENT SYSTEM

      Keep the system but look for optimization opportunities.

      Your existing application portfolio satisfies both functionality and integration requirements. The processes surrounding it likely need attention, but the system should be considered for retention.

      Maintaining your current system entails adjusting current processes and/or adding new ones and involves minimal cost, time, and effort.

      INDICATORS

      POTENTIAL SOLUTIONS

      People

      • User satisfaction is in the mid-range
      • There is an opportunity to rectify problems
      • Contact vendor to inquire about employee training opportunities
      • Build a change management strategy

      Process

      • Processes are old and have not been optimized
      • There are many manual processes and workarounds
      • Low process maturity or undocumented inconsistent processes
      • Explore process reengineering and process improvement opportunities
      • Evaluate and standardize processes

      Technology

      • No major capability gaps
      • Supported for 5+ years
      • Explore opportunities outside of the core technology including workflows, integrations, and reporting

      Alternative 1: Optimize your current system

      MAINTAIN CURRENT SYSTEM

      • Keep your SAP system running
      • Invest in resolving current challenges
      • Automate manual processes where appropriate
      • Improve/modify current system
      • Evaluate current system against requirements/processes
      • Reimplement functionality

      Alternative Overview

      Initial Investment ($)

      Medium

      Risk

      Medium

      Change Management Required

      Medium

      Operating Costs ($)

      Low

      Alignment With Organizational Goals and ERP Strategy

      Medium-Low

      Key Considerations

      • Now that I know my needs, where is the current system underused?
      • Do we have specialized needs?
      • Which functions can best enable the business?

      Advantages

      • Less cost investment than upgrading or replacing the system
      • Less technology risk
      • The current system has several optimization initiatives that can be implemented
      • Familiarity with the system; IT and business users know the system well
      • Least amount of changes
      • Integrations will be able to be maintained and will mean less complexity
      • Will allow us to leverage current investments and build on our current confidence in the solution
      • Allow us to review processes and engineer some workflow and process improvements

      Disadvantages

      • The system may need some augmentation to handle some improvement areas
      • Build some items from scratch
      • Less user-friendly
      • Need to reimplement and reconfigure some modules
      • Lots of workarounds – more staff needed to support current processes
      • Increase customization (additional IT development investment)
      • System gaps would remain
      • System feels “hard” to use
      • Workarounds still needed
      • Hard to overcome “negative” experience with the current system
      • Some functional gaps will remain
      • Less system development and support from the vendor as the product ages.
      • May become a liability and risk area in the future

      For what time frame does this make sense?

      Short Term

      Medium Term

      Long Term

      Option: Augment your current system

      Use augmentation to resolve your existing technology and data pain points.

      AUGMENT CURRENT SYSTEM

      Add to the system.

      Your existing application is for the most part functionally rich but may need some tweaking. Spend time and effort enhancing your current system.

      You will be able to add functions by leveraging existing system features. Augmentation requires limited investment and less time and effort than a full system replacement.

      INDICATORS

      POTENTIAL SOLUTIONS

      Technology Pain Points

      • Lack of reporting functions
      • Lacking functional depth in key process areas
      • Add point solutions or enable modules to address missing functionality

      Data Pain Points

      • Poor data quality
      • Lack of data for processing and reporting
      • Single-source data entry
      • Add modules or augment processes to capture data

      Alternative 2: Augment current solution

      AUGMENT CURRENT SYSTEM

      Maintain core system.

      Invest in SAP modules or extended functionality.

      Add functionality with bolt-on targeted “best of breed” solutions.

      Invest in tools to make the SAP portfolio and ecosystem work better.

      Alternative Overview

      Initial Investment ($)

      High

      Risk

      High

      Change Management

      High

      Operating Costs ($)

      High

      Alignment With Organizational Goals and ERP Strategy

      High

      Key Considerations

      • Now that I know my needs, where is the current system underused?
      • Do we have specialized needs?
      • Which functions can best enable the business?

      Advantages

      • Meet specific business needs – right solution for each component
      • Well-aligned to specific business needs
      • Higher morale – best solution with improved user interface
      • Allows you to find the right solution for the unique needs of the organization
      • Allows you to incorporate a light change management strategy that can include training for the end users and IT
      • Incorporate best practice processes
      • Leverage out-of-the-box functionality

      Disadvantages

      • Multiple technological solutions
      • Lots of integrations
      • Out-of-sync upgrades
      • Extra costs – potential less negotiation leverage
      • Multiple solutions to support
      • Multiple vendors
      • Less control over upgrades – including timing (potential out of sync)
      • More training – multiple products, multiple interfaces
      • Confusion – which system to use when
      • Need more HR specialization
      • More complexity in reporting
      • More alignment with JDE E1 information

      For what time frame does this make sense?

      Short Term

      Medium Term

      Long Term

      Option: Consolidate systems

      Consolidate and integrate your current systems to address your technology and data pain points.

      CONSOLIDATE AND INTEGRATE SYSTEMS

      Get rid of one system, combine two, or connect many.

      Your ERP application portfolio consists of multiple apps serving the same functions.

      Consolidating your systems eliminates the need to manage multiple pieces of software that provide duplicate functionality. Reducing the number of ERP applications makes integration and data sharing simpler.

      INDICATORS

      POTENTIAL SOLUTIONS

      Technology Pain Points

      • Disparate and disjointed systems
      • Multiple systems supporting the same function
      • Unused software licenses
      • System consolidation
      • System and module integration
      • Assess usage and consolidate licensing

      Data Pain Points

      • Multiple versions of same data
      • Duplication of data entry in different modules or systems
      • Poor data quality
      • Centralize core records
      • Assign data ownership
      • Single-source data entry

      Alternative 3: Consolidate systems

      AUGMENT CURRENT SYSTEM

      Get rid of old disparate on-premise solutions.

      Consolidate into an up-to-date ERP solution.

      Standardize across the organization.

      Alternative Overview

      Initial Investment ($)

      High

      Risk

      Med

      Change Management

      Med

      Operating Costs ($)

      Med

      Alignment With Organizational Goals and ERP Strategy

      High

      Key Considerations

      • Now that I know my needs, where is the current system underused?
      • Do we have specialized needs?
      • Which functions can best enable the business?

      Advantages

      • Aligns the technology across the organization
      • Streamlining of processes
      • Opportunity for decreased costs
      • Easier to maintain
      • Modernizes the SAP portfolio
      • Easier to facilitate training
      • Incorporate best practice processes
      • Leverage out-of-the-box functionality

      Disadvantages

      • Unique needs of some business units may not be addressed
      • Will require change management and training
      • Deeper investment in SAP

      For what time frame does this make sense?

      Short Term

      Medium Term

      Long Term

      Option: Upgrade System

      Upgrade your system to address gaps in your existing processes and various pain points.

      REPLACE CURRENT SYSTEM

      Move to a new SAP solution

      You’re transitioning from an end-of-life legacy system. Your existing system offers poor functionality and poor integration. It would likely be more cost- and time-efficient to replace the application and its surrounding processes altogether. You are satisfied with SAP overall and want to continue to leverage your SAP relationships and investments.

      INDICATORS

      POTENTIAL SOLUTIONS

      Technology Pain Points

      • Obsolete or end-of-life technology portfolio
      • Lack of functionality and poor integration
      • Not aligned with technology direction or enterprise architecture plans
      • Evaluate the ERP technology landscape
      • Determine if you need to replace the current system with a point solution or an all-in-one solution
      • Align ERP technologies with enterprise architecture

      Data Pain Points

      • Limited capability to store and retrieve data
      • Understand your data requirements

      Process Pains

      • Insufficient tools to manage workflow
      • Review end-to-end processes
      • Assess user satisfaction

      Alternative 4: Upgrade System

      UPGRADE SYSTEM

      Upgrade your current SAP systems with SAP product replacements.

      Invest in SAP with the appropriate migration path for your organization.

      Alternative Overview

      Initial Investment ($)

      High

      Risk

      Med

      Change Management

      Med

      Operating Costs ($)

      Med

      Alignment With Organizational Goals and ERP Strategy

      High

      Key Considerations

      • Now that I know my needs, where is the current system underused?
      • Do we have specialized needs?
      • Which functions can best enable the business?

      Advantages

      • Aligns the technology across the organization
      • Opportunity for business transformation
      • Allows you to leverage your SAP and SI relationships
      • Modernizes your ERP portfolio
      • May offer you advantages around business transformation and process improvement
      • Opportunity for new hosting options
      • May offer additional opportunities for consolidation or business enablement

      Disadvantages

      • Big initiative
      • Costly
      • Adds business risk during ERP upgrade
      • May require a high amount of change management
      • Organization will have to build resources to support the replacement and ongoing support of the new product
      • Training will be required across business and IT
      • Integrations with other applications may need to be rebuilt

      For what time frame does this make sense?

      Short Term

      Medium Term

      Long Term

      Option: Replace your current system

      Replace your system to address gaps in your existing processes and various pain points.

      REPLACE CURRENT SYSTEM

      Start from scratch.

      You’re transitioning from an end-of-life legacy system. Your existing system offers poor functionality and poor integration. It would likely be more cost and time efficient to replace the application and its surrounding processes all together.

      INDICATORS

      POTENTIAL SOLUTIONS

      Technology Pain Points

      • Lack of functionality and poor integration
      • Obsolete technology
      • Not aligned with technology direction or enterprise architecture plans
      • Dissatisfaction with SAP and SI
      • Evaluate the ERP technology landscape
      • Determine if you need to replace the current system with a point solution or an all-in-one solution
      • Align ERP technologies with enterprise architecture

      Data Pain Points

      • Limited capability to store and retrieve data
      • Understand your data requirements

      Process Pains

      • Insufficient tools to manage workflow
      • Review end-to-end processes
      • Assess user satisfaction

      Alternative 5: Replace SAP with another ERP solution

      AUGMENT CURRENT SYSTEM

      Get rid of old disparate on-premises solutions.

      Consolidate into an up-to-date ERP solution.

      Standardize across the organization.

      Alternative Overview

      Initial Investment ($)

      High

      Risk

      Med

      Change Management

      Med

      Operating Costs ($)

      Med

      Alignment With Organizational Goals and ERP Strategy

      High

      Key Considerations

      • Do we have the appetite to walk away from SAP?
      • What opportunities are we looking for?
      • Are other ERP solutions better for our business?

      Advantages

      • Allows you to explore ERP options outside of SAP
      • Aligns the technology across the organization
      • Opportunity for business transformation
      • Allows you to move away from SAP
      • Modernizes your ERP portfolio
      • May offer you advantages around business transformation and process improvement
      • Opportunity for new hosting options
      • May offer additional opportunities for consolidation or business enablement

      Disadvantages

      • Big initiative
      • Costly
      • Adds business risk during ERP replacement
      • Relationships will have to be rebuilt with ERP vendor and SIs
      • May require a high amount of change management
      • Organization will have to build resources to support the replacement and ongoing support of the new product
      • Training will be required across business and IT
      • Integrations with other applications may need to be rebuilt

      For what time frame does this make sense?

      Short Term

      Medium Term

      Long Term

      Activity 4.1.1: Pick your path

      1.5 hours

      For each given path selected, identify:

      • Advantage
      • Disadvantages
      • Initial Investment ($)
      • Risk
      • Change Management
      • Operating Costs ($)
      • Alignment With ERP Objectives
      • Key Considerations
      • Timeframe

      Record this information in the Get the Most Out of Your SAP Workbook.

      The image contains a screenshot of activity 4.1.1 pick your path.

      Download the Get the Most Out of Your SAP Workbook

      Pick the right SAP migration path for your organization

      There are three S/4HANA paths you can take to achieve your ideal future state. Make sure to pick the one that suits your needs as defined by your current state and meets your overall long-term roadmap.

      The image contains a diagram of the pathways that can be take from current state to future state. The options are: BEST PRACTICE QUICK WIN
(Public Cloud), AUGMENT BEST PRACTICE (Private Cloud), OWN FULL SOLUTION (On Premise)

      SAP S/4 HANA offerings can be confusing

      The image contains a screenshot that demonstrates the SAP S/4 Offerings.

      What is the cloud, how is it deployed, and how is service provided?

      The image contains a screenshot from the National Institute of Standards and Technology that describes the Cloud Characteristics, Service Model, and Delivery Model.

      A workload-first approach will allow you to take full advantage of the cloud’s strengths

      • Under all but the most exceptional circumstances good cloud strategies will incorporate different service models. Very few organizations are “IaaS shops” or “SaaS shops,” even if they lean heavily in a one direction.
      • These different service models (including non-cloud options like colocation and on-premises infrastructure) each have different strengths. Part of your cloud strategy should involve determining which of the services makes the most sense for you.
      • Own the cloud by understanding which cloud (or non-cloud!) offering makes the most sense for you, given your unique context.

      See Info-Tech’s Define Your Cloud Vision for more information.

      Cloud service models

      • This research focuses on five key service models, each of which has its own strengths and weaknesses. Moving right from “on-prem” customers gradually give up more control over their environments to cloud service providers.
      • An entirely premises-based environment means that the customer is responsible for everything ranging from the dirt under the datacenter to application-level configurations. Conversely, in a SaaS environment, the provider is responsible for everything but those top-level application configurations.
      • A managed service provider or other third-party can manage any or of the components of the infrastructure stack. A service provider may, for example, build a SaaS solution on top of another provider’s IaaS or offer configuration assistance with a commercially available SaaS.

      Info-Tech Insight

      Not all workloads fit well in the cloud. Many environments will mix service models (e.g. SaaS for some workloads, some in IaaS, some on-premises) and this can be perfectly effective. It must be consistent and intentional, however.

      The image contains a screenshot of cloud service models: On-prem, CoLo, laaS, PaaS, and SaaS

      Option: Best Practice Quick Win

      S/4HANA Cloud, Essentials

      Updates

      4 times a year

      License Model

      Subscription

      Server Platform

      SAP

      Platform Management

      SAP only

      Pre-Set Templates (industries)

      Not allowed

      Single vs. Multi-Tenant

      Multi-client

      Maintenance ALM Tool

      SAP ALM

      New Implementation

      This is a public cloud solution for new clients adopting SAP that are mostly looking for full functionality within best practice.

      Consider a full greenfield approach. Even for mid-size existing customers looking for a best-practice overhaul.

      Functionality is kept to the core. Any specialties or unique needs would be outside the core.

      Regional localization is still being expanded and must be evaluated early if you are a global company.

      Option: Augment Best Practice

      S/4HANA Cloud, Extended Edition

      Updates

      Every 1-2 years or up to client’s schedule

      License Model

      Subscription

      Server Platform

      AZURE, AWS, Google

      Platform Management

      SAP only

      Pre-Set Templates (industries)

      Coded separately

      Single vs. Multi-Tenant

      Single tenant

      Maintenance ALM Tool

      SAP ALM or SAP Solution Manager

      New Implementation With Client Specifics

      No longer available to new customers from January 25, 2022, though available for renewals.

      Replacement is called SAP Extended Services for SAP S/4HANA Cloud, private edition.

      This offering is a grey area, and the extended offerings are being defined.

      New S/4HANA Cloud extensibility is being offered to early adopters, allowing for customization within a separate system landscape (DTP) and aiming for an SAP Central Business Configuration solution for the cloud. A way of fine-tuning to meet customer-specific needs.

      Option: Augment Best Practice (Cont.)

      S/4HANA Cloud, Private Edition

      Updates

      Every 1-5 years or up to client’s schedule

      License Model

      Subscription

      Server Platform

      AZURE, AWS, Google

      Platform Management

      SAP only

      Pre-Set Templates (industries)

      Allowed

      Single vs. Multi-Tenant

      Single tenant

      Maintenance ALM Tool

      SAP ALM or SAP Solution Manager

      New Implementation With Client Specifics

      This is a private cloud solution for existing or new customers needing more uniqueness, though still looking to adopt best practice.

      Still considered a new implementation with data migration requirements that need close attention.

      This offering is trying to move clients to the S/4HANA Cloud with close competition with the Any Premise product offering. Providing client specific scalability while allowing for standardization in the cloud and growth in the digital strategy. All customizations and ABAP functionality must be revisited or revamped to fit standardization.

      Option: Own Full Solution

      S/4HANA Any Premise

      Updates

      Client decides

      License Model

      Perpetual or subscription

      Server Platform

      AZURE, AWS, Google, partner's or own server room

      Platform Management

      Client and/or partner

      Pre-Set Templates (industries)

      Allowed

      Single vs. Multi-Tenant

      Single tenant

      Maintenance ALM Tool

      SAP Solution Manager

      Status Quo Migration to S/4HANA

      This is for clients looking for a quick transition to S/4HANA with minimal risks and without immediate changes to their operations.

      Though knowing the direction with SAP is toward its cloud solution, this may be a long costly path to getting the that end state.

      The Any Premise version carries over existing critical ABAP functionalities, and the SAP GUI can remain as the user interface.

      Activity 4.1.2 (Optional) Evaluate optimization initiatives

      1 hour

      1. If there is an opportunity to optimize the current SAP environment or prepare for the move to a new platform, continue with this step.
      2. Valuate your optimization initiatives from tab 3.2 “Optimization Initiatives.”

      Consider: relevance to achieving goals, number of users, importance to role, satisfaction with features, usability, data quality

      Value Opportunities: increase revenue, decrease costs, enhanced services, reach customers

      Additional Factors:

      • Current to Future Risk Profile
      • Number of Departments to Benefit
      • Importance to Stakeholder Relations
      • Resources: Do we have resources available and the skillset?
      • Cost
      • Overall Effort Rating
      • "Gut Check: Is it achievable? Have we done it or something similar before? Are we willing to invest in it?"

      Prioritize

      • Relative priority
      • Determine if this will be included in your optimization roadmap
      • Decision to proceed
      • Next steps

      Record this information in the Get the Most Out of Your SAP Workbook.

      Download the Get the Most Out of Your SAP Workbook

      Activity 4.1.3 Roadmap building blocks: SAP migration

      1 hour

      Migration paths: Determine your migration path and next steps using the Activity 4.1.1 “SAP System Options.”

      1. Identify initiatives and next steps.
      2. For each item on your roadmap, assign an owner who will be accountable to the completion of the roadmap item.
      3. Wherever possible, assign a start date, month, or quarter. The more specific you can be the better.
      4. Identify completion dates to create a sense of urgency. If you are struggling with start dates, it can help to start with a finish date and “back in” to a start date based on estimated efforts.
      5. Include periphery tasks such as communication strategy.

      Record this information in the Get the Most Out of Your SAP Workbook.

      Note: Your roadmap should be treated as a living document that is updated and shared with the stakeholders on a regular schedule.

      The image contains a diagram of the pathways that can be take from current state to future state. The options are: BEST PRACTICE QUICK WIN
(Public Cloud), AUGMENT BEST PRACTICE (Private Cloud), OWN FULL SOLUTION (On Premise)

      Download the Get the Most Out of Your SAP Workbook

      Activity 4.1.4 Roadmap building blocks: SAP optimization

      1 hour

      Optimization initiatives: Determine which if any to proceed with.

      1. Identify initiatives.
      2. For each item on your roadmap, assign an owner who will be accountable to the completion of the roadmap item.
      3. Wherever possible, assign a start date, month, or quarter. The more specific you can be the better.
      4. Identify completion dates to create a sense of urgency. If you are struggling with start dates, it can help to start with a finish date and “back in” to a start date based on estimated efforts.
      5. Include periphery tasks such as communication strategy.

      Record this information in the Get the Most Out of Your SAP Workbook.

      Note: Your roadmap should be treated as a living document that is updated and shared with the stakeholders on a regular schedule.

      The image contains a screenshot of activity 4.1.4 SAP optimization.

      Download the Get the Most Out of Your SAP Workbook

      SAP optimization roadmap

      Initiative

      Owner

      Start Date

      Completion Date

      Create final workshop deliverable

      Info-Tech

      16 September 2021

      Review final deliverable

      Workshop sponsor

      Present to executive team

      October 2021

      Build business case

      CFO, CIO, Directors

      3 weeks to build

      3-4 weeks process time

      Build an RFI for initial costings

      1-2 weeks

      Stage 1 approval for requirements gathering

      Executive committee

      Milestone

      Determine and acquire BA support for next step

      1 week

      Requirements gathering – level 2 processes

      Project team

      1 week

      Build RFP (based on informal approval)

      CFO, CIO, Directors

      4th calendar quarter 2022

      Possible completion: January 2023

      2-4 weeks

      Data strategy optimization

      The image contains a graph to demonstrate the data strategy optimization.

      Activity 4.1.5 (Optional) Build a visual SAP roadmap

      1 hour

      1. For some, a visual representation of a roadmap is easier to comprehend. Consider taking the roadmap built in 4.1.4 and creating a visual.
      2. Record this information in the Get the Most Out of Your SAP Workbook.

        The image contains a screenshot of activity 4.1.5 build a visual SAP roadmap.

      Download the Get the Most Out of Your SAP Workbook

      SAP strategy roadmap

      The image contains a screenshot of the SAP strategy roadmap.

      Implementations Partners

      • Able to consult, migrate, implement, and manage the SAP S/4HANA business suite across industries.
      • Able to transform the enterprise’s core business system to achieve the desired outcome.
      • Capable in strategic planning, building business cases, developing roadmaps, cost and time analysis, deployment model (on-prem, cloud, hybrid model), database conversion, database and operational support, and maintenance services.

      Info-Tech Insight

      It is becoming a common practice for implementation partners to engage in a two- to three-month Discovery Phase or Phase 0 to prepare an implementation roadmap. It is important to understand how this effort is tied to the overall service agreement.

      The image contains several logos of the implementation partners: Atos, Accenture, Cognizant, EY, Infosys, Tech Mahindra, LTI, Capgemini, Wipro, IBM, tos.

      Summary of Accomplishment

      Get the Most Out of Your SAP

      ERP technology is critical to facilitating an organization’s flow of information across business units. It allows for seamless integration of systems and creates a holistic view of the enterprise to support decision making. ERP implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.

      Get the Most Out of Your SAP allows organizations to proactively implement continuous assessment and optimization of their enterprise resource planning system, including:

      • Alignment and prioritization of key business and technology drivers.
      • Identification of processes, including classification and gap analysis.
      • Measurement of user satisfaction across key departments.
      • Improved vendor relations.
      • Data quality initiatives.

      This formal SAP optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Research Contributors

      The image contains a picture of Ben Dickie.

      Ben Dickie

      Research Practice Lead

      Info-Tech Research Group

      Ben Dickie is a Research Practice Lead at Info-Tech Research Group. His areas of expertise include customer experience management, CRM platforms, and digital marketing. He has also led projects pertaining to enterprise collaboration and unified communications.

      The image contains a picture of Scott Bickley.

      Scott Bickley

      Practice Lead and Principal Research Director

      Info-Tech Research Group

      Scott Bickley is a Practice Lead and Principal Research Director at Info-Tech Research Group focused on vendor management and contract review. He also has experience in the areas of IT asset management (ITAM), software asset management (SAM), and technology procurement along with a deep background in operations, engineering, and quality systems management.

      The image contains a picture of Andy Neil.

      Andy Neil

      Practice Lead, Applications

      Info-Tech Research Group

      Andy is a Senior Research Director, Data Management and BI, at Info-Tech Research Group. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and the development of industry standard data models.

      Bibliography

      Armel, Kate. "New Article: Data-Driven Estimation, Management Lead to High Quality." QSM: Quantitative Software Management, 14 May 2013. Accessed 4 Feb. 2021.

      Enterprise Resource Planning. McKinsey, n.d. Accessed 13 Apr. 2022.

      Epizitone, Ayogeboh. Info-Tech Interview, 10 May 2021.

      Epizitone, Ayogeboh, and Oludayo O. Olugbara. “Principal Component Analysis on Morphological Variability of Critical Success Factors for Enterprise Resource Planning.” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 11, no. 5, 2020. Web.

      Gheorghiu, Gabriel. "The ERP Buyer’s Profile for Growing Companies." Selecthub, 2018. Accessed 21 Feb. 2021.

      Karlsson, Johan. "Product Backlog Grooming Examples and Best Practices." Perforce, 18 May 2018. Accessed 4 Feb. 2021.

      Lichtenwalter, Jim. “A look back at 2021 and a look ahead to 2022.” ASUG, 23 Jan. 2022. Web.

      “Maximizing the Emotional Economy: Behavioral Economics." Gallup, n.d. Accessed 21 Feb. 2021.

      Mell, Peter, and Timothy Grance. “The NIST Definition of Cloud Computing.” National Institute of Standards and Technology. Sept. 2011. Web.

      Norelus, Ernese, Sreeni Pamidala, and Oliver Senti. "An Approach to Application Modernization: Discovery and Assessment Phase," Medium, 24 Feb 2020. Accessed 21 Feb. 2021.

      “Process Frameworks." APQC, n.d. Accessed 21 Feb. 2021.

      “Quarterly number of SAP S/4HANA subscribers worldwide, from 2015 to 2021.” Statista, n.d. Accessed 13 Apr. 2022.

      Riley, L., C.Hanna, and M. Tucciarone. “Rightsizing SAP in these unprecedented times.” Upperedge, 19 May 2020.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.

      “SAP S/4HANA Product Scorecard Report.” SoftwareReviews, n.d. Accessed 18 Apr. 2022.

      Saxena, Deepak, and Joe Mcdonagh. "Evaluating ERP Implementations: The Case for a Lifecycle-based Interpretive Approach." The Electronic Journal of Information Systems Evaluation, vol. 22, no. 1, 2019, pp. 29-37. Accessed 21 Feb. 2021.

      Smith, Anthony. "How To Create A Customer-Obsessed Company Like Netflix." Forbes, 12 Dec. 2017. Accessed 21 Feb. 2021.

      Service Management

      • Buy Link or Shortcode: {j2store}46|cart{/j2store}
      • Related Products: {j2store}46|crosssells{/j2store}
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture

      The challenge

      • We have good, holistic practices, but inconsistent adoption leads to chaotic service delivery and low customer satisfaction.
      • You may have designed your IT services with little structure, formalization, or standardization.
      • That makes the management of these services more difficult and also leads to low business satisfaction.

      Continue reading

      Implement a Transformative IVR Experience That Empowers Your Customers

      • Buy Link or Shortcode: {j2store}68|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $6,499 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Today’s customers expect a top-tier experience when interacting with businesses.
      • The advancements in IVR technology mean that IT departments are managing added complexity in drafting a strategy for a top-tier IVR approach.
      • Implementing best practices and the right enabling technology stack is critical to supporting world-class customer experience through IVR.

      Our Advice

      Critical Insight

      • Don’t assume that contact centers and IVR systems are relics of the past. Customers still look to phone calls as being the most effective way to get a fast answer.
      • Tailor your IVR system for your customers. There is no “one-size-fits-all” approach – understand your key customer demographics and support their experience by implementing the most effective strategies for them.
      • Don’t buy best of breed, buy best for you. Base your enabling technology selection on your requirements and use cases, not on the latest industry trends and developments.

      Impact and Result

      • Before selecting and deploying technology solutions, create a database of common customer pain points and FAQs to act as an outline for the call flow tree.
      • Understand and apply operational best practices, such as ensuring proper call menu organization and using self-service applications, to improve IVR metrics and, ultimately, the customer experience.
      • Understand emerging technologies and evolving trends in the IVR space, including natural language processing and integrating your IVR with other essential enterprise applications (e.g. customer relationship management platforms).

      Implement a Transformative IVR Experience That Empowers Your Customers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transformative IVR Experience Deck – A deck outlining the best strategies and enabling technologies to implement in your IVR approach to improve your customer experience.

      This storyboard offers insight into impactful strategies and beneficial enabling technologies to implement in your IVR approach to improve your customers’ experience and to reduce the load on your support staff. This deck outlines IT’s role in the IVR development process, offering insight into how to develop an effective IVR call flow and providing details on relevant enabling technologies to consider implementing to further improve your offering.

      • Implement a Transformative IVR Experience That Empowers Your Customers – Phases 1-4

      2. IVR Call Flow Template – A template designed to help you build an effective call flow tree by providing further insight into how to better understand your customers.

      This template demonstrates an ideal IVR approach, outlining a sample call flow for a telecommunications company designed to meet the needs of a curated customer persona. Use this template to gain a better understanding of your own key customers and to construct your own call flow tree.

      • Create an IVR Call Flow That Empowers Your Customers
      [infographic]

      Further reading

      Implement a Transformative IVR Experience That Empowers Your Customers

      Learn the strategies that will allow you to develop an effective interactive voice response (IVR) framework that supports self-service and improves customer experience.

      Stop! Are you ready for this project?

      This Research Is Designed For:

      • Business analysts, application directors/managers, and customer service leaders tasked with developing and executing a technology enablement strategy for optimizing their contact center approach.
      • Any organization aiming to improve its customer experience by implementing a customer-centric approach to over-the-phone service via an IVR system.

      This Research Will Help You:

      • Adopt the best strategies for outlining an effective IVR approach and for transforming an existing IVR system.
      • Improve customer experience and ultimately customer satisfaction by enabling you to create a more efficient IVR call flow tree.
      • Select the proper IVR strategies to focus on based on the maturity level of your organization's call center.
      • Review the "art of the possible" and learn of the latest developments in successful IVR execution.
      • Learn IT's role in developing a successful IVR system and in developing a technology strategy that optimizes your IVR approach.

      Executive Summary

      Your Challenge

      • Today's customers expect a top-tier experience when interacting with businesses.
      • The advancements in IVR technology mean that IT departments are managing added complexity in drafting a strategy for a top-tier IVR approach.
      • Implementing best practices and the right enabling technology stack is critical to supporting world-class customer experience through IVR.

      Common Obstacles

      • Many organizations do not have a clear understanding of customers' drivers for contacting their IVR.
      • As many contact centers look to improve the customer experience, the need for an impactful IVR system has markedly increased. The proliferation of recommendations for IVR best practices and related technologies has made it difficult to identify and implement the right approach.
      • With a growing number of IVR-related requests, IT must be prepared to speak intelligently about requirements and the "art of the possible."

      Info-Tech's Approach

      • Before selecting and deploying technology solutions, create a database of common customer call drivers to act as an outline for the call flow tree.
      • Understand and apply operational best practices, such as ensuring proper call menu organization and using self-service applications, to improve IVR metrics and, ultimately, the customer experience.
      • Understand evolving trends and emerging technologies in the IVR space, including offering personalized service and using natural language processing/conversational AI.

      Info-Tech Insight

      Tailor your IVR system specifically for your customers. There is no one-size-fits-all approach. Understand your key customers and support their experience by implementing the most effective strategies for them.

      Voice is still the dominant way in which customers choose to receive support

      Despite the contrary beliefs that the preference for phone support and IVR systems is declining, studies have consistently shown that consumers still prefer receiving customer service over the phone.

      76%

      of customers prefer the "traditional" medium of phone calls to reach customer support agents.

      50%

      of customers across all age groups generally use the phone to contact customer support, making it the most-used customer service channel.

      Your IVR approach can make or break your customers' experience

      The feelings that customers are left with after interacting with contact centers and support lines has a major impact on their future purchase decisions

      Effective IVR systems provide customers with positive experiences, keeping them happy and satisfied. Poorly executed IVR systems leave customers feeling frustrated and contribute to an overall negative experience. Negative experiences with your IVR system could lead to your customers taking their business elsewhere.

      In fact, research by Haptik shows that an average of $262 per customer is lost each year due to poor IVR experiences ("7 Conversational IVR Trends for 2021 and Beyond," Haptik, 2021).

      50%

      of customers have abandoned their business transactions while dealing with an IVR system.

      Source: Vonage, 2020

      45%

      of customers will abandon a business altogether due to a poor IVR experience.

      Source: "7 Remarkable IVR Trends For the Year 2022 And Beyond," Haptik, 2021

      IVR systems only improve your customers' experience when done properly

      There are many common mistakes that organizations make when implementing their own IVR strategies:

      1. Offering too many menu options. IVR systems are supposed to allow customers to resolve their inquiries quickly, so it is integral that you organize your menu effectively. Less is more when it comes to your IVR call flow tree.
      2. A lack of self-service capabilities. IVR systems are meant to maximize customer service and improve the customer experience by offering self-service functionality. If resolutions for common issues can't be found through IVR, your return on investment (ROI) is limited.
      3. Having callers get stuck in an "IVR loop." Customers caught hearing the same information repeatedly will often abandon their call. Don't allow customers to get "tangled" in your call flow tree; always make human contact an option.
      4. Not offering personalized service. The inability to identify customers by their number or other identifying features leads to poor personalization and time wasted repeating information, contributing to an overall negative experience.
      5. Not updating the IVR system. By not taking advantage of new developments in IVR technology and by not using customer and employee feedback to upgrade your offering, you are missing out on the potential to improve your customers' experience. Complacency kills, and your organization will be at a competitive disadvantage because of it.

      Implement a transformative IVR approach that empowers your customers

      Call flow trees don't grow overnight; they require commitment, nurturing, and care

      1. Focus on the Roots of Your Call Flow Tree
        • Your call flow tree will only grow as strong as the roots allow it; begin beneath the surface by understanding the needs of your customers and the goals of your organization first, before building your initial IVR menu.
      2. Allow Customers the Opportunity to Branch Out
        • Empower your customers by directing your call flow tree to self-service applications where possible and to live agents when necessary.
      3. Let Your Call Flow Tree Flourish
        • Integrate your IVR with other relevant business applications and apply technological developments that align with the needs of your customers and the goals of your organization.
      4. Keep Watering Your Call Flow Tree
        • Don't let your call flow tree die! Elicit feedback from relevant stakeholders and develop an iterative review cycle to identify and implement necessary changes to your call flow tree, ensuring continued growth.

      IT plays an integral role in supporting the IVR approach

      IT is responsible for providing technology enablement of the IVR strategy

      While IT may not be involved in organizing the call flow tree itself, their impact on an organization's IVR approach is undeniable. Not only will IT assist with the implementation and integration of your IVR system, they will also be responsible for maintaining the technology on an ongoing basis. As such, IT should be a part of your organization's software selection team, following Info-Tech's methodology for optimizing your software selection process.

      • With an understanding of the organization's customer experience management strategy and business goals, IT should be looked toward to:
      • Provide insight into the "art of the possible" with IVR systems.
      • Recommend enabling technologies relative to your call center's maturity (e.g. agent assist and natural language processing).
      • Outline integration capabilities with your existing application portfolio.
      • Highlight any security concerns.
      • Assist with vendor engagement.
      • Take part in stakeholder feedback groups, consulting with agents about their pain points and attempting to solve their problems.

      Guided Implementation

      What does a typical GI on this topic look like?

      Focus on the Roots of Your Call Flow Tree

      Allow Customers the Opportunity to Branch Out Let Your IVR Call Flow Tree Flourish Keep Watering Your Call Flow Tree

      Call #1: Introduce the project, scoping customer call drivers and defining metrics of success.

      Call #3: Discuss the importance of promoting self-service and how to improve call routing processes, assessing the final tiers of the IVR.

      Call #4: Discuss the benefits of integrating your IVR within your existing business architecture and using relevant enabling technologies.

      Call #5: Discuss how to elicit feedback from relevant stakeholders and develop an iterative IVR review cycle, wrapping up the project.

      Call #2: Begin assessing initial IVR structure.

      A Guided Implementation (GI) is a series

      of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 5 to 7 calls over the course of 4 to 6 months.

      Phase 1

      Focus on the Roots of Your Call Flow Tree

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Building a database of your customers' call drivers
      • Developing IVR-related goals and connecting them with your key performance indicators (KPIs)
      • Developing the first tier of your IVR menu

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 1.1

      Understand Your Customers

      This step will walk you through the following activity:

      1.1.1 Build a database of the reasons why your customers call your contact center

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • List of your customers' call drivers

      Help your customers get to where they need to go

      Understand which questions customers need answered the most and organize your IVR menu accordingly

      • With any IVR system, your primary focus should be creating a simple, easily navigated call flow. You not only want your customers to be able to find the solutions that they are looking for, but you want them to be able to do so easily and quickly.
      • In order to direct customers more efficiently, you need to understand why they're motivated to call your contact center. This will be different for every organization, so it requires a deeper understanding of your customers.
      • After understanding the motivators behind your customers' reasons for calling, you'll be able to organize your call flow tree effectively.
      • Assign the most popular reasons that customers call first in your IVR call flow. Organizing your call flow in such a way will ensure a quicker turn around time for customer inquiries, providing callers with the immediate resolution that they are seeking.

      "Call flows are the structure of a call center's interactive voice response (IVR). They define the path a caller takes to reach a resolution. The more efficient the flow, the quicker a resolution can be – thereby delivering a better caller experience."

      Thomas Randall, Ph.D.
      Senior Research Analyst
      Info-Tech Research Group

      1.1.1 Activity: Build a list of the most common reasons that your key customers call your contact center

      30 minutes

      1. As a group, review the reasons that customers call your contact center. This includes reviewing which questions are asked most frequently, what services are most often inquired about, and what pain points and complaints live agents hear most regularly.
      2. Organize each call driver from most to least popular based on how often they are heard.
      3. Record your findings.
      Input Output
      • List of common customer questions
      • List of common customer pain points/complaints
      • Database of customer call drivers
      Materials Participants
      • Whiteboard
      • Markers
      • Project team
      • Customer service leaders/live agents

      Info-Tech Insight

      To understand why your customers are calling, first you need to know who your customers are. Improve your caller understanding by creating customer personas.

      1.1.1 Activity: Build a list of the most common reasons that your key customers call your contact center

      Example

      Customer Call Drivers
      Need to pay a bill
      Complaints about an outage to their service
      Inquiry about new plans
      Need to update account information
      Complaints about their last bill

      Step 1.2

      Develop Goals for Your IVR

      This step will walk you through the following activity:

      1.2.1 Outline IVR-related goals relevant to your organization.

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Goals for your organizational IVR

      Create IVR-related goals you wish for your organization to achieve

      Organizations across different industries will measure success in a multitude of ways; develop goals that are relevant to your needs and desires

      Based on your customer experience strategy and what industry you're in, the goals that you aim to accomplish will look different. A doctor's office will be more concerned with an accurate diagnosis and high first call resolution rate than low average talk time!

      Setting business goals relevant to your organization is only half of the battle; it's just as important to hold your organization accountable to those goals and measure your continued progress toward meeting them.

      1.2.1 Activity: Brainstorm a list of goals that you would like your organization to achieve when optimizing your IVR approach

      30 minutes

      1. In two to three groups, brainstorm goals related to your IVR that are relevant to your organization.
      2. Classify these goals as being either quick wins or part of a longer-term engagement based on the time they would take to accomplish.
      3. Introduce your goals to the entire group, coming to an agreement on the top goals that the organization should aim to achieve through implementing a new/transformed IVR approach.
      InputOutput
      • Customer experience strategy
      • Desired IVR-related achievements
      • Organizational IVR goals
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      1.2.1 Activity: Brainstorm a list of goals that you would like your organization to achieve when optimizing your IVR approach

      Example

      Goal Designation
      Lower the average queue time Quick win
      Lower call abandonment rate Quick win
      Lower customer attrition Long-term
      Lower employee attrition Long-term
      Increase average speed of answer Quick win

      Step 1.3

      Align Your Goals With Your KPIs

      This step will walk you through the following activity:

      1.3.1 Review your organizational IVR goals and connect them with your key performance indicators (KPIs)

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Metrics used to measure organizational success related to your IVR

      Ensure you are using the proper metrics for measuring the success of your call flow tree

      You won't know if your IVR is operating successfully if you don't know what success looks like for you. It is important to align your contact center KPIs with your business goals so you can hold your IVR system accountable.

      Example

      Metric Description Current Score Target Score [Date/Year]
      First call resolution
      Average abandonment rate
      Customer attrition
      Employee attrition
      Average queue time
      Service level
      Average speed of answer
      Average handle time
      Average call transfer rate
      Average talk time
      Customer self-service resolution
      Agent satisfaction
      Customer satisfaction

      1.3.1 Activity: Develop KPIs for your contact center and connect them to your organization's business goals

      30 minutes

      1. As a group, establish the metrics or KPIs that will be used to measure your progress against the organizational IVR goals created in Activity 1.2.1.
      2. Take note of your current score for each of your organizational goals and determine your target score.
      3. Attach a deadline or target date by which you would like to reach your target score. Target dates can vary based on whether your goal is classified as a quick win or part of a longer-term engagement.
      InputOutput
      • Organizational IVR goals
      • KPIs
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      Step 1.4

      Build Your Initial IVR Menu

      This step will walk you through the following activity:

      1.4.1 Develop the first tier of your IVR menu, determining the initial selections that customers will have to choose from

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Tier one of your IVR call flow tree

      Keep your IVR concise – minimize the length of your voice prompts and limit the depth of your menus

      You don't want to overload your customers with information. Providing your callers with overly detailed prompts and too many menu options will only lead to frustration, ultimately diminishing both the efficiency and the effectiveness of your IVR. Limiting the length of your voice prompts and the depth of your menus will lay out a clear path for your callers, increasing the likelihood that they are able to navigate your IVR accurately.

      Each of your IVR menus should provide your customers with no more than five selections.

      Your IVR should offer a maximum of three menu tiers.

      Each of your selection "descriptions" or voice prompts should be no longer than four seconds in length.

      Info-Tech Insight

      According to a study by Telzio (2020), introductory IVR messages that greet your customers and identify your company should be under 7.9 seconds in length. Longer introductions will only bore, frustrate, and overload the customer before the call really even begins.

      When developing your voice prompts, it is integral to speak clearly using simple and easily understood language

      • Speak clearly and stay away from industry-specific jargon to ensure that your voice prompts are widely understood by your customer base. This will allow callers to digest the information relayed through your IVR more accurately.
      • Part of increasing the retention of information communicated through your IVR is also ensuring that sufficient pauses are taken between each of your voice prompts. Just as you want to avoid overloading your customers with voice prompts that are too long and too detailed, you also want to give your callers adequate time to process the information that is being relayed to them.
      • Improving the ease of listening to your IVR will reduce the risk of overwhelming your callers and will increase the likelihood that they are able to follow along appropriately, directing themselves down the proper call flow.

      Info-Tech Insight

      Securing voice talent and be expensive and cumbersome. Consider using an automated voice through a text-to-speech solution for your prompts. This will ensure that all your prompts are consistent throughout your menus, and it also makes it significantly easier to provide crucial updates within your IVR system.

      When sufficient pauses are taken between menu options, input errors can be reduced by over…

      Source: Ansafone Contact Centers, 2019

      1.4.1 Activity: Begin building your call flow tree by developing the initial selections that customers will choose from when dialing into your IVR

      30 minutes

      1. Review the database of customer call drivers completed in Activity 1.1.1 to create the opening menu of your IVR call flow tree.
      2. Limit your selections/prompts to a maximum of five by grouping related questions, services, and complaints/pain points into broad categories.
      3. Organize your selections/prompts according to how often customers call in relating to that topic.

      Info-Tech Insight

      Remember: You don't need five selections! That is the maximum recommended number of prompts to use and will most likely be reserved for more complex call flows. More isn't always better. If you can limit your initial menu to fewer selections, then do so.

      InputOutput
      • Database of customer call drivers
      • Initial IVR menu
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      1.4.1 Activity: Begin building your call flow tree by developing the initial selections that customers will choose from when dialing into your IVR

      Example

      IVR Initial Greeting

      1. For Billing and Payments

      2. To Report an Outage

      3. To Make Changes to Your Plan or Account

      Phase 2

      Allow Customers the Opportunity to Branch Out

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Completing the second tier of your call flow tree
      • Completing the third and final tier of your call flow tree

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 2.1

      Build the Second Tier of Your IVR Menu

      This step will walk you through the following activity:

      • 2.1.1 Complete the second tier of your call flow tree, branching out from your initial menu

      Allow Customers the Opportunity to Branch Out

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Tier 2 of your IVR call flow tree

      An IVR system should empower your customers to solve problems on their own

      Integrate business applications into your IVR menus to enable self-service capabilities and automate processes where possible

      • An IVR system should assist your customer service team while also empowering your customers. This can be accomplished through offering self-service and using automated messaging via a broadcast messaging system.
      • Some common self-service practices include providing callers with the ability to check credit card statements, pay bills, and track shipments.
      • Automated messaging can be used to address common customer questions. For instance, if a company-wide issue exists, an automated message can outline the issue and highlight the approximate time for resolution, providing customers with the answer they were seeking while eliminating the need to speak to a live agent. This technique is commonly practiced by internet providers during outages.
      • Providing callers with the opportunity to find a resolution for themselves through self-service and automated messaging not only improves the customer experience but also frees up your customer service team for more pressing matters.

      73%

      of customers want to be provided with the ability to solve issues on their own.

      67%

      of customers prefer to use self-service options over speaking with a customer service representative.

      Source: Raffle, 2020

      2.1.1 Activity: Grow your call flow tree! Begin branching out from your initial menu options and develop the second tier of your IVR system

      30 minutes

      1. Branch out from your initial IVR menu created in Activity 1.4.1. Get more specific in your prompts, branching out from the general groupings you have created.
      2. Consult with your database of customer call drivers created in Activity 1.1.1 to organize your subgroupings, again prioritizing the services most sought and the questions, complaints, and pain points most frequently heard.
      3. Limit each subsection to a maximum of five prompts.

      Info-Tech Insight

      Always provide your callers with the option to go back to a previous menu or to have menu options repeated.

      InputOutput
      • Database of customer call drivers
      • Initial IVR menu
      • Second IVR menu
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      2.1.1 Activity: Grow your call flow tree! Begin branching out from your initial menu options and develop the second tier of your IVR system

      Example

      This is an image of the sample flow tree from Activity 2.1.1


      Step 2.2

      Build the Third Tier of Your IVR Menu

      This step will walk you through the following activity:

      2.2.1 Complete your call flow tree by branching out your third and final tier of menu options.

      Allow Customers the Opportunity to Branch Out

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Third and final tier of your IVR call flow tree

      Provide your callers with the option to speak to a live agent – but not too soon

      While promoting self-service and automating certain processes will improve the functionality of your IVR, it is also important to realize that some issues will ultimately require human intervention. An effective IVR system harmonizes these concepts by making human contact an option, but not too early in the process. You need to find the right balance!

      When organizing your IVR call flow tree, you need to be conscious of sending clients in an endless "IVR loop." You should never have your IVR continually repeat its menu options. Customers will abandon an IVR if they are stuck in an IVR loop, being forced to listen to the same information repeatedly without having a way to reach an agent.

      If a problem cannot be solved within three steps or by the third tier of your IVR menus, callers should be provided with the option to speak to a live agent, if not automatically routed to one. By providing your callers with the option to speak to a live agent on the third tier of your IVR, you are still offering ample time for customers to discover an avenue to solve their issue on their own through self-service, without frustrating them by losing them in an endless loop of IVR options.

      30%

      of customers say that not being able to reach a human agent is the most frustrating aspect of a poor customer service experience.

      Source: ProProfs Chat, 2022

      Info-Tech Insight

      Consider routing callers to a live agent not only on the third tier of your IVR menus but also after three input errors. Multiple input errors can show an eagerness to speak to a representative or a strong misunderstanding of the IVR offering.

      How you direct a customer to a live agent can make all the difference

      Don't think that just offering your customers the option to speak to a live agent is enough. When aiming to significantly improve your customers' experience, how you direct calls to your live agents plays a major role. When a call is being directed to a live agent, be sure to:

      • Optimize your call routing and minimize call transfers. Use skills-based routing to direct your incoming client calls to the most suitable agent to resolve their issue. Inaccurately routing callers through your IVR leads to having to transfer the customer to another agent, which is a major contributor to a negative customer experience.
      • Include wait-time expectations and call-back functionality. There is no denying it: Waiting on hold can be a real pain. If a customer needs to go on hold, inform them of where they are in the queue and what the approximate wait time is. A little transparency can go a long way. You should also provide customers with the option to have a representative call them back. This greatly improves the customer experience, particularly when wait times are long.
      • Play useful on-hold messages. If a customer does decide to wait on the line to speak to a representative, ensure your on-hold messaging doesn't negatively impact their experience. Always have multiple songs and messages available to cycle through to limit customer annoyance. For on-hold messages, consider mentioning self-service capabilities available on other channels or providing company news and information on special promotions. Know your key customer demographics and plan your on-hold messaging accordingly.

      72%

      of customers view having to talk to multiple agents as poor customer service.

      Source: ProProfs Chat, 2022

      33%

      of customers highlight waiting on hold as being their biggest frustration.

      Source: EmailAnalytics, 2022

      2.2.1 Activity: Complete your call flow tree!

      30 minutes

      1. Branch out from the second tier of your IVR call flow tree created in Activity 2.1.1, connecting relevant prompts with self-service applications and automated responses. Keep in mind, most of your frequently asked questions can and should be directed toward an automated response.
      2. Direct all remaining prompts to a live agent, ensuring each selection from your second-tier menu is capped off appropriately.

      Info-Tech Insight

      Remember: Your IVR system doesn't live in isolation. The information offered by your IVR, particularly from automated messages, should be consistent with information found within other resources (e.g. online knowledge bases).

      InputOutput
      • Tier 1 and 2 of your IVR menus
      • Completed IVR call flow
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      2.2.1 Activity: Complete your call flow tree!

      Example

      This is an image of the sample flow tree from Activity 2.2.1

      Phase 3

      Let Your IVR Call Flow Tree Flourish

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Reviewing the benefits of offering personalized service
      • Reviewing new technologies offered in the IVR space

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 3.1

      Learn the Benefits of a Personalized IVR

      This step will walk you through the following activity:

      3.1.1 Review the benefits of offering personalized service, namely by connecting your IVR system with your customer knowledge base

      Let Your IVR Call Flow Tree Flourish

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding the importance of offering personalized service

      Personalizing service is integral for improving your customer experience

      Integrate your IVR system with your customer relationship management (CRM) system or customer knowledge base of choice to provide support to your customers on a personal level.

      The integration of your IVR system with your CRM or other applicable knowledge base allows for customer data (e.g. customer history and previous interactions) to be accessible to your staff during calls. Access to this data allows for a deeper understanding of your customers and for personalization of service. This provides immediate benefits to your contact center that will improve your customer experience.

      When you inevitably do need to transfer a customer to another agent, they won't have to repeat their issue to a new representative, as all their information will now be easily accessible. Being forced to repeat themselves to multiple agents is a major cause of frustration for customers. This integration would also allow you to route callers to the previous agent that they dealt with whenever possible for the purpose of continuity, and it would enable you to implement other beneficial technologies as well.

      One such example is "agent assist." Agent assist is an AI bot that listens in on calls, learning customer context and automatically searching knowledge bases to help resolve queries without the agent having to put the caller on hold to manually perform that work themselves. Not only does agent assist improve customer resolution times, but it also ramps up onboarding time, allowing for new agents to enter the workforce and perform with confidence earlier.

      76%

      of consumers expect personalized experiences.

      71%

      of customers expect internal collaboration so that they don't have to repeat themselves.

      Source: Zendesk, 2019

      Personalization can empower your IVR in many ways

      Personalizing your IVR does much more than just provide your customer service representatives with conversational context. Personalization enables your IVR to recognize callers by their phone number, or even by voice via biometric authentication technologies.

      This advanced level of recognition allows your IVR to greet your callers by name, speak to them in their preferred language, send follow-up correspondence to their preferred method of communication (i.e. email or SMS), and even provide them with contact numbers and addresses for your organization's physical locations that are closest to them.

      An example of a more advanced functionality is having your IVR call flow personalized for each customer based on their call history. As customers call in, their data is collected, ultimately improving your IVR's ability to predict and understand caller intent. This makes personalized call flows possible. If customers typically call in to make payments, your IVR can logically deduce that their next call will be for the same reason, and it will alter the call menu to direct them to that functionality more efficiently.

      Step 3.2

      Review New Technology to Apply to Your IVR

      This step will walk you through the following activity:

      3.2.1 Review new technologies offered in the IVR space and understand their impact

      Let Your IVR Call Flow Tree Flourish

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of key technologies

      Let your customers tell you exactly what they need

      Use natural language processing and conversational AI to further advance your IVR offering

      Instead of making your customers work their way through your call flow tree to find out what they need, why not just ask them? Conversational IVR, also known as an "intuitive IVR system," makes this possible.

      Think Google Assistant, Siri, and Alexa. Your customers can simply tell you what they need and your conversational IVR, using the advancements in natural language processing and conversational AI, will take it from there, directing callers to the resources needed to resolve their issues.

      Powerful enough to understand full sentences and not just select words or phrases, the increased intelligence of a conversational IVR system allows it to handle complex customer inquiries. Leveraging machine learning capabilities, the system will only continue to improve its ability to understand caller intent, ultimately leading to increased call routing accuracy as it fields more and more calls.

      Info-Tech Insight

      Remember: Your customers want fast and easy, not overwhelming and confusing. Some customers who are greeted with an open-ended question from a conversational IVR may not be sure how to respond.

      Understand your key customer demographics and act accordingly. It may be beneficial to provide your callers with guidelines of what to say. Outlining appropriate responses that will guide your customers to their desired department quicker will boost their experience with your conversational IVR.

      There are a lot of benefits to implementing a conversational IVR

      • Putting your callers in control and offering a more humanized approach, conversational IVRs are the preferred first point of contact for customers.
      • Conversational IVRs reduce the time required to reach resolution and can handle more calls than a standard IVR.
      • Conversational IVRs allow for the collection of more relevant data. By not limiting callers to predetermined menu options, you can track the reasons behind customers' calls with more accuracy, using this data to drive future IVR developments.
      • Conversational IVRs are more cost-effective than standard IVRs. According to a report by IBM, companies world-wide spend over $1.3 trillion to address 256 billion customer calls annually. This means that each call a live agent addresses costs an average of $30 (Cognigy, 2020). With a conversational IVR, that cost can be reduced to one-eighth (ETCIO.com, 2020).
      • Conversational IVRs can be handle calls in multiple languages, offering improved scalability for companies operating multi-nationally.

      60%

      of callers will bypass the pre-recorded messages in a standard IVR to reach a human voice.

      Source: Cognigy, 2020

      66%

      of requests can be resolved faster by a conversational IVR than by a live agent.

      Source: Cognigy, 2020

      Despite this, only...

      28%

      of IVR systems contacted use voice response as their primary input method.

      Source: Telzio, 2020

      How do you know if a conversational IVR is right for your organization?

      Large, enterprise-level organizations that field a high volume of customer calls are more likely to receive the benefits and higher ROI from implementing a conversational IVR

      Instead of updating the entire IVR system and implementing a conversational IVR, smaller and mid-level organizations should consider attaching a natural language processing front-end to their existing IVR. Through this, you will be able to reap a lot of the same benefits you would if you were to upgrade to a conversational IVR.

      You can attach a natural language processing front-end to your existing IVR in two ways.

      1. Use an API to recognize your customer's voice prompts. Greet your customers with a question, such as "what is your reason for calling," as your initial IVR menu, and when your customer answers, their response will be sent to your selected API (Amazon Lex, IBM Watson, Google Dialogflow, etc.). The API will then process the customer's input and direct the caller to the appropriate branch of your call flow tree.
      2. Use a conversational AI platform to field your calls. Implement a conversational AI platform to be the first point of contact for your customers. After receiving and analyzing the input from your customers, the platform would then route your callers to your current IVR system and to the appropriate menu, whether that be to an automated message, a self-service application, or a live agent.

      Phase 4

      Keep Watering Your IVR Call Flow Tree

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Understanding the importance of receiving feedback from relevant stakeholders and the best practices for obtaining feedback
      • Understanding the best practices for developing an ongoing review cycle

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 4.1

      Gather Insights on Your IVR's Performance

      This step will walk you through the following activity:

      4.1.1 Understand the importance of receiving feedback and review the best methods for obtaining it from your clients.

      Keep Watering Your IVR Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of the importance of receiving feedback and how to obtain it from customers

      Elicit feedback from your employees and from your customers

      Your live agents are on the proverbial front lines, fielding calls from customers daily. As such, they are the prime stakeholders for knowing what kinds of calls the organization receives and how often. Their input on the most frequent reasons that customers call, whether it be to address common pain points or to have FAQs answered, is invaluable. Ask them regularly for their feedback on how the IVR system is performing and which updates should be implemented.

      While improving the agent experience is a driver behind adopting an IVR system, the focus should always be improving your customer experience. So why wouldn't you ask your customers for their feedback on your IVR offering? Most customers don't only want to be asked to provide feedback, they expect to be asked. Have your agents ask your customers directly about their experience with your IVR or use the functions of your IVR to offer automated end-of-call surveys.

      Info-Tech Insight

      Many IVR systems are capable of recording calls. Listening back on previous calls is another great way to further understand how your IVR is performing, and it also can provide a glimpse into your customers' experience.

      Surveys provide great insight into your customers' level of satisfaction – not only with your IVR but also with your live agents

      Customer satisfaction score (CSAT) is a great way to determine how happy callers are with their experiences with your organization. CSAT surveys ask your clients outright how satisfied they are with their recent interaction and have them rate your service on a scale. While straightforward, the feedback received from CSAT surveys is more general and can lack depth.

      For more detailed responses, consider asking your clients an open-ended question as opposed to using a rating scale. This will provide you with a more specific understanding of your customers' experience. For this, an IVR system that supports voice transcription is best. Automated speech-to-text functionality will ensure rapid results.

      Another option is to offer a survey that includes skip logic. These multi-tiered surveys, much like an IVR call flow tree, direct your callers to different follow-up questions based on their previous answers. While capable of providing more insight into the customer experience, these surveys are only recommended for more complex service offerings.

      Customer feedback is vitally important

      Asking for feedback makes your callers feel valued, and it also provides your organization with extremely useful information – including an understanding of what you may need to change within your IVR

      90%

      of consumers believe that organizations should provide them with the opportunity to give customer feedback.

      Source: SmallBizGenius, 2022

      41%

      of customer support professionals say that CSAT is their team's most important KPI.

      Source: Hiver, 2022

      Step 4.2

      Create an Agile Review Method

      This step will walk you through the following activity:

      4.2.1 Understand the best practices for developing an ongoing review cycle for your IVR approach

      Keep Watering Your IVR Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of the importance of IVR maintenance and of the development of an iterative review cycle

      Create an agile review method to continually enhance your call flows

      • Track items
        • Elicit feedback from your key stakeholders (i.e. live agents) as part of a regular review – every month, two months, six months, or year – of your call flow tree's efficiency. Delve into the feedback elicited from your customers at the same intervals. Look for patterns and trends and record items accordingly.
      • Manage backlog
        • Store and organize your recorded items into a backlog, prioritizing items to implement in order of importance. This could be structured by way of identifying which items are a quick win vs. which items are part of a more strategic and long-term implementation.
      • Perform iteration
        • Record key metric scores and communicate the changes you have planned to stakeholders before you implement items. Then, make the change.
      • Be retrospective
        • Examine the success of the implementation by comparing your metric scores from before and after the change. Record instances where performing similar changes could be carried out better in future iterations.

      Summary of Accomplishment

      • Knowledge Gained
        • Benefits of enabling personalized service
        • IVR-enabling technologies
        • Methods of eliciting feedback
      • Processes Optimized
        • IVR voice prompt creation
        • IVR voice prompt organization
        • IVR review cycles
      • Deliverables Completed
        • Database of customer call drivers
        • Organizational IVR goals and KPIs
        • IVR call flow tree

      Related Info-Tech Research

      This is a picture of a hand holding a cellular phone

      Choose a Right-Sized Contact Center Solution

      • IT needs a method to pinpoint which contact center solution best aligns with business objectives, adapting to a post-COVID-19 world of remote work, flexibility, and scalability.
      This image contains a screenshot from Info-tech's Build a Strong Technology Foundation for Customer Experience Management.

      Build a Strong Technology Foundation for Customer Experience Management

      • Customer expectations around personalization, channel preferences, and speed-to-resolution are at an all-time high. Your customers are willing to pay more for high-value experiences, and having a strong customer experience management (CXM) strategy is a proven path to creating sustainable value for the organization.
      This image contains a screenshot from Info-tech's IT Strategy Research Center

      IT Strategy Research Center

      • Create an IT strategy based on business needs, not just intuition.
      This image contains a screenshot from Info-tech's SoftwareReviews blueprint.

      SoftwareReviews

      • Accelerate and improve your software selection process with enterprise software reviews. Focus on available resources for communications platform as a service providers and conversational intelligence software.

      Bibliography

      "7 Conversational IVR Trends for 2021 and Beyond." Haptik, 25 March 2021. Accessed 16 June 2022.
      "7 Remarkable IVR Trends For the Year 2022 And Beyond." Haptik, 30 Dec. 2021. Accessed 27 April 2022.
      "8 IVR Strategies that Keep Customers Happy." Ansafone Contact Centers, 31 May 2019. Accessed 25 April 2022.
      "Agent Assist." Speakeasy AI, 19 April 2022. Accessed 27 April 2022.
      "AI chatbot that's easy to use." IBM, n.d. Accessed 21 June 2022.
      "IVR Trends to Watch in 2020 and Beyond: Inside CX." Intrado, 1 May 2020. Accessed 27 April 2022.
      "RIP IVR: 1980-2020." Vonage, 2 June 2020. Accessed 16 June 2022.
      Andrea. "What do Customers Want? – 37 Customer Service Statistics." SmallBizGenius, 17 March 2022. Accessed 24 May 2022.
      Anthony, James. "106 Customer Service Statistics You Must See: 2021/2022 Data & Analysis." FinancesOnline, 14 Jan. 2022. Accessed 27 April 2022.
      Brown, James. "14 stats that prove the importance of self-service in customer service." raffle, 13 Oct. 2020. Accessed 17 June 2022.
      Buesing, Eric, et al. "Getting the best customer service from your IVR: Fresh eyes on an old problem." McKinsey & Company, 1 Feb. 2019. Accessed 25 April 2022.
      Callari, Ron. "IVR Menus and Best Practices." Telzio, 4 Sep. 2020. Accessed 27 April 2022.
      Cornell, Jared. "104 Customer Service Statistics & Facts of 2022." ProProfs Chat, 6 April 2022. Accessed 16 June 2022.
      DeCarlo, Matthew. "18 Common IVR Mistakes & How To Configure Effective IVR." GetVoIP, 13 June 2019. Accessed 27 April 2022.
      DeMers, Jayson. "77 Customer Service Statistics to Know." EmailAnalytics, 23 March 2022. Accessed 27 April 2022.
      Frants, Valeriy. Interview. Conducted by Austin Wagar, 22 June 2022.
      Grieve, Patrick. "Personalized customer service: what it is and how to provide it." Zendesk, 28 June 2019. Accessed 27 April 2022.
      "How Natural Language Processing Can Help Your Interactive Voice Response System Meet Best Practice." Hostcomm, 15 July 2019. Accessed 25 April 2022.
      "IVR and customer experience: get the best UX for your clients." Kaleyra, 14 Dec. 2020. Accessed 25 April 2022.
      Irvine, Bill. "Selecting an IVR System for Customer Satisfaction Surveys." IVR Technology Group, 14 April 2020. Accessed 22 June 2022.
      Kulbyte, Toma. "Key Customer Experience Statistics to Know." SuperOffice, 24 June 2021. Accessed 24 May 2022.
      Leite, Thiago. "What's the Difference Between Standard & Conversational IVR?" Cognigy, 27 Oct. 2020. Accessed 24 May 2022.
      Maza, Cristina. "What is IVR? The ultimate guide." Zendesk, 30 Sep. 2020. Accessed 25 April 2022.
      McCraw, Corey. "What is IVR Call Flow? Benefits, Features, Metrics & More." GetVoIP, 30 April 2020. Accessed 25 April 2022.
      Mircevski, Bruno. "Smart IVR Introduction – What Is It and Why You Should Use It." Ideta, 7 March 2022. Accessed 28 April 2022.
      Oriel, Astha. "Artificial Intelligence in IVR: A Step Towards Faster Customer Services." Analytics Insight, 19 Aug. 2020. Accessed 24 May 2022.
      Perzynska, Kasia. "What is CSAT & How to Measure Customer Satisfaction?" Survicate, 9 March 2022. Accessed 22 June 2022.
      Pratt, Mary K. "How to set business goals, step by step." TechTarget, 27 April 2022. Accessed 21 June 2022.
      Robinson, Kerry. "Insight of the Week: Make Your IVR More Like Alexa." Waterfield Tech, 20 April 2022. Accessed 25 April 2022.
      Sehgal, Karishma. "Exclusive Research – 76% of customer service teams offer support outside of business hours." Hiver, 4 May 2022. Accessed 22 June 2022.
      Smith, Mercer. "111 Customer Service Statistics and Facts You Shouldn't Ignore." Help Scout, 23 May 2022. Accessed 24 June 2022.
      Thompson, Adrian. "A Guide to Conversational IVR." The Bot Forge, 27 Jan. 2021. Accessed 21 June 2022.
      Tolksdorf, Juergen. " 5 Ways to Leverage AI and Agent-Assist to Improve Customer Experience." Genesys, 19 May 2020. Accessed 27 April 2022.
      Vaish, Aakrit. "5 ways conversational IVR is helping businesses revolutionize customer service." ETCIO.com, 20 March 2020. Web.
      Westfall, Leah. "Improving customer experience with the right IVR strategy." RingCentral, 23 July 2021. Accessed 25 April 2022.

      Essentials of Vendor Management for Small Business

      • Buy Link or Shortcode: {j2store}229|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Each year, SMB IT organizations spend more money “outsourcing” tasks, activities, applications, functions, and other items.
      • Many SMBs lack the affordability of implementing a sophisticated vendor management initiative or office.
      • The increased spend and associated outsourcing leads to less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Our Advice

      Critical Insight

      • Vendor management is not “plug and play” – each organization’s vendor management initiative (VMI) needs to fit its culture, environment, and goals. There are commonalities among vendor management initiatives, but the key is to adapt vendor management principles to fit your needs, not the other way around.
      • All vendors are not of equal importance to an organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization’s investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.
      • Having a solid foundation is critical to the VMI’s ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates “informally”, starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Impact and Result

      • Build and implement a vendor management initiative tailored to your environment.
      • Create a solid foundation to sustain your vendor management initiative as it evolves and matures.
      • Leverage vendor management-specific tools and templates to manage vendors more proactively and improve communication.
      • Concentrate your vendor management resources on the right vendors.
      • Build a roadmap and project plan for your vendor management journey to ensure you reach your destination.
      • Build collaborative relationships with critical vendors.

      Essentials of Vendor Management for Small Business Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand how changes in the vendor landscape and customer reliance on vendors have made a vendor management initiative indispensible.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI.

      • Essentials of Vendor Management for Small Business – Phase 1: Plan
      • Phase 1 Small Business Tools and Templates Compendium

      2. Build

      This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      • Essentials of Vendor Management for Small Business – Phase 2: Build
      • Phase 2 Small Business Vendor Classification Tool
      • Phase 2 Small Business Risk Assessment Tool
      • Phase 2 Small Business Tools and Templates Compendium

      3. Run

      This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI.

      • Essentials of Vendor Management for Small Business – Phase 3: Run

      4. Review

      This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      • Essentials of Vendor Management for Small Business – Phase 4: Review
      [infographic]

      Further reading

      Essentials of Vendor Management for Small Business

      Create and implement a vendor management framework to begin obtaining measurable results in 90 days.


      EXECUTIVE BRIEF

      Analyst Perspective

      Vendor Management Challenge

      Small businesses are often challenged by the growth and complexity of their vendor ecosystem, including the degree to which the vendors control them. Vendors are increasing, obtaining more and more budget dollars, while funding for staff or headcount is decreasing as a result of cloud-based applications and an increase in our reliance on Managed Service Providers. Initiating a vendor management initiative (VMI) vs. creating a fully staffed vendor management office will get you started on the path of proactively controlling your vendors instead of consistently operating in a reactionary mode. This blueprint is designed with that very thought: to assist small businesses in creating the essentials of a vendor management initiative.

      This is a picture of Steve Jeffery

      Steve Jeffery
      Principal Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Each year, IT organizations "outsource" tasks, activities, functions, and other items. During 2021:

      • Spend on as-a-service providers increased 38% over 2020.*
      • Spend on managed service providers increased 16% over 2020.*
      • IT service providers increased their merger and acquisition numbers by 47% over 2020.*

      This leads to more spend, less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Common Obstacles

      As new contracts are negotiated and existing contracts are renegotiated or renewed, there is a perception that the contracts will yield certain results, output, performance, solutions, or outcomes. The hope is that these will provide a measurable expected value to IT and the organization. Oftentimes, much of the expected value is never realized. Many organizations don't have a VMI to help:

      • Ensure at least the expected value is achieved.
      • Improve on the expected value through performance management.
      • Significantly increase the expected value through a proactive VMI.

      Info-Tech's Approach

      Vendor Management is a proactive, cross-functional lifecycle. It can be broken down into four phases:

      • Plan
      • Build
      • Run
      • Review

      The Info-Tech process addresses all four phases and provides a step-by-step approach to configure and operate your VMI. The content in this blueprint helps you quickly establish your VMI and sets a solid foundation for its growth and maturity.

      Info-Tech Insight

      Vendor management is not a one-size-fits-all initiative. It must be configured:

      • For your environment, culture, and goals.
      • To leverage the strengths of your organization and personnel.
      • To focus your energy and resources on your critical vendors.

      Executive Summary

      Your challenge

      Spend on managed service providers and as-a-service providers continues to increase. In addition, IT services vendors continue to be active in the mergers and acquisitions arena. This increases the need for a VMI to help with the changing IT vendor landscape.

      38%

      2021

      16%

      2021

      47%

      2021

      Spend on as-a-service providers

      Spend on managed services providers

      IT services merger & acquisition growth (transactions)

      Source: Information Services Group, Inc., 2022.

      Executive Summary

      Common obstacles

      When organizations execute, renew, or renegotiate a contract, there is an "expected value" associated with that contract. Without a robust VMI, most of the expected value will never be realized. With a robust VMI, the realized value significantly exceeds the expected value during the contract term.

      A contract's realized value with and without a vendor management initiative

      This is an image of a bar graph showing the difference in value between those with and without a VMI, with and for those with a VMI, with Vendor Collaboration and with Vendor Performance Management. The data for those with a VMI have substantially more value.

      Source: Based on findings from Geller & Company, 2003.

      Executive Summary

      Info-Tech's approach

      A sound, cyclical approach to vendor management will help you create a VMI that meets your needs and stays in alignment with your organization as they both change (i.e. mature and grow).

      This is an image of the 4 Step Vendor Management Process. The four steps are: 1. Plan; 2. Build; 3. Run; 4. Review.

      Info-Tech's methodology for creating and operating your vmi

      Phase 1 - Plan Phase 2 - Build Phase 3 - Run Phase 4 - Review
      Phase Steps

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      Phase Outcomes This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI. This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan. This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI. This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      Insight Summary

      Insight 1

      Vendor management is not "plug and play" – each organization's vendor management initiative (VMI) needs to fit its culture, environment, and goals. While there are commonalities and leading practices associated with vendor management, your initiative won't look exactly like another organization's. The key is to adapt vendor management principles to fit your needs.

      Insight 2

      All vendors are not of equal importance to your organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization's investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.

      Insight 3

      Having a solid foundation is critical to the VMI's ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates "informally", starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Blueprint benefits

      IT benefits

      • Identify and manage risk proactively.
      • Reduce costs and maximize value.
      • Increase visibility with your critical vendors.
      • Improve vendor performance.
      • Create a collaborative environment with key vendors.
      • Segment vendors to allocate resources more effectively and more efficiently.

      Business benefits

      • Improve vendor accountability.
      • Increase collaboration between departments.
      • Improve working relationships with your vendors.
      • Create a feedback loop to address vendor/customer issues before they get out of hand or are more costly to resolve.
      • Increase access to meaningful data and information regarding important vendors.

      Phase 1 - Plan

      Phase 1

      Phase 2 Phase 3 Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Organizing your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, and a desired future state for the VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Procurement/Sourcing
      • IT
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 1 – Plan

      Get Organized

      Phase 1 – Plan focuses on getting organized. Foundational elements (Mission Statement, Goals, Scope, Strengths and Obstacles, Roles and Responsibilities, and Process Mapping) will help you define your VMI. These and the other elements of this Phase will follow you throughout the process of starting up your VMI and running it.

      Spending time up front to ensure that everyone is on the same page will help avoid headaches down the road. The tendency is to skimp (or even skip) on these steps to get to "the good stuff." To a certain extent, the process provided here is like building a house. You wouldn't start building your dream home without having a solid blueprint. The same is true with vendor management. Leveraging vendor management tools and techniques without the proper foundation may provide some benefit in the short term, but in the long term it will ultimately be a house of cards waiting to collapse.

      Step 1.1 – Mission statement and goals

      Identify why the VMI exists and what it will achieve

      Whether you are starting your vendor management journey or are already down the path, it is important to know why the vendor management initiative exists and what it hopes to achieve. The easiest way to document this is with a written declaration in the form of a Mission Statement and Goals. Although this is the easiest way to proceed, it is far from easy.

      The Mission Statement should identify at a high level the nature of the services provided by the VMI, who it will serve, and some of the expected outcomes or achievements. The Mission Statement should be no longer than one or two sentences.

      The complement to the Mission Statement is the list of goals for the VMI. Your goals should not be a reassertion of your Mission Statement in bullet format. At this stage it may not be possible to make them SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based), but consider making them as SMART as possible. Without some of the SMART parameters attached, your goals are more like dreams and wishes. At a minimum, you should be able to determine the level of success achieved for each of the VMI goals.

      Although the VMI's Mission Statement will stay static over time (other than for significant changes to the VMI or organization as a whole), the goals should be reevaluated periodically using a SMART filter, and adjusted as needed.

      1.1.1 – Mission statement and goals

      20 – 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the reasons why the VMI will exist.
      2. Review external mission statements for inspiration.
      3. Review internal mission statements from other areas to ensure consistency.
      4. Draft and document your Mission Statement in the Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals.
      5. Continue brainstorming and identify the high-level goals for the VMI.
      6. Review the list of goals and make them as SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based) as possible.
      7. Document your goals in the Phase 1 Tools and Templates Compendium– Tab 1.1 Mission Statement and Goals.
      8. Obtain signoff on the Mission Statement and goals from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission statements from other internal and external sources

      Output

      • Completed Mission Statement and Goals

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.2 – Scope

      Determine what is in scope and out of scope for the VMI

      Regardless of where your VMI resides or how it operates, it will be working with other areas within your organization. Some of the activities performed by the VMI will be new and not currently handled by other groups or individuals internally; at the same time, some of the activities performed by the VMI may be currently handled by other groups or individuals internally. In addition, executives, stakeholders, and other internal personnel may have expectations or make assumptions about the VMI. As a result, there can be a lot of confusion about what the VMI does and doesn't do, and the answers cannot always be found in the VMI's Mission Statement and Goals.

      One component of helping others understand the VMI landscape is formalizing the VMI Scope. The Scope will define boundaries for the VMI. The intent is not to fence itself off and keep others out but provide guidance on where the VMI's territory begins and ends. Ultimately, this will help clarify the VMI's roles and responsibilities, improve workflow, and reduce errant assumptions.

      When drafting your VMI scoping document, make sure you look at both sides of the equation (similar to what you would do when following best practices for a statement of work). Identify what is in scope and what is out of scope. Be specific when describing the individual components of the VMI Scope, and make sure executives and stakeholders are onboard with the final version.

      1.2.1 – Scope

      20 - 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the activities and functions in scope and out of scope for the VMI.
        1. Be specific to avoid ambiguity and improve clarity.
        2. Go back and forth between in scope and out of scope as needed; it is not necessary to list all the in-scope items and then turn your attention to the out-of-scope items.
      2. Review the lists to make sure there is enough specificity. An item may be in scope or out of scope, but not both.
      3. Use the Phase 1 Tools and Templates Compendium – Tab 1.2 Scope to document the results.
      4. Obtain signoff on the Scope from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission Statement and Goals

      Output

      • Completed list of items in and out of scope for the VMI

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.2 Scope

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.3 – Strengths and obstacles

      Pinpoint the VMI's strengths and obstacles

      A SWOT analysis (strengths, weaknesses, opportunities, and threats) is a valuable tool, but it is overkill for your VMI at this point. However, using a modified and simplified form of this tool (strengths and obstacles) will yield significant results and benefit the VMI as it grows and matures.

      Your output will be two lists: the strengths associated with the VMI and the obstacles the VMI is facing. For example, strengths could include items such as smart people working within the VMI and executive support. Obstacles could include items such as limited headcount and training required for VMI staff.

      The goals are 1) to harness the strengths to help the VMI be successful and 2) to understand the impact of the obstacles and plan accordingly. The output can also be used to enlighten executives and stakeholders about the challenges associated with their directives or requests (e.g. human bandwidth may not be sufficient to accomplish some of the vendor management activities and there is a moratorium on hiring until the next budget year).

      For each strength identified, determine how you will or can leverage it when things are going well or when the VMI is in a bind. For each obstacle, list the potential impact on the VMI (e.g. scope, growth rate, and number of vendors that can actively be part of the VMI).

      As you do your brainstorming, be as specific as possible and validate your lists with stakeholders and executives as needed.

      1.3.1 – Strengths and obstacles

      20 - 40 Minutes

      Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the VMI's strengths and obstacles.

      Be specific to avoid ambiguity and improve clarity.

      Go back and forth between strengths and obstacles as needed; it is not necessary to list all the strengths first and then all the obstacles.

      It is possible for an item to be a strength and an obstacle; when this happens, add details to distinguish the situations.

      Review the lists to make sure there is enough specificity.

      Determine how you will leverage each strength and how you will manage each obstacle.

      Use the Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles to document the results.

      Obtain signoff on the strengths and obstacles from stakeholders and executives as required.

      Input

      • Brainstorming
      • Mission Statement and Goals
      • Scope

      Output

      • Completed list of items impacting the VMI's ability to be successful: strengths the VMI can leverage and obstacles the VMI must manage

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.4 – Roles and responsibilities

      Obtain consensus on who is responsible for what

      One crucial success factor for VMIs is gaining and maintaining internal alignment. There are many moving parts to an organization, and a VMI must be clear on the various roles and responsibilities related to the relevant processes. Some of this information can be found in the VMI's Scope referenced in Step 1.2, but additional information is required to avoid stepping on each other's toes; many of the processes require internal departments to work together. (For example, obtaining requirements for a request for proposal takes more than one person or department). While it is not necessary to get too granular, it is imperative that you have a clear understanding of how the VMI activities will fit within the larger vendor management lifecycle (which is comprised of many sub processes) and who will be doing what.

      As we have learned through our workshops and guided implementations, a traditional RACI* or RASCI* Chart does not work well for this purpose. These charts are not intuitive, and they lack the specificity required to be effective. For vendor management purposes, a higher-level view and a slightly different approach provide much better results.

      This step will lead your through the creation of an OIC* Chart to determine vendor management lifecycle roles and responsibilities. Afterward, you'll be able to say, "Oh, I see clearly who is involved in each part of the process and what their role is."

      *RACI – Responsible, Accountable, Consulted, Informed

      *RASCI – Responsible, Accountable, Support, Consulted, Informed

      *OIC – Owner, Informed, Contributor

      This is an image of a table, where the row headings are: Role 1-5, and the Column Headings are: Step 1-5.

      Step 1.4 – Roles and responsibilities (cont'd)

      Obtain consensus on who is responsible for what

      To start, define the vendor management lifecycle steps or process applicable to your VMI. Next, determine who participates in the vendor management lifecycle. There is no need to get too granular – think along the lines of departments, subdepartments, divisions, agencies, or however you categorize internal operational units. Avoid naming individuals other than by title; this typically happens when a person oversees a large group (e.g. the CIO [chief information officer] or the CPO [chief procurement officer]). Be thorough, but don't let the chart get out of hand. For each role and step of the lifecycle, ask whether the entry is necessary; does it add value to the clarity of understanding the responsibilities associated with the vendor management lifecycle? Consider two examples, one for roles and one for lifecycle steps. 1) Is IT sufficient or do you need IT Operations and IT Development? 2) Is "negotiate contract documents" sufficient or do you need negotiate the contract and negotiate the renewal? The answer will depend on your culture and environment but be wary of creating a spreadsheet that requires an 85-inch monitor to view it.

      After defining the roles (departments, divisions, agencies) and the vendor management lifecycle steps or process, assign one of three letters to each box in your chart:

      • O – Owner – who owns the process; they may also contribute to it.
      • I – Informed – who is informed about the progress or results of the process.
      • C – Contributor – who contributes or works on the process; it can be tangible or intangible contributions.

      This activity can be started by the VMI or done as a group with representatives from each of the named roles. If the VMI starts the activity, the resulting chart should be validated by the each of the named roles.

      1.4.1 – Roles and responsibilities

      1 – 6 hours

      1. Meet with the participants and configure the OIC Chart in the Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart.
        1. Review the steps or activities across the top of the chart and modify as needed.
        2. Review the roles listed along the left side of the chart and modify as needed.
      2. For each activity or step across the top of the chart, assign each role a letter – O for owner of that activity or step, I for informed, or C for contributor. Use only one letter per cell.
      3. Work your way across the chart. Every cell should have an entry or be left blank if it is not applicable.
      4. Review the results and validate that every activity or step has an O assigned to it; there must be an owner for every activity or step.
      5. Obtain signoff on the OIC Chart from stakeholders and executives as required.

      Input

      • A list of activities or steps to complete a project starting with requirements gathering and ending with ongoing risk management.
      • A list of internal areas (departments, divisions, agencies, etc.) and stakeholders that contribute to completing a project.

      Output

      • Completed OCI chart indicating roles and responsibilities for the VMI and other internal areas.

      Materials

      • Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart

      Participants

      • VMI team
      • Procurement/Sourcing
      • IT
      • Representatives from other areas as needed
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Phase 2 - Build

      Create and configure tools, templates, and processes

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activities:

      • Configuring and creating the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Human Resources
      • Legal
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 2 – Build

      Create and configure tools, templates, and processes

      Phase 2 – Build focuses on creating and configuring the tools and templates that will help you run your VMI. Vendor management is not a plug and play environment, and unless noted otherwise, the tools and templates included with this blueprint require your input and thought. The tools and templates must work in concert with your culture, values, and goals. That will require teamwork, insights, contemplation, and deliberation.

      During this Phase you'll leverage the various templates and tools included with this blueprint and adapt them for your specific needs and use. In some instances, you'll be starting with mostly a blank slate; while in others, only a small modification may be required to make it fit your circumstances. However, it is possible that a document or spreadsheet may need heavy customization to fit your situation. As you create your VMI, use the included materials for inspiration and guidance purposes rather than as absolute dictates.

      Step 2.1 – Classification model

      Configure the COST vendor classification tool

      One of the functions of a VMI is to allocate the appropriate level of vendor management resources to each vendor since not all vendors are of equal importance to your organization. While some people may be able intuitively to sort their vendors into vendor management categories, a more objective, consistent, and reliable model works best. Info-Tech's COST model helps you assign your vendors to the appropriate vendor management category so that you can focus your vendor management resources where they will do the most good.

      COST is an acronym for Commodity, Operational, Strategic, and Tactical. Your vendors will occupy one of these vendor management categories, and each category helps you determine the nature of the resources allocated to that vendor, the characteristics of the relationship desired by the VMI, and the governance level used.

      The easiest way to think of the COST model is as a 2 x 2 matrix or graph. The model should be configured for your environment so that the criteria used for determining a vendor's classification align with what is important to you and your organization. However, at this point in your VMI's maturation, a simple approach works best. The Classification Model included with this blueprint requires minimal configuration to get your started, and that is discussed on the activity slide associated with this Step 2.1.

      This is an image of the COST Vendor Classification Tool.

      Step 2.1 – Classification model (cont'd)

      Configure the COST vendor classification tool

      Common characteristics by vendor management category

      Operational

      Strategic
      • Low to moderate risk and criticality; moderate to high spend and switching costs
      • Product or service used by more than one area
      • Price is a key negotiation point
      • Product or service is valued by the organization
      • Quality or the perception of quality is a differentiator (i.e. brand awareness)
      • Moderate to high risk and criticality; moderate to high spend and switching costs
      • Few competitors and differentiated products and services
      • Product or service significantly advances the organization's vision, mission, and success
      • Well-established in their core industry

      Commodity

      Tactical
      • Low risk and criticality; low spend and switching costs
      • Product or service is readily available from many sources
      • Market has many competitors and options
      • Relationship is transactional
      • Price is the main differentiator
      • Moderate to high risk and criticality; low to moderate spend and switching costs
      • Vendor offerings align with or support one or more strategic objectives
      • Often IT vendors "outside" of IT (i.e. controlled and paid for by other areas)
      • Often niche or new vendors

      Source: Compiled in part from Guth, Stephen. "Vendor Relationship Management Getting What You Paid for (And More)." 2015.

      2.1.1 – Classification model

      15 – 30 Minutes

      1. Meet with the participants to configure the spend ranges in Phase 2 Vendor Classification Tool – Tab 1. Configuration for your environment.
      2. Collect your vendors and their annual spend to sort by largest to lowest.
      3. Update cells F14-J14 in the Classification Model based on your actual data.
        1. Cell F14 – Set the boundary at a point between the spend for your 10th and 11th ranked vendors. For example, if the 10th vendor by spend is $1,009, 850 and the 11th vendor by spend is $980,763, the range for F14 would be $1,000,00+.
        2. Cell G14 – Set the bottom of the range at a point between the spend for your 30th and 31st ranked vendors; the top of the range will be $1 less than the bottom of the range specified in F14.
        3. Cell H14 – Set the bottom of the range slightly below the spend for your 50th ranked vendor; the top of the range will be $1 less than the bottom of the range specified in G14.
        4. Cells I14 and J14 – Divide the remaining range in half and split it between the two cells; for J14 the range will be $0 to $1 less than the bottom range in I14.
      4. Ignore the other variables at this time.

      Input

      • Phase 1 List of Vendors by Annual Spend

      Output

      • Configured Vendor Classification Tool

      Materials

      • Phase 2 Vendor Classification Tool – Tab 1. Configuration

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.2 – Risk assessment tool

      Identify risks to measure, monitor, and report on

      One of the typical drivers of a VMI is risk management. Organizations want to get a better handle on the various risks their vendors pose. Vendor risks originate from many areas: financial, performance, security, legal, and others. However, security risk is the high-profile risk, and the one organizations often focus on almost exclusively, which leaves the organization vulnerable in other areas.

      Risk management is a program, not a project; there is no completion date. A proactive approach works best and requires continual monitoring, identification, and assessment. Reacting to risks after they occur can be costly and have other detrimental effects on the organization. Any risk that adversely affects IT will adversely affect the entire organization.

      While the VMI won't necessarily be quantifying or calculating the risk directly, it generally is the aggregator of risk information across the risk categories, which it then includes in its reporting function (see Steps 2.12 and 3.8).

      At a minimum, your risk management strategy should involve:

      • Identifying the risks you want to measure and monitor.
      • Identifying your risk appetite (the amount of risk you are willing to live with).
      • Measuring, monitoring, and reporting on the applicable risks.
      • Developing and deploying a risk management plan to minimize potential risk impact.

      Vendor risk is a fact of life, but you do have options for how to handle it. Be proactive and thoughtful in your approach, and focus your resources on what is important.

      2.2.1 – Risk assessment tool

      30 - 90 Minutes

      1. Meet with the participants to configure the risk indicators in Phase 2 Vendor Risk Assessment Tool – Tab 1. Set parameters for your environment.
      2. Review the risk categories and determine which ones you will be measuring and monitoring.
      3. Review the risk indicators under each risk category and determine whether the indicator is acceptable as written, is acceptable with modifications, should be replaced, or should be deleted.
      4. Make the necessary changes to the risk indicators; these changes will cascade to each of the vendor tabs. Limit the number of risk indicators to no more than seven per risk category.
      5. Gain input and approval as needed from sponsors, stakeholders, and executives as required.

      Input

      • Scope
      • OIC Chart
      • Process Maps
      • Brainstorming

      Output

      • Configured Vendor Risk Assessment Tool

      Materials

      • Phase 2 Vendor Risk Assessment Tool – Tab 1. Set Parameters

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.3 – Scorecards and feedback

      Design a two-way feedback loop with your vendors

      A vendor management scorecard is a great tool for measuring, monitoring, and improving relationship alignment. In addition, it is perfect for improving communication between you and the vendor.

      Conceptually, a scorecard is similar to a school report card. At the end of a learning cycle, you receive feedback on how well you do in each of your classes. For vendor management, the scorecard is also used to provide periodic feedback, but there are some nuances and additional benefits and objectives when compared to a report card.

      Although scorecards can be used in a variety of ways, the focus here will be on vendor management scorecards – contract management, project management, and other types of scorecards will not be included in the materials covered in this Step 2.3 or in Step 3.4.

      This image contains a table with the score for objectives A-D. The scores are: A4, B3, C5, D4.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Anatomy

      The Info-Tech scorecard includes five areas:

      • Measurement categories. Measurement categories help organize the scorecard. Limit the number of measurement categories to three to five; this allows the parties to stay focused on what's important. Too many measurement categories make it difficult for the vendor to understand the expectations.
      • Criteria. The criteria describe what is being measured. Create criteria with sufficient detail to allow the reviewers to fully understand what is being measured and to evaluate it. Criteria can be objective or subjective. Use three to five criteria per measurement category.
      • Measurement category weights. Not all your measurement categories may be of equal importance to you; this area allows you to give greater weight to a measurement category when compiling the overall score.
      • Rating. Reviewers will be asked to assign a score to each criteria using a 1 to 5 scale.
      • Comments. A good scorecard will include a place for reviewers to provide additional information regarding the rating, or other items that are relevant to the scorecard.

      An overall score is calculated based on the rating for each criteria and the measurement category weights.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Goals and objectives

      Scorecards can be used for a variety of reasons. Some of the common ones are:

      • Improving vendor performance.
      • Conveying expectations to the vendor.
      • Identifying and recognizing top vendors.
      • Increasing alignment between the parties.
      • Improving communication with the vendor.
      • Comparing vendors across the same criteria.
      • Measuring items not included in contract metrics.
      • Identifying vendors for "strategic alliance" consideration.
      • Helping the organization achieve specific goals and objectives.

      Identifying and resolving issues before they impact performance or the relationship.

      Identifying your scorecard drivers first will help you craft a suitable scorecard.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Info-Tech recommends starting with simple scorecards to allow you and the vendors to acclimate to the new process and information. As you build your scorecards, keep in mind that internal personnel will be scoring the vendors and the vendors will be reviewing the scorecard. Make your scorecard easy for your personnel to fill out, and containing meaningful content to drive the vendor in the right direction. You can always make the scorecard more complex in the future.

      Our recommendation of five categories is provided below. Choose three to five of the categories that help you accomplish your scorecard goals and objectives:

      1. Timeliness – Responses, resolutions, fixes, submissions, completions, milestones, deliverables, invoices, etc.
      2. Cost – Total cost of ownership, value, price stability, price increases/decreases, pricing models, etc.
      3. Quality – Accuracy, completeness, mean time to failure, bugs, number of failures, etc.
      4. Personnel – Skilled, experienced, knowledgeable, certified, friendly, trustworthy, flexible, accommodating, etc.
      5. Risk – Adequate contractual protections, security breaches, lawsuits, finances, audit findings, etc.

      Some criteria may be applicable in more than one category. The categories above should cover at least 80% of the items that are important to your organization. The general criteria listed for each category is not an exhaustive list, but most things break down into time, money, quality, people, and risk issues.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Additional Considerations

      • Even a good rating system can be confusing. Make sure you provide some examples or a way for reviewers to discern the differences between a 1, 2, 3, 4, and 5. Don't assume your "rating key" will be intuitive.
      • When assigning weights, don't go lower than 10% for any measurement category. If the weight is too low, it won't be relevant enough to have an impact on the total score. If it doesn't "move the needle", don't include it.
      • Final sign-off on the scorecard template should occur outside the VMI. The heavy lifting can be done by the VMI to create it, but the scorecard is for the benefit of the organization overall, and those impacted by the vendors specifically. You may end up playing arbiter or referee, but the scorecard is not the exclusive property of the VMI. Try to reach consensus on your final template whenever possible.
      • You should notice improved ratings and total scores over time for your vendors. One explanation for this is the Pygmalion Effect: "The Pygmalion [E]ffect describes situations where someone's high expectations improves our behavior and therefore our performance in a given area. It suggests that we do better when more is expected of us."* Convey your expectations and let the vendors' competitive juices take over.
      • While creating your scorecard and materials to explain the process to internal personnel, identify those pieces that will help you explain it to your vendors during vendor orientation (see Steps 2.6 and 3.4). Leveraging pre-existing materials is a great shortcut.

      *Source: The Decision Lab, n.d.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Vendor Feedback

      After you've built your scorecard, turn your attention to the second half of the equation – feedback from the vendor. A communication loop cannot be successful without dialogue flowing both ways. While this can happen with just a scorecard, a mechanism specifically geared toward the vendor providing you with feedback improves communication, alignment, and satisfaction.

      You may be tempted to create a formal scorecard for the vendor to use; avoid that temptation until later in your maturity or development of the VMI. You'll be implementing a lot of new processes, deploying new tools and templates, and getting people to work together in new ways. Work on those things first.

      For now, implement an informal process for obtaining information from the vendor. Start by identifying information that you will find useful – information that will allow you to improve overall, to reduce waste or time, to improve processes, to identify gaps in skills. Incorporate these items into your business alignment meetings (see Steps 2.4 and 3.5). Create three to five good questions to ask the vendor and include these in the business alignment meeting agenda. The goal is to get meaningful feedback, and that starts with asking good questions.

      Keep it simple at first. When the time is right, you can build a more formal feedback form or scorecard. Don't be in a rush; as long as the informal method works, keep using it.

      2.3.1 – Scorecards and feedback

      30 – 60 Minutes

      1. Meet with the participants and brainstorm ideas for your scorecard measurement categories:
        1. What makes a vendor valuable to your organization?
        2. What differentiates a "good" vendor from a "bad" vendor?
        3. What items would you like to measure and provide feedback on to the vendor to improve performance, the relationship, risk, and other areas?
      2. Select three, but no more than five, of the following measure categories: timeliness, cost, quality, personnel, and risk.
      3. Within each measurement category, list two or three criteria that you want to measure and track for your vendors. Choose items that are as universal as possible rather than being applicable to one vendor or one vendor type.
      4. Assign a weight to each measurement category, ensuring that the total weight is 100% for all measurement categories.
      5. Document your results as you go in Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard.

      Input

      • Brainstorming

      Output

      • Configured Scorecard template

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      2.3.2 – Scorecards and feedback

      15 to 30 Minutes

      1. Meet with the participants and brainstorm ideas for feedback to seek from your vendors during your business alignment meetings. During the brainstorming, identify questions to ask the vendor about your organization that will:
        1. Help you improve the relationship.
        2. Help you improve your processes or performance.
        3. Help you improve ongoing communication.
        4. Help you evaluate your personnel.
      2. Identify the top five questions you want to include in your business alignment meeting agenda. (Note: you may need to refine the actual questions from the brainstorming activity before they are ready to include in your business alignment meeting agenda.)
      3. Document both your brainstorming activity and your final results in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback. The brainstorming questions can be used in the future as your VMI matures and your feedback transforms from informal to formal. The results will be used in Steps 2.4 and 3.5.

      Input

      • Brainstorming

      Output

      • Feedback questions to include with the business alignment meeting agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.4 – Business alignment meeting agenda

      Craft an agenda that meets the needs of the VMI

      A business alignment meeting (BAM) is a multi-faceted tool to ensure the customer and the vendor stay focused on what is important to the customer at a high level. BAMs are not traditional operational meetings where the parties get into the details of the contracts, deal with installation problems, address project management issues, or discuss specific cost overruns. The focus of the BAM is the scorecard (see Step 2.3), but other topics are discussed, and other purposes are served. For example:

      • You can use the BAM to develop the relationship with the vendor's leadership team so that if escalation is ever needed, your organization is more than just a name on a spreadsheet or customer list.
      • You can learn about innovations the vendor is working on (without the meeting turning into a sales call).
      • You can address high-level performance trends and request corrective action as needed.
      • You can clarify your expectations.
      • You can educate the vendor about your industry, culture, and organization.
      • You can learn more about the vendor.

      As you build your BAM Agenda, someone in your organization may say, "Oh, that's just a quarterly business review (QBR) or top-to-top meeting." In most instances, an existing QBRs or top-to-top meeting is not the same as a BAM. Using the term QBR or top-to-top meeting instead of BAM can lead to confusion internally. The VMI may say to the business unit, procurement, or another department, "We're going to start running some QBRs for our strategic vendors." The typical response is, "There's no need; we already run QBRs/top-to-top meetings with our important vendors." This may be accompanied by an invitation to join their meeting, where you may be an afterthought, have no influence, and get five minutes at the end to talk about your agenda items. Keep your BAM separate so that it meets your needs.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As previously noted, using the term BAM more accurately depicts the nature of the VMI meeting and prevents confusion internally with other meetings already occurring. In addition, hosting the BAM yourself rather than piggybacking onto another meeting ensures that the VMI's needs are met. The VMI will set and control the BAM agenda and determine the invite list for internal personnel and vendor personnel. As you may have figured out by now, having the right customer and vendor personnel attend will be essential.

      BAMs are conducted at the vendor level, not the contract level. As a result, the frequency of the BAMs will depend on the vendor's classification category (see Steps 2.1 and 3.1). General frequency guidelines are provided below, but they can be modified to meet your goals:

      • Commodity vendors – Not applicable
      • Operational vendors – Biannually or annually
      • Strategic vendors – Quarterly
      • Tactical vendors – Quarterly or biannually

      BAMs can help you achieve some additional benefits not previously mentioned:

      • Foster a collaborative relationship with the vendor.
      • Avoid erroneous assumptions by the parties.
      • Capture and provide a record of the relationship (and other items) over time.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As with any meeting, building the proper agenda will be one of the keys to an effective and efficient meeting. A high-level BAM agenda with sample topics is set out below:

      BAM Agenda

      • Opening remarks
        • Welcome and introductions
        • Review of previous minutes
      • Active discussion
        • Review of open issues
        • Scorecard and feedback
        • Current status of projects to ensure situational awareness by the vendor
        • Roadmap/strategy/future projects
        • Accomplishments
      • Closing remarks
        • Reinforce positives (good behavior, results, and performance, value added, and expectations exceeded)
        • Recap
      • Adjourn

      2.4.1 – Business alignment meeting agenda

      20 – 45 Minutes

      1. Meet with the participants and review the sample agenda in Phase 2 Tools and Templates Compendium – Tab 2.4 BAM Agenda.
      2. Using the sample agenda as inspiration and brainstorming activities as needed, create a BAM agenda tailored to your needs.
        1. Select the items from the sample agenda applicable to your situation.
        2. Add any items required based on your brainstorming.
        3. Add the feedback questions identified during Activity 2.3.2 and documented in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback.
      3. Gain input and approval from sponsors, stakeholders, and executives as required or appropriate.
      4. Document the final BAM agenda in Phase 2 Tools and Templates Compendium –Tab 2.4 BAM Agenda.

      Input

      • Brainstorming
      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Output

      • Configured BAM agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab2 .4 BAM Agenda

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.5 – Relationship alignment document

      Draft a document to convey important VMI information to your vendors

      Throughout this blueprint, alignment is mentioned directly (e.g. business alignment meetings [Steps 2.4 and 3.3]) or indirectly implied. Ensuring you and your vendors are on the same page, have clear and transparent communication, and understand each other's expectations is critical to fostering strong relationships. One component of gaining and maintaining alignment with your vendors is the Relationship Alignment Document (RAD). Depending upon the Scope of your VMI and what your organization already has in place, your RAD will fill in the gaps on various topics.

      Early in the VMI's maturation, the easiest approach is to develop a short document (1 one page) or a pamphlet (i.e. the classic trifold) describing the rules of engagement when doing business with your organization. The RAD can convey expectations, policies, guidelines, and other items. The scope of the document will depend on:

      1. What you believe is important for the vendors to understand.
      2. Any other similar information already provided to the vendors.

      The first step to drafting a RAD is to identify what information vendors need to know to stay on your good side. You may want vendors to know about your gift policy (e.g. employees may not accept vendor gifts above a nominal value, such as a pen or mousepad). Next, compare your list of what vendors need to know and determine if the content is covered in other vendor-facing documents such as a vendor code of conduct or your website's vendor portal. Lastly, create your RAD to bridge the gap between what you want and what is already in place. In some instances, you may want to include items from other documents to reemphasize them with the vendor community.

      Info-Tech Insight

      The RAD can be used with all vendors regardless of classification category. It can be sent directly to the vendors or given to them during vendor orientation (see Step 3.3)

      2.5.1 – Relationship alignment document

      1 to 4 Hours

      1. Meet with the participants and review the RAD sample and checklist in Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc.
      2. Determine:
        1. Whether you will create one RAD for all vendors or one RAD for strategic vendors and another RAD for tactical and operational vendors; whether you will create a RAD for commodity vendors.
        2. The concepts you want to include in your RAD(s).
        3. The format for your RAD(s) – traditional, pamphlet, or other.
        4. Whether signoff or acknowledgement will be required by the vendors.
      3. Draft your RAD(s) and work with other internal areas, such as Marketing to create a consistent brand for the RADS, and Legal to ensure consistent use and preservation of trademarks or other intellectual property rights and other legal issues.
      4. Review other vendor-facing documents (e.g. supplier code of conduct, onsite safety and security protocols) for consistencies between them and the RAD(s).
      5. Obtain signoff on the RAD(s) from stakeholders, sponsors, executives, Legal, Marketing, and others as needed.

      Input

      • Brainstorming
      • Vendor-facing documents, policies, and procedures

      Output

      • Completed Relationship Alignment Document(s)

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc

      Participants

      • VMI team
      • Marketing, as needed
      • Legal, as needed

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.6 – Vendor orientation

      Create a VMI awareness process to build bridges with your vendors

      Your organization is unique. It may have many similarities with other organizations, but your culture, risk tolerance, mission, vision, and goals, finances, employees, and "customers" (those that depend on you) make it different. The same is true of your VMI. It may have similar principles, objectives, and processes to other organizations' VMIs, but yours is still unique. As a result, your vendors may not fully understand your organization and what vendor management means to you.

      Vendor orientation is another means to helping you gain and maintain alignment with your important vendors, educate them on what is important to you, and provide closure when/if the relationship with the vendor ends. Vendor orientation is comprised of three components, each with a different function:

      • Orientation
      • Reorientation
      • Debrief

      Vendor orientation focuses on the vendor management pieces of the puzzle (e.g. the scorecard process) rather than the operational pieces (e.g. setting up a new vendor in the system to ensure invoices are processed smoothly).

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Reorientation

      • Reorientation is either identical or similar to orientation, depending upon the circumstances. Reorientation occurs for several reasons, and each reason will impact the nature and detail of the reorientation content. Reorientation occurs whenever:
      • There is a significant change in the vendor's products or services.
      • The vendor has been through a merger, acquisition, or divestiture.
      • A significant contract renewal/renegotiation has recently occurred.
      • Sufficient time has passed from orientation; commonly 2 to 3 years.
      • The vendor has been placed in a "performance improvement plan" or "relationship improvement plan" protocol.
      • Significant turnover has occurred within your organization (executives, key stakeholders, and/or VMI personnel).
      • Substantial turnover has occurred at the vendor at the executive or account management level.
      • The vendor has changed vendor classification categories after the most current classification.
      • As the name implies, the goal is to refamiliarize the vendor with your current VMI situation, governances, protocols, and expectations. The drivers for reorientation will help you determine the reorientation's scope, scale, and frequency.

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Debrief

      To continue the analogy from orientation, debrief is like an exit interview for an employee when their employment is terminated. In this case, debrief occurs when the vendor is no longer an active vendor with your organization - all contracts have terminated or expired, and no new business with the vendor is anticipated within the next three months.

      Similar to orientation and reorientation, debrief activities will be based on the vendor's classification category within the COST model. Strategic vendors don't go away very often; usually, they transition to operational or tactical vendors first. However, if a strategic vendor is no longer providing products or services to you, dig a little deeper into their experiences and allocate extra time for the debrief meeting.

      The debrief should provide you with feedback on the vendor's experience with your organization and their participation in your VMI. Additionally, it can provide closure for both parties since the relationship is ending. Be careful that the debrief does not turn into a finger-pointing meeting or therapy session for the vendor. It should be professional and productive; if it is going off the rails, terminate the meeting before more damage can occur.

      End the debrief on a high note if possible. Thank the vendor, highlight its key contributions, and single out any personnel who went above and beyond. You never know when you will be doing business with this vendor again – don't burn bridges!

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      As you create your vendor orientation materials, focus on the message you want to convey.

      • For orientation and reorientation:
        • What is important to you that vendors need to know?
        • What will help the vendors understand more about your organization and your VMI?
        • What and how are you different from other organizations overall, and in your "industry"?
        • What will help them understand your expectations?
        • What will help them be more successful?
        • What will help you build the relationship?
      • For debrief:
        • What information or feedback do you want to obtain?
        • What information or feedback to you want to give?

      The level of detail you provide strategic vendors during orientation and reorientation may be different from the information you provide tactical and operational vendors. Commodity vendors are not typically involved in the vendor orientation process. The orientation meetings can be conducted on a one-to-one basis for strategic vendors and a one-to-many basis for operational and tactical vendors; reorientation and debrief are best conducted on a one-to-one basis. Lastly, face-to-face or video meetings work best for vendor orientation; voice-only meetings, recorded videos, or distributing only written materials seldom hit their mark or achieve the desired results.

      Step 2.7 – Three-year roadmap

      Plot your path at a high level

      1. The VMI exists in many planes concurrently:
      2. It operates both tactically and strategically.

      It focuses on different timelines or horizons (e.g., the past, the present, and the future). Creating a three-year roadmap facilitates the VMI's ability to function effectively across these multiple landscapes.

      The VMI roadmap will be influenced by many factors. The work product from Phase 1 – Plan, input from executives, stakeholders, and internal clients, and the direction of the organization are great sources of information as you begin to build your roadmap.

      To start, identify what you would like to accomplish in year 1. This is arguably the easiest year to complete: budgets are set (or you have a good idea what the budget will look like), personnel decisions have been made, resources have been allocated, and other issues impacting the VMI are known with a higher degree of certainty than any other year. This does not mean things won't change during the first year of the VMI, but expectations are usually lower, and the short event horizon makes things more predictable during the year-1 ramp-up period.

      Years 2 and 3 are more tenuous, but the process is the same: identify what you would like to accomplish or roll out in each year. Typically, the VMI maintains the year-1 plan into subsequent years and adds to the scope or maturity. For example, you may start year 1 with BAMs and scorecards for three of your strategic vendors; during year 2, you may increase that to five vendors; and during year 3, you may increase that to nine vendors. Or, you may not conduct any market research during year 1, waiting to add it to your roadmap in year 2 or 3 as you mature.

      Breaking things down by year helps you identify what is important and the timing associated with your priorities. A conservative approach is recommended. It is easy to overcommit, but the results can be disastrous and painful.

      2.7.1 – Three-year roadmap

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate year 1 of your three-year roadmap with your existing fiscal year or reporting year. Year 1 may be shorter or longer than a calendar year.
      2. Review the VMI activities listed in Phase 2 Tools and Templates Compendium – Tab 2.7 Three-year roadmap. Use brainstorming and your prior work product from Phase 1 and Phase 2 to identify additional items for the roadmap and add them at the bottom of the spreadsheet.
      3. Starting with the first activity, determine when that activity will begin and put an X in the corresponding column; if the activity is not applicable, leave it blank or insert N/A.
      4. Go back to the top of the list and add information as needed.
        1. For any year-1 or year-2 activities, add an X in the corresponding columns if the activity will be expanded/continued in subsequent periods (e.g., if a Year 2 activity will continue in year 3, put an X in year 3 as well).
        2. Use the comments column to provide clarifying remarks or additional insights related to your plans or "X's". For example, "Scorecards begin in year 1 with three vendors and will roll out to five vendors in year 2 and nine vendors in year 3."
      5. Obtain signoff from stakeholders, sponsors, and executives as needed.

      Input

      • Phase 1 work product
      • Steps 2.1 – 2.6 work product
      • Brainstorming

      Output

      • High level three-year roadmap for the VMI

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.7 Three-Year Roadmap

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.8 – 90-day plan

      Pave your short-term path with a series of detailed quarterly plans

      Now that you have prepared a three-year roadmap, it's time to take the most significant elements from the first year and create action plans for each three-month period. Your first 90-day plan may be longer or shorter if you want to sync to your fiscal or calendar quarters. Aligning with your fiscal year can make it easier for tracking and reporting purposes; however, the more critical item is to make sure you have a rolling series of four 90-day plans to keep you focused on the important activities and tasks throughout the year.

      The 90-day plan is a simple project plan that will help you measure, monitor, and report your progress. Use the Info-Tech tool to help you track:

      Activities.

      • Tasks comprising each activity.
      • Who will be performing the tasks.
      • An estimate of the time required per person per task.
      • An estimate of the total time to achieve the activity.
      • A due date for the activity.
      • A priority of the activity.

      The first 90-day plan will have the greatest level of detail and should be as thorough as possible; the remaining three 90-day plans will each have less detail for now. As you approach the middle of the first 90-day plan, start adding details to the next 90-day plan; toward the end of the first quarter add a high-level 90-day plan to the end of the chain. Continue repeating this cycle each quarter and consult the three-year roadmap and the leadership team, as necessary.

      2.8.1 – 90-day plan

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate the first "90-day" plan with your existing fiscal year or reporting cycles. Your first plan may be shorter or longer than 90 days.
      2. Looking at the year-1 section of the three-year roadmap, identify the activities that will be started during the next 90 days.
      3. Using the Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan, enter the following information into the spreadsheet for each activity to be accomplished during the next 90 days:
        1. Activity description.
        2. Tasks required to complete the activity (be specific and descriptive).
        3. The people who will be performing each task.
        4. The estimated number of hours required to complete each task.
        5. The start date and due date for each task or the activity.
      4. Validate the tasks are a complete list for each activity and the people performing the tasks have adequate time to complete the tasks by the due date(s).
      5. Assign a priority to each Activity.

      Input

      • Three-Year Roadmap
      • Phase 1 work product
      • Steps 2.1 – 2.7 work product
      • Brainstorming

      Output

      • Detailed plan for the VMI for the next quarter or "90" days

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.9 – Quick wins

      Identify potential short-term successes to gain momentum and show value immediately

      As the final step in the timeline trilogy, you are ready to identify some quick wins for the VMI. Using the first 90-day plan and a brainstorming activity, create a list of things you can do in 15 to 30 days that add value to your initiative and build momentum.

      As you evaluate your list of potential candidates, look for things that:

      • Are achievable within the stated timeline.
      • Don't require a lot of effort.
      • Involve stopping a certain process, activity, or task; this is sometimes known as a "stop doing stupid stuff" approach.
      • Will reduce or eliminate inefficiencies; this is sometimes known as the war on waste.
      • Have a moderate to high impact or bolster the VMI's reputation.

      As you look for quick wins, you may find that everything you identify does not meet the criteria. That's okay; don't force the issue. Return your focus to the 90-day plan and three-year roadmap and update those documents if the brainstorming activity associated with Step 2.9 identified anything new.

      2.9.1 – Quick wins

      15 - 30 Minutes

      1. Meet with the participants and review the three-year roadmap and 90-day plan. Determine if any item on either document can be completed:
        1. Quickly (30 days or less).
        2. With minimal effort.
        3. To provide or show moderate to high levels of value or provide the VMI with momentum.
      2. Brainstorm to identify any other items that meet the criteria in step 1 above.
      3. Compile a comprehensive list of these items and select up to five to pursue.
      4. Document the list in the Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins.
      5. Manage the quick wins list and share the results with the VMI team and applicable stakeholders and executives.

      Input

      • Three-Year Roadmap
      • 90-Day Plan
      • Brainstorming

      Output

      • A list of activities that require low levels of effort to achieve moderate to high levels of value in a short period

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.10 – Reports

      Construct your reports to resonate with your audience

      Issuing reports is a critical piece of the VMI since the VMI is a conduit of information for the organization. It may be aggregating risk data from internal areas, conducting vendor research, compiling performance data, reviewing market intelligence, or obtaining relevant statistics, feedback, comments, facts, and figures from other sources. Holding onto this information minimizes the impact a VMI can have on the organization; however, the VMI's internal clients, stakeholders, and executives can drown in raw data and ignore it completely if it is not transformed into meaningful, easily-digested information.

      Before building a report, think about your intended audience:

      • What information are they looking for? What will help them understand the big picture?
      • What level of detail is appropriate, keeping in mind the audience may not be like-minded?
      • What items are universal to all the readers and what items are of interest to one or two readers?
      • How easy or hard will it be to collect the data? Who will be providing it, and how time consuming will it be?
      • How accurate, valid, and timely will the data be?
      • How frequently will each report need to be issued?

      Step 2.10 – Reports (cont'd)

      Construct your reports to resonate with your audience

      Use the following guidelines to create reports that will resonate with your audience:

      • Value information over data, but sometimes data does have a place in your report.
      • Use pictures, graphics, and other representations more than words, but words are often necessary in small, concise doses.
      • Segregate your report by user; for example, general information up top, CIO information below that on the right, CFO information to the left of CIO information, etc.
      • Send a draft report to the internal audience and seek feedback, keeping in mind you won't be able to cater to or please everyone.

      2.10.1 – Reports

      15 – 45 Minutes

      1. Meet with the participants and review the applicable work product from Phase 1 and Phase 2; identify qualitative and quantitative items the VMI measures, monitors, tracks, or aggregates.
      2. Determine which items will be reported and to whom (by category):
        1. Internally to personnel within the VMI.
        2. Internally to personnel outside the VMI.
        3. Externally to vendors.
      3. Within each category above, determine your intended audiences/recipients. For example, you may have a different list of recipients for a risk report than you do a scorecard summary report. This will help you identify the number of reports required.
      4. Create a draft structure for each report based on the audience and the information being conveyed. Determine the frequency of each report and person responsible for creating for each report.
      5. Document your final choices in Phase 2 Tools and Templates Compendium – Tab 2.10 Reports.

      Input

      • Brainstorming
      • Phase 1 work product
      • Steps 2.1 – 2.11 work product

      Output

      • A list of reports used by the VMI
      • For each report
        • The conceptual content
        • A list of who will receive or have access
        • A creation/distribution frequency

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.10 Reports

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Phase 3 - Run

      Implement your processes and leverage your tools and templates

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Beginning to operate the VMI. The main outcomes from this phase are guidance and the steps required to initiate your VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 3 – Run

      Implement your processes and leverage your tools and templates

      All the hard work invested in Phase 1 – Plan and Phase 2 – Build begins to pay off in Phase 3 – Run. It's time to stand up your VMI and ensure that the proper level of resources is devoted to your vendors and the VMI itself. There's more hard work ahead, but the foundational elements are in place. This doesn't mean there won't be adjustments and modifications along the way, but you are ready to use the tools and templates in the real world; you are ready to begin reaping the fruits of your labor.

      Phase 3 – Run guides you through the process of collecting data, monitoring trends, issuing reports, and conducting effective meetings to:

      • Manage risk better.
      • Improve vendor performance.
      • Improve vendor relationships.
      • Identify areas where the parties can improve.
      • Improve communication between the parties.
      • Increase the value proposition with your vendors.

      Step 3.1 – Classify vendors

      Begin classifying your top 25 vendors by spend

      Step 3.1 sets the table for many of the subsequent steps in Phase 3 – Run. The results of your classification process will determine which vendors go through the scorecarding process (Step 3.2); which vendors participate in BAMs (Step 3.3), and which vendors you will devote relationship-building resources to (Step 3.6).

      As you begin classifying your vendors, Info-Tech recommends using an iterative approach initially to validate the results from the classification model you configured in Step 2.1.

      1. Identify your top 25 vendors by spend.
      2. Run your top 10 vendors by spend through the classification model and review the results.
        1. If the results are what you expected and do not contain any significant surprises, go to 3. on the next page.
        2. If the results are not what you expected or do contain significant surprises, look at the configuration page of the tool (Tab 1) and adjust the weights or the spend categories slightly. Be cautious in your evaluation of the results before modifying the configuration page - some legitimate results are unexpected, or are surprises based on bias. If you modify the weighting, review the new results and repeat your evaluation. If you modify the spend categories, review the answers on the vendor tabs to ensure that the answers are still accurate; review the new results and repeat your evaluation.

      Step 3.1 – Classify vendors (cont'd)

      Review your results and adjust the classification tool as needed

      1. Run your top 11-through-25 vendors by spend through the classification model and review the results. Identify any unexpected results. Determine if further configuration makes sense and repeat the process outlined in 2.b., previous page, as necessary. If no further modifications are required, continue to 4., below.
      2. Share the preliminary results with the leadership team, executives, and stakeholders to obtain their approval or adjustments to the results.
        1. They may have questions and want to understand the process before approving the results.
        2. They may request that you move a vendor from one quadrant to another based on your organization's roadmap, the vendor's roadmap, or other information not available to you.
      3. Identify the vendors that will be part of the VMI at this stage – how many and which ones. Based on this number and the VMI's scope (Step 1.2), make sure you have the resources necessary to accommodate the number of vendors participating in the VMI. Proceed cautiously and gradually increase the number of vendors participating in the VMI.

      Step 3.1 – Classify vendors (cont'd)

      Finalize the results and update VMI tools and templates

      1. Update the vendor inventory tool (Step 1.7) to indicate the current classification status for the top 25 vendors by spend. Once your vendors have been classified, you can sort the vendor inventory tool by classification status to see all the vendors in that category at once.
      2. Review your three-year roadmap (Step 2.9) and 90-day plans (Step 2.6) to determine if any modifications are needed to the activities and timelines.

      Additional classification considerations:

      • You should only have a few vendors that fit in the strategic category. As a rough guideline, no more than 5% to 10% of your IT vendors should end up in the strategic category. If you have many vendors, even 5% may be too many. the classification model is an objective start to the classification process, but common sense must prevail over the "math" at the end of the day.
      • At this point, there is no need to go beyond the top 25 by spend. Most VMIs starting out can't handle more than three to five strategic vendors initially. Allow the VMI to run a pilot program with a small sample size, work out any bugs, make adjustments, and then ramp up the VMI's rollout in waves. Vendors can be added quarterly, biannually, or annually, depending upon the desired goals and available resources.

      Step 3.1 – Classify vendors (cont'd)

      Align your vendor strategy to your classification results

      As your VMI matures, additional vendors will be part of the VMI. Review the table below and incorporate the applicable strategies into your deployment of vendor management principles over time. Stay true to your mission, goals, and scope, and remember that not all your vendors are of equal importance.

      Operational

      Strategic
      • Focus on spend containment
      • Concentrate on lowering total cost of ownership
      • Invest moderately in cultivating the relationship
      • Conduct BAMs biannually or annually
      • Compile scorecards quarterly or biannually
      • Identify areas for performance and cost improvement
      • Focus on value, collaboration, and alignment
      • Review market intelligence for the vendor's industry
      • Invest significantly in cultivating the relationship
      • Initiate executive-to-executive relationships
      • Conduct BAMs quarterly
      • Compile scorecards quarterly
      • Understand how the vendors view your organization

      Commodity

      Tactical
      • Investigate vendor rationalization and consolidation
      • Negotiate for the best-possible price
      • Leverage competition during negotiations
      • Streamline the purchasing and payment process
      • Allocate minimal VMI resources
      • Assign the lowest priority for vendor management metrics
      • Conduct risk assessments biannually or annually
      • Cultivate a collaborative relationship based on future growth plans or potential with the vendor
      • Conduct BAMs quarterly or biannually
      • Compile scorecards quarterly
      • Identify areas of performance improvement
      • Leverage innovation and creative problem solving

      Step 3.1 – Classify vendors (cont'd)

      Be careful when using the word "partner" with your strategic and other vendors

      For decades, vendors have used the term "partner" to refer to the relationship they have with their clients and customers. This is often an emotional ploy used by the vendors to get the upper hand. To fully understand the terms "partner" and "partnership", let's evaluate them through two more objective, less cynical lenses.

      If you were to talk to your in-house or outside legal counsel, you may be told that partners share in profits and losses, and they have a fiduciary obligation to each other. Unless there is a joint venture between the parties, you are unlikely to have a partnership with a vendor from this perspective.

      What about a "business" partnership — one that doesn't involve sharing profits and losses? What would that look like? Here are some indicators of a business partnership (or preferably a strategic alliance):

      • Trust and transparent communication exist.
      • You have input into the vendor's roadmap for products and services.
      • The vendor is aligned with your desired outcomes and helps you achieve success.
      • You and the vendor are accountable for actions and inactions, with both parties being at risk.
      • There is parity in the peer-to-peer relationships between the organizations (e.g. C-Level to C-Level).
      • The vendor provides transparency in pricing models and proactively suggests ways for you to reduce costs.
      • You and the vendor work together to make each party better, providing constructive feedback on a regular basis.
      • The vendor provides innovative suggestions for you to improve your processes, performance, the bottom line, etc.
      • Negotiations are not one-sided; they are meaningful and productive, resulting in an equitable distribution of money and risk.

      Step 3.1 – Classify vendors (cont'd)

      Understand the implications and how to leverage the words "partner" and "partnership"

      By now you might be thinking, "What's all the fuss? Why does it matter?" At Info-Tech, we've seen firsthand how referring to the vendor as a partner can have the following impact:

      • Confidences are disclosed unnecessarily.
      • Negotiation opportunities and leverage are lost.
      • Vendors no longer have to earn the customer's business.
      • Vendor accountability is missing due to shared responsibilities.
      • Competent skilled vendor resources are assigned to other accounts.
      • Value erodes over time since contracts are renewed without being competitively sourced.
      • One-sided relationships are established, and false assurances are provided at the highest levels within the customer organization.

      Proceed with caution when using partner or partnership with your vendors. Understand how your organization benefits from using these terms and mitigate the negatives outlined above by raising awareness internally to ensure people understand the psychology behind the terms. Finally, use the term to your advantage when warranted by referring to the vendor as a partner when you want or need something that the vendor is reluctant to provide. Bottom line: be strategic in how you refer to vendors and know the risks.

      Step 3.2 – Compile scorecards

      Begin scoring your top vendors

      The scorecard process typically is owned and operated by the VMI, but the actual rating of the criteria within the measurement categories is conducted by those with day-to-day interactions with the vendors, those using or impacted by the services and products provided by the vendors, and those with the skills to research other information on the scorecard (e.g. risk). Chances are one person will not be able to complete an entire scorecard by themselves. As a result, the scorecard process is a team sport comprised of sub-teams where necessary.

      The VMI will compile the scores, calculate the final results, and aggregate all the comments into one scorecard. There are two common ways to approach this task:

      1. Send out the scorecard template to those who will be scoring the vendor and ask them to return it when completed, providing them with a due date a few days before you need it; you'll need time to compile, calculate, and aggregate.
      2. Invite those who will be scoring the vendor to a meeting and let the contributors use that time to score the vendors; make VMI team members available to answer questions and facilitate the process.

      Step 3.2 – Compile scorecards (cont'd)

      Gather input from stakeholders and others impacted by the vendors

      Since multiple people will be involved in the scorecarding process or have information to contribute, the VMI will have to work with the reviewers to ensure he right mix of data is provided. For example:

      • If you are tracking lawsuits filed by or against the vendor, one person from Legal may be able to provide that, but they may not be able to evaluate any other criteria on the scorecard.
      • If you are tracking salesperson competencies, multiple people from multiple areas may have valuable insights.
      • If you are tracking deliverable timeliness, several project managers may want to contribute across several projects.

      Where one person is contributing exclusively to limited criteria, make it easy for them to identify the criteria they are to evaluate. When multiple people from the same functional area will provide insights, they can contribute individually (and the VMI will average their responses) or they can respond collectively after reaching consensus as a group.

      After the VMI has compiled, calculated, and aggregated, share the results with executives, impacted stakeholders, and others who will be attending the BAM for that vendor. Depending upon the comments provided by internal personnel, you may need to create a sanitized version of the scorecard for the vendor.

      Make sure your process timeline has a buffer built in. You'll be sending the final scorecard to the vendor three to five days before the BAM, and you'll need some time to assemble the results. The scorecarding process can be perceived as a low-priority activity for people outside of the VMI, and other "priorities" will arise for them. Without a timeline buffer, the VMI may find itself behind schedule and unprepared, due to things beyond its control.

      Step 3.3 – Conduct business alignment meetings

      Determine which vendors will participate and how long the meetings will last

      At their core, BAMs aren't that different from any other meeting. The basics of running a meeting still apply, but there are a few nuances that apply to BAMs. Set out below are leading practices for conducing your BAMs; adapt them to meet your needs and suit your environment.

      Who

      Initially, BAMs are conducted with the strategic vendors in your pilot program. Over time you'll add vendors until all your strategic vendors are meeting with you quarterly. After that, roll out the BAMs to those tactical and operational vendors located close to the strategic quadrant in the classification model (Steps 2.1 and 3.1) and as VMI resources allow. It may take several years before you are holding regular BAMs with all your strategic, tactical, and operational vendors.

      Duration

      Keep the length of your meetings reasonable. The first few with a vendor may need to be 60 to 90 minutes long. After that, you should be able to trim them to 45 minutes to 60 minutes. The BAM does not have to fill the entire time. When you are done, you are done.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Identify who will be invited and send out invitations

      Invitations

      Set up a recurring meeting whenever possible. Changes will be inevitable but keeping the timeline regular works to your advantage. Also, the vendors included in your initial BAMs won't change for twelve months. For the first BAM with a vendor, provide adequate notice; four weeks is usually sufficient, but calendars will fill up quickly for the main attendees from the vendor. Treat the meeting as significant and make sure your invitation reflects this. A simple meeting request will often be rejected, treated as optional, or ignored completely by the vendor's leadership team (and maybe yours as well!).

      Invitees

      Internal invitees should include those with a vested interest in the vendor's performance and the relationship. Other functional areas may be invited based on need or interest. Be careful the attendee list doesn't get too big. Based on this, internal BAM attendees often include representatives from IT, Sourcing/Procurement, and the applicable business units. At times, Finance and Legal are included.

      From the vendor's side, strive to have decision makers and key leaders attend. The salesperson/account manager is often included for continuity, but a director or vice president of sales will have more insights and influence. The project manager is not needed at this meeting due to the nature of the meeting and its agenda; however, a director or vice president from the product or service delivery area is a good choice. Bottom line: get as high into the vendor's organization as possible whenever possible; look at the types of contracts you have with that vendor to provide guidance on the type of people to invite.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Prepare for the Meetings and Maintain Control

      Preparation

      Send the scorecard and agenda to the vendor five days prior to the BAM. The vendor should provide you with any information you require for the meeting five days prior, as well.

      Decide who will run the meeting. Some customers like to lead, and others let the vendor present. How you craft the agenda and your preferences will dictate who runs the show.

      Make sure the vendor knows what materials they should bring to the meeting or have access to. This will relate to the agenda and any specific requests listed under the discussion points. You don't want the vendor to be caught off guard and unable to discuss a matter of importance to you.

      Running the BAM

      Regardless of which party leads, make sure you manage the agenda to stay on topic. This is your meeting – not the vendor's, not IT's, not Procurement's or Sourcing's. Don't let anyone hijack it.

      Make sure someone is taking notes. If you are running this virtually, consider recording the meeting. Check with your legal department first for any concerns, notices, or prohibitions that may impact your recording the session.

      Remember, this is not a sales call, and it is not a social activity. Innovation discussions are allowed and encouraged, but that can quickly devolve into a sales presentation. People can be friendly toward one another, but the relationship building should not overwhelm the other purposes.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Follow these additional guidelines to maximize your meetings

      More leading practices

      • Remind everyone that the conversation may include items covered by various confidentiality provisions or agreements.
      • Publish the meeting minutes on a timely basis (within 48 hours).
      • Focus on the bigger picture by looking at trends over time; get into the details only when warranted.
      • Meet internally immediately beforehand to prepare – don't go in cold. Review the agenda and the roles and responsibilities for the attendees.
      • Physical meetings are better than virtual meetings, but travel constraints, budgets, and pandemics may not allow for physical meetings.

      Final thoughts

      • When performance or the relationship is suffering, be constructive in your feedback and conversations rather than trying to assign blame; lead with the carrot rather than the stick.
      • Look for collaborative solutions whenever possible and avoid referencing the contract if possible. Communicate your willingness to help resolve outstanding issues.
      • Use inclusive language and avoid language that puts the vendor on the defensive.
      • Make sure that your meetings are not focused exclusively on the negative, but don't paint a rosy picture where one doesn't exist.
      • A vendor that is doing well should be commended. This is an important part of relationship building.

      Step 3.4 – Work the 90-day plan

      Monitor your progress and share your results

      Having a 90-day plan is a good start, but assuming the tasks on the plan will be accomplished magically or without any oversight can lead to failure. While it won't take a lot of time to work the plan, following a few basic guidelines will help ensure the 90-day plan gets results and wasn't created in vain.

      1. Measure and track your progress against the initial/current 90-day plan at least weekly; with a short timeline, any delay can have a huge impact.
      2. If adjustments are needed to any elements of the plan, understand the cause and the impact of those adjustments before making them.
      3. Make adjustments ONLY when warranted. The temptation will be to push activities and tasks further out on the timeline (or to the next 90-day plan!) when there is any sort of hiccup along the way, especially when personnel outside the VMI are involved. Hold true to the timeline whenever possible; once you start slipping, it often becomes a habit.
      4. Report on progress every week and hold people accountable for their assignments and contributions.
      5. Take the 90-day plan seriously and treat it as you would any significant project. This is part of the VMI's branding and image.

      Step 3.5 – Manage the three-year roadmap

      Keep an eye on the future since it will feed the present

      The three-year roadmap is a great planning tool, but it is not 100% reliable. There are inherent flaws and challenges. Essentially, the roadmap is a set of three "crystal balls" attempting to tell you what the future holds. The vision for year 1 may be clear, but for each subsequent year, the crystal ball becomes foggier. In addition, the timeline is constantly changing; before you know it, tomorrow becomes today and year 2 becomes year 1.

      To help navigate through the roadmap and maximize its potential, follow these principles:

      • Manage each year of the roadmap differently.
        • Review the year-1 map each quarter to update your 90-day plans (See steps 2.10 and 3.4).
        • Review the year-2 map every six months to determine if any changes are necessary. As you cycle through this, your vantage point of year 2 will be 6 months or 12 months away from the beginning of year 2, and time moves quickly.
        • Review the year-3 map annually, and determine what needs to be added, changed, or deleted. Each time you review year 3, it will be a "new" year 3 that needs to be built.
      • Analyze the impact on the proposed modifications from two perspectives: 1) What is the impact if a requested modification is made? 2) What is the impact if a requested modification is not made?
      • Validate all modifications with leadership and stakeholders before updating the three-year roadmap to ensure internal alignment.

      Step 3.6 – Develop/improve vendor relationships

      Drive better performance through better relationships

      One of the key components of a VMI is relationship management. Good relationships with your vendors provide many benefits for both parties, but they don't happen by accident. Do not assume the relationship will be good or is good merely because your organization is buying products and services from a vendor.

      In many respects, the VMI should mirror a vendor's sales organization by establishing relationships at multiple levels within the vendor organizations, not just with the salesperson or account manager. Building and maintaining relationships is hard work, but the return on investment makes it worthwhile.

      Business relationships are comprised of many components, not all of which must be present to have a great relationship. However, there are some essential components. Whether you are trying to develop, improve, or maintain a relationship with a vendor, make sure you are conscious of the following:

      • Focusing your energies on strategic vendors first and then tactical and operational vendors.
      • Being transparent and honest in your communications.
      • Continuously building trust by being responsive and honoring commitments (timely).
      • Creating a collaborative environment and build upon common ground.
      • Thanking the vendor when appropriate.
      • Resolving disputes early, avoiding the "blame game", and being objective when there are disagreements.

      Phase 4 - Review

      Keep your VMI up to date and running smoothly

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Helping the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 4 – Review

      Keep your VMI up to date and running smoothly

      As the adage says, "The only thing constant in life is change." This is particularly true for your VMI. It will continue to mature, people inside and outside of the VMI will change, resources will expand or contract from year to year, your vendor base will change. As a result, your VMI needs the equivalent of a physical every year. In place of bloodwork, x-rays, and the other paces your physician may put you through, you'll assess compliance with your policies and procedures, incorporate leading practices, leverage lessons learned, maintain internal alignment, and update governances.

      Be thorough in your actions during this Phase to get the most out of it. It requires more than the equivalent of gauging a person's health by taking their temperature, measuring their blood pressure, and determining their body mass index. Keeping your VMI up-to-date and running smoothly takes hard work.

      Some of the items presented in this Phase require an annual review; others may require quarterly review or timely review (i.e. when things are top of mind and current). For example, collecting lessons learned should happen on a timely basis rather than annually, and classifying your vendors should occur annually rather than every time a new vendor enters the fold.

      Ultimately, the goal is to improve over time and stay aligned with other areas internally. This won't happen by accident. Being proactive in the review of your VMI further reinforces the nature of the VMI itself – proactive vendor management, not reactive!

      Step 4.1 – Incorporate leading practices

      Identify and evaluate what external VMIs are doing

      The VMI's world is constantly shifting and evolving. Some changes will take place slowly, while others will occur quickly. Think about how quickly the cloud environment has changed over the past five years versus the 15 years before that; or think about issues that have popped up and instantly altered the landscape (we're looking at you COVID and ransomware). As a result, the VMI needs to keep pace, and one of the best ways to do that is to incorporate leading practices.

      At a high level, a leading practice is a way of doing something that is better at producing a particular outcome or result or performing a task or activity than other ways of proceeding. The leading practice can be based on methodologies, tools, processes, procedures, and other items. Leading practices change periodically due to innovation, new ways of thinking, research, and other factors. Consequently, a leading practice is to identify and evaluate leading practices each year.

      Step 4.1 – Incorporate leading practices (cont'd)

      Update your VMI based on your research

      • A simple approach for incorporating leading practices into your regular review process is set out below:
      • Research:
        • What other VMIs in your industry are doing.
        • What other VMIs outside your industry are doing.
        • Vendor management in general.
      • Based on your results, list specific leading practices others are doing that would improve your VMI (be specific – e.g. other VMIs are incorporating risk into their classification process).
      • Evaluate your list to determine which of these potential changes fit or could be modified to fit your culture and environment.
      • Recommend the proposed changes to leadership (with a short business case or explanation/justification, as needed) and gain approval.

      Remember: Leading practices or best practices may not be what is best for you. In some instances, you will have to modify them to fit in your culture and environment; in other instances, you will elect not to implement them at all (in any form).

      Step 4.2 – Leverage lessons learned

      Tap into the collective wisdom and experience of your team members

      There are many ways to keep your VMI running smoothly, and creating a lessons learned library is a great complement to the other ways covered in this Phase 4 - Review. By tapping into the collective wisdom of the team and creating a safe feedback loop, the VMI gains the following benefits:

      • Documented institutional wisdom and knowledge normally found only in the team members' brains.
      • The ability for one team member to gain insights and avoid mistakes without having to duplicate the events leading to the insights or mistakes.
      • Improved methodologies, tools, processes, procedures, skills, and relationships.

      Many of the processes raised in this Phase can be performed annually, but a lessons learned library works best when the information is deposited in a timely manner. How you choose to set up your lessons learned process will depend on the tools you select and your culture. You may want to have regular input meetings to share the lessons as they are being deposited, or you may require team members to deposit lessons learned on a regular basis (within a week after they happen, monthly, or quarterly). Waiting too long can lead to vague or lost memories and specifics; timeliness of the deposits is a crucial element.

      Step 4.2 – Leverage lessons learned (cont'd)

      Create a library to share valuable information across the team

      Lessons learned are not confined to identifying mistakes or dissecting bad outcomes. You want to reinforce good outcomes, as well. When an opportunity for a lessons-learned deposit arises, identify the following basic elements:

      • A brief description of the situation and outcome.
      • What went well (if anything) and why did it go well?
      • What didn't go well (if anything) and why didn't it go well?
      • What would/could you do differently next time?
      • A synopsis of the lesson(s) learned.

      Info-Tech Insights

      The lessons learned library needs to be maintained. Irrelevant material needs to be culled periodically, and older or duplicate material may need to be archived.

      the lessons learned process should be blameless. The goal is to share insightful information, not to reward or punish people based on outcomes or results.

      Step 4.3 – Maintain internal alignment

      Review the plans of other internal areas to stay in sync

      Maintaining internal alignment is essential for the ongoing success of the VMI. Over time, it is easy to lose sight of the fact that the VMI does not operate in a vacuum; it is an integral component of a larger organization whose parts must work well together to function optimally. Focusing annually on the VMI's alignment within the enterprise helps reduce any breakdowns that could derail the organization.

      To ensure internal alignment:

      • Review the key components of the applicable materials from Phase 1 - Plan and Phase 2 - Build with the appropriate members of the leadership team (e.g. executives, sponsors, and stakeholders). Not every item from those Phases and Steps needs to be reviewed but err on the side of caution for the first set of alignment discussions, and be prepared to review each item. You can gauge the audience's interest on each topic and move quickly when necessary or dive deeper when needed. Identify potential changes required to maintain alignment.
      • Review the strategic plans (e.g. 1-, 3-, and 5- year plans) for various portions of the organization if you have access to them or gather insights if you don't have access.
        • If the VMI is under the IT umbrella, review the strategic plans for IT and its departments.
        • Review the strategic plans for the areas the VMI works with (e.g. Procurement, Business Units).
        • The organization itself.
      • Create and vet a list of modifications to the VMI and obtain approval.
      • Develop a plan for making the necessary changes.

      Summary of Accomplishment

      Problem solved

      Vendor management is a broad, often overwhelming, comprehensive spectrum that encompasses many disciplines. By now, you should have a great idea of what vendor management can or will look like in your organization. Focus on the basics first: Why does the VMI exist and what does it hope to achieve? What is it's scope? What are the strengths you can leverage, and what obstacles must you manage? How will the VMI work with others? From there, the spectrum of vendor management will begin to clarify and narrow.

      Leverage the tools and templates from this blueprint and adapt them to your needs. They will help you concentrate your energies in the right areas and on the right vendors to maximize the return on your organization's investment in the VMI of time, money, personnel, and other resources. You may have to lead by example internally and with your vendors at first, but they will eventually join you on your path if you stay true to your course.

      At the heart of a good VMI is the relationship component. Don't overlook its value in helping you achieve your vendor management goals. The VMI does not operate in a vacuum, and relationships (internal and external) will be critical.

      Lastly, seek continual improvement from the VMI and from your vendors. Both parties should be held accountable, and both parties should work together to get better. Be proactive in your efforts, and you, the VMI, and the organization will be rewarded.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Related Info-Tech Research

      Prepare for Negotiations More Effectively
      Don't leave negotiation preparations and outcomes to chance. Learn how to prepare for negotiations more effectively and improve your results.

      Understand Common IT Contract Provisions to Negotiate More Effectively
      Info-Tech's guidance and insights will help you navigate the complex process of contract review and identify the key details necessary to maximize the protections for your organization.

      Capture and Market the ROI of Your VMO
      Calculating the impact or value of a vendor management office (VMO) can be difficult without the right framework and tools. Let Info-Tech's tools and templates help you account for the contributions made by your VMO.

      Bibliography

      Slide 5 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 6 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 7 – Geller & Company. "World-Class Procurement — Increasing Profitability and Quality." Spend Matters. 2003. Web. Accessed 4 Mar. 2019.

      Slide 26 – Guth, Stephen. The Vendor Management Office: Unleashing the Power of Strategic Sourcing. Lulu.com, 2007. Print. Protiviti. Enterprise Risk Management. Web. 16 Feb. 2017.

      Slide 34 – "Why Do We Perform Better When Someone Has High Expectations of Us?" The Decision Lab. Accessed January 31, 2022.

      Slide 56 - Top 10 Tips for Creating Compelling Reports," October 11, 2019, Design Eclectic. Accessed March 29, 2022.

      Slide 56 – "Six Tips for Making a Quality Report Appealing and Easy To Skim," Agency for Health Research and Quality. Accessed March 29, 2022.

      Slide 56 –Tucker, Davis. Marketing Reporting: Tips to Create Compelling Reports, March 28, 2020, 60 Second Marketer. Accessed March 29, 2022.

      Deliver on Your Digital Product Vision

      • Buy Link or Shortcode: {j2store}351|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $133,318 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product organizations are under pressure to align the value they provide to the organization’s goals and overall company vision.
      • You need to clearly convey your direction, strategy, and tactics to gain alignment, support, and funding from your organization.
      • Products require continuous additions and enhancements to sustain their value. This requires detailed, yet simple communication to a variety of stakeholders.

      Our Advice

      Critical Insight

      • A vision without tactics is an unsubstantiated dream, while tactics without a vision is working without a purpose. You need to have a handle on both to achieve outcomes that are aligned with the needs of your organization.

      Impact and Result

      • Recognize that a vision is only as good as the data that backs it up – lay out a comprehensive backlog with quality built-in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Deliver on Your Digital Product Vision Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a digital product vision that you can stand behind. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a digital product vision

      Define a digital product vision that takes into account your objectives, business value, stakeholders, customers, and metrics.

      • Deliver on Your Digital Product Vision – Phase 1: Define a Digital Product Vision
      • Digital Product Strategy Template
      • Digital Product Strategy Supporting Workbook

      2. Build a better backlog

      Build a structure for your backlog that supports your product vision.

      • Deliver on Your Digital Product Vision – Phase 2: Build a Better Backlog
      • Product Backlog Item Prioritization Tool

      3. Build a product roadmap

      Define standards, ownership for your backlog to effectively communicate your strategy in support of your digital product vision.

      • Deliver on Your Digital Product Vision – Phase 3: Build a Product Roadmap
      • Product Roadmap Tool

      4. Release and deliver value

      Understand what to consider when planning your next release.

      • Deliver on Your Digital Product Vision – Phase 4: Release and Deliver Value

      5. Communicate the strategy – make it happen

      Build a plan for communicating and updating your strategy and where to go next.

      • Deliver on Your Digital Product Vision – Phase 5: Communicate the Strategy – Make It Happen!

      Infographic

      Workshop: Deliver on Your Digital Product Vision

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define a Digital Product Vision

      The Purpose

      Understand the elements of a good product vision and the pieces that back it up.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals people can align to.

      Activities

      1.1 Build out the elements of an effective digital product vision

      Outputs

      Completed product vision definition for a familiar product via the product canvas

      2 Build a Better Backlog

      The Purpose

      Define the standards and approaches to populate your product backlog that support your vision and overall strategy.

      Key Benefits Achieved

      A prioritized backlog with quality throughout that enables alignment and the operationalization of the overall strategy.

      Activities

      2.1 Introduction to key activities required to support your digital product vision

      2.2 What do we mean by a quality backlog?

      2.3 Explore backlog structure and standards

      2.4 Define backlog data, content, and quality filters

      Outputs

      Articulate the activities required to support the population and validation of your backlog

      An understanding of what it means to create a quality backlog (quality filters)

      Defining the structural elements of your backlog that need to be considered

      Defining the content of your backlog and quality standards

      3 Build a Product Roadmap

      The Purpose

      Define standards and procedures for creating and updating your roadmap.

      Key Benefits Achieved

      Enable your team to create a product roadmap to communicate your product strategy in support of your digital product vision.

      Activities

      3.1 Disambiguating backlogs vs. roadmaps

      3.2 Defining audiences, accountability, and roadmap communications

      3.3 Exploring roadmap visualizations

      Outputs

      Understand the difference between a roadmap and a backlog

      Roadmap standards and agreed-to accountability for roadmaps

      Understand the different ways to visualize your roadmap and select what is relevant to your context

      4 Define Your Release, Communication, and Next Steps

      The Purpose

      Build a release plan aligned to your roadmap.

      Key Benefits Achieved

      Understand what goes into defining a release via the release canvas.

      Considerations in communication of your strategy.

      Understand how to frame your vision to enable the communication of your strategy (via an executive summary).

      Activities

      4.1 Lay out your release plan

      4.2 How to introduce your product vision

      4.3 Communicate changes to your strategy

      4.4 Where do we get started?

      Outputs

      Release canvas

      An executive summary used to introduce other parties to your product vision

      Specifics on communication of the changes to your roadmap

      Your first step to getting started

      Assess the Viability of M365-O365 Security Add-Ons

      • Buy Link or Shortcode: {j2store}251|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting

      The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?

      Our Advice

      Critical Insight

      Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.

      Impact and Result

      Determine what is important to the business, and in what order of priority.

      Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.

      Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.

      Assess the Viability of M365/O365 Security Add-Ons Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to assess the viability of M365/O365 security add-ons. Review Info-Tech’s methodology and understand the four key steps to completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review your current state

      Examine what you are licensed for, what you are paying, what you need, and what your constraints are.

      • Microsoft 365/Office 365 Security Add-Ons Assessment Tool

      2. Assess your needs

      Determine what is “good enough” security and assess the needs of your organization.

      3. Select your path

      Decide what you will go with and start planning your next steps.

      [infographic]

      Maximize Your American Rescue Plan Funding

      • Buy Link or Shortcode: {j2store}74|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $661,499 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Will funding from COVID-19 stimulus opportunities mean more human and financial resources for IT?
      • Are there governance processes in place to successfully execute large projects?
      • What does a large, one-time influx of capital mean for keeping-the-lights-on budgets?
      • How will ARP funding impact your internal resourcing?
      • How can you ensure that IT is not left behind or an afterthought?

      Our Advice

      Critical Insight

      • Seek a one-to-many relationship between IT solutions and business problems. Use the central and overarching nature of IT to identify one solution to multiple business problems that span multiple programs, departments, and agencies.
      • Lack of specific guidance should not be a roadblock to starting. Be proactive by initiating the planning process so that you are ready to act as soon as details are clear.
      • IT involvement is the lynchpin for success. The pandemic has made this theme self-evident, and it needs to stay that way.
      • The fact that this funding is called COVID-19 relief might make you think you should only use it for recovery, but actually it should be viewed as an opportunity to help the organization thrive post-pandemic.

      Impact and Result

      • Shift IT’s role from service provider to innovator. Take ARP funding as a once-in-a-lifetime opportunity to create future enterprise capabilities by thinking big to consider IT innovation that can transform the business and its initiatives for the post-pandemic world.
      • Whether your organization is eligible for a direct or an indirect transfer, be sure you understand the requirements to apply for funding internally through a business case or externally through a grant application.
      • Gain the skills to execute the project with confidence by developing a comprehensive statement of work and managing your projects and vendor relationships effectively.

      Maximize Your American Rescue Plan Funding Research & Tools

      Use our research to help maximize ARP funding.

      Follow Info-Tech's approach to think big, align with the business, analyze budget and staffing, execute with confidence, and ensure compliance and reporting.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      [infographic]

      Workshop: Maximize Your American Rescue Plan Funding

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Think Big

      The Purpose

      Push the boundaries of conventional thinking and consider IT innovations that truly transform the business.

      Key Benefits Achieved

      A list of innovative IT opportunities that your IT department can use to transform the business

      Activities

      1.1 Discuss the objectives of ARP and what they mean to IT departments.

      1.2 Identify drivers for change.

      1.3 Review IT strategy.

      1.4 Augment your IT opportunities list.

      Outputs

      Revised IT vision

      List of innovative IT opportunities that can transform the business

      2 Align With the Business

      The Purpose

      Partner with the business to reprioritize projects and initiatives for the post-pandemic world.

      Key Benefits Achieved

      Assessment of the organization’s new and existing IT opportunities and alignment with business objectives

      Activities

      2.1 Assess alignment of current and new IT initiatives with business objectives.

      2.2 Review and update prioritization criteria for IT projects.

      Outputs

      Preliminary list of IT initiatives

      Revised project prioritization criteria

      3 Analyze IT Budget and Staffing

      The Purpose

      Identify IT budget deficits resulting from pandemic response and discover opportunities to support innovation through new staff and training.

      Key Benefits Achieved

      Prioritized shortlist of business-aligned IT initiative and projects

      Activities

      3.1 Classify initiatives into project categories using ROM estimates.

      3.2 Identify IT budget needs for projects and ongoing services.

      3.3 Identify needs for new staff and skills training.

      3.4 Determine business benefits of proposed projects.

      3.5 Prioritize your organization’s projects.

      Outputs

      Prioritized shortlist of business-aligned IT initiatives and projects

      4 Plan Next Steps

      The Purpose

      Tie IT expenditures to direct transfers or link them to ARP grant opportunities.

      Key Benefits Achieved

      Action plan to obtain ARP funding

      Activities

      4.1 Tie projects to direct transfers, where applicable.

      4.2 Align list of projects to indirect ARP grant opportunities.

      4.3 Develop an action plan to obtain ARP funding.

      4.4 Discuss required approach to project governance.

      Outputs

      Action plan to obtain ARP funding

      Project governance gaps

      Applications Priorities 2023

      • Buy Link or Shortcode: {j2store}186|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.
      • These tools and technologies must meet the top business goals of CXOs: ensure service continuity, improve customer experience, and make data-driven decisions.
      • While today’s business applications are good and well received, there is still room for improvement. The average business application satisfaction score among IT leadership was 72% (n=1582, CIO Business Vision).

      Our Advice

      Critical Insight

      • Applications are critical components in any business strategic plan. They can directly influence an organization’s internal and external brand and reputation, such as their uniqueness, competitiveness and innovativeness in the industry
      • Business leaders are continuously looking for innovative ways to better position their application portfolio to satisfy their goals and objectives, i.e., application priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfies the different needs very different customers, stakeholders, and users.
      • Unfortunately, expectations on your applications team have increased while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      Impact and Result

      Learn and explore the technology and practice initiatives in this report to determine which initiatives should be prioritized in your application strategy and align to your business organizational objectives:

      • Optimize the effectiveness of the IT organization.
      • Boost the productivity of the enterprise.
      • Enable business growth through technology.

      Applications Priorities 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Applications Priorities Report 2023 – A report that introduces and describes five opportunities to prioritize in your 2023 application strategy.

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the ambitions of your organization.

      • Applications Priorities 2023 Report

      Infographic

      Further reading

      Applications Priorities 2023

      Applications are the engine of the business: keep them relevant and modern

      What we are facing today is transforming the ways in which we work, live, and relate to one another. Applications teams and portfolios MUST change to meet this reality.

      Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.

      As organizations continue to strengthen business continuity, disaster recovery, and system resilience, activities to simply "keep the lights on" are not enough. Be pragmatic in the prioritization and planning of your applications initiatives, and use your technologies as a foundation for your growth.

      Your applications must meet the top business goals of your CXOs

      • Ensure service continuity
      • Improve customer experience
      • Make data-driven decisions
      • Maximize stakeholder value
      • Manage risk

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Select and align your applications priorities to your business goals and objectives

      Applications are critical components in any business strategic plan. They can directly influence an organization's internal and external brand and reputation, such as their:

      • Uniqueness, competitiveness, and innovativeness in the industry.
      • Ability to be dynamic, flexible, and responsive to changing expectations, business conditions, and technologies.

      Therefore, business leaders are continuously looking for innovative ways to better position their application portfolios to satisfy their goals and objectives, i.e. applications priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfy
      the different needs of very different customers, stakeholders, and users.

      Today's business applications are good but leave room for improvement

      72%
      Average business application satisfaction score among IT leadership in 1582 organizations.

      Source: CIO Business Vision, August 2021 to July 2022, N=190.

      Five Applications Priorities for 2023

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the Ambitions of your organization.

      this is an image of the Five Applications Priorities for which will be addressed in this blueprint.

      Strengthen your foundations to better support your applications priorities

      These key capabilities are imperative to the success of your applications strategy.

      KPI and Metrics

      Easily attainable and insightful measurements to gauge the progress of meeting strategic objectives and goals (KPIs), and the performance of individual teams, practices and processes (metrics).

      BUSINESS ALIGNMENT

      Gain an accurate understanding and interpretation of stakeholder, end-user, and customer expectations and priorities. These define the success of business products and services considering the priorities of individual business units and teams.

      EFFICIENT DELIVERY & SUPPORT PRACTICE

      Software delivery and support roles, processes, and tools are collaborative, well equipped and resourced, and optimized to meet changing stakeholder expectations.

      Data Management & Governance

      Ensuring data is continuously reliable and trustworthy. Data structure and integrations are defined, governed, and monitored.

      Product & Service Ownership

      Complete inventory and rationalization of the product and service portfolio, prioritized backlogs, roadmaps, and clear product and service ownership with good governance. This helps ensure this portfolio is optimized to meet its goals and objectives.

      Strengthen your foundations to better support your applications priorities (cont'd)

      These key capabilities are imperative to the success of your applications strategy.

      Organizational Change Management

      Manage the adoption of new and modified processes and technologies considering reputational, human, and operational concerns.

      IT Operational Management

      Continuous monitoring and upkeep of products and services to assure business continuity, and system reliability, robustness and disaster recovery.

      Architectural Framework

      A set of principles and standards that guides the consistent, sustainable and scalable growth of enterprise technologies. Changes to the architecture are made in collaboration with affected parties, such as security and infrastructure.

      Application Security

      The measures, controls, and tactics at the application layer that prevent vulnerabilities against external and internal threats and ensure compliance to industry and regulatory security frameworks and standards.

      There are many factors that can stand in your team's way

      Expectations on your applications team have increased, while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      1. Attracting and retaining talent
      2. Maximizing the return on technology
      3. Confidently shifting to digital
      4. Addressing competing priorities
      5. Fostering a collaborative culture
      6. Creating high-throughput teams

      CIOs agree that at least some improvement is needed across key IT activities

      A bar graph is depicted which shows the proportion of CIOs who believe that some, or significant improvement is necessary for the following categories: Measure IT Project Success; Align IT Budget; Align IT Project Approval Process; Measure Stakeholder Satisfaction With IT; Define and Align IT Strategy; Understand Business Goals

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Pressure Point 1:
      Attracting and Retaining Talent

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Lack of employee empowerment and few opportunities for learning and development.
      • Poor coworker and manager relationships.
      • Compensation and benefits are inadequate to maintain desired quality of life.
      • Unproductive work environment and conflicting balance of work and life.
      • Unsatisfactory employee experience, including lack of employee recognition
        and transparency of organizational change.

      While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing.
      62% of organizations reported increased working hours, while 80% reported an increase in flexibility.
      Source: McLean & Company, 2022; n=394.

      Be strategic in how you fill and train key IT skills and capabilities

      • Cybersecurity
      • Big Data/Analytics
      • Technical Architecture
      • DevOps
      • Development
      • Cloud

      Source: Harvey Nash Group, 2021; n=2120.

      Pressure Point 2:
      Maximizing the Return of Technology

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Inability to analyze, propose, justify, and communicate modernization solutions in language the stakeholders understand and in a way that shows they clearly support business priorities and KPIs and mitigate risks.
      • Little interest in documenting and rationalizing products and services through business-IT collaboration.
      • Lack of internal knowledge of the system and loss of vendor support.
      • Undefined, siloed product and service ownership and governance, preventing solutions from working together to collectively deliver more value.
      • Little stakeholder appetite to invest in activities beyond "keeping the lights on."

      Only 64% of applications were identified as effective by end users.
      Effective applications are identified as at least highly important and have high feature and usability satisfaction.
      Source: Application Portfolio Assessment, August 2021 to July 2022; N=315.

      "Regardless of the many definitions of modernization floating around, the one characteristic that we should be striving for is to ensure our applications do an outstanding job of supporting the users and the business in the most effective and efficient manner possible."
      Source: looksoftware.

      Pressure Point 3:
      Confidently Shifting to Digital

      "Going digital" reshapes how the business operates and drives value by optimizing how digital and traditional technologies and tactics work together. This shift often presents significant business and technical risks to business processes, enterprise data, applications, and systems which stakeholders and teams are not aware of or prepared to accommodate.

      Address the underlying challenges

      • Differing perspectives on digital can lead to disjointed transformation initiatives, oversold benefits, and a lack of synergy among digital technologies and processes.
      • Organizations have difficulty adapting to new technologies or rethinking current business models, processes, and ways of working because of the potential human, ethical, and reputational impacts and restrictions from legacy systems.
      • Management lacks a framework to evaluate how their organization manages and governs business value delivery.
      • IT is not equipped or resourced to address these rapidly changing business, customer, and technology needs.
      • The wrong tools and technologies were chosen to support the shift to digital.

      The shift to digital processes is starting, but slowly.
      62% of respondents indicated that 1-20% of their processes were digitized during the past year.
      Source: Tech Trends and Priorities 2023; N=500

      Resistance to change and time/budget constraints are top barriers preventing companies from modernizing their applications.
      Source: Konveyor, 2022; n=600.

      Pressure Point 4:
      Addressing Competing Priorities

      Enterprise products and services are not used, operated, or branded in isolation. The various parties involved may have competing priorities, which often leads to disagreements on when certain business and technology changes should be made and how resources, budget, and other assets should be allocated. Without a broader product vision, portfolio vision, and roadmap, the various dependent or related products and services will not deliver the same level of value as if they were managed collectively.

      Address the underlying challenges

      • Undefined product and service ownership and governance, including escalation procedures when consensus cannot be reached.
      • Lack of a unified and grounded set of value and quality definitions, guiding principles, prioritization standards, and broad visibility across portfolios, business capabilities, and business functions.
      • Distrust between business units and IT teams, which leads to the scaling of unmanaged applications and fragmented changes and projects.
      • Decisions are based on opinions and experiences without supporting data.

      55% of CXOs stated some improvement is necessary in activities to understand business goals.
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      CXOs are moderately satisfied with IT's performance as a business partner (average score of 69% among all CXOs). This sentiment is similarly felt among CIOs (64%).
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      Pressure Point 5:
      Fostering a Collaborative Culture

      Culture impacts business results, including bottom-line revenue and productivity metrics. Leaders appreciate the impact culture can have on applications initiatives and wish to leverage this. How culture translates from an abstract concept to something that is measurable and actionable is not straightforward. Executives need to clarify how the desired culture will help achieve their applications strategy and need to focus on the items that will have the most impact.

      Address the underlying challenges

      • Broad changes do not consider the unique subcultures, personalities, and behaviors of the various teams and individuals in the organization.
      • Leaders mandate cultural changes without alleviating critical barriers and do not embody the principles of the target state.
      • Bureaucracy and politics restrict changes and encourage the status quo.
      • Industry standards, technologies, and frameworks do not support or cannot be tailored to fit the desired culture.
      • Some teams are deliberately excluded from the scoping, planning, and execution of key product and service delivery and management activities.

      Agile does not solve team culture challenges.
      43% of organizations cited organizational culture as a significant barrier to adopting and scaling Agile practices.
      Source: Digital.ai, 2021.

      "Providing a great employee experience" as the second priority (after recruiting) highlights the emphasis organizations are placing on helping employees adjust after having been forced to change the way work gets done.
      Source: McLean & Company, 2022; N=826.

      Use your applications priorities to help address your pressure points

      Success can be dependent on your ability to navigate around or alleviate your pressure points. Design and market your applications priorities to bring attention to your pressure points and position them as key risk factors to their success.

      Applications Priorities
      Digital Experience (DX) Intelligent Automation Proactive Application Management Multisource Systems Digital Organization as a Platform
      Attracting and Retaining Talent Enhance the employee experience Be transparent and support role changes Shift focus from maintenance to innovation Enable business-managed applications Promote and showcase achievements and successes
      Maximizing the Return on Technology Modernize or extend the use of existing investments Automate applications across multiple business functions Improve the reliability of mission-critical applications Enhance the functionality of existing applications Increase visibility of underused applications
      Confidently Shifting to Digital Prioritize DX in your shift to digital Select the capabilities that will benefit most from automation Prepare applications to support digital tools and technologies Use best-of-breed tools to meet specific digital needs Bring all applications up to a common digital standard
      Addressing Competing Priorities Ground your digital vision, goals, and objectives Recognize and evaluate the architectural impact Rationalize the health of the applications Agree on a common philosophy on system composition Map to a holistic platform vision, goals, and objectives
      Fostering a Collaborative Culture Involve all perspectives in defining and delivering DX Involve the end user in the delivery and testing of the automated process Include the technical perspective in the viability of future applications plans Discuss how applications can work together better in an ecosystem Ensure the platform is configured to meet the individual needs of the users
      Creating High-Throughput Teams Establish delivery principles centered on DX Remove manual, error-prone, and mundane tasks Simplify applications to ease delivery and maintenance Alleviate delivery bottlenecks and issues Abstract the enterprise system to expedite delivery

      Digital Experience (DX)

      PRIORITY 1

      • Deliver Valuable User, Customer, Employee, and Brand Experiences

      Delivering valuable digital experiences requires the adoption of good management, governance, and operational practices to accommodate stakeholder, employee, customer, and end-user expectations of digital experiences (e.g. product management, automation, and iterative delivery). Technologies are chosen based on what best enables, delivers, and supports these expectations.

      Introduction

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      What is digital experience (DX)?

      Digital experience (DX) refers to the interaction between a user and an organization through digital products and services. Digital products and services are tools, systems, devices, and resources that gather, store, and process data; are continuously modernized; and embody eight key attributes that are described on the following slide. DX is broken down into four distinct perspectives*:

      • Customer Experience – The immediate perceptions of transactions and interactions experienced through a customer's journey in the use of the organization's digital
        products and services.
      • End-User Experience – Users' emotions, beliefs, and physical and psychological responses
        that occur before, during, or after interacting with a digital product or service.
      • Brand Experience – The broader perceptions, emotions, thoughts, feelings and actions the public associate with the organization's brand and reputation or its products and services. Brand experience evolves over time as customers continuously engage with the brand.
      • Employee Experience – The satisfaction and experience of an employee through their journey with the organization, from recruitment and hiring to their departure. How an employee embodies and promotes the organization brand and culture can affect their performance, trust, respect, and drive to innovate and optimize.
      Digital Products and Services
      Customer Experience Brand Experience Employee Experience End-User Experience

      Digital products and services have a common set of attributes

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      • Digital products and services must keep pace with changing business and end-user needs as well as tightly supporting your maturing business model with continuous modernization. Focus your continuous modernization on the key characteristics that drive business value.
      • Fit for purpose: Functionalities are designed and implemented for the purpose of satisfying the end user's needs and solving their problems.
      • User-centric: End users see the product as rewarding, engaging, intuitive, and emotionally satisfying. They want to come back to it.
      • Adaptable: The product can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components.
      • Accessible: The product is available on demand and on the end user's preferred interface.
        End users have a seamless experience across all devices.
      • Private and secured: The end user's activity and data are protected from unauthorized access.
      • Informative and insightful: The product delivers consumable, accurate, and trustworthy real-time data that is important to the end user.
      • Seamless application connection: The product facilitates direct interactions with one or more other products through an uninterrupted user experience.
      • Relationship and network building: The product enables and promotes the connection and interaction of people.

      The Business Value cycle of continuous modernization.

      Signals

      DX is critical for business growth and maturity, but the organization may not be ready

      A good DX has become a key differentiator that gives organizations an advantage over their competition and peers. Shifts in working environments; employee, customer, and stakeholder expectations; and the advancements in modern technologies have raised the importance of adopting and transitioning to digital processes and tools to stay relevant and responsive to changing business and technology conditions.

      Applications teams are critical to ensuring the successful delivery and operation of these digital processes and tools. However, they are often under-resourced and challenged to meet their DX goals.

      • 7% of both business and IT respondents think IT has the resources needed to keep up with digital transformation initiatives and meet deadlines (Cyara, 2021).
      • 43% of respondents said that the core barrier to digital transformation is a lack of skilled resources (Creatio, 2021).
      A circle graph is shown with 91% of the circle coloured in dark blue, with the number 91% in the centre.

      of organizations stated that at least 1% of processes were shifted from being manually completed to digitally completed in the last year. 29% of organizations stated at least 21% were shifted.

      Source: Tech Trends and Priorities 2023; N=500.

      A circle graph is shown with 98% of the circle coloured in dark blue, with the number 98% in the centre.

      of organizations recognized digital transformation is important for competitive advantage. 94% stated it is important to enhance customer experience, and 91% stated it will have a positive impact on revenue.

      Source: Cyara, 2021.

      Drivers

      Brand and reputation

      Customers are swayed by the innovations and advancements in digital technologies and expect your applications team to deliver and support them. Your leaders recognize the importance of these expectations and are integrating them into their business strategy and brand (how the organization presents itself to its customers, employees and the public). They hope that their actions will improve and shape the company's reputation (public perception of the company) as effective, customer-focused, and forward-thinking.

      Worker productivity

      As you evolve and adopt more complex tools and technology, your stakeholders will expect more from business units and IT teams. Unfortunately, teams employing manual processes and legacy systems will struggle to meet these expectations. Digital products and services promote the simplification of complex operations and applications and help the business and your teams better align operational practices with strategic goals and deliver valuable DX.

      Organization modernization

      Legacy processes, systems, and ways of working are no longer suitable for meeting the strategic digital objectives and DX needs stakeholders expect. They drive up operational costs without increased benefits, impede business growth and innovation, and consume scarce budgets that could be used for other priorities. Shifting to digital tools and technologies will bring these challenges to light and demonstrate how modernization is an integral part of DX success.

      Benefits & Risks

      Benefits

      • Flexibility & Satisfaction
      • Adoption
      • Reliability

      Employees and customers can choose how they want to access, modify, and consume digital products and services. They can be tailored to meet the specific functional needs, behaviors, and habits of the end user.

      The customer, end user, brand, and employee drive selection, design, and delivery of digital products and services. Even the most advanced technologies will fail if key roles do not see the value in their use.

      Digital products and services are delivered with technical quality built into them, ensuring they meet the industry, regulatory, and company standards throughout their lifespan and in various conditions.

      Risks

      • Legacy & Lore
      • Bureaucracy & Politics
      • Process Inefficiencies
      • No Quality Standards

      Some stakeholders may not be willing to change due to their familiarity and comfort of business practices.

      Competing and conflicting priorities of strategic products and services undermine digital transformation and broader modernization efforts.

      Business processes are often burdened by wasteful activities. Digital products and services are only as valuable as the processes they support.

      The performance and support of your digital products and services are hampered due to unmanageable technical debt because of a deliberate decision to bypass or omit quality good practices.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enhance the employee experience.

      Design the digital processes, tools, and technologies to meet the individual needs of the employee.

      Maximizing the Return on Technology

      Modernize or extend the use of existing investments.

      Drive higher adoption of applications and higher user value and productivity by implementing digital capabilities to the applications that will gain the most.

      Confidently Shifting to Digital

      Prioritize DX in your shift to digital. Include DX as part of your definition of success.

      Your products and services are not valuable if users, customers, and employees do not use them.

      Addressing Competing Priorities

      Ground your digital vision, goals, and objectives

      Establish clear ownership of DX and digital products and services with a cross-functional prioritization framework.

      Fostering a Collaborative Culture

      Involve all perspectives in defining and delivering DX.

      Maintain a committee of owners, stakeholders, and delivery teams to ensure consensus and discuss how to address cross-functional opportunities and risks.

      Creating High-Throughput Teams

      Establish delivery principles centered on DX.

      Enforce guiding principles to streamline and simplify DX delivery, such as plug-and-play architecture and quality standards.

      Recommendations

      Build a digital business strategy

      A digital business strategy clearly articulates the goals and ambitions of the business to adopt digital practices, tools, and technologies. This document:

      • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
      • Unifies digital possibilities with your customer experiences.
      • Establishes accountability with the executive leadership.
      • States the importance of cross-functional participation from senior management across the organization.

      Related Research:

      Learn, understand, and empathize with your users, employees, and customers

      • To create a better product, solution, or service, understanding those who use it, their needs, and their context is critical.
      • A great experience design practice can help you balance those goals so that they are in harmony with those of your users.
      • IT leaders must find ways to understand the needs of the business and develop empathy on a much deeper level. This empathy is the foundation for a thriving business partnership.

      Related Research:

      Recommendations

      Center product and service delivery decisions and activities on DX and quality

      User, customer, employee, and brand are integral perspectives on the software development lifecycle (SDLC) and the management and governance practices supporting digital products and services. It ensures quality standards and controls are consistently upheld while maintaining alignment with various needs and priorities. The goal is to come to a consensus on a universal definition and approach to embed quality and DX-thinking throughout the delivery process.

      Related Research:

      Instill collaborative delivery practices

      Today's rapidly scaling and increasingly complex digital products and services create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality. This pressure is further compounded by the competing priorities of individual stakeholders and the nuances among different personas of digital products and services.

      A collaborative delivery practice sets the activities, channels, and relationships needed to deliver a valuable and quality product or service with cross-functional awareness, accountability, and agreement.

      Related Research:

      Recommendations

      Continuously monitor and modernize your digital products and services

      Today's modern digital products and services are tomorrow's shelfware. They gradually lose their value, and the supporting technologies will become obsolete. Modernization is a continuous need.

      Data-driven insights help decision makers decide which products and services to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Enhancements focusing on critical business capabilities strengthen the case for investment and build trust with all stakeholders.

      Related Research:

      CASE STUDY
      Mastercard in Asia

      Focus on the customer journey

      Chief Marketing Officer M.V. Rajamannar (Raja) wanted to change Mastercard's iconic "Priceless" ad campaign (with the slogan "There are some things money can't buy. For everything else there's Mastercard."). The main reasons were that the campaign relied on one-way communication and targeted end customers, even though Mastercard doesn't issue cards directly to customers; partner banks do. To drive the change in campaign, Raja and his team created a digital engine that leveraged digital and social media. Digital engine is a seven-step process based on insights gleaned from data and real-time optimization.

      1. Emotional spark: Using data to understand customers' passion points, Mastercard builds videos and creatives to ignite an emotional spark and give customers a reason to engage. For example, weeks before New Year's Eve, Mastercard produced a video with Hugh Jackman to encourage customers to submit a story about someone who deeply mattered to them. The authors of the winning story would be flown to reunite with those both distant and dear.
      2. Engagement: Mastercard targets the right audience with a spark video through social media to encourage customers to share their stories.
      3. Offers: To help its partner banks and merchants in driving their business, the company identifies the best offers to match consumers' interests. In the above campaign, Mastercard's Asia-Pacific team found that Singapore was a favorite destination for Indian customers, so they partnered with Singapore's Resorts World Sentosa with an attractive offer.
      4. Real-time optimization: Mastercard optimizes, in real time, a portfolio of several offers through A/B testing and other analysis.
      5. Amplification: Real-time testing provides confidence to Mastercard about the potential success of these offers and encourages its bank and merchant partners to co-market and co-fund these campaigns.
      6. Network effects: A few weeks after consumers submitted their stories about distant loved ones, Mastercard selected winners, produced videos of them surprising their friends and families, and used these videos in social media to encourage sharing.
      7. Incremental transactions: These programs translate into incremental business for banks who issue cards, for merchants where customers spend money, and for Mastercard, which gets a portion of every transaction.

      Source: Harvard Business Review Press

      CASE STUDY
      Mastercard in Asia (cont'd)

      Focus on the customer journey

      1. Emotional Spark
        Drives genuine personal stories
      2. Engagement
        Through Facebook
        and social media
      3. Offers
        From merchants
        and Mastercard assets
      4. Optimization
        Real-time testing of offers and themes
      5. Amplification
        Paid and organic programmatic buying
      6. Network Effects
        Sharing and
        mass engagement
      7. Incremental Transactions
        Win-win for all parties

      CASE STUDY
      Mastercard in Asia (cont'd)

      The Mastercard case highlights important lessons on how to engage customers:

      • Have a broad message. Brands need to connect with consumers over how they live and spend their time. Organizations need to go beyond the brand or product message to become more relevant to consumers' lives. Dove soap was very successful in creating a conversation among consumers with its "Real Beauty" campaign, which focused not on the brand or even the product category, but on how women and society view beauty.
      • Shift from storytelling to story making. To break through the clutter of advertising, companies need to move from storytelling to story making. A broader message that is emotionally engaging allows for a two-way conversation.
      • Be consistent with the brand value. The brand needs to stand for something, and the content should be relevant to and consistent with the image of the brand. Pepsi announced an award of $20 million in grants to individuals, businesses, and nonprofits that promote a new idea to make a positive impact on community. A large number of submissions were about social causes that had nothing to do with Pepsi, and some, like reducing obesity, were in conflict with Pepsi's product.
      • Create engagement that drives business. Too much entertainment in ads may engage customers but detract from both communicating the brand message and increasing sales. Simply measuring the number of video views provides only a partial picture of a program's success.

      Intelligent Automation

      PRIORITY 2

      • Extend Automation Practices with AI and ML

      AI and ML are rapidly growing. Organizations see the value of machines intelligently executing high-performance and dynamic tasks such as driving cars and detecting fraud. Senior leaders see AI and ML as opportunities to extend their business process automation investments.

      Introduction

      Intelligent automation is the next step in your business process automation journey

      What is intelligent automation (IA)?

      Intelligent automation (IA) is the combination of traditional automation technologies, such as business process management (BPM) and robotic process automation (RPA), with AI and ML. The goal is to further streamline and scale decision making across various business processes by:

      • Removing human interactions.
      • Addressing decisions that involve complex variables.
      • Automatically adapting processes to changing conditions.
      • Bridging disparate automation technologies into an integrated end-to-end value delivery pipeline.

      "For IA to succeed, employees must be involved in the transformation journey so they can experience firsthand the benefits of a new way of working and creating business value," (Cognizant).

      What is the difference between IA and hyperautomation?

      "Hyperautomation is the act of automating everything in an organization that can be automated. The intent is to streamline processes across an organization using intelligent automation, which includes AI, RPA and other technologies, to run without human intervention. … Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible" (IBM, 2021).

      Note that hyperautomation often enables IA, but teams solely adopting IA do not need to abide to its automation-first principles.

      IA is a combination of various tools and technologies

      What tools and technologies are involved in IA?

      • Artificial intelligence (AI) & Machine Learning (ML) – AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. AI is making its own decisions without human intervention. Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned. AI is a combination of technologies and can include machine learning.
      • Intelligent Business Process Management System (iBPMS) – Combination of BPM tools with AI and other intelligence capabilities.
      • Robotic Process Automation (RPA) – Robots leveraging an application's UI rather than programmatic access. Automate rules-based, repetitive tasks performed by human workers with AI/ML.
      • Process Mining & Discovery – Process mining involves reading system event logs and application transactions and applying algorithmic analysis to automatically identify and map inferred business processes. Process discovery involves unintrusive virtual agents that sit on a user's desktop and record and monitor how they interact with applications to perform tasks and processes. Algorithms are then used to map and analyze the processes.
      • Intelligent Document Processing – The conversion of physical or unstructured documents into a structured, digital format that can be used in automation solutions. Optical character recognition (OCR) and natural language processing (NPL) are common tools used to enable this capability.
      • Advanced Analytics – The gathering, synthesis, transformation, and delivery of insightful and consumable information that supports data-driven decision making. Data is queried from various disparate sources and can take on a variety of structured and unstructured formats.

      The cycle of IA technologies

      Signals

      Process automation is an executive priority and requires organizational buy-in

      Stakeholders recognize the importance of business process automation and AI and are looking for ways to deliver more value using these technologies.

      • 90% of executives stated automating business workflows post-COVID-19 will ensure business continuity (Kofax, 2022).
      • 88% of executives stated they need to fast-track their end-to-end digital transformation (Kofax, 2022).

      However, the advertised benefits to vendors of enabling these desired automations may not be easily achievable because of:

      • Manual and undocumented business processes.
      • Fragmented and inaccessible systems.
      • Poor data quality, insights, and security.
      • The lack of process governance and management practice.
      A circle graph is shown with 49% of the circle coloured in dark blue, with the number 49% in the centre.

      of CXOs stated staff sufficiency, skill and engagement issues as a minor IT pain point compared to 51% of CIOs stated this issue as a major pain point.

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      A circle graph is shown with 36% of the circle coloured in dark blue, with the number 36% in the centre.

      of organizations have already invested in AI or machine learning.

      Source: Tech Trends and Priorities 2023; N=662

      Drivers

      Quality & throughput

      Products and services delivered through an undefined and manual process risk the creation of preventable and catchable defects, security flaws and holes, missing information, and other quality issues. IA solutions consistently reinforce quality standards the same way across all products and services while tailoring outputs to meet an individual's specific needs. Success is dependent on the accurate interpretation and application of quality standards and the user's expectations.

      Worker productivity

      IA removes the tedious, routine, and mundane tasks that distract and restrict employees from doing more valuable, impactful, and cognitively focused activities. Practical insights can also be generated through IA tools that help employees make data-driven decisions, evaluate problems from different angles, and improve the usability and value of the products and services they produce.

      Good process management practices

      Automation magnifies existing inefficiencies of a business process management practice, such as unclear and outdated process documentation and incorrect assumptions. IA reinforces the importance of good business process optimization practices, such as removing waste and inefficiencies in a thoughtful way, choosing the most appropriate automation solution, and configuring the process in the right way to maximize the solution's value.

      Benefits & Risks

      Benefits

      • Documentation
      • Hands-Off
      • Reusability

      All business processes must be mapped and documented to be automated, including business rules, data entities, applications, and control points.

      IA can be configured and orchestrated to automatically execute when certain business, process, or technology conditions are met in an unattended or attended manner.

      IA is applicable in use cases beyond traditional business processes, such as automated testing, quality control, audit, website scraping, integration platform, customer service, and data transfer.

      Risks

      • Data Quality & Bias
      • Ethics
      • Recovery & Security
      • Management

      The accuracy and relevance of the decisions IA makes are dependent on the overall quality of the data
      used to train it.

      Some decisions can have significant reputational, moral, and ethical impacts if made incorrectly.
      The question is whether it is appropriate for a non-human to make that decision.

      IA is composed of technologies that can be compromised or fail. Without the proper monitoring, controls,
      and recovery protocols, impacted IA will generate significant business and IT costs and can potentially harm customers, employees, and the organization.

      Low- and no-code capabilities ease and streamline IA development, which makes it susceptible to becoming unmanageable. Discipline is needed to ensure IA owners are aware of the size and health of the IA portfolio.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Be transparent and support role changes.

      Plan to address the human sentiment with automation (e.g. job security) and the transition of the role to other activities.

      Maximizing the Return on Technology

      Automate applications across multiple business functions.

      Recognize the value opportunities of improving and automating the integration of cross-functional processes.

      Confidently Shifting to Digital

      Maximize the learning of automation fit.

      Select the right capabilities to demonstrate the value of IA while using lessons learned to establish the appropriate support.

      Addressing Competing Priorities

      Recognize automation opportunities with capability maps.

      Use a capability diagram to align strategic IA objectives with tactical and technical IA initiatives.

      Fostering a Collaborative Culture

      Involve the user in the delivery process.

      Maximize automation adoption by ensuring the user finds value in its use before deployment.

      Creating High-Throughput Teams

      Remove manual, error-prone, and mundane tasks.

      Look for ways to improve team throughput by removing wasteful activities, enforcing quality, and automating away tasks driving down productivity.

      Recommendations

      Build your business process automation playbook and practice

      Formalize your business process automation practice with a good toolkit and a repeatable set of tactics and techniques.

      • Clarify the problem being solved with IA.
      • Optimate your processes. Apply good practices to first optimize (opti-) and then automate (-mate) key business processes.
      • Deliver minimum viable automations (MVAs). Maximize the learning of automation solutions and business operational changes through small, strategic automation use cases.

      Related Research:

      Explore the various IA tooling options

      Each IA tool will address a different problem. Which tool to choose is dependent on a variety of factors, such as functional suitability, technology suitability, delivery and support capabilities, alignment to strategic business goals, and the value it is designed to deliver.

      Related Research:

      Recommendations

      Introduce AI and ML thoughtfully and with a plan

      Despite the many promises of AI, organizations are struggling to fully realize its potential. The reasons boil down to a lack of understanding of when these technologies should and shouldn't be used, as well as a fear of the unknown. The plan to adopt AI should include:

      • Understanding of what AI really means in practice.
      • Identifying specific applications of AI in the business.
      • Understanding the type of AI applicable for the situation.

      Related Research:

      Mitigate AI and ML bias

      Biases can be introduced into an IA system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used and what assumptions were made. In most cases, AI and ML bias is a is a social, political, and business problem.

      While bias may not be intentional nor completely prevented or eliminated, early detection, good design, and other proactive preventative steps can be taken to minimize its scope and impact.

      Related Research:

      CASE STUDY
      University Hospitals

      Challenge

      University Hospitals Cleveland (UH) faces the same challenge that every major hospital confronts regarding how to deliver increasingly complex, high-quality healthcare to a diverse population efficiently and economically. In 2017, UH embarked on a value improvement program aiming to improve quality while saving $400 million over a five-year period.

      In emergency department (ED) and inpatient units, leaders found anticipating demand difficult, and consequently units were often over-staffed when demand was low and under-staffed when demand was high. Hospital leaders were uncertain about how to reallocate resources based on capacity needs.

      Solution

      UH turned to Hospital IQ's Census Solution to proactively manage capacity, staff, and flow in the ED and inpatient areas.

      By applying AI, ML, and external data (e.g. weather forecasts) to the hospital's own data (including EMR data and hospital policies), the solution helped UH make two-day census forecasts that managers used to determine whether to open or close in-patient beds and, when necessary, divert low-acuity patients to other hospitals in the system to handle predicted patient volume.

      Source: University Hospitals

      Results

      ED boarding hours have declined by 10% and the hospital has seen a 50% reduction in the number of patients who leave the hospital without
      being seen.

      UH also predicts in advance patients ready for discharge and identifies roadblocks, reducing the average length of stay by 15%. UH is able to better manage staff, reducing overtime and cutting overall labor costs.

      The hospital has also increased staff satisfaction and improved patient safety by closing specific units on weekends and increasing the number of rooms that can be sterilized.

      Proactive Application Management

      PRIORITY 3

      • Strengthen Applications to Prevent and Minimize the Impact of Future Issues

      Application management is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on application management when it becomes a problem. The lack of governance and practice accountability leaves this practice in a chaotic state: politics take over, resources are not strategically allocated, and customers are frustrated. As a result, application management is often reactive and brushed aside for new development.

      Introduction

      What is application management?

      Application management ensures valuable software is successfully delivered and is maintained for continuous and sustainable business operations. It contains a repeatable set of activities needed to rationalize and roadmap products and services while balancing priorities of new features and maintenance tasks.

      Unfortunately, application management is commonly perceived as a practice that solely addresses issues, updates, and incidents. However, application management teams are also tasked with new value delivery that was not part of the original release.

      Why is an effective application maintenance (reactive) practice not good enough?

      Application maintenance is the "process of modifying a software system or its components after delivery to correct faults, improve performance or other attributes, or adapt to a changed environment or business process," (IEEE, 1998). While it is critical to quickly fix defects and issues when they occur, reactively addressing them is more expensive than discovering them early and employing the practices to prevent them.

      Even if an application is working well, its framework, architecture, and technology may not be compatible with the possible upcoming changes stakeholders and vendors may want to undertake. Applications may not be problems now, but they soon can be.

      What motivates proactive application changes?

      This image shows the motivations for proactive application changes, sorted by external and internal sources.

      Proactive application management must be disciplined and applied strategically

      Proactive application management practices are critical to maintaining business continuity. They require continuous review and modification so that applications are resilient and can address current and future scenarios. Depending on the value of the application, its criticality to business operations, and its susceptibility to technology change, a more proactive management approach may be warranted. Stakeholders can then better manage resources and budget according to the needs of specific products.

      Reactive Management

      Run-to-Failure

      Fix and enhance the product when it breaks. In most cases, a plan is in place ahead of a failure, so that the problem can be addressed without significant disruption and costs.

      Preventive

      Regularly inspect and optimize the product to reduce the likelihood that it will fail in the future. Schedule inspections based on a specific timeframe or usage threshold.

      Predictive

      Predict failures before they happen using performance and usage data to alert teams when products are at risk of failure according to specified conditions.

      Reliability and Risk Based

      Analyze all possible failure scenarios for each component of the product and create tailored delivery plans to improve the stability, reliability, and value of each product.

      Proactive Management

      Signals

      Applications begin to degrade as soon as they are used

      Today's applications are tomorrow's shelfware. They gradually lose their value, stability, robustness, and compatibility with other enterprise technologies. The longer these applications are left unattended or simply "keeping the lights on," the more risks they will bring to the application portfolio, such as:

      • Discovery and exploitation of security flaws and gaps.
      • Increasing the lock-in to specific vendor technologies.
      • Inconsistent application performance across various workloads.

      These impacts are further compounded by the continuous work done on a system burdened with technical debt. Technical debt describes the result of avoided costs that, over time, cause ongoing business impacts. Left unaddressed, technical debt can become an existential threat that risks your organization's ability to effectively compete and serve its customers. Unfortunately, most organizations have a significant, growing, unmanageable technical debt portfolio.

      A circle graph is shown with 60% of the circle coloured in dark green, with the number 60% in the centre.

      of respondents stated they saw an increase in perceived change in technical debt during the past three years. A quarter of respondents indicated that it stayed the same.

      Source: McKinsey Digital, 2020.

      US
      $4.35
      Million

      is the average cost of a data breach in 2022. This figure represents a 2.6% increase from last year. The average cost has climbed 12.7% since 2020.

      Source: IBM, 2022; N=537.

      Drivers

      Technical debt

      Historical decisions to meet business demands by deferring key quality, architectural, or other software delivery activities often lead to inefficient and incomplete code, fragile legacy systems, broken processes, data quality problems, and the other contributors to technical debt. The impacts for this challenge is further heightened if organizations are not actively refactoring and updating their applications behind the scenes. Proactive application management is intended to raise awareness of application fragility and prioritize comprehensive refactoring activities alongside new feature development.

      Long-term application value

      Applications are designed, developed, and tested against a specific set of parameters which may become less relevant over time as the business matures, technology changes, and user behaviors and interactions shift. Continuous monitoring of the application system, regular stakeholder and user feedback, and active technology trend research and vendor engagement will reveal tasks to prepare an application for future value opportunities or stability and resilience concerns.

      Security and resiliency

      Innovative approaches to infiltrating and compromising applications are becoming prevailing stakeholder concerns. The loopholes and gaps in existing application security protocols, control points, and end-user training are exploited to gain the trust of unsuspecting users and systems. Proactive application management enforces continuous security reviews to determine whether applications are at risk. The goal is to prevent an incident from happening by hardening or complementing measures already in place.

      Benefits & Risks

      Benefits

      • Consistent Performance
      • Robustness
      • Operating Costs

      Users expect the same level of performance and experience from their applications in all scenarios. A proactive approach ensures the configurations meet the current needs of users and dependent technologies.

      Proactively managed applications are resilient to the latest security concerns and upcoming trends.

      Continuous improvements to the underlying architecture, codebase, and interfaces can minimize the cost to maintain and operate the application, such as the transition to a loosely coupled architecture and the standardization of REST APIs.

      Risks

      • Stakeholder Buy-In
      • Delayed Feature Releases
      • Team Capacity
      • Discipline

      Stakeholders may not see the association between the application's value and its technical quality.

      Updates and enhancements are system changes much like any application function. Depending
      on the priority of these changes, new functions may be pushed off to a future release cycle.

      Applications teams require dedicated capacity to proactively manage applications, but they are often occupied meeting other stakeholder demands.

      Overinvesting in certain application management activities (such as refactoring, re-architecture, and redesign) can create more challenges. Knowing how much to do is important.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Shift focus from maintenance to innovation.

      Work on the most pressing and critical requests first, with a prioritization framework reflecting cross-functional priorities.

      Maximizing the Return on Technology

      Improve the reliability of mission-critical applications.

      Regularly verify and validate applications are up to date with the latest patches and fixes and comply with industry good practices and regulations.

      Confidently Shifting to Digital

      Prepare applications to support digital tools and technologies.

      Focus enhancements on the key components required to support the integration, performance, and security needs of digital.

      Addressing Competing Priorities

      Rationalize the health of the applications.

      Use data-driven, compelling insights to justify the direction and prioritization of applications initiatives.

      Fostering a Collaborative Culture

      Include the technical perspective in the viability of future applications plans.

      Demonstrate how poorly maintained applications impede the team's ability to deliver confidently and quickly.

      Creating High-Throughput Teams

      Simplify applications to ease delivery and maintenance.

      Refactor away application complexities and align the application portfolio to a common quality standard to reduce the effort to deliver and test changes.

      Recommendations

      Reinforce your application maintenance practice

      Maintenance is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on maintenance when it becomes a problem.

      • Justify the necessity of streamlined maintenance.
      • Strengthen triaging and prioritization practices.
      • Establish and govern a repeatable process.

      Ensure product issues, incidents, defects, and change requests are promptly handled to minimize business and IT risks.

      Related Research:

      Build an application management practice

      Apply the appropriate management approaches to maintain business continuity and balance priorities and commitments among maintenance and new development requests.

      This practice serves as the foundation for creating exceptional customer experience by emphasizing cross-functional accountability for business value and product and service quality.

      Related Research:

      Recommendations

      Manage your technical debt

      Technical debt is a type of technical risk, which in turn is business risk. It's up to the business to decide whether to accept technical debt or mitigate it. Create a compelling argument to stakeholders as to why technical debt should be a business priority rather than just an IT one.

      • Define and identify your technical debt.
      • Conduct a business impact analysis.
      • Identify opportunities to better manage technical debt.

      Related Research:

      Gauge your application's health

      Application portfolio management is nearly impossible to perform without an honest and thorough understanding of your portfolio's alignment to business capabilities, business value, total cost of ownership, end-user reception and satisfaction, and technical health.

      Develop data-driven insights to help you decide which applications to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Related Research:

      Recommendations

      Adopt site reliability engineering (SRE) and DevOps practices

      Site reliability engineering (SRE) is an operational model for running online services more reliably by a team of dedicated reliability-focused engineers.

      DevOps, an operational philosophy promoting development and operations collaboration, can bring the critical insights to make application management practices through SRE more valuable.

      Related Research:

      CASE STUDY
      Government Agency

      Goal

      A government agency needed to implement a disciplined, sustainable application delivery, planning, and management process so their product delivery team could deliver features and changes faster with higher quality. The goal was to ensure change requests, fixes, and new features would relieve requester frustrations, reduce regression issues, and allow work to be done on agreeable and achievable priorities organization-wide. The new model needed to increase practice efficiency and visibility in order to better manage technical debt and focus on value-added solutions.

      Solution

      This organization recognized a number of key challenges that were inhibiting its team's ability to meet its goals:

      • The product backlog had become too long and unmanageable.
      • Delivery resources were not properly allocated to meet the skills and capabilities needed to successfully meet commitments.
      • Quality wasn't defined or enforced, which generated mounting technical debt.
      • There was a lack of clear metrics and defined roles and responsibilities.
      • The business had unrealistic and unachievable expectations.

      Source: Info-Tech Workshop

      Key practices implemented

      • Schedule quarterly business satisfaction surveys.
      • Structure and facilitate regular change advisory board meetings.
      • Define and enforce product quality standards.
      • Standardize a streamlined process with defined roles.
      • Configure management tools to better handle requests.

      Multisource Systems

      PRIORITY 4

      • Manage an Ecosystem Composed of In-House and Outsourced Systems

      Various market and company factors are motivating a review on resource and system sourcing strategies. The right sourcing model provides key skills, resources, and capabilities to meet innovation, time to market, financial, and quality goals of the business. However, organizations struggle with how best to support sourcing partners and to allocate the right number of resources to maximize success.

      Introduction

      A multisource system is an ecosystem of integrated internally and externally developed applications, data, and infrastructure. These technologies can be custom developed, heavily configured vendor solutions, or they may be commercial off-the-shelf (COTS) solutions. These systems can also be developed, supported, and managed by internal staff, in partnership with outsourced contractors, or be completely outsourced. Multisource systems should be configured and orchestrated in a way that maximizes the delivery of specific value drivers for the targeted audience.

      Successfully selecting a sourcing approach is not a simple RFP exercise to choose the lowest cost

      Defining and executing a sourcing approach can be a significant investment and risk because of the close interactions third-party services and partners will have with internal staff, enterprise applications and business capabilities. A careful selection and design is necessary.

      The selection of a sourcing partner is not simple. It involves the detailed inspection and examination of different candidates and matching their fit to the broader vision of the multisource system. In cases where control is critical, technology stack and resource sourcing consolidation to a few vendors and partners is preferred. In other cases, where worker productivity and system flexibility are highly prioritized, a plug-and-play best-of-breed approach is preferred.

      Typical factors involved in sourcing decisions.

      Sourcing needs to be driven by your department and system strategies

      How does the department want to be perceived?

      The image that your applications department and teams want to reflect is frequently dependent on the applications they deliver and support, the resources they are composed of, and the capabilities they provide.

      Therefore, choosing the right sourcing approach should be driven by understanding who the teams are and want to be (e.g. internal builder, an integrator, a plug-in player), what they can or want to do (e.g. custom-develop or implement), and what they can deliver or support (e.g. cloud or on-premises) must be established.

      What value is the system delivering?

      Well-integrated systems are the lifeblood of your organization. They provide the capabilities needed to deliver value to customers, employees, and stakeholders. However, underlying system components may not be sourced under a unified strategy, which can lead to duplicate vendor services and high operational costs.

      The right sourcing approach ensures your partners address key capabilities in your system's delivery and support, and that they are positioned to maximize the value of critical and high-impact components.

      Signals

      Business demand may outpace what vendors can support or offer

      Outsourcing and shifting to a buy-over-build applications strategy are common quick fixes to dealing with capacity and skills gaps. However, these quick fixes often become long-term implementations that are not accounted for in the sourcing selection process. Current application and resource sourcing strategies must be reviewed to ensure that vendor arrangements meet the current and upcoming demands and challenges of the business, customers, and enterprise technologies, such as:

      • Pressure from stakeholders to lower operating costs while maintaining or increasing quality and throughput.
      • Technology lock-in that addresses short-term needs but inhibits long-term growth and maturity.
      • Team capacity and talent acquisition not meeting the needs of the business.
      A circle graph is shown with 42% of the circle coloured in dark brown, with the number 42% in the centre.

      of respondents stated they outsourced software development fully or partly in the last 12 months (2021).

      Source: Coding Sans, 2021.

      A circle graph is shown with 65% of the circle coloured in dark brown, with the number 65% in the centre.

      of respondents stated they were at least somewhat satisfied with the result of outsourcing software development.

      Source: Coding Sans, 2021.

      Drivers

      Business-managed applications

      Employees are implementing and building applications without consulting, notifying, or heeding the advice of IT. IT is often ill-equipped and under-resourced to fight against shadow IT. Instead, organizations are shifting the mindset of "fight shadow IT" to "embrace business-managed applications," using good practices in managing multisource systems. A multisource approach strikes the right balance between user empowerment and centralized control with the solutions and architecture that can best enable it.

      Unique problems to solve

      Point solutions offer features to address unique use cases in uncommon technology environments. However, point solutions are often deployed in siloes with limited integration or overlap with other solutions. The right sourcing strategy accommodates the fragmented nature of point solutions into a broader enterprise system strategy, whether that be:

      • Multisource best of breed – integrate various technologies that provide subsets of the features needed for supporting business functions.
      • Multisource custom – integrate systems built in-house with technologies developed by external organizations.
      • Vendor add-ons and integrations – enhance an existing vendor's offering by using their system add-ons as upgrades, new add-ons, or integrations.

      Vendor services

      Some vendor services in a multisource environment may be redundant, conflicting, or incompatible. Given that multisource systems are regularly changing, it is difficult to identify what services are affected, what would be needed to fill the gap of the removed solution, or which redundant services should be removed.

      A multisource approach motivates the continuous rationalization of your vendor services and partners to determine the right mixture of in-house and outsourced resources, capabilities, and technologies.

      Benefits & Risks

      Benefits

      • Business-Focused Solution
      • Flexibility
      • Cost Optimization

      Multisource systems can be designed to support an employee's ability to select the tools they want and need.

      The environment is architected in a loosely coupled approach to allow applications to be easily added, removed, and modified with minimized impact to other integrated applications.

      Rather than investing in large solutions upfront, applications are adopted when they are needed and are removed when little value is gained. Disciplined application portfolio management is necessary to see the full value of this benefit.

      Risks

      • Manageable Sprawl
      • Policy Adherence
      • Integration & Compatibility

      The increased number and diversity of applications in multisource system environments can overwhelm system managers who do not have an effective application portfolio management practice.

      Fragmented application implementations risk inconsistent adherence to security and other quality policies, especially in situations where IT is not involved.

      Application integration can quickly become tangled, untraceable, and unmanageable because of varying team and vendor preferences for specific integration technologies and techniques.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enable business-managed applications.

      Create the integrations to enable the easy connection of desired tools to enterprise systems with the appropriate guardrails.

      Maximizing the Return on Technology

      Enhance the functionality of existing applications.

      Complement current application capability gaps with data, features, and services from third-party applications.

      Confidently Shifting to Digital

      Use best-of-breed tools to meet specific digital needs.

      Select the best tools to meet the unique and special functional needs of the digital vision.

      Addressing Competing Priorities

      Agree on a common philosophy on system composition.

      Establish an owner of the multisource system to guide how the system should mature as the organization grows.

      Fostering a Collaborative Culture

      Discuss how applications can work together better in an ecosystem.

      Build committees to discuss how applications can better support each other and drive more value.

      Creating High-Throughput Teams

      Alleviate delivery bottlenecks and issues.

      Leverage third-party sources to fill skills and capacity gaps until a long-term solution can be implemented.

      Recommendations

      Define the goals of your applications department and product vision

      Understanding the applications team's purpose and image is critical in determining how the system they are managing and the skills and capacities they need should be sourced.

      Changing and conflicting definitions of value and goals make it challenging to convey an agreeable strategy of the multisource system. An achievable vision and practical tactics ensure all parties in the multisource system are moving in the same direction.

      Related Research:

      Develop a sourcing partner strategy

      Almost half of all sourcing initiatives do not realize projected savings, and the biggest reason is the choice of partner (Zhang et al., 2018). Making the wrong choice means inferior products, higher costs and the loss of both clients and reputation.

      Choosing the right sourcing partner involves understanding current skills and capacities, finding the right matching partner based on a desired profile, and managing a good working relationship that sees short-term gains and supports long-term goals.

      Related Research:

      Recommendations

      Strengthen enterprise integration practices

      Integration strategies that are focused solely on technology are likely to complicate rather than simplify because little consideration is given on how other systems and processes will be impacted. Enterprise integration needs to bring together business process, applications, and data – in that order.

      Kick-start the process of identifying opportunities for improvement by mapping how applications and data are coordinated to support business activities.

      Related Research:

      Manage your solution architecture and application portfolio

      Haphazardly implementing and integrating applications can generate significant security, performance, and data risks. A well-thought-through solution architecture is essential in laying the architecture quality principles and roadmap on how the multisource system can grow and evolve in a sustainable and maintainable way.

      Good application portfolio management complements the solution architecture as it indicates when low-value and unused applications should be removed to reduce system complexity.

      Related Research:

      Recommendations

      Embrace business-managed applications

      Multisource systems bring a unique opportunity to support the business and end users' desire to implement and develop their own applications. However, traditional models of managing applications may not accommodate the specific IT governance and management practices required to operate business-managed applications:

      • A collaborative and trusting business-IT relationship is key.
      • The role of IT must be reimagined.
      • Business must be accountable for its decisions.

      Related Research:

      CASE STUDY
      Cognizant

      Situation

      • Strives to be primarily an industry-aligned organization that delivers multiple service lines in multiple geographies.
      • Cognizant seeks to carefully consider client culture to create a one-team environment.
      • Value proposition is a consultative approach bringing thought leadership and mutually adding value to the relationship vs. the more traditional order-taker development partner.
      • Wants to share in solution development to facilitate shared successes. Geographic alignment drives knowledge of the client and their challenges, not just about time zone and supportability.
      • Offers one of the largest offshore capabilities in the world, supported by local and nearshore resources to drive local knowledge.
      • Today's clients don't typically want a black box, they are sophisticated and want transparency around the process and solution, to have a partner.
      • Clients do want to know where the work is being delivered from, how it's being done.

      Source: interview with Jay MacIsaac, Cognizant.

      Approach

      • Best relationship comes where teams operate as one.
      • Clients are seeking value, not a development black box.
      • Clients want to have a partner they can engage with, not just an order taker.
      • Want to build a one-team culture with shared goals and deliver business value.
      • Seek a partner that will add to their thinking not echo it.

      Results

      • Cognizant is continuing to deliver double-digit growth and continues to strive for top quartile performance.
      • Growth in the client base has seen the company grow to over 340,000 associates worldwide.

      Digital Organization as a Platform

      PRIORITY 5

      • Create a Common Digital Interface to Access All Products and Services

      A digital platform enables organizations to leverage a flexible, reliable, and scalable foundation to create a valuable DX, ease delivery and management efforts, maximize existing investments, and motivate the broader shift to digital. This approach provides a standard to architect, integrate, configure, and modernize the applications that compose the platform.

      Introduction

      What is digital organization as a platform (DOaaP)?

      Digital organization as a platform (DOaaP) is a collection of integrated digital services, products, applications, and infrastructure that is used as a vehicle to meet and exceed an organization's digital strategies. It often serves as an accessible "place for exchanges of information, goods, or services to occur between producers and consumers as well as the community that interacts
      with said platform" (Watts, 2020).

      DOaaP involves a strategy that paves the way for organizations to be digital. It helps organizations use their assets (e.g. data, processes, products, services) in the most effective ways and become more open to cooperative delivery, usage, and management. This opens opportunities for innovation and cross-department collaborations.

      How is DOaaP described?

      1. Open and Collaborative
        • Open organization: open data, open APIs, transparency, and user participation.
        • Collaboration, co-creation, crowdsourcing, and innovation
      2. Accessible and Connected
        • Digital inclusion
        • Channel ubiquity
        • Integrity and interoperability
        • Digital marketplace
      3. Digital and Programmable
        • Digital identity
        • Policies and processes as code
        • Digital products and services
        • Enabling digital platforms

      Digital organizations follow a common set of principles and practices

      Customer-centricity

      Digital organizations are driven by customer focus, meeting and exceeding customer expectations. It must design its services with a "digital first" principle, providing access through every expected channel and including seamless integration and interoperability with various departments, partners, and third-party services. It also means creating trust in its ability to provide secure services and to keep privacy and ethics as core pillars.

      Leadership, management, and strategies

      Digital leadership brings customer focus to the enterprise and its structures and organizes efficient networks and ecosystems. Accomplishing this means getting rid of silos and a siloed mentality and aligning on a digital vision to design policies and services that are efficient, cost-effective, and provide maximum benefit to the user. Asset sharing, co-creation, and being open and transparent become cornerstones of a digital organization.

      Infrastructure

      Providing digital services across demographics and geographies requires infrastructure, and that in turn requires long-term vision, smart investments, and partnerships with various source partners to create the necessary foundational infrastructure upon which to build digital services.

      Digitization and automation

      Automation and digitization of processes and services, as well as creating digital-first products, lead to increased efficiency and reach of the organization across demographics and geographies. Moreover, by taking a digital-first approach, digital organizations future-proof their services and demonstrate their commitment to stakeholders.

      Enabling platforms

      DOaaP embraces open standards, designing and developing organizational platforms and ecosystems with a cloud-first mindset and sound API strategies. Developer experience must also take center stage, providing the necessary tools and embracing Agile and DevOps practices and culture become prerequisites. Cybersecurity and privacy are central to the digital platform; hence they must be part of the design and development principles and practices.

      Signals

      The business expects support for digital products and services

      Digital transformation continues to be a high-priority initiative for many organizations, and they see DOaaP as an effective way to enable and exploit digital capabilities. However, DOaaP unleashes new strategies, opportunities, and challenges that are elusive or unfamiliar to business leaders. Barriers in current business operating models may limit DOaaP success, such as:

      • Department and functional silos
      • Dispersed, fragmented and poor-quality data
      • Ill-equipped and under-skilled resources to support DOaaP adoption
      • System fragmentation and redundancies
      • Inconsistent integration tactics employed across systems
      • Disjointed user experience leading to low engagement and adoption

      DOaaP is not just about technology, and it is not the sole responsibility of either IT or business. It is the collective responsibility of the organization.

      A circle graph is shown with 47% of the circle coloured in dark blue, with the number 47% in the centre.

      of organizations plan to unlock new value through digital. 50% of organizations are planning major transformation over the next three years.

      Source: Nash Squared, 2022.

      A circle graph is shown with 70% of the circle coloured in dark blue, with the number 70% in the centre.

      of organizations are undertaking digital expansion projects focused on scaling their business with technology. This result is up from 57% in 2021.

      Source: F5 Inc, 2022.

      Drivers

      Unified brand and experience

      Users should have the same experience and perception of a brand no matter what product or service they use. However, fragmented implementation of digital technologies and inconsistent application of design standards makes it difficult to meet this expectation. DOaaP embraces a single design and DX standard for all digital products and services, which creates a consistent perception of your organization's brand and reputation irrespective of what products and services are being used and how they are accessed.

      Accessibility

      Rapid advancement of end-user devices and changes to end-user behaviors and expectations often outpace an organization's ability to meet these requirements. This can make certain organization products and services difficult to find, access and leverage. DOaaP creates an intuitive and searchable interface to all products and services and enables the strategic combination of technologies to collectively deliver more value.

      Justification for modernization

      Many opportunities are left off the table when legacy systems are abstracted away rather than modernized. However, legacy systems may not justify the investment in modernization because their individual value is outweighed by the cost. A DOaaP initiative motivates decision makers to look at the entire system (i.e. modern and legacy) to determine which components need to be brought up to a minimum digital state. The conversation has now changed. Legacy systems should be modernized to increase the collective benefit of the entire DOaaP.

      Benefits & Risks

      Benefits

      • Look & Feel
      • User Adoption
      • Shift to Digital

      A single, modern, customizable interface enables a common look and feel no matter what and how the platform is being accessed.

      Organizations can motivate and encourage the adoption and use of all products and services through the platform and increase the adoption of underused technologies.

      DOaaP motivates and supports the modernization of data, processes, and systems to meet the goals and objectives outlined in the broader digital transformation strategy.

      Risks

      • Data Quality
      • System Stability
      • Ability to Modernize
      • Business Model Change

      Each system may have a different definition of commonly used entities (e.g. customer), which can cause data quality issues when information is shared among these systems.

      DOaaP can stress the performance of underlying systems due to the limitations of some systems to handle increased traffic.

      Some systems cannot be modernized due to cost constraints, business continuity risks, vendor lock-in, legacy and lore, or other blocking factors.

      Limited appetite to make the necessary changes to business operations in order to maximize the value of DOaaP technologies.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent Promote and showcase achievements and successes. Share the valuable and innovative work of your teams across the organization and with the public.
      Maximizing the Return on Technology Increase visibility of underused applications. Promote the adoption and use of all products and services through the platform and use the lessons learned to justify removal, updates or modernizations.
      Confidently Shifting to Digital Bring all applications up to a common digital standard. Define the baseline digital state all applications, data, and processes must be in to maximize the value of the platform.
      Addressing Competing Priorities Map to a holistic platform vision, goals and objectives. Work with relevant stakeholders, teams and end users to agree on a common directive considering all impacted perspectives.
      Fostering a Collaborative Culture Ensure the platform is configured to meet the individual needs of the users. Tailor the interface and capabilities of the platform to address users' functional and personal concerns.
      Creating High-Throughput Teams Abstract the enterprise system to expedite delivery. Use the platform to standardize application system access to simplify platform changes and quicken development and testing.

      Recommendations

      Define your platform vision

      Organizations realize that a digital model is the way to provide more effective services to their customers and end users in a cost-effective, innovative, and engaging fashion. DOaaP is a way to help support this transition.

      However, various platform stakeholders will have different interpretations of and preferences for what this platform is intended to solve, what benefits it is supposed to deliver, and what capabilities it will deliver. A grounded vision is imperative to steer the roadmap and initiatives.

      Related Research:

      Assess and modernize your applications

      Certain applications may not sufficiently support the compatibility, flexibility, and efficiency requirements of DOaaP. While workaround technologies and tactics can be employed to overcome these application challenges, the full value of the DOaaP may not be realized.

      Reviewing the current state of the application portfolio will indicate the functional and value limitations of what DOaaP can provide and an indication of the scope of investment needed to bring applications up to a minimum state.

      Related Research:

      Recommendations

      Understand and evaluate end-user needs

      Technology has reached a point where it's no longer difficult for teams to build functional and valuable digital platforms. Rather, the difficulty lies in creating an interface and platform that people want to use and use frequently.

      While it is important to increase the access and promotion of all products and services, orchestrating and configuring them in a way to deliver a satisfying experience is even more important. Applications teams must first learn about and empathize with the needs of end users.

      Related Research:

      Architect your platform

      Formalizing and constructing DOaaP just for the sake of doing so often results in an initiative that is lengthy and costly and ends up being considered a failure.

      The build and optimization of the platform must be predicated on a thorough understanding of the DOaaP's goals, objectives, and priorities and the business capabilities and process they are meant to support and enable. The appropriate architecture and delivery practices can then be defined and employed.

      Related Research:

      CASE STUDY
      e-Estonia

      Situation

      The digital strategy of Estonia resulted in e-Estonia, with the vision of "creating a society with more transparency, trust, and efficiency." Estonia has addressed the challenge by creating structures, organizations, and a culture of innovation, and then using the speed and efficiency of digital infrastructure, apps, and services. This strategy can reduce or eliminate bureaucracy through transparency and automation.

      Estonia embarked on its journey to making digital a priority in 1994-1996, focusing on a committed investment in infrastructure and digital literacy. With that infrastructure in place, they started providing digital services like an e-banking service (1996), e-tax and mobile parking (2002), and then went full steam ahead with a digital information interoperability platform in 2001, digital identity in 2002, e-health in 2008, and e-prescription in 2010. The government is now strategizing for AI.

      Results

      This image contains the results of the e-Estonia case study results

      Source: e-Estonia

      Practices employed

      The e-Estonia digital government model serves as a reference for governments across the world; this is acknowledged by the various awards it has received, like #2 in "internet freedom," awarded by Freedom House in 2019; #1 on the "digital health index," awarded by the Bertelsmann Foundation in 2019; and #1 on "start-up friendliness," awarded by Index Venture in 2018.

      References

      "15th State of Agile Report." Digital.ai, 2021. Web.
      "2022 HR Trends Report." McLean & Company, 2022.
      "2022: State of Application Strategy Report." F5 Inc, 2022.
      "Are Executives Wearing Rose-Colored Glasses Around Digital Transformation?" Cyara, 2021. Web.
      "Cost of a Data Breach Report 2022." IBM, 2022. Web.
      Dalal, Vishal, et al. "Tech Debt: Reclaiming Tech Equity." McKinsey Digital, Oct. 2020. Web.
      "Differentiating Between Intelligent Automation and Hyperautomation." IBM, 15 October 2021. Web.
      "Digital Leadership Report 2021." Harvey Nash Group, 2021.
      "Digital Leadership Report 2022: The State of Digital." Nash Squared, 2022. Web.
      Gupta, Sunil. "Driving Digital Strategy: A Guide to Reimagining Your Business." Harvard Business Review Press, 2018. Web.
      Haff, Gordon. "State of Application Modernization Report 2022." Konveyor, 2022. Web.
      "IEEE Standard for Software Maintenance: IEEE Std 1219-1998." IEEE Standard for Software Maintenance, 1998. Accessed Dec. 2015.
      "Intelligent Automation." Cognizant, n.d. Web.
      "Kofax 2022: Intelligent Automation Benchmark Study". Kofax, 2021. Web.
      McCann, Leah. "Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?" rAVe, 2 July 2020, Web.
      "Proactive Staffing and Patient Prioritization to Decompress ED and Reduce Length of Stay." University Hospitals, 2018. Web.
      "Secrets of Successful Modernization." looksoftware, 2013. Web.
      "State of Software Development." Coding Sans, 2021. Web.
      "The State of Low-Code/No-Code." Creatio, 2021. Web.
      "We Have Built a Digital Society and We Can Show You How." e-Estonia. n.d. Web.
      Zanna. "The 5 Types of Experience Series (1): Brand Experience Is Your Compass." Accelerate in Experience, 9 February 2020. Web.
      Zhang, Y. et al. "Effects of Risks on the Performance of Business Process Outsourcing Projects: The Moderating Roles of Knowledge Management Capabilities." International Journal of Project Management, 2018, vol. 36 no. 4, 627-639.

      Research Contributors and Experts

      This is a picture of Chris Harrington

      Chris Harrington
      Chief Technology Officer
      Carolinas Telco Federal Credit Union

      Chris Harrington is Chief Technology Officer (CTO) of Carolinas Telco Federal Credit Union. Harrington is a proven leader with over 20 years of experience developing and leading information technology and cybersecurity strategies and teams in the financial industry space.

      This is a picture of Benjamin Palacio

      Benjamin Palacio
      Senior Information Technology Analyst County of Placer

      Benjamin Palacio has been working in the application development space since 2007 with a strong focus on system integrations. He has seamlessly integrated applications data across multiple states into a single reporting solution for management teams to evaluate, and he has codeveloped applications to manage billions in federal funding. He is also a CSAC-credentialed IT Executive (CA, USA).

      This is a picture of Scott Rutherford

      Scott Rutherford
      Executive Vice President, Technology
      LGM Financial Services Inc.

      Scott heads the Technology division of LGM Financial Services Inc., a leading provider of warranty and financing products to automotive OEMs and dealerships in Canada. His responsibilities include strategy and execution of data and analytics, applications, and technology operations.

      This is a picture of Robert Willatts

      Robert Willatts
      IT Manager, Enterprise Business Solutions and Project Services
      Town of Newmarket

      Robert is passionate about technology, innovation, and Smart City Initiatives. He makes customer satisfaction as the top priority in every one of his responsibilities and accountabilities as an IT manager, such as developing business applications, implementing and maintaining enterprise applications, and implementing technical solutions. Robert encourages communication, collaboration, and engagement as he leads and guides IT in the Town of Newmarket.

      This is a picture of Randeep Grewal

      Randeep Grewal
      Vice President, Enterprise Applications
      Red Hat

      Randeep has over 25 years of experience in enterprise applications, advanced analytics, enterprise data management, and consulting services, having worked at numerous blue-chip companies. In his most recent role, he is the Vice President of Enterprise Applications at Red Hat. Reporting to the CIO, he is responsible for Red Hat's core business applications with a focus on enterprise transformation, application architecture, engineering, and operational excellence. He previously led the evolution of Red Hat into a data-led company by maturing the enterprise data and analytics function to include data lake, streaming data, data governance, and operationalization of analytics for decision support.

      Prior to Red Hat, Randeep was the director of global services strategy at Lenovo, where he led the strategy using market data to grow Lenovo's services business by over $400 million in three years. Prior to Lenovo, Randeep was the director of advanced analytics at Alliance One and helped build an enterprise data and analytics function. His earlier work includes seven years at SAS, helping SAS become a leader in business analytics, and at KPMG consulting, where he managed services engagements at Fortune 100 companies.

      Cut Cost Through Effective IT Category Planning

      • Buy Link or Shortcode: {j2store}213|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • IT departments typically approach sourcing a new vendor or negotiating a contract renewal as an ad hoc event.
      • There is a lack of understanding on how category planning governance can save money.
      • IT vendor “go to market” or sourcing activities are typically not planned and are a reaction to internal client demands or vendor contract expiration.

      Our Advice

      Critical Insight

      • Lack of knowledge of the benefits and features of category management, including the perception that the sourcing process takes too long, are two of the most common challenges that prevent IT from category planning.
      • Other challenges include the traditional view of contract renegotiation and vendor acquisition as a transactional event vs. an ongoing strategic process.
      • Finally, allocating resources and time to collect the data, vendor information, and marketing analysis prevents us from creating category plans.

      Impact and Result

      • An IT category plan establishes a consistent and proactive methodology or process to sourcing activities such as request for information (RFI), request for proposals, (RFPs), and direct negotiations with a specific vendor or“targeted negotiations” such as renewals.
      • The goal of an IT category plan is to leverage a strategic approach to vendor selection while identify cost optimizing opportunities that are aligned with IT strategy and budget objectives.

      Cut Cost Through Effective IT Category Planning Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create an IT category plan to reduce your IT cost, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an IT category plan

      Use our three-step approach of Organize, Design, and Execute an IT Category Plan to get the most out of your IT budget while proactively planning your vendor negotiations.

      • IT Category Plan
      • IT Category Plan Metrics
      • IT Category Plan Review Presentation
      [infographic]

      Project Management

      • Buy Link or Shortcode: {j2store}48|cart{/j2store}
      • Related Products: {j2store}48|crosssells{/j2store}
      • member rating overall impact: 9.7/10
      • member rating average dollars saved: $303,499
      • member rating average days saved: 42
      • Parent Category Name: Project Portfolio Management and Projects
      • Parent Category Link: /ppm-and-projects

      The challenge

      • Ill-defined or even lack of upfront project planning will increase the perception that your IT department cannot deliver value because most projects will go over time and budget.
      • The perception is those traditional ways of delivering projects via the PMBOK only increase overhead and do not have value. This is less due to the methodology and more to do with organizations trying to implement best-practices that far exceed their current capabilities.
      • Typical best-practices are too clinical in their approach and place unrealistic burdens on IT departments. They fail to address the daily difficulties faces by staff and are not sized to fit your organization.
      • Take a flexible approach and ensure that your management process is a cultural and capacity fit for your organization. Take what fits from these frameworks and embed them tailored into your company.

      Our advice

      Insight

      • The feather-touch is often the right touch. Ensure that you have a lightweight approach for most of your projects while applying more rigor to the more complex and high-risk developments.
      • Pick the right tools. Your new project management processes need the right tooling to be successful. Pick a tool that is flexible enough o accommodate projects of all sizes without imposing undue governance onto smaller projects.
      • Yes, take what fits within your company from frameworks, but there is no cherry-picking. Ensure your processes stay in context: If you do not inform for effective decision-making, all will be in vain. Develop your methods such that guide the way to big-picture decision taking and support effective portfolio management.

      Impact and results 

      • The right amount of upfront planning is a function of the type of projects you have and your company. The proper levels enable better scope statements, better requirements gathering, and increased business satisfaction.
      • An investment in a formal methodology is critical to projects of all sizes. An effective process results in more successful projects with excellent business value delivery.
      • When you have a repeatable and consistent approach to project planning and execution, you can better communicate between the IT project managers and decision-makers.
      • Better communication improves the visibility of the overall project activity within your company.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should tailor project management practices to the type of projects you do and your company and review our methodology. We show you how we can support you.

      Lay the groundwork for project management success

      Assess your current capabilities to set the right level of governance.

      • Tailor Project Management Processes to Fit Your Projects – Phase 1: Lay the Groundwork for PM Success (ppt)
      • Project Management Triage Tool (xls)
      • COBIT BAI01 (Manage Programs and Projects) Alignment Workbook (xls)
      • Project Level Definition Matrix (xls)
      • Project Level Selection Tool (xls)
      • Project Level Assessment Tool (xls)
      • Project Management SOP Template (doc)

      Small project require a lightweight framework

      Increase small project's throughput.

      • Tailor Project Management Processes to Fit Your Projects – Phase 2: Build a Lightweight PM Process for Small Initiatives (ppt)
      • Level 1 Project Charter Template (doc)
      • Level 1 Project Status Report Template (doc)
      • Level 1 Project Closure Checklist Template (doc)

      Build the standard process medium and large-scale projects

      The standard process contains fully featured initiation and planning.

      • Tailor Project Management Processes to Fit Your Projects – Phase 3: Establish Initiation and Planning Protocols for Medium-to-Large Projects (ppt)
      • Project Stakeholder and Impact Assessment Tool (xls)
      • Level 2 Project Charter Template (doc)
      • Level 3 Project Charter Template (doc)
      • Kick-Off Meeting Agenda Template (doc)
      • Scope Statement Template (doc)
      • Project Staffing Plan(xls)
      • Communications Management Plan Template (doc)
      • Customer/Sponsor Project Status Meeting Template (doc)
      • Level 2 Project Status Report Template (doc)
      • Level 3 Project Status Report Template (doc)
      • Quality Management Workbook (xls)
      • Benefits Management Plan Template (xls)
      • Risk Management Workbook (xls)

      Build a standard process for the execution and closure of medium to large scale projects

      • Tailor Project Management Processes to Fit Your Projects – Phase 4: Develop Execution and Closing Procedures for Medium-to-Large Projects (ppt)
      • Project Team Meeting Agenda Template (doc)
      • Light Project Change Request Form Template (doc)
      • Detailed Project Change Request Form Template (doc)
      • Light Recommendation and Decision Tracking Log Template (xls)
      • Detailed Recommendation and Decision Tracking Log Template (xls)
      • Deliverable Acceptance Form Template (doc)
      • Handover to Operations Template (doc)
      • Post-Mortem Review Template (doc)
      • Final Sign-Off and Acceptance Form Template (doc)

      Implement your project management standard operating procedures (SOP)

      Develop roll-out and training plans, implement your new process and track metrics.

      • Tailor Project Management Processes to Fit Your Projects – Phase 5: Implement Your PM SOP (ppt)
      • Level 2 Project Management Plan Template (doc)
      • Project Management Process Costing Tool (xls)
      • Project Management Process Training Plan Template (doc)
      • Project Management Training Monitoring Tool (xls)
      • Project Management Process Implementation Timeline Tool (MS Project)
      • Project Management Process Implementation Timeline Tool (xls)

       

       

      The Small Enterprise Guide to People and Resource Management

      • Buy Link or Shortcode: {j2store}602|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Train & Develop
      • Parent Category Link: /train-and-develop
      • 52% of small business owners agree that labor quality is their most important problem, and 76% of executives expect the talent market to get even more challenging.
      • The problem? You can't compete on salary, training budgets are slim, you need people skilled in all areas, and even one resignation represents a large part of your workforce.

      Our Advice

      Critical Insight

      • The usual, reactive approach to workforce management is risky:
        • Optimizing tactics helps you hire faster, train more, and negotiate better contracts.
        • But fulfilling needs as they arise costs more, has greater risk of failure, and leaves you unprepared for future needs.
      • In a small enterprise where every resource counts, in which one hire represents 10% of your workforce, it is essential to get it right.

      Impact and Result

      • Workforce planning helps you anticipate future needs.
      • More lead time means better decisions at lower cost.
      • Small Enterprises benefit most, since every resource counts.

      The Small Enterprise Guide to People and Resource Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The Small Enterprise Guide to People and Resource Management Deck – Find out why workforce planning is critical for small enterprises.

      Use this storyboard to lay the foundation of people and resources management practices in your small enterprise IT department.

      • The Small Enterprise Guide to People and Resource Management – Phases 1-3

      2. Workforce Planning Workbook – Use the tool to successfully complete all of the activities required to define and estimate your workforce needs for the future.

      Use these concise exercises to analyze your department’s talent current and future needs and create a skill sourcing strategy to fill the gaps.

      • Workforce Planning Workbook for Small Enterprises

      3. Knowledge Transfer Tools – Use these templates to identify knowledge to be transferred.

      Work through an activity to discover key knowledge held by an employee and create a plan to transfer that knowledge to a successor.

      • IT Knowledge Identification Interview Guide Template
      • IT Knowledge Transfer Plan Template

      4. Development Planning Tools – Use these tools to determine priority development competencies.

      Assess employees’ development needs and draft a development plan that fits with key organizational priorities.

      • IT Competency Library
      • Leadership Competencies Workbook
      • IT Employee Career Development Workbook
      • Individual Competency Development Plan
      • Learning Methods Catalog for IT Employees

      Infographic

      Workshop: The Small Enterprise Guide to People and Resource Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Your Foundations

      The Purpose

      Set project direction and analyze workforce needs.

      Key Benefits Achieved

      Planful needs analysis ensures future workforce supports organizational goals.

      Activities

      1.1 Set workforce planning goals and success metrics.

      1.2 Identify key roles and competency gaps.

      1.3 Conduct a risk analysis to identify future needs.

      1.4 Determine readiness of internal successors.

      Outputs

      Work with the leadership team to:

      Extract key business priorities.

      Set your goals.

      Assess workforce needs.

      2 Create Your Workforce Plan

      The Purpose

      Conduct a skill sourcing analysis, and determine competencies to develop internally.

      Key Benefits Achieved

      A careful analysis ensures skills are being sourced in the most efficient way, and internal development is highly aligned with organizational objectives.

      Activities

      2.1 Determine your skill sourcing route.

      2.2 Determine priority competencies for development.

      Outputs

      Create a workforce plan.

      2.Determine guidelines for employee development.

      3 Plan Knowledge Transfer

      The Purpose

      Discover knowledge to be transferred, and build a transfer plan.

      Key Benefits Achieved

      Ensure key knowledge is not lost in the event of a departure.

      Activities

      3.1 Discover knowledge to be transferred.

      3.2 Identify the optimal knowledge transfer methods.

      3.3 Create a knowledge transfer plan.

      Outputs

      Discover tacit and explicit knowledge.

      Create a knowledge transfer roadmap.

      4 Plan Employee Development

      The Purpose

      Create a development plan for all staff.

      Key Benefits Achieved

      A well-structured development plan helps engage and retain employees while driving organizational objectives.

      Activities

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins.

      4.3 Build manager coaching skills.

      Outputs

      Assess employees.

      Prioritize development objectives.

      Plan development activities.

      Build management skills.

      Further reading

      The Small Enterprise Guide to People and Resource Management

      Quickly start getting the right people, with the right skills, at the right time

      Is this research right for you?

      Research Navigation

      Managing the people in your department is essential, whether you have three employees or 300. Depending on your available time, resources, and current workforce management maturity, you may choose to focus on the overall essentials, or dive deep into particular areas of talent management. Use the questions below to help guide you to the right Info-Tech resources that best align with your current needs.

      Question If you answered "no" If you answered "yes"

      Does your IT department have fewer than 15 employees, and is your organization's revenue less than $25 million (USD)?

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Follow the guidance in this blueprint.

      Does your organization require a more rigorous and customizable approach to workforce management?

      Follow the guidance in this blueprint.

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Analyst Perspective

      Workforce planning is even more important for small enterprises than large organizations.

      It can be tempting to think of workforce planning as a bureaucratic exercise reserved for the largest and most formal of organizations. But workforce planning is never more important than in small enterprises, where every individual accounts for a significant portion of your overall productivity.

      Without workforce planning, organizations find themselves in reactive mode, hiring new staff as the need arises. They often pay a premium for having to fill a position quickly or suffer productivity losses when a critical role goes unexpectedly vacant.

      A workforce plan helps you anticipate these challenges, come up with solutions to mitigate them, and allocate resources for the most impact, which means a greater return on your workforce investment in the long run.

      This blueprint will help you accomplish this quickly and efficiently. It will also provide you with the essential development and knowledge transfer tools to put your plan into action.

      This is a picture of Jane Kouptsova

      Jane Kouptsova
      Senior Research Analyst, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      52% of small business owners agree that labor quality is their most important problem.1

      Almost half of all small businesses face difficulty due to staff turnover.

      76% of executives expect the talent market to get even more challenging.2

      Common Obstacles

      76% of executives expect workforce planning to become a top strategic priority for their organization.2

      But…

      30% of small businesses do not have a formal HR function.3

      Small business leaders are often left at a disadvantage for hiring and retaining the best talent, and they face even more difficulty due to a lack of support from HR.

      Small enterprises must solve the strategic workforce planning problem, but they cannot invest the same time or resources that large enterprises have at their disposal.

      Info-Tech's Approach

      A modular, lightweight approach to workforce planning and talent management, tailored to small enterprises

      Clear activities that guide your team to decisive action

      Founded on your IT strategy, ensuring you have not just good people, but the right people

      Concise yet comprehensive, covering the entire workforce lifecycle from competency planning to development to succession planning and reskilling

      Info-Tech Insight

      Every resource counts. When one hire represents 10% of your workforce, it is essential to get it right.

      1CNBC & SurveyMonkey. 2ADP. 3Clutch.

      Labor quality is small enterprise's biggest challenge

      The key to solving it is strategic workforce planning

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in today's workforce, including pinpointing the human capital needs of the future.

      Linking workforce planning with strategic planning ensures that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      52%

      of small business owners agree that labor quality is their most important problem.1

      30%

      30% of small businesses have no formal HR function.2

      76%

      of senior leaders expect workforce planning to become the top strategic challenge for their organization.3

      1CNBC & SurveyMonkey. 2Clutch. 3ADP.

      Workforce planning matters more for small enterprises

      You know that staffing mistakes can cost your department dearly. But did you know the costs are greater for small enterprises?

      The price of losing an individual goes beyond the cost of hiring a replacement, which can range from 0.5 to 2 times that employee's salary (Gallup, 2019). Additional costs include loss of productivity, business knowledge, and team morale.

      This is a major challenge for large organizations, but the threat is even greater for small enterprises, where a single individual accounts for a large proportion of IT's productivity. Losing one of a team of 10 means 10% of your total output. If that individual was solely responsible for a critical function, your department now faces a significant gap in its capabilities. And the effect on morale is much greater when everyone is on the same close-knit team.

      And the threat continues when the staffing error causes you not to lose a valuable employee, but to hire the wrong one instead. When a single individual makes up a large percentage of your workforce, as happens on small teams, the effects of talent management errors are magnified.

      A group of 100 triangles is shown above a group of 10 triangles. In each group, one triangle is colored orange, and the rest are colored blue.

      Info-Tech Insight

      One bad hire on a team of 100 is a problem. One bad hire on a team of 10 is a disaster.

      This is an image of Info-Tech's small enterprise guide o people and resource management.

      Blueprint pre-step: Determine your starting point

      People and Resource management is essential for any organization. But depending on your needs, you may want to start at different stages of the process. Use this slide as a quick reference for how the activities in this blueprint fit together, how they relate to other workforce management resources, and the best starting point for you.

      Your IT strategy is an essential input to your workforce plan. It defines your destination, while your workforce is the vessel that carries you there. Ensure you have at least an informal strategy for your department before making major workforce changes, or review Info-Tech's guidance on IT strategy.

      This blueprint covers the parts of workforce management that occur to some extent in every organization:

      • Workforce planning
      • Knowledge transfer
      • Development planning

      You may additionally want to seek guidance on contract and vendor management, if you outsource some part of your workload outside your core IT staff.

      Track metrics

      Consider these example metrics for tracking people and resource management success

      Project Outcome Metric Baseline Target
      Reduced training costs Average cost of training (including facilitation, materials, facilities, equipment, etc.) per IT employee
      Reduced number of overtime hours worked Average hours billed at overtime rate per IT employee
      Reduced length of hiring period Average number of days between job ad posting and new hire start date
      Reduced number of project cancellations due to lack of capacity Total of number of projects cancelled per year
      Increased number of projects completed per year (project throughput) Total number of project completions per year
      Greater net recruitment rate Number of new recruits/Number of terminations and departures
      Reduced turnover and replacement costs Total costs associated with replacing an employee, including position coverage cost, training costs, and productivity loss
      Reduced voluntary turnover rate Number of voluntary departures/Total number of employees
      Reduced productivity loss following a departure or termination Team or role performance metrics (varies by role) vs. one year ago

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1:

      Scope requirements, objectives, and your specific challenges.

      Call #2: Assess current workforce needs.

      Call #4: Determine skill sourcing route.

      Call #6:

      Identify knowledge to be transferred.

      Call #8: Draft development goals and select activities.

      Call #3: Explore internal successor readiness.

      Call #5:Set priority development competencies.

      Call #7: Create a knowledge transfer plan.

      Call #9: Build managers' coaching & feedback skills.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 4 to 6 calls over the course of 3 to 4 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      1.Lay Your Foundations 2. Create Your Workforce Plan 3. Plan Knowledge Transfer 3. Plan Employee Development Next Steps and Wrap-Up (offsite)
      Activities

      1.1 Set workforce planning goals and success metrics

      1.2 Identify key roles and competency gaps

      1.3 Conduct a risk analysis to identify future needs

      1.4 Determine readiness of internal successors

      1.5 Determine your skill sourcing route

      1.6 Determine priority competencies for development

      3.1 Discover knowledge to be transferred

      3.2 Identify the optimal knowledge transfer methods

      3.3 Create a knowledge transfer plan

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins

      4.3 Build manager coaching skills

      Outcomes

      Work with the leadership team to:

      1. Extract key business priorities
      2. Set your goals
      3. Assess workforce needs

      Work with the leadership team to:

      1. Create a workforce plan
      2. Determine guidelines for employee development

      Work with staff and managers to:

      1. Discover tacit and explicit knowledge
      2. Create a knowledge transfer roadmap

      Work with staff and managers to:

      1. Assess employees
      2. Prioritize development objectives
      3. Plan development activities
      4. Build management skills

      Info-Tech analysts complete:

      1. Workshop report
      2. Workforce plan record
      3. Action plan

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Each onsite day is structured with group working sessions from 9-11 a.m. and 1:30-3:30 p.m. and includes Open Analyst Timeslots, where our facilitators are available to expand on scheduled activities, capture and compile workshop results, or review additional components from our comprehensive approach.

      This is a calendar showing days 1-4, and times from 8am-5pm

      Phase 1

      Workforce Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Human resource partner (if applicable)

      Additional Resources

      Workforce Planning Workbook for Small Enterprises

      Phase pre-step: Gather resources and participants

      1. Ensure you have an up-to-date IT strategy. If you don't have a formal strategy in place, ensure you are aware of the main organizational objectives for the next 3-5 years. Connect with executive stakeholders if necessary to confirm this information.
        If you are not sure of the organizational direction for this time frame, we recommend you consult Info-Tech's material on IT strategy first, to ensure your workforce plan is fully positioned to deliver value to the organization.
      2. Consult with your IT team and gather any documentation pertaining to current roles and skills. Examples include an org chart, job descriptions, a list of current tasks performed/required, a list of company competencies, and a list of outsourced projects.
      3. Gather the right participants. Most of the decisions in this section will be made by senior leadership, but you will also need input from front-line managers. Ensure they are available on an as-needed basis. If your organization has an HR partner, it can also be helpful to involve them in your workforce planning process.

      Formal workforce planning benefits even small teams

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in your workforce today and plan for the human capital needs of the future.

      Your workforce plan is an extension of your IT strategy, ensuring that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      The smaller the business, the more impact each individual's performance has on the overall success of the organization. When a given role is occupied by a single individual, the organization's performance in that function is determined wholly by one employee. Creating a workforce plan for a small team may seem excessive, but it ensures your organization is not unexpectedly hit with a critical competency gap.

      Right-size your workforce planning process to the size of your enterprise

      Small organizations are 2.2 times more likely to have effective workforce planning processes.1 Be mindful of the opportunities and risks for organizations of your size as you execute the project. How you build your workforce plan will not change drastically based on the size of your organization; however, the scope of your initiative, the size of your team, and the tactics you employ may vary.

      Small Organization

      Medium Organization

      Large Organization

      Project Opportunities

      • Project scope is much more manageable.
      • Communication and planning can be more manageable.
      • Fewer roles can clarify prioritization needs and promotability.
      • Project scope is more manageable.
      • Moderate budget for workforce planning initiatives is needed.
      • Communication and enforcement is easier.
      • Larger candidate pool to pull from.
      • Greater career path options for staff.
      • In-house expertise may be available

      Project Risks

      • Limited resources and time to execute the project.
      • In-house expertise is unlikely.
      • Competencies may be informal and not documented.
      • Limited overlap in responsibilities, resulting in fewer redundancies.
      • Limited staff with experience for the project.
      • Workforce planning may be a lower priority and difficult to generate buy-in for.
      • Requires more staff to manage workforce plan and execute initiatives.
      • Less collective knowledge on staff strengths may make career planning difficult.
      • Geographically dispersed business units make collaboration and communication difficult.

      1 McLean & Company Trends Report 2014

      1.1 Set project outcomes and success metrics

      1-3 hours

      1. As a group, brainstorm key pain points that the IT department experiences due to the lack of a workforce plan. Ask them to consider turnover, retention, training, and talent acquisition.
      2. Discuss any key themes that arise and brainstorm your desired project outcomes. Keep a record of these for future reference and to aid in stakeholder communication.
      3. Break into smaller groups (or if too small, continue as a single group):
        1. For each desired outcome, consider what metrics you could use to track progress. Keep your initial list of pain points in mind as you brainstorm metrics.
        2. Write each of the metric suggestions on a whiteboard and agree to track 3-5 metrics. Set targets for each metric. Consider the effort required to obtain and track the metric, as well as its reliability.
        3. Assign one individual for tracking the selected metrics. Following the meeting, that individual will be responsible for identifying the baseline and targets, and reporting on metrics progress.

      Input

      Output

      • List of workforce data available
      • List of workforce metrics to track the workforce plan's impact

      Materials

      Participants

      • Whiteboard/flip charts
      • Leadership team
      • Human resource partner (if applicable)

      1.2 Identify key roles and competency gaps

      1-3 hours

      1. As a group, identify all strategic, core, and supporting roles by reviewing the organizational chart:
        1. Strategic: What are the roles that must be filled by top performers and cannot be left vacant in order to meet strategic objectives?
        2. Core: What roles are important to drive operational excellence?
        3. Supporting: What roles are required for day-to-day work, but are low risk if the role is vacant for a period of time?
      2. Working individually or in small groups, have managers for each identified role define the level of competence required for the job. Consider factors such as:
        1. The difficulty or criticality of the tasks being performed
        2. The impact on job outcomes
        3. The impact on the performance of other employees
        4. The consequence of errors if the competency is not present
        5. How frequently the competency is used on the job
        6. Whether the competency is required when the job starts or can be learned or acquired on the job within the first six months
      3. Continue working individually and rate the level of proficiency of the current incumbent.
      4. As a group, review the assessment and make any adjustments.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Download the Workforce Planning Workbook for Small Enterprises

      1.2 Identify key roles and competency gaps

      Input Output
      • Org chart, job descriptions, list of current tasks performed/required, list of company competencies
      • List of competency gaps for key roles
      Materials Participants
      • Leadership team
      • Managers

      Conduct a risk-of-departure analysis

      A risk-of-departure analysis helps you plan for future talent needs by identifying which employees are most likely to leave the organization (or their current role).

      A risk analysis takes into account two factors: an employee's risk for departure and the impact of departure:

      Employees are high risk for departure if they:

      • Have specialized or in-demand skills (tenured employees are more likely to have this than recent hires)
      • Are nearing retirement
      • Have expressed career aspirations that extend outside your organization
      • Have hit a career development ceiling at your organization
      • Are disengaged
      • Are actively job searching
      • Are facing performance issues or dismissal OR promotion into a new role

      Employees are low risk for departure if they:

      • Are a new hire or new to their role
      • Are highly engaged
      • Have high potential
      • Are 5-10 years out from retirement

      If you are not sure where an employee stands with respect to leaving the organization, consider having a development conversation with them. In the meantime, consider them at medium risk for departure.

      To estimate the impact of departure, consider:

      • The effect of losing the employee in the near- and medium-term, including:
        • Impact on the organization, department, unit/team and projects
        • The cost (in time, resources, and productivity loss) to replace the individual
        • The readiness of internal successors for the role

      1.3 Conduct a risk analysis to identify future needs

      1-3 hours

      Preparation: Your estimation of whether key employees are at risk of leaving the organization will depend on what you know of them objectively (skills, age), as well as what you learn from development conversations. Ensure you collect all relevant information prior to conducting this activity. You may need to speak with employees' direct managers beforehand or include them in the discussion.

      • As a group, list all your current employees, and using the previous slide for guidance, rank them on two parameters: risk of departure and impact of departure, on a scale of low to high. Record your conclusions in a chart like the one on the right. (For a more in-depth risk assessment, use the "Risk Assessment Results" tab of the Key Roles Succession Planning Tool.)
      • Employees that fall in the "Mitigate" quadrant represent key at-risk roles with at least moderate risk and moderate impact. These are your succession planning priorities. Add these roles to your list of key roles and competency gaps, and include them in your workforce planning analysis.
      • Employees that fall in the "Manage" quadrants represent secondary priorities, which should be looked at if there is capacity after considering the "Mitigate" roles.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      This is an image of the Risk analysis for risk of departure to importance of departure.

      Info-Tech Insight

      Don't be afraid to rank most or all your staff as "high impact of departure." In a small enterprise, every player counts, and you must plan accordingly.

      1.3 Conduct a risk analysis to identify future needs

      Input Output
      • Employee data on competencies, skills, certifications, and performance. Input from managers from informal development conversations.
      • A list of first- and second-priority at-risk roles to carry forward into a succession planning analysis
      Materials Participants
      • Leadership team
      • Managers

      Determine your skill sourcing route

      The characteristics of need steer hiring managers to a preferred choice, while the marketplace analysis will tell you the feasibility of each option.

      Sourcing Options

      Preferred Options

      Final Choice

      four blue circles

      A right facing arrow

      Two blue circles A right facing arrow One blue circle
      State of the Marketplace

      State of the Marketplace

      Urgency: How soon do we need this skill? What is the required time-to-value?

      Criticality: How critical, i.e. core to business goals, are the services or systems that this skill will support?

      Novelty: Is this skill brand new to our workforce?

      Availability: How often, and at what hours, will the skill be needed?

      Durability: For how long will this skill be needed? Just once, or indefinitely for regular operations?

      Scarcity: How popular or desirable is this skill? Do we have a large enough talent pool to draw from? What competition are we facing for top talent?

      Cost: How much will it cost to hire vs. contract vs. outsource vs. train this skill?

      Preparedness: Do we have internal resources available to cultivate this skill in house?

      1.4 Determine your skill sourcing route

      1-3 hours

      1. Identify the preferred sourcing method as a group, starting with the most critical or urgent skill need on your list. Use the characteristics of need to guide your discussion. If more than one option seems adequate, carry several over to the next step.
      2. Consider the marketplace factors applicable to the skill in question and use these to narrow down to one final sourcing decision.
        1. If it is not clear whether a suitable internal candidate is available or ready, refer to the next activity for a readiness assessment.
      3. Be sure to document the rationale supporting your decision. This will ensure the decision can be clearly communicated to any stakeholders, and that you can review on your decision-making process down the line.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Info-Tech Insight

      Consider developing a pool of successors instead of pinning your hopes on just one person. A single pool of successors can be developed for either one key role that has specialized requirements or even multiple key roles that have generic requirements.

      Input

      Output

      • List of current and upcoming skill gaps
      • A sourcing decision for each skill

      Materials

      Participants

      • Leadership team
      • Human resource partner (if applicable)

      1.5 Determine readiness of internal successors

      1-3 hours

      1. As a group, and ensuring you include the candidates' direct managers, identify potential successors for the first role on your list.
      2. Ask how effectively the potential successor would serve in the role today. Review the competencies for the key role in terms of:
        1. Relationship-building skills
        2. Business skills
        3. Technical skills
        4. Industry-specific skills or knowledge
      3. Determine what competencies the succession candidate currently has and what must be learned. Be sure you know whether the candidate is open to a career change. Don't assume – if this is not clear, have a development conversation to ensure everyone is on the same page.
      4. Finally, determine how difficult it will be for the successor to acquire missing skills or knowledge, whether the resources are available to provide the required development, and how long it will take to provide it.
      5. As a group, decide whether training an internal successor is a viable option for the role in question, considering the successor's readiness and the characteristics of need for the role. If a clear successor is not readily apparent, consider:
        1. If the development of the successor can be fast-tracked, or if some requirements can be deprioritized and the successor provided with temporary support from other employees.
        2. If the role in question is being discussed because the current incumbent is preparing to leave, consider negotiating an arrangement that extends the incumbent's employment tenure.
      6. Record the decision and repeat for the next role on your list.

      Info-Tech Insight

      A readiness assessment helps to define not just development needs, but also any risks around the organization's ability to fill a key role.

      Input

      Output

      • List of roles for which you are considering training internally
      • Job descriptions and competency requirements for the roles
      • List of roles for which internal successors are a viable option

      Materials

      Participants

      • Leadership team
      • Candidates' direct managers, if applicable

      Use alternative work arrangements to gain time to prepare successors

      Alternative work arrangements are critical tools that employers can use to achieve a mutually beneficial solution that mitigates the risk of loss associated with key roles.

      Alternative work arrangements not only support employees who want to keep working, but more importantly, they allow the business to retain employees that are needed in key roles who are departure risks due to retirement.

      Viewing retirement as a gradual process can help you slow down skill loss in your organization and ensure you have sufficient time to train successors. Retiring workers are becoming increasingly open to alternative work arrangements. Among employed workers aged 50-75, more than half planned to continue working part-time after retirement.
      Source: Statistics Canada.

      Flexible work options are the most used form of alternative work arrangement

      A bar graph showing the percent of organizations who implemented alternate work arrangement, for Flexible work options; Contract based work; Part time roles; Graduated retirement programs; Part year jobs or job sharing; Increased PTO for employees over a certain age.

      Source: McLean & Company, N=44

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Flexible work options Employees work the same number of hours but have flexibility in when and where they work (e.g. from home, evenings). Employees who work fairly independently with no or few direct reports. Employee may become isolated or disconnected, impeding knowledge transfer methods that require interaction or one-on-one time.
      Contract-based work Working for a defined period of time on a specific project on a non-salaried or non-wage basis. Project-oriented work that requires specialized knowledge or skills. Available work may be sporadic or specific projects more intensive than the employee wants. Knowledge transfer must be built into the contractual arrangement.
      Part-time roles Half days or a certain number of days per week; indefinite with no end date in mind. Employees whose roles can be readily narrowed and upon whom people and critical processes are not dependent. It may be difficult to break a traditionally full-time job down into a part-time role given the size and nature of associated tasks.
      Graduated retirement Retiring employee has a set retirement date, gradually reducing hours worked per week over time. Roles where a successor has been identified and is available to work alongside the incumbent in an overlapping capacity while he or she learns. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Part-year jobs or job sharing Working part of the year and having the rest of the year off, unpaid. Project-oriented work where ongoing external relationships do not need to be maintained. The employee is unavailable for knowledge transfer activities for a large portion of the year. Another risk is that the employee may opt not to return at the end of the extended time off with little notice.
      Increased paid time off Additional vacation days upon reaching a certain age. Best used as recognition or reward for long-term service. This may be a particularly useful retention incentive in organizations that do not offer pension plans. The company may not be able to financially afford to pay for such extensive time off. If the role incumbent is the only one in the role, this may mean crucial work is not being done.
      Altered roles Concentration of a job description on fewer tasks that allows the employee to focus on his or her specific expertise. Roles where a successor has been identified and is available to work alongside the incumbent, with the incumbent's new role highly focused on mentoring. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Phase 2

      Knowledge Transfer

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership/management team
      • Incumbent & successor

      Additional Resources

      IT Knowledge Identification Interview Guide Template

      Knowledge Transfer Plan Template

      Determine your skill sourcing route

      Knowledge transfer plans have three key components that you need to complete for each knowledge source:

      Define what knowledge needs to be transferred

      Each knowledge source has unique information which needs to be transferred. Chances are you don't know what you don't know. The first step is therefore to interview knowledge sources to find out.

      Identify the knowledge receiver

      Depending on who the information is going to, the knowledge transfer tactic you employ will differ. Before deciding on the knowledge receiver and tactic, consider three key factors:

      • How will this knowledge be used in the future?
      • What is the next career step for the knowledge receiver?
      • Are the receiver and the source going to be in the same location?

      Identify which knowledge transfer tactics you will use for each knowledge asset

      Not all tactics are good in every situation. Always keep the "knowledge type" (information, process, skills, and expertise), knowledge sources' engagement level, and the knowledge receiver in mind as you select tactics.

      Don't miss tacit knowledge

      There are two basic types of knowledge: "explicit" and "tacit." Ensure you capture both to get a well-rounded overview of the role.

      Explicit Tacit
      • "What knowledge" – knowledge can be articulated, codified, and easily communicated.
      • Easily explained and captured – documents, memos, speeches, books, manuals, process diagrams, facts, etc.
      • Learn through reading or being told.
      • "How knowledge" – intangible knowledge from an individual's experience that is more from the process of learning, understanding, and applying information (insights, judgments, and intuition).
      • Hard to verbalize, and difficult to capture and quantify.
      • Learn through observation, imitation, and practice.

      Types of explicit knowledge

      Types of tacit knowledge

      Information Process Skills Expertise

      Specialized technical knowledge.

      Unique design capabilities/methods/models.

      Legacy systems, details, passwords.

      Special formulas/algorithms/ techniques/contacts.

      • Specialized research & development processes.
      • Proprietary production processes.
      • Decision-making processes.
      • Legacy systems.
      • Variations from documented processes.
      • Techniques for executing on processes.
      • Relationship management.
      • Competencies built through deliberate practice enabling someone to act effectively.
      • Company history and values.
      • Relationships with key stakeholders.
      • Tips and tricks.
      • Competitor history and differentiators.

      e.g. Knowing the lyrics to a song, building a bike, knowing the alphabet, watching a YouTube video on karate.

      e.g. Playing the piano, riding a bike, reading or speaking a language, earning a black belt in karate.

      Embed your knowledge transfer methods into day-to-day practice

      Multiple methods should be used to transfer as much of a person's knowledge as possible, and mentoring should always be one of them. Select your method according to the following criteria:

      Info-Tech Insight

      The more integrated knowledge transfer is in day-to-day activities, the more likely it is to be successful, and the lower the time cost. This is because real learning is happening at the same time real work is being accomplished.

      Type of Knowledge

      • Tacit knowledge transfer methods are often informal and interactive:
        • Mentoring
        • Multi-generational work teams
        • Networks and communities
        • Job shadowing
      • Explicit knowledge transfer methods tend to be more formal and one way:
        • Formal documentation of processes and best practices
        • Self-published knowledge bases
        • Formal training sessions
        • Formal interviews

      Incumbent's Preference/Successor's Preference

      Ensure you consult the employees, and their direct manager, on the way they are best prepared to teach and learn. Some examples of preferences include:

      1. Prefer traditional classroom learning, augmented with participation, critical reflection, and feedback.
      2. May get bored during formal training sessions and retain more during job shadowing.
      3. Prefer to be self-directed or self-paced, and highly receptive to e-learning and media.
      4. Prefer informal, incidental learning, tend to go immediately to technology or direct access to people. May have a short attention span and be motivated by instant results.
      5. May be uncomfortable with blogs and wikis, but comfortable with SharePoint.

      Cost

      Consider costs beyond the monetary. Some methods require an investment in time (e.g. mentoring), while others require an investment in technology (e.g. knowledge bases).

      The good news is that many supporting technologies may already exist in your organization or can be acquired for free.

      Methods that cost time may be difficult to get underway since employees may feel they don't have the time or must change the way they work.

      2.1 Create a knowledge transfer plan

      1-3 hours

      1. Working together with the current incumbent, brainstorm the key information pertaining to the role that you want to pass on to the successor. Use the IT Knowledge Identification Interview Guide Template to ensure you don't miss anything.
        • Consider key knowledge areas, including:
          • Specialized technical knowledge.
          • Specialized research and development processes.
          • Unique design capabilities/methods/models.
          • Special formulas/algorithms/techniques.
          • Proprietary production processes.
          • Decision-making criteria.
          • Innovative sales methods.
          • Knowledge about key customers.
          • Relationships with key stakeholders.
          • Company history and values.
        • Ask questions of both sources and receivers of knowledge to help determine the best knowledge transfer methods to use.
          • What is the nature of the knowledge? Explicit or tacit?
          • Why is it important to transfer?
          • How will the knowledge be used?
          • What knowledge is critical for success?
          • How will the users find and access it?
          • How will it be maintained and remain relevant and usable?
          • What are the existing knowledge pathways or networks connecting sources to recipients?
      2. Once the knowledge has been identified, use the information on the following slides to decide on the most appropriate methods. Be sure to consult the incumbent and successor on their preferences.
      3. Prioritize your list of knowledge transfer activities. It's important not to try to do too much too quickly. Focus on some quick wins and leverage the success of these initiatives to drive the project forward. Follow these steps as a guide:
        1. Take an inventory of all the tactics and techniques which you plan to employ. Eliminate redundancies where possible.
        2. Start your implementation with your highest risk role or knowledge item, using explicit knowledge transfer tactics. Interviews, use cases, and process mapping will give you some quick wins and will help gain momentum for the project.
        3. Then move forward to other tactics, the majority of which will require training and process design. Pick 1-2 other key tactics you would like to employ and build those out. For tactics that require resources or monetary investment, start with those that can be reused for multiple roles.

      Record your plan in the IT Knowledge Transfer Plan Template.

      Download the IT Knowledge Identification Interview Guide Template

      Download the Knowledge Transfer Plan Template

      Info-Tech Insight

      Wherever possible, ask employees about their personal learning styles. It's likely that a collaborative compromise will have to be struck for knowledge transfer to work well.

      2.1 Create a knowledge transfer plan

      Input

      Output

      • List of roles for which you need to transfer knowledge
      • Prioritized list of knowledge items and chosen transfer method

      Materials

      Participants

      • Leadership team
      • Incumbent
      • Successor

      Not every transfer method is effective for every type of knowledge

      Knowledge Type
      Tactic Explicit Tacit
      Information Process Skills Expertise
      Interviews Very Strong Strong Strong Strong
      Process Mapping Medium Very Strong Very Weak Very Weak
      Use Cases Medium Very Strong Very Weak Very Weak
      Job Shadow Very Weak Medium Very Strong Very Strong
      Peer Assist Strong Medium Very Strong Very Strong
      Action Review Medium Medium Strong Strong
      Mentoring Weak Weak Strong Very Strong
      Transition Workshop Strong Strong Strong Weak
      Storytelling Weak Weak Strong Very Strong
      Job Share Weak Weak Very Strong Very Strong
      Communities of Practice Strong Weak Very Strong Very Strong

      This table shows the relative strengths and weaknesses of each knowledge transfer tactic compared against four different knowledge types.

      Not all techniques are effective for all types of knowledge; it is important to use a healthy mixture of techniques to optimize effectiveness.

      Employees' engagement can impact knowledge transfer effectiveness

      Level of Engagement
      Tactic Disengaged/ Indifferent Almost Engaged - Engaged
      Interviews Yes Yes
      Process Mapping Yes Yes
      Use Cases Yes Yes
      Job Shadow No Yes
      Peer Assist Yes Yes
      Action Review Yes Yes
      Mentoring No Yes
      Transition Workshop Yes Yes
      Storytelling No Yes
      Job Share Maybe Yes
      Communities of Practice Maybe Yes

      When considering which tactics to employ, it's important to consider the knowledge holder's level of engagement. Employees who you would identify as being disengaged may not make good candidates for job shadowing, mentoring, or other tactics where they are required to do additional work or are asked to influence others.

      Knowledge transfer can be controversial for all employees as it can cause feelings of job insecurity. It's essential that motivations for knowledge transfer are communicated effectively.

      Pay particular attention to your communication style with disengaged and indifferent employees, communicate frequently, and tie communication back to what's in it for them.

      Putting disengaged employees in a position where they are mentoring others can be a risk, as their negativity could influence others not to participate, or it could negate the work you're doing to create a positive knowledge sharing culture.

      Employees' engagement can impact knowledge transfer effectiveness

      Effort by Stakeholder

      Tactic

      Business Analyst

      IT Manager

      Knowledge Holder

      Knowledge Receiver

      Interviews

      These tactics require the least amount of effort, especially for organizations that are already using these tactics for a traditional requirements gathering process.

      Medium

      N/A

      Low

      Low

      Process Mapping

      Medium

      N/A

      Low

      Low

      Use Cases

      Medium

      N/A

      Low

      Low

      Job Shadow

      Medium

      Medium

      Medium

      Medium

      Peer Assist

      Medium

      Medium

      Medium

      Medium

      Action Review

      These tactics generally require more involvement from IT management and the BA in tandem for preparation. They will also require ongoing effort for all stakeholders. It's important to gain stakeholder buy-in as it is key for success.

      Low

      Medium

      Medium

      Low

      Mentoring

      Medium

      High

      High

      Medium

      Transition Workshop

      Medium

      Low

      Medium

      Low

      Storytelling

      Medium

      Medium

      Low

      Low

      Job Share

      Medium

      High

      Medium

      Medium

      Communities of Practice

      High

      Medium

      Medium

      Medium

      Phase 3

      Development Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Employees

      Additional Resources

      Effective development planning hinges on robust performance management

      Your performance management framework is rooted in organizational goals and defines what it means to do any given role well.

      Your organization's priority competencies are the knowledge, skills and attributes that enable an employee to do the job well.

      Each individual's development goals are then aimed at building these priority competencies.

      Mission Statement

      To be the world's leading manufacturer and distributor of widgets.

      Business Goal

      To increase annual revenue by 10%.

      IT Department Objective

      To ensure reliable communications infrastructure and efficient support for our sales and development teams.

      Individual Role Objective

      To decrease time to resolution of support requests by 10% while maintaining quality.

      Info-Tech Insight

      Without a performance management framework, your employees cannot align their development with the organization's goals. For detailed guidance, see Info-Tech's blueprint Setting Meaningful Employee Performance Measures.

      What is a competency?

      The term "competency" refers to the collection of knowledge, skills, and attributes an employee requires to do a job well.

      Often organizations have competency frameworks that consist of core, leadership, and functional competencies.

      Core competencies apply to every role in the organization. Typically, they are tied to organizational values and business mission and/or vision.

      Functional competencies are at the department, work group, or job role levels. They are a direct reflection of the function or type of work carried out.

      Leadership competencies generally apply only to people managers in the organization. Typically, they are tied to strategic goals in the short to medium term

      Generic Functional
      • Core
      • Leadership
      • IT
      • Finance
      • Sales
      • HR

      Use the SMART model to make sure goals are reasonable and attainable

      S

      Specific: Be specific about what you want to accomplish. Think about who needs to be involved, what you're trying to accomplish, and when the goal should be met.

      M

      Measurable: Set metrics that will help to determine whether the goal has been reached.

      A

      Achievable: Ensure that you have both the organizational resources and employee capability to accomplish the goal.

      R

      Relevant: Goals must align with broader business, department, and development goals in order to be meaningful.

      T

      Time-bound: Provide a target date to ensure the goal is achievable and provide motivation.

      Example goal:

      "Learn Excel this summer."

      Problems:

      Not specific enough, not measurable enough, nor time bound.

      Alternate SMART goal:

      "Consult with our Excel expert and take the lead on creating an Excel tool in August."

      3.2 Identify target competencies & draft development goals

      1 hour

      Pre-work: Employees should come to the career conversation having done some self-reflection. Use Info-Tech's IT Employee Career Development Workbook to help employees identify their career goals.

      1. Pre-work: Managers should gather any data they have on the employee's current proficiency at key competencies. Potential sources include task-based assessments, performance ratings, supervisor or peer feedback, and informal conversation.

        Prioritize competencies. Using your list of priority organizational competencies, work with your employees to help them identify two to four competencies to focus on developing now and in the future. Use the Individual Competency Development Plan template to document your assessment and prioritize competencies for development. Consider the following questions for guidance:
        1. Which competencies are needed in my current role that I do not have full proficiency in?
        2. Which competencies are related to both my career interests and the organization's priorities?
        3. Which competencies are related to each other and could be developed together or simultaneously?
      2. Draft goals. Ask your employee to create a list of multiple simple goals to develop the competencies they have selected to work on developing over the next year. Identifying multiple goals helps to break development down into manageable chunks. Ensure goals are concrete, for example, if the competency is "communication skills," your development goals could be "presentation skills" and "business writing."
      3. Review goals:
        1. Ask why these areas are important to the employee.
        2. Share your ideas and why it is important that the employee develop in the areas identified.
        3. Ensure that the goals are realistic. They should be stretch goals, but they must be achievable. Use the SMART framework on the previous slide for guidance.

      Info-Tech Insight

      Lack of career development is the top reason employees leave organizations. Development activities need to work for both the organization and the employee's own development, and clearly link to advancing employees' careers either at the organization or beyond.

      Download the IT Employee Career Development Workbook

      Download the Individual Competency Development Plan

      3.2 Identify target competencies & draft development goals

      Input

      Output

      • Employee's career aspirations
      • List of priority organizational competencies
      • Assessment of employee's current proficiency
      • A list of concrete development goals

      Materials

      Participants

      • Employee
      • Direct manager

      Apply a blend of learning methods

      • Info-Tech recommends the 70-20-10 principle for learning and development, which places the greatest emphasis on learning by doing. This experiential learning is then supported by feedback from mentoring, training, and self-reflection.
      • Use the 70-20-10 principle as a guideline – the actual breakdown of your learning methods will need to be tailored to best suit your organization and the employee's goals.

      Spend development time and effort wisely:

      70%

      On providing challenging on-the-job opportunities

      20%

      On establishing opportunities for people to develop learning relationships with others, such as coaching and mentoring

      10%

      On formal learning and training programs

      Internal initiatives are a cost-effective development aid

      Internal Initiative

      What Is It?

      When to Use It

      Special Project

      Assignment outside of the scope of the day-to-day job (e.g. work with another team on a short-term initiative).

      As an opportunity to increase exposure and to expand skills beyond those required for the current job.

      Stretch Assignment

      The same projects that would normally be assigned, but in a shorter time frame or with a more challenging component.

      Employee is consistently meeting targets and you need to see what they're capable of.

      Training Others

      Training new or more junior employees on their position or a specific process.

      Employee wants to expand their role and responsibility and is proficient and positive.

      Team Lead On an Assignment

      Team lead for part of a project or new initiative.

      To prepare an employee for future leadership roles by increasing responsibility and developing basic managerial skills.

      Job Rotation

      A planned placement of employees across various roles in a department or organization for a set period of time.

      Employee is successfully meeting and/or exceeding job expectations in their current role.

      Incorporating a development objective into daily tasks

      What do we mean by incorporating into daily tasks?

      The next time you assign a project to an employee, you should also ask the employee to think about a development goal for the project. Try to link it back to their existing goals or have them document a new goal in their development plan.

      For example: A team of employees always divides their work in the same way. Their goal for their next project could be to change up the division of responsibility so they can learn each other's roles.

      Another example:

      "I'd like you to develop your ability to explain technical terms to a non-technical audience. I'd like you to sit down with the new employee who starts tomorrow and explain how to use all our software, getting them up and running."

      Info-Tech Insight

      Employees often don't realize that they are being developed. They either think they are being recognized for good work or they are resentful of the additional workload.

      You need to tell your employees that the activity you are asking them to do is intended to further their development.

      However, be careful not to sell mundane tasks as development opportunities – this is offensive and detrimental to engagement.

      Establish manager and employee accountability for following up

      Ensure that the employee makes progress in developing prioritized competencies by defining accountabilities:

      Tracking Progress

      Checking In

      Development Meetings

      Coaching & Feedback

      Employee accountability:

      • Employees need to keep track of what they learn.
      • Employees should take the time to reflect on their progress.

      Manager accountability:

      • Managers need to make the time for employees to reflect.

      Employee accountability:

      • Employees need to provide managers with updates and ask for help.

      Manager accountability:

      • Managers need to check in with employees to see if they need additional resources.

      Employee accountability:

      • Employees need to complete assessments again to determine whether they have made progress.

      Manager accountability:

      • Managers should schedule monthly meetings to discuss progress and identify next steps.

      Employee accountability:

      • Employees should ask their manager and colleagues for feedback after development activities.

      Manager accountability:

      • Managers can use both scheduled meetings and informal conversations to provide coaching and feedback to employees.

      3.3 Select development activities and schedule check-ins

      1-3 hours

      Pre-work: Employees should research potential development activities and come prepared with a range of suggestions.

      Pre-work: Managers should investigate options for employee development, such as internal training/practice opportunities for the employee's selected competencies and availability of training budget.

      1. Communicate your findings about internal opportunities and external training allowance to the employee. This can also be done prior to the meeting, to help guide the employee's own research. Address any questions or concerns.
      2. Review the employee's proposed list of activities, and identify priority ones based on:
        1. How effectively they support the development of priority competencies.
        2. How closely they match the employee's original goals.
        3. The learning methods they employ, and whether the chosen activities support a mix of different methods.
        4. The degree to which the employee will have a chance to practice new skills hands-on.
        5. The amount of time the activities require, balanced against the employee's work obligations.
      3. Guide the employee in selecting activities for the short and medium term. Establish an understanding that this list is tentative and subject to ongoing revision during future check-ins.
        1. If in doubt about whether the employee is over-committing, err on the side of fewer activities to start.
      4. Schedule a check-in for one month out to review progress and roadblocks, and to reaffirm priorities.
      5. Check-ins should be repeated regularly, typically once a month.

      Download the Learning Methods Catalog

      Info-Tech Insight

      Adopt a blended learning approach using a variety of techniques to effectively develop competencies. This will reinforce learning and accommodate different learning styles. See Info-Tech's Learning Methods Catalog for a description of popular experiential, relational, and formal learning methods.

      3.3 Select development activities and schedule check-ins

      Input

      Output

      • List of potential development activities (from employee)
      • List of organizational resources (from manager)
      • A selection of feasible development activities
      • Next check-in scheduled

      Materials

      Participants

      • Employee
      • Direct manager

      Tips for tricky conversations about development

      What to do if…

      Employees aren't interested in development:

      • They may have low aspiration for advancement.
      • Remind them about the importance of staying current in their role given increasing job requirements.
      • Explain that skill development will make their job easier and make them more successful at it; sell development as a quick and effective way to learn the skill.
      • Indicate your support and respond to concerns.

      Employees have greater aspiration than capability:

      • Explain that there are a number of skills and capabilities that they need to improve in order to move to the next level. If the specific skills were not discussed during the performance appraisal, do not hesitate to explain the improvements that you require.
      • Inform the employee that you want them to succeed and that by pushing too far and too fast they risk failure, which would not be beneficial to anyone.
      • Reinforce that they need to do their current job well before they can be considered for promotion.

      Employees are offended by your suggestions:

      • Try to understand why they are offended. Before moving forward, clarify whether they disagree with the need for development or the method by which you are recommending they be developed.
      • If it is because you told them they had development needs, then reiterate that this is about helping them to become better and that everyone has areas to develop.
      • If it is about the development method, discuss the different options, including the pros and cons of each.

      Coaching and feedback skills help managers guide employee development

      Coaching and providing feedback are often confused. Managers often believe they are coaching when they are just giving feedback. Learn the difference and apply the right approach for the right situation.

      What is coaching?

      A conversation in which a manager asks questions to guide employees to solve problems themselves.

      Coaching is:

      • Future-focused
      • Collaborative
      • Geared toward growth and development

      What is feedback?

      Information conveyed from the manager to the employee about their performance.

      Feedback is:

      • Past-focused
      • Prescriptive
      • Geared toward behavior and performance

      Info-Tech Insight

      Don't forget to develop your managers! Ensure coaching, feedback, and management skills are part of your management team's development plan.

      Understand the foundations of coaching to provide effective development coaching:

      Knowledge Mindset Relationship
      • Understand what coaching is and how to apply it:
      • Identify when to use coaching, feedback, or other people management practices, and how to switch between them.
      • Know what coaching can and cannot accomplish.
      • When focusing on performance, guide an employee to solve problems related to their work. When focusing on development, guide an employee to reach their own development goals.
      • Adopt a coaching mindset by subscribing to the following beliefs:
      • Employees want to achieve higher performance and have the potential to do so.
      • Employees have a unique and valuable perspective to share of the challenges they face as well as the possible solutions.
      • Employees should be empowered to realize solutions themselves to motivate them in achieving goals.
      • Develop a relationship of trust between managers and employees:
      • Create an environment of psychological safety where employees feel safe to be open and honest.
      • Involve employees in decision making and inform employees often.
      • Invest in employees' success.
      • Give and expect candor.
      • Embrace failure.

      Apply the "4A" behavior-focused coaching model

      Using a model allows every manager, even those with little experience, to apply coaching best practices effectively.

      Actively Listen

      Ask

      Action Plan

      Adapt

      Engage with employees and their message, rather than just hearing their message.

      Key active listening behaviors:

      • Provide your undivided attention.
      • Observe both spoken words and body language.
      • Genuinely try to understand what the employee is saying.
      • Listen to what is being said, then paraphrase back what you heard.

      Ask thoughtful, powerful questions to learn more information and guide employees to uncover opportunities and/or solutions.

      Key asking behaviors:

      • Ask open-ended questions.
      • Ask questions to learn something you didn't already know.
      • Ask for reasoning (the why).
      • Ask "what else?"

      Hold employees and managers accountable for progress and results.

      During check-ins, review each development goal to ensure employees are meeting their targets.

      Key action planning behaviors:

      Adapt to individual employees and situations.

      Key adapting behaviors:

      • Recognize employees' unique characteristics.
      • Appreciate the situation at hand and change your behavior and communication in order to best support the individual employee.

      Use the following questions to have meaningful coaching conversations

      Opening Questions

      • What's on your mind?
      • Do you feel you've had a good week/month?
      • What is the ideal situation?
      • What else?

      Problem-Identifying Questions

      • What is most important here?
      • What is the challenge here for you?
      • What is the real challenge here for you?
      • What is getting in the way of you achieving your goal?

      Problem-Solving Questions

      • What are some of the options available?
      • What have you already tried to solve this problem? What worked? What didn't work?
      • Have you considered all the possibilities?
      • How can I help?

      Next-Steps Questions

      • What do you need to do, and when, to achieve your goal?
      • What resources are there to help you achieve your goal? This includes people, tools, or even resources outside our organization.
      • How will you know when you have achieved your goal? What does success look like?

      The purpose of asking questions is to guide the conversation and learn something you didn't already know. Choose the questions you ask based on the flow of the conversation and on what information you would like to uncover. Approach the answers you get with an open mind.

      Info-Tech Insight

      Avoid the trap of "hidden agenda" questions, whose real purpose is to offer your own advice.

      Use the following approach to give effective feedback

      Provide the feedback in a timely manner

      • Plan the message you want to convey.
      • Provide feedback "just-in-time."
      • Ensure recipient is not preoccupied.
      • Try to balance the feedback; refer to successful as well as unsuccessful behavior.

      Communicate clearly, using specific examples and alternative behaviors

      • Feedback must be honest and helpful.
      • Be specific and give a recent example.
      • Be descriptive, not evaluative.
      • Relate feedback to behaviors that can be changed.
      • Give an alternative positive behavior.

      Confirm their agreement and understanding

      • Solicit their thoughts on the feedback.
      • Clarify if not understood; try another example.
      • Confirm recipient understands and accepts the feedback.

      Manager skill is crucial to employee development

      Development is a two-way street. This means that while employees are responsible for putting in the work, managers must enable their development with support and guidance. The latter is a skill, which managers must consciously cultivate.

      For more in-depth management skills development, see the Info-Tech "Build a Better Manager" training resources:

      Bibliography

      Anderson, Kelsie. "Is Your IT Department Prepared for the 4 Biggest Challenges of 2017?" 14 June 2017.
      Atkinson, Carol, and Peter Sandiford. "An Exploration of Older Worker Flexible Working Arrangements in Smaller Firms." Human Resource Management Journal, vol. 26, no. 1, 2016, pp. 12–28. Wiley Online Library.
      BasuMallick, Chiradeep. "Top 8 Best Practices for Employee Cross-Training." Spiceworks, 15 June 2020.
      Birol, Andy. "4 Ways You Can Succeed With a Staff That 'Wears Multiple Hats.'" The Business Journals, 26 Nov. 2013.
      Bleich, Corey. "6 Major Benefits To Cross-Training Employees." EdgePoint Learning, 5 Dec. 2018.
      Cancialosi, Chris. "Cross-Training: Your Best Defense Against Indispensable Employees." Forbes, 15 Sept. 2014.
      Cappelli, Peter, and Anna Tavis. "HR Goes Agile." Harvard Business Review, Mar. 2018.
      Chung, Kai Li, and Norma D'Annunzio-Green. "Talent Management Practices of SMEs in the Hospitality Sector: An Entrepreneurial Owner-Manager Perspective." Worldwide Hospitality and Tourism Themes, vol. 10, no. 4, Jan. 2018.
      Clarkson, Mary. Developing IT Staff: A Practical Approach. Springer Science & Business Media, 2012.
      "CNBC and SurveyMonkey Release Latest Small Business Survey Results." Momentive, 2019. Press Release. Accessed 6 Aug. 2020.
      Cselényi, Noémi. "Why Is It Important for Small Business Owners to Focus on Talent Management?" Jumpstart:HR | HR Outsourcing and Consulting for Small Businesses and Startups, 25 Mar. 2013.
      dsparks. "Top 10 IT Concerns for Small Businesses." Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support, 16 May 2017.
      Duff, Jimi. "Why Small to Mid-Sized Businesses Need a System for Talent Management | Talent Management Blog | Saba Software." Saba, 17 Dec. 2018.
      Employment and Social Development Canada. "Age-Friendly Workplaces: Promoting Older Worker Participation." Government of Canada, 3 Oct. 2016.
      Exploring Workforce Planning. Accenture, 23 May 2017.
      "Five Major IT Challenges Facing Small and Medium-Sized Businesses." Advanced Network Systems. Accessed 25 June 2020.
      Harris, Evan. "IT Problems That Small Businesses Face." InhouseIT, 17 Aug. 2016.
      Heathfield, Susan. "What Every Manager Needs to Know About Succession Planning." Liveabout, 8 June 2020.
      ---. "Why Talent Management Is an Important Business Strategy." Liveabout, 29 Dec. 2019.
      Herbert, Chris. "The Top 5 Challenges Facing IT Departments in Mid-Sized Companies." ExpertIP, 25 June 2012.
      How Smaller Organizations Can Use Talent Management to Accelerate Growth. Avilar. Accessed 25 June 2020.
      Krishnan, TN, and Hugh Scullion. "Talent Management and Dynamic View of Talent in Small and Medium Enterprises." Human Resource Management Review, vol. 27, no. 3, Sept. 2017, pp. 431–41.
      Mann Jackson, Nancy. "Strategic Workforce Planning for Midsized Businesses." ADP, 6 Feb. 2017.
      McCandless, Karen. "A Beginner's Guide to Strategic Talent Management (2020)." The Blueprint, 26 Feb. 2020.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup.com, 13 Mar. 2019.
      Mihelič, Katarina Katja. Global Talent Management Best Practices for SMEs. Jan. 2020.
      Mohsin, Maryam. 10 Small Business Statistics You Need to Know in 2020 [May 2020]. 4 May 2020.
      Ramadan, Wael H., and B. Eng. The Influence of Talent Management on Sustainable Competitive Advantage of Small and Medium Sized Establishments. 2012, p. 15.
      Ready, Douglas A., et al. "Building a Game-Changing Talent Strategy." Harvard Business Review, no. January–February 2014, Jan. 2014.
      Reh, John. "Cross-Training Employees Strengthens Engagement and Performance." Liveabout, May 2019.
      Rennie, Michael, et al. McKinsey on Organization: Agility and Organization Design. McKinsey, May 2016.
      Roddy, Seamus. "The State of Small Business Employee Benefits in 2019." Clutch, 18 Apr. 2019.
      SHRM. "Developing Employee Career Paths and Ladders." SHRM, 28 Feb. 2020.
      Strandberg, Coro. Sustainability Talent Management: The New Business Imperative. Strandberg Consulting, Apr. 2015.
      Talent Management for Small & Medium-Size Businesses. Success Factors. Accessed 25 June 2020.
      "Top 10 IT Challenges Facing Small Business in 2019." Your IT Department, 8 Jan. 2019.
      "Why You Need Workforce Planning." Workforce.com, 24 Oct. 2022.

      Optimize Applications Release Management

      • Buy Link or Shortcode: {j2store}406|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $44,874 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • The business demands high service and IT needs to respond. Rapid customer response through efficient release and deployment is critical to maintain high business satisfaction.
      • The lack of process ownership leads to chaotic and uncoordinated releases, resulting in costly rework and poor hand-offs.
      • IT emphasizes tools but release tools and technologies alone will not fix the problem. Tools are integrated into the processes they support – if the process challenges aren’t addressed first, then the tool won’t help.
      • Releases are traditionally executed in silos with limited communication across the entire release pipeline. Culturally, there is little motivation for cross-functional collaboration and holistic process optimization.

      Our Advice

      Critical Insight

      • Release management is not solely driven by tools. It is about delivering high quality releases on time through accountability and governance aided by the support of tools.
      • Release management is independent of your software development lifecycle (SDLC). Release management practices sit as an agnostic umbrella over your chosen development methodology.
      • Ownership of the entire process is vital. Release managers ensure standards are upheld and the pipeline operates efficiently.

      Impact and Result

      • Acquire release management ownership. Ensure there is appropriate accountability for speed and quality of the releases passing through the entire pipeline. A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
      • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
      • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

      Optimize Applications Release Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize release management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review your release management objectives

      Assess the current state and define the drivers behind your release management optimizations.

      • Optimize Applications Release Management – Phase 1: Review Your Release Management Objectives
      • Release Management Process Standard Template
      • Release Management Maturity Assessment

      2. Standardize release management

      Design your release processes, program framework, and release change management standards, and define your release management team.

      • Optimize Applications Release Management – Phase 2: Standardize Release Management
      • Release Manager

      3. Roll out release management enhancements

      Create an optimization roadmap that fits your context.

      • Optimize Applications Release Management – Phase 3: Roll Out Release Management Enhancements
      [infographic]

      Workshop: Optimize Applications Release Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Your Release Management Objectives

      The Purpose

      Reveal the motivators behind the optimization of release management.

      Identify the root causes of current release issues and challenges.

      Key Benefits Achieved

      Ensure business alignment of optimization efforts.

      Firm grasp of why teams are facing release issues and the impacts they have on the organization.

      Activities

      1.1 Identify the objectives for application release.

      1.2 Conduct a current state assessment of release practices.

      Outputs

      Release management business objectives and technical drivers

      Current state assessment of release processes, communication flows, and tools and technologies

      2 Standardize Release Management

      The Purpose

      Alleviate current release issues and challenges with best practices.

      Standardize a core set of processes, tools, and roles & responsibilities to achieve consistency, cadence, and transparency.

      Key Benefits Achieved

      Repeatable execution of the same set of processes to increase the predictability of release delivery.

      Defined ownership of release management.

      Adaptable and flexible release management practices to changing business and technical environments.

      Activities

      2.1 Strengthen your release process.

      2.2 Coordinate releases with a program framework.

      2.3 Manage release issues with change management practices.

      2.4 Define your release management team.

      Outputs

      Processes accommodating each release type and approach the team is required to complete

      Release calendars and program framework

      Release change management process

      Defined responsibilities and accountabilities of release manager and release management team

      3 Roll Out Release Management Enhancements

      The Purpose

      Define metrics to validate release management improvements.

      Identify the degree of oversight and involvement of the release management team.

      Prioritize optimization roadmap against business needs and effort.

      Key Benefits Achieved

      Easy-to-gather metrics to measure success that can be communicated to stakeholders.

      Understanding of how involved release management teams are in enforcing release management standards.

      Practical and achievable optimization roadmap.

      Activities

      3.1 Define your release management metrics.

      3.2 Ensure adherence to standards.

      3.3 Create your optimization roadmap.

      Outputs

      List of metrics to gauge success

      Oversight and reporting structure of release management team

      Release management optimization roadmap

      Develop Your Agile Approach for a Successful Transformation

      • Buy Link or Shortcode: {j2store}163|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $86,469 Average $ Saved
      • member rating average days saved: 16 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization wants to shorten delivery time and improve quality by adopting Agile delivery methods.
      • You know that Agile transformations are complex and difficult to implement.
      • Your organization may have started using Agile, but with only limited success.
      • You want to maximize your Agile transformation’s chances of success.

      Our Advice

      Critical Insight

      • Agile transformations are more likely to be successful when the entire organization understands Agile fundamentals, principles, and practices; the “different way of working” that Agile requires; and the role each person plays in its success.

      Impact and Result

      • Understand the “what and why” of Agile.
      • Identify your organization’s biggest Agile pain points.
      • Gain a deeper understanding of Agile principles and practices, and apply these to your Agile pain points.
      • Create a list of action items to address your organization’s Agile challenges.

      Develop Your Agile Approach for a Successful Transformation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify common Agile challenges

      Identify your organization's biggest Agile pain points so you can focus attention on those topics that are impacting your Agile capabilities the most.

      • Develop Your Agile Approach for a Successful Transformation – Phases 1-2

      2. Establish a solid foundation for Agile delivery

      Ensure that your organization has a solid understanding of Agile principles and practices to help ensure your Agile transformation is successful. Understand Agile's different way of working and identify the steps your organization will need to take to move from traditional Waterfall delivery to Agile.

      • Roadmap for Transition to Agile

      3. Backlog Management Module: Manage your backlog effectively

      The Backlog Management Module helps teams develop a better understanding of backlog management and user story decomposition. Improve your backlog quality by implementing a three-tiered backlog with quality filters.

      4. Scrum Simulation Module: Simulate effective Scrum practices

      The Scrum Simulation Module helps teams develop a better understanding of Scrum practices and the behavioral blockers affecting Agile teams and organizational culture. This module features two interactive simulations to encourage a deeper understanding of good Scrum practices and Agile principles.

      • Scrum Simulation Exercise (Online Banking App)

      5. Estimation Module: Improve product backlog item estimation

      The Estimation Module helps teams develop a better understanding of Agile estimation practices and how to apply them. Teams learn how Agile estimation and reconciliation provide reliable planning estimates.

      6. Product Owner Module: Establish an Effective Product Owner Role

      The Product Owner Module helps teams understand product management fundamentals and a deeper understanding of the product owner role. Teams define their product management terminology, create quality filters for PBIs moving through the backlog, and develop their product roadmap approach for key audiences.

      7. Product Roadmapping Module: Create effective product roadmaps

      The Product Roadmapping Module helps teams understand product road mapping fundamentals. Teams learn to effectively use the six tools of Product Roadmapping.

      [infographic]

      Further reading

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Analyst Perspective

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Pictures of Alex Ciraco and Hans Eckman

      Alex Ciraco and Hans Eckman
      Application Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Your organization wants to shorten delivery time and improve quality by adopting Agile delivery methods.
      • You know that Agile transformations are complex and difficult to implement.
      • Your organization may have started using Agile, but with only limited success.
      • You want to maximize your Agile transformation's chances of success.

      Common Obstacles

      • People seem to have different, conflicting, or inadequate knowledge of Agile principles and practices.
      • Your organization is not seeing the full benefits that Agile promises, and project teams aren't sure they are "doing Agile right."
      • Confusion and misinformation about Agile is commonplace in your organization.

      Info-Tech's Approach

      • Use our Common Agile Challenges Survey to identify your organization's Agile pain points.
      • Leverage this blueprint to level-set the organization on Agile fundamentals.
      • Address your survey's biggest Agile pain points to see immediate benefits and improvements in the way you practice Agile in your organization.

      Info-Tech Insight

      Agile transformations are more likely to be successful when the entire organization genuinely understands Agile fundamentals, principles and practices, as well as the role each person plays in its success. Focus on developing a solid understanding of Agile practices so your organization can "Be Agile", not just "Do Agile".

      Info-Tech's methodology

      1. Identify Common Agile Challenges

      2. Establish a Solid Foundation for Agile Delivery

      3. Agile Modules

      Phase Steps

      1.1 Identify common agile challenges

      2.1 Align teams with Agile fundamentals

      2.2 Interpret your common Agile challenges survey results

      2.3 (Optional) Move stepwise to iterative Agile delivery

      2.4 Identify insights and team feedback

      • Backlog Management Module:
        Manage Your Backlog Effectively
      • Scrum Simulation Module:
        Simulate Effective Scrum Practices
      • Estimation Module:
        Improve Product Backlog Item Estimation
      • Product Owner Module:
        Establish an Effective Product Owner Role
      • Product Roadmapping Module: Create Effective Product Roadmaps
      Phase Outcomes

      Understand common challenges associated with Agile transformations and identify your organization's struggles.

      Establish and apply a uniform understanding of Agile fundamentals and principles.

      Create a roadmap for your transition to Agile delivery and prioritized challenges.

      Foster deeper understanding of Agile principles and practices to resolve pain points.

      Develop your agile approach for a successful transformation

      Everyone's Agile journey is not the same.

      agile journey for a successful transformation

      Application delivery continues to fall short

      78% of IT professionals believe the business is "usually" or "always" out of sync with project requirements.
      Source: "10 Ways Requirements Can Sabotage Your Projects Right From the Start"

      Only 34% of software is rated as both important and effective by users.

      Source: Info-Tech's CIO Business Vision Diagnostic

      Agile DevOps is a progression of cultural, behavioral, and process changes. It takes time.

      An image of the trail to climb Mount Everest, with the camps replaced by the main steps of the agile approach to reaching Nirvana.

      Enhancements and maintenance are misunderstood

      an image showing the relationship between enhancements and maintenance.

      Source: "IEEE Transactions on Software Engineering"

      Why Agile/DevOps? It's about time to value

      Leaders and stakeholders are frustrated with long lead times to implement changes. Agile/DevOps promotes smaller, more frequent releases to start earning value sooner.

      A frequency graph showing the Time to delivering value depends on Frequency of Releases

      Time to delivering value depends on Frequency of Releases

      Embrace change, don't "scope creep" it

      64% of IT professionals adopt Agile to enhance their ability to manage changing priorities.

      71% of IT professionals found their ability to manage changing priorities improved after implementing Agile.

      Info-Tech Insight

      Traditional delivery processes work on the assumption that product requirements will remain constant throughout the SDLC. This results in delayed delivery of product enhancements which are critical to maintaining a positive customer experience.

      Adapted from: "12th Annual State of Agile Report"

      Agile's four core values

      "…while there is value in the items on the right, we value the items on the left more."
      – Source: "The Agile Manifesto"

      We value. . .

      Individuals and Interactions

      OVER

      Processes and Tools

      Working Software

      OVER

      Comprehensive Documentation

      Customer Collaboration

      OVER

      Contract Negotiation

      Responding to Change

      OVER

      Following a Plan

      Being Agile

      OVER

      Being Prescriptive

      Harness Agile's cultural advantages

      Collaboration

      • Team members leverage all their experience working toward a common goal.

      Iterations

      • Cycles provide opportunities for more product feedback.

      Continual Improvement

      • Self-managing teams continually improve their approach for the next iteration.

      Prioritization

      • The most important needs are addressed in the current iteration.

      Compare Waterfall and Agile – the "what" (how are they different?)

      This is an example of the Waterfall Approach.

      A "One and Done" Approach (Planning & Documentation Based)
      Elapsed time to deliver any value: Months to years

      This is an example of the Agile Approach

      An "Iterative" Approach (Empirical/Evidence Based)
      Elapsed time to deliver any value: Weeks

      Be aware of common myths around Agile

      1. … solve development and communication issues.
      2. … ensure you will finish requirements faster.
      3. … mean you don't need planning and documentation.

      "Although Agile methods are increasingly being adopted in globally distributed settings, there is no panacea for success."
      – "Negotiating Common Ground in Distributed Agile Development: A Case Study Perspective."

      "Without proper planning, organizations can start throwing more resources at the work which spirals into the classic Waterfall issues of managing by schedule."
      – Kristen Morton, Associate Implementation Architect,
      OneShield Inc., Info-Tech Interview

      Agile* SDLC

      With shared ownership instead of silos, we can deliver value at the end of every iteration (aka sprint)

      An image of the Agile SDLC Approach.

      * There are many Agile methodologies to choose from, but Scrum is by far the most widely used (and is shown above).

      Key Elements of the Agile SDLC

      • You are not "one-and-done." There are many short iterations with constant feedback.
      • There is an empowered product owner. This is a single authoritative voice that represents stakeholders.
      • There is a fluid product backlog. This enables prioritization of requirements "just-in-time."
      • Cross-functional, self-managing team. This team makes commitments and is empowered by the organization to do so.
      • Working, tested code at the end of each sprint. Value becomes more deterministic along sprint boundaries.
      • Demonstrate to stakeholders. Allow them to see and use the functionality and provide necessary feedback.
      • Feedback is being continuously injected back into the product backlog. This shapes the future of the solution.
      • Continuous improvement through sprint retrospectives.
      • "Internally Governed" when done right (the virtuous cycle of sprint-demo-feedback).

      A backlog stores and organizes PBIs at various stages of readiness

      A well-formed backlog can be thought of as a DEEP backlog:

      • Detailed Appropriately: Product backlog items (PBIs) are broken down and refined as necessary.
      • Emergent: The backlog grows and evolves over time as PBIs are added and removed.
      • Estimated: The effort a PBI requires is estimated at each tier.
      • Prioritized: The PBIs value and priority are determined at each tier.

      (Perforce, 2018)

      An image showing the Ideas; Qualified; Ready; funnel leading to the sprint approach.

      Outline the criteria to proceed to the next tier via quality filters

      Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.

      An image showing the approach you will use to Outline the criteria to proceed to the next tier via quality filters

      Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.

      Deliverables

      Many steps in this blueprint are accompanied by supporting deliverables to help you accomplish your goals.

      Common Agile Challenges Survey
      Survey the organization to understand which of the common Agile challenges the organization is experiencing

      A screenshot from Common Agile Challenges Survey

      Roadmap for Transition to Agile
      Identify steps you will take to move your organization toward Agile delivery

      A screenshot from Roadmap for Transition to Agile

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Consistent Agile delivery teams.
      • Delivery prioritized with business needs and committed work is achievable.
      • Improved ability to adjust future delivery cycles to meet changing business, market, and end-user needs.
      • Increased alignment and stability of resources with products and technology areas.
      • Reduction in the mean time to delivery of product backlog items.
      • Reduction in technical debt.
      • Better delivery alignment with enterprise goals, vision, and outcomes.
      • Improved coordination with product owners and stakeholders.
      • Quantifiable value realization following each release.
      • Product decisions made at the right time and with the right input.
      • Improved team morale and productivity.
      • Improved operational efficiency and process automation.
      • Increased employee retention and quality of new hires.
      • Reduction in accumulated project risk.

      Measure the value of this blueprint

      Implementing quality and consistent Agile practices improves SDLC metrics and reduces time to value.

      • Use Select and Use SDLC Metrics Effectivelyto track and measure the impact of Agile delivery. For example:
        • Reduction in PBI wait time
        • Improve throughput
        • Reduction in defects and defect severity
      • Phase 1 helps you prepare and send your Common Agile Challenges Survey.
      • Phase 2 builds a transformation plan aligned with your top pain points.

      Align Agile coaching and practices to address your key pain points identified in the Common Agile Challenges Survey.

      A screenshot from Common Agile Challenges Survey

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      This is an image of the eight calls which will take place over phases 1-3.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 8 calls over the course of 1 to 2 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phases 1-2
      1.5 - 3.0 days estimated

      Backlog Management
      0.5 - 1.0 days estimated

      Scrum Simulation
      1.25 - 2.25 days estimated

      Estimation
      1.0 - 1.25 days estimated

      Product Owner
      1.0 - 1.75 days estimated

      Product Roadmapping
      0.5 - 1.0 days estimated

      Establish a Solid Foundation for Agile Delivery

      Define the
      IT Target State

      Assess the IT
      Current State

      Bridge the Gap and
      Create the Strategy

      Establish an Effective Product Owner Role

      Create Effective Product Roadmaps

      Activities

      1.1 Gather Agile challenges and gaps
      2.1 Align teams with Agile fundamentals
      2.2 Interpret your common Agile challenges survey results
      2.3 (Optional) Move stepwise to iterative Agile delivery
      2.4 Identify insights and team feedback

      1. User stories and the art of decomposition
      2. Effective backlog management and refinement
      3. Identify insights and team feedback
      1. Scrum sprint planning and retrospective simulation
      2. Pass the balls – sprint velocity game
      1. Improve product backlog item estimation
      2. Agile estimation fundamentals
      3. Understand the wisdom of crowds
      4. Identify insights and team feedback
      1. Understand product management fundamentals
      2. The critical role of the product owner
      3. Manage effective product backlogs and roadmaps
      4. Identify insights and team feedback
      1. Identify your product roadmapping pains
      2. The six "tools" of product roadmapping
      3. Product roadmapping exercise

      Deliverables

      1. Identify your organization's biggest Agile pain points.
      2. Establish common Agile foundations.
      3. Prioritize support for a better Agile delivery approach.
      4. Plan to move stepwise to iterative Agile delivery.
      1. A better understanding of backlog management and user story decomposition.
      1. Scrum sprint planning and retrospective simulation
      2. Pass the balls – sprint velocity game
      1. Improve product backlog item estimation
      2. Agile estimation fundamentals
      3. Understand the wisdom of crowds
      4. Identify insights and team feedback
      1. Understand product management fundamentals
      2. The critical role of the product owner
      3. Manage effective product backlogs and roadmaps
      4. Identify insights and team feedback
      1. Understand product vs. project orientation.
      2. Understand product roadmapping fundamentals.

      Agile Modules

      For additional assistance planning your workshop, please refer to the facilitation planning tool in the appendix.

      Related Info-Tech Research

      Mentoring for Agile Teams
      Get practical help and guidance on your Agile transformation journey.

      Implement DevOps Practices That Work
      Streamline business value delivery through the strategic adoption of DevOps practices.

      Deliver on Your Digital Product Vision
      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale
      Deliver value at the scale of your organization through defining enterprise product families.

      Phase 1

      Phase 1

      Phase 2

      Agile Modules

      1.1 Identify common Agile challenges

      2.1 Align teams with Agile fundamentals

      2.2 Interpret your common Agile challenges survey results

      2.3 (Optional) Move stepwise to iterative Agile delivery

      2.4 Identify insights and team feedback

      • Backlog Management Module: Manage Your Backlog Effectively
      • Scrum Simulation Module: Simulate Effective Scrum Practices
      • Estimation Module: Improve Product Backlog Item Estimation
      • Product Owner Module: Establish an Effective Product Owner Role
      • Product Roadmapping: Create Effective Product Roadmaps

      This phase will walk you through the following activities:

      • Decide who will participate in the Common Agile Challenges Survey
      • Compile the results of the survey to identify your organization's biggest pain points with Agile

      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Develop Your Agile Approach for a Successful Transformation

      Step 1.1

      Identify common Agile challenges

      Activities

      1.1 Distribute Common Agile Challenges Survey and collect results

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of your organization's Agile pain points.

      Focus Agile support where it is most needed

      A screenshot from Common Agile Challenges Survey

      Info-Tech Insight

      There isn't one approach that cures all the problems your Agile teams are facing. First, understand these common challenges, then develop a plan to address the root causes.

      Use Info-Tech's Common Agile Challenges Survey to determine common issues and what problems individual teams are facing. Use the Agile modules and supporting guides in this blueprint to provide targeted support on what matters most.

      Exercise 1.1.1 Distribute Common Agile Challenges Survey

      30 minutes

      1. Download Survey Template: Info-Tech Common Agile Challenges Survey template.
      2. Create your own local copy of the Common Agile Challenges Survey by using the template. The Common Agile Challenges Survey will help you to identify which of the many common Agile-related challenges your organization may be facing.
      3. Decide on the teams/participants who will be completing the survey. It is best to distribute the survey broadly across the organization and include participants from several teams and roles.
      4. Copy the link for your local survey and distribute it for participants to complete (we suggest giving them one week to complete it).
      5. Collect the consolidated survey results in preparation for the next phase.
      6. NOTE: Using this survey template requires having access to Microsoft Forms. If you do not have access to Microsoft Forms, an Info-Tech analyst can perform the survey for you.

      Output

      • Your organization's biggest Agile pain points

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Record the results in the Roadmap for Transition to Agile Template

      Phase 2

      Establish a Solid Foundation for Agile Delivery

      Phase 1

      Phase 2

      Agile Modules

      1.1 Identify common Agile challenges

      2.1 Align teams with Agile fundamentals

      2.2 Interpret your common Agile challenges survey results

      2.3 (Optional) Move stepwise to iterative Agile delivery

      2.4 Identify insights and team feedback

      • Backlog Management Module: Manage Your Backlog Effectively
      • Scrum Simulation Module: Simulate Effective Scrum Practices
      • Estimation Module: Improve Product Backlog Item Estimation
      • Product Owner Module: Establish an Effective Product Owner Role
      • Product Roadmapping: Create Effective Product Roadmaps

      This phase will walk you through the following activities:

      • Gain a fundamental understanding of Agile
      • Understand why becoming Agile is hard
      • Identify steps needed to become more Agile
      • Understand your biggest Agile pain points

      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Step 2.1

      Align teams with Agile fundamentals

      Activities

      2.1.1 Share what Agile means to you
      2.1.2 (Optional) Contrast two delivery teams
      2.1.3 (Optional) Dissect the Agilist's Oath
      2.1.4 (Optional) Create your prototype definitions of ready
      2.1.5 (Optional) Create your prototype definitions of done
      2.1.6 Identify the challenges of implementing agile in your organization

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of what Agile is and why we do it.

      Exercise 2.1.1 Share what Agile means to you

      30-60 minutes

      1. What is Agile? Why do we do it?
      2. As a group, discuss and capture your thoughts on:
        1. What is Agile (its characteristics, practices, differences from alternatives, etc.)?
        2. Why do we do it (its drivers, benefits, advantages, etc.)?
      3. Capture your findings in the table below:

      What is Agile?

      Why do we do it?

      (e.g. Agile mindset, principles, and practices)

      (e.g. benefits)

      Output

      • Your current understanding of Agile and its benefits

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Why Agile/DevOps? It's about time to value

      Leaders and stakeholders are frustrated with long lead times to implement changes. Agile/DevOps promotes smaller, more frequent releases to start earning value sooner.

      A graph demonstrating the increased frequency of release expected over time, from 1960 - present

      Time to delivering value depends on frequency of releases.
      Source: 5Q Partners

      The pandemic accelerated the speed of digital transformation

      With the massive disruption preventing people from gathering, businesses shifted to digital interactions with customers.

      December 2019 - 36%; acceleration of 3 years; July 2020 - 58%.

      Companies also accelerated the pace of creating digital or digitally enhanced products and services.

      December 2019 - 35%; acceleration of 3 years; July 2020 - 55%.

      (McKinsey, 2020 )

      "The Digital Economy incorporates all economic activity reliant on or significantly enhanced by the use of digital inputs, including digital technologies, digital infrastructure, digital services and data."
      (OECD Definition)

      What does "elite" DevOps look like?

      This is an image of an annotated table showing what elite devops looks like.

      Where are you now?
      Where do You Want to Be?

      * Google Cloud/Accelerate State of DevOps 2021

      Realize and sustain value with DevOps

      Businesses with elite DevOps practices…

      973x more frequent faster lead time code deployments from commit to deploy, 3x 6570x lower change failure rate faster time to recover.

      Waterfall vs. Agile – the "what" (How are they different?)

      This is an example of the Waterfall Approach.

      A "One and Done" Approach (Planning & Documentation Based)
      Elapsed time to deliver any value: Months to years

      This is an example of the Agile Approach

      An "Iterative" Approach (Empirical/Evidence Based)
      Elapsed time to deliver any value: Weeks

      (Optional) Exercise 2.1.2 A tale of two teams

      Discussion (5-10 minutes)

      As a group, discuss how these teams differ

      Team 1:
      An image of the business analyst passing the requirements baton to the architect runner.

      Team 2:
      An image of team of soldiers carrying a heavy log up a beach

      Image Credit: DVIDS

      Discuss differences between these teams:
      • How are they different?
      • How would you coach/train/manage/lead?
      • How does team members' behavior differ?
      • How would you measure each team?
      What would have to happen at your organization to make working like this possible?

      Output

      • How your organization can support Agile behavior and mindset

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Dissect the Agilist's Oath

      Read and consider each element of the oath.

      • As a member of this Scrum team, I recognize that we are all equally and collectively responsible for the success of this project.
      • Success is defined as achieving the best possible outcome for our stakeholders given the constraints of time, money, and circumstances we will face.
      • We will achieve this by working collaboratively with our product owner to regularly deliver high-quality, working, tested code that can be demonstrated, and we will adjust our path forward based on the feedback we receive.
      • I will holistically embrace the concept of "good enough for now" into my work practices, because I know that waiting for the best/perfect solution does not yield optimal results.
      • Collectively, we will work to holistically minimize risk for the project across all phases and disciplines.
      • My primary role will be _____ [PO, SM, BA, Dev, Arch, Test, Ops, etc.], but I will contribute wherever and however best serves the current needs of the project.
      • I recognize that working in Agile/Scrum is not an excuse to ignore important things like adequate design and documentation. Collectively, we will ensure that these things are completed incrementally to a level of detail and quality which adequately serves the organization and stakeholders.
      • We are a team, and we will succeed or fail as one.

      Exercise 2.1.3 (Optional) Dissect the Agilist's Oath

      30 minutes

      1. Each bullet point in the Agilist's Oath is chosen to convey one of eight key messages about Agile practices and the mindset change that's required by everyone involved.
      2. As a group, discuss the "message" for each bullet point in the Agilist's Oath. Then identify which of them would be "easy" and "hard" to achieve in your organization.
      • As a member of this Scrum team, I recognize that we are all equally and collectively responsible for the success of this project.
      • Success is defined as achieving the best possible outcome for our stakeholders given the constraints of time, money, and circumstances we will face.
      • We will achieve this by working collaboratively with our product owner to regularly deliver high-quality, working, tested code that can be demonstrated, and we will adjust our path forward based on the feedback we receive.
      • I will holistically embrace the concept of "good enough for now" into my work practices, because I know that waiting for the best/perfect solution does not yield optimal results.
      • Collectively, we will work to holistically minimize risk for the project across all phases and disciplines.
      • My primary role will be _____ [PO, SM, BA, Dev, Arch, Test, Ops, etc.], but I will contribute wherever and however best serves the current needs of the project.
      • I recognize that working in Agile/Scrum is not an excuse to ignore important things like adequate design and documentation. Collectively, we will ensure that these things are completed incrementally to a level of detail and quality which adequately serves the organization and stakeholders.
      • We are a team, and we will succeed or fail as one.

      Which aspects of the Agilist's Oath are "easy" in your org?

      Which aspects of the Agilist's Oath are "hard" in your org?

      Output

      • How your organization can support Agile behavior and mindset

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Be aware of common myths around Agile

      Agile does not . . . .

      1. … solve development and communication issues.
      2. … ensure you will finish requirements faster.
      3. … mean you don't need planning and documentation.

      "Although Agile methods are increasingly being adopted in globally distributed settings, there is no panacea for success."
      – "Negotiating Common Ground in Distributed Agile Development: A Case Study Perspective."

      "Without proper planning, organizations can start throwing more resources at the work which spirals into the classic Waterfall issues of managing by schedule."
      – Kristen Morton, Associate Implementation Architect,
      OneShield Inc., Info-Tech Interview

      Agile's four core values

      "…while there is value in the items on the right, we value the items on the left more."
      – Source: "The Agile Manifesto"

      We value. . .

      Individuals and Interactions

      OVER

      Processes and Tools

      Working Software

      OVER

      Comprehensive Documentation

      Customer Collaboration

      OVER

      Contract Negotiation

      Responding to Change

      OVER

      Following a Plan

      Being Agile

      OVER

      Being Prescriptive

      Consider the traditional/Waterfall SDLC

      With siloes and handoffs, valuable product is delivered only at the end of an extended project lifecycle.

      This is an image of the Traditional Waterfall SDLC approach

      View additional transition models in the appendix

      Agile* SDLC

      With shared ownership instead of silos, we can deliver value at the end of every iteration (aka sprint)

      Key Elements of the Agile SDLC

      • You are not "one-and-done". There are many short iterations with constant feedback.
      • There is an empowered product owner. This is a single authoritative voice that represents stakeholders.
      • There is a fluid product backlog. This enables prioritization of requirements "just-in-time"
      • Cross-functional, self-managing team. This team makes commitments and is empowered by the organization to do so.
      • Working, tested code at the end of each sprint. Value becomes more deterministic along sprint boundaries.
      • Demonstrate to stakeholders. Allow them to see and use the functionality and provide necessary feedback.
      • Feedback is being continuously injected back into the product backlog. This shapes the future of the solution.
      • Continuous improvement through sprint retrospectives.
      • "Internally Governed" when done right (the virtuous cycle of sprint-demo-feedback).

      This is a picture of the Agile SDLC approach.

      * There are many Agile methodologies to choose from, but Scrum (shown above) is by far the most widely used.

      Scrum roles and responsibilities

      Product Owner

      Scrum Master

      Team Members

      Responsible

      • For identifying the product features and their importance in the final deliverable.
      • For refining and reprioritizing the backlog that identifies which features will be delivered in the next sprint based on business importance.
      • For clearing blockers and escalations when necessary.
      • For leading scrums, retrospectives, sprint reviews, and demonstrations.
      • For team building and resolving team conflicts.
      • For creating, testing, deploying, and supporting deliverables and valuable features.
      • For self-managing. There is no project manager assigning tasks to each team member.

      Accountable

      • For delivering valuable features to stakeholders.
      • For ensuring communication throughout development.
      • For ensuring high-quality deliverables for the product owner.

      Consulted

      • By the team through collaboration, rather than contract negotiation.
      • By the product owner on resolution of risks.
      • By the team on suggestions for improvement.
      • By the scrum master and product owner during sprint planning to determine level of complexity of tasks.

      Informed

      • On the progress of the current sprint.
      • By the team on work completed during the current sprint.
      • On direction of the business and current priorities.

      Scrum ceremonies

      Are any of these challenges for your organization? Done When:

      Project Backlog Refinement (PO & SM): Prepare user stories to be used in the next two to three future sprints. User stories are broken down into small manageable pieces of work that should not span sprints. If a user story is too big for a sprint, it is broken down further here. The estimation of the user story is examined, as well as the acceptance criteria, and each is adjusted as necessary from the Agile team members' input.

      Regularly over the project's lifespan

      Sprint Planning (PO, SM & Delivery Team): Discuss the work for the upcoming sprint with the business. Establish a clear understanding of the expectations of the team and the sprint. The product owner decides if priority and content of the user stories is still accurate. The development team decides what they believe can be completed in the sprint, using the user stories, in priority order, refined in backlog refinement.

      At/before the start of each sprint

      Daily Stand-Up (SM & Delivery Team): Coordinate the team to communicate progress and identify any roadblocks as quickly as possible. This meeting should be kept to fifteen minutes. Longer conversations are tabled for a separate meeting. These are called "stand-ups" because attendees should stay standing for the duration, which helps keep the meeting short and focused. The questions each team member should answer at each meeting: What did I do since last stand-up? What will I do before the next stand-up? Do I have any roadblocks?

      Every day during the sprint

      Sprint Demo (PO, SM, Delivery Team & Stakeholders): Review and demonstrate the work completed in the sprint with the business (demonstrate working and tested code which was developed during the sprint and gather stakeholder feedback).

      At the end of each sprint

      Sprint Retrospective (SM & Delivery Team & PO): Discuss how the sprint worked to determine if anything can be changed to improve team efficiency. The intent of this meeting is not to find/place blame for things that went wrong, but instead to find ways to avoid/alleviate pain points.

      At the end of each sprint

      Sample delivery sprint calendar

      The following calendar illustrates a two-week Scrum cadence (including ceremonies). This diagram is for illustrative purposes only. The length of the sprint and timing of ceremonies may differ from delivery team to delivery team based on their needs and schedules.

      An image of a sample sprint delivery calendar

      Sample delivery sprint calendar

      The following calendar illustrates a three-week Scrum cadence (including ceremonies). This diagram is for illustrative purposes only. The length of the sprint and timing of ceremonies may differ from delivery team to delivery team based on their needs and schedules.

      An image of a sample sprint delivery calendar

      Ensure your teams have the right information

      Implement and enforce your definition of ready at each stage of planning. Ensure your teams understand the required tasks by clarifying the definition of done.*

      Ready

      Done
      • The request has a defined problem, and the value is understood.
      • The request is documented, and the owner is identified.
      • Business and IT roles are committed to participating in estimation and planning activities.
      • Estimates and plans are made and validated with IT teams and business representatives.
      • Stakeholders and decision makers accept the estimates and plans as well as the related risks.
      • Estimates and plans are documented and slated for future review.

      * Note that your definitions of ready and done may vary from project to project, and they should be decided on collectively by the delivery team at the beginning of the project (part of setting their "norms") and updated if/when needed.

      Exercise 2.1.4 (Optional) Create definition of ready and done for an oil change

      10-15 minutes

      Step 1:

      1. As a group, create a definition of ready and done for doing an oil change (this will help you to understand the nature and value of a definition of ready and done using a relatable example):

      Definition of Ready

      Checklist:

      Definition of Done

      Checklist – For each user story:

      The checklist of things that must be true/done to begin the oil change.

      • We have the customer's car and keys
      • We know which grade of oil the customer wants

      The checklist of things that must be true/done at the end of the oil change.

      • The oil has been changed
      • A reminder sticker has been placed on windshield

      Exercise 2.1.4 (Optional) Create your prototype definitions of ready

      30-60 minutes

      Step 2:

      1. As a group, review the two sample definitions of ready below and select the one you consider to be the best starting point for your prototype definition of ready.

      Definition of Ready SAMPLE 1:

      Checklist – For each user story:

      • Technical and business risks are identified.
      • Resources are available for development.
      • Story has been assigned to a sprint/iteration.
      • Organizational business value is defined.
      • A specific user has been identified.
      • Stakeholders and needs defined.
      • Process impacts are identified.
      • Data needs are defined.
      • Business rules and non-functional requirements are identified.
      • Acceptance criteria are ready.
      • UI design work is ready.
      • Story has been traced to the project, epic, and sprint goal.

      Definition of Ready SAMPLE 2:

      Checklist – For each user story:

      • The value of story to the user is clearly indicated.
      • The acceptance criteria for story have been clearly described.
      • User story dependencies identified.
      • User story sized by delivery team.
      • Scrum team accepts user experience artifacts.
      • Performance criteria identified, where appropriate.
      • Person who will accept the user story is identified.
      • The team knows how to demo the story.

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.1.4 (Optional) Create your prototype definitions of ready

      30-60 minutes

      Step 3:

      1. As a group, using the selected sample as your starting point, decide what changes need to be made (keep/add/delete/modify):

      Definition of Ready Checklist – For each user story:

      Disposition

      The value of story to the user is clearly indicated.

      Keep as is

      The acceptance criteria for story have been clearly described. Keep as is
      User story dependencies identified. Modify to: "Story has been traced to the project, epic, and sprint goal"
      User story sized by delivery team. Modify to: "User Stories have been sized by the Delivery team using Story Points"
      Scrum team accepts user experience artifacts. Keep as is
      Performance criteria identified, where appropriate. Keep as is
      Person who will accept the user story is identified.

      Delete

      The team knows how to demo the story. Keep as is

      Add: "Any performance related criteria have been identified where appropriate"

      Add: "Any data model related changes have been identified where needed"

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.1.4 (Optional) Create your prototype definitions of ready

      30-60 minutes

      Step 4:

      1. As a group, capture and agree on your prototype definition of ready*:

      Definition of Ready

      Checklist – For each user story:

      User stories and related requirements contain clear descriptions of what is expected of a given functionality. Business value is identified.

      • The value of the story to the user is clearly indicated.
      • The acceptance criteria for the story have been clearly described.
      • Story has been traced to the project, epic, and sprint goal.
      • User stories have been sized by the delivery team using story points.
      • Scrum team accepts user experience artifacts.
      • Performance criteria identified, where appropriate.
      • The team knows how to demo the story.
      • Any performance-related criteria have been identified where appropriate.
      • Any data-model-related changes have been identified where needed.

      Record the results in the Roadmap for Transition to Agile Template

      * This checklist helps Agile teams determine if the stories in their backlog are ready for sprint planning. As your team gains experience with Agile, tailor this list to your needs and follow it until the practice becomes second nature.

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.1.5 (Optional) Create your prototype definitions of done

      30-60 minutes

      Step 5:

      1. As a group, review the two sample definitions of ready below and select the one you consider to be the best starting point for your prototype definition of ready:

      SAMPLE 1:

      Definition of Done Checklist – For each user story:

      • Design complete
      • Code compiles
      • Static code analysis has been performed and passed
      • Peer reviewed with coding standards passed
      • Code merging completed
      • Unit tests and smoke tests are done/functional (preferably automated)
      • Meets the steps identified in the user story
      • Unit & QA test passed
      • Usability testing completed
      • Passes functionality testing including security testing
      • Data validation has been completed
      • Ready to be released to the next stage

      SAMPLE 2:

      Definition of Done Checklist – For each user story:

      • Work was completed in a way that a professional would say they are satisfied with their work.
      • Work has been seen by multiple team members.
      • Work meets the criteria of satisfaction described by the customer.
      • The work is part of a package that will be shared with the customer as soon as possible.
      • The work and any learnings from doing the work have been documented.
      • Completion of the work is known by and visible to all team members.
      • The work has passed all quality, security, and completeness checks as defined by the team.

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.1.4 (Optional) Create your prototype definitions of done

      30-60 minutes

      Step 6:

      1. As a group, using the selected sample as your starting point, decide what changes need to be made (keep/add/delete/modify):

      Definition of Ready Checklist – For each user story:

      Disposition

      • Work was completed in a way that a professional would say they are satisfied with their work.
      Keep as is
      • Work has been seen by multiple team members.
      Delete
      • Work meets the criteria of satisfaction described by the customer.
      Modify to: "All acceptance criteria for the user story have been met"
      • The work is a part of a package that will be shared with the customer as soon as possible.
      Modify to: "The user story is ready to be demonstrated to Stakeholders"
      • The work and any learnings from doing the work has been documented.
      Keep as is
      • Completion of the work is known by and visible to all team members.
      Keep as is
      • The work has passed all quality, security, and completeness checks as defined by the team.
      Modify to: "Unit, smoke and regression testing has been performed (preferably automated), all tests were passed"
      Add: "Any performance related criteria associated with the story have been met"

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.1.4 (Optional) Create your prototype definitions of done

      30-60 minutes

      Step 7:

      1. As a group, capture and agree on your prototype Definition of Done*:

      Definition of Done

      Checklist – For each user story:

      When the user story is accepted by the product owner and is ready to be released.

      • Work was completed in a way that a professional would say they are satisfied with their work.
      • All acceptance criteria for the user story have been met.
      • The user story is ready to be demonstrated to stakeholders.
      • The work and any learnings from doing the work have been documented.
      • Completion of the work is known by and visible to all team members.
      • Unit, smoke, and regression testing has been performed (preferably automated), and all tests were passed.
      • Any performance-related criteria associated with the story have been met.

      Record the results in the Roadmap for Transition to Agile Template

      * This checklist helps Agile teams determine if the stories in their backlog are ready for sprint planning. As your team gains experience with Agile, tailor this list to your needs and follow it until the practice becomes second nature.

      Output

      • Prototype definitions of ready and done for your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Getting to "Agile DevOps Nirvana" is hard, but it's worth it.

      An image of the trail to climb Mount Everest, from camps 1-4

      Agile DevOps is a progression of cultural, behavioral, and process changes.
      It takes time.

      An image of the trail to climb Mount Everest, with the camps replaced by the steps to deploy Agile, to reach Agile/Devops Nirvana

      Agile DevOps may be hard, but it's worth it…

      It turns out Waterfall is not as good at reducing risk and ensuring delivery after all.

      CHAOS RESOLUTION BY AGILE VERSUS WATERFALL
      Size Method Successful Challenged Failed
      All Size Projects Agile 39% 52% 9%
      Waterfall 11% 60% 29%

      Standish Group; CHAOS REPORT 2015

      "I believe in this [Waterfall] concept, but the implementation described above is risky and invites failure."

      – Winston W. Royce

      Compare Waterfall to Agile

      Waterfall

      Agile

      Roles and Responsibilities

      Silo your resources

      Defined/segregated responsibilities

      Handoffs between siloes via documents

      Avoid siloes

      Collective responsibility

      Transitions instead of handoffs

      Belief System

      Trust the process

      Assign tasks to individuals

      Trust the delivery team

      Assign ownership/responsibilities to the team

      Planning Approach

      Create a detailed plan before work begins

      Follow the plan

      High level planning only

      The plan evolves over project lifetime

      Delivery Approach

      One and done (big bang delivery at end of project)

      Iterative delivery (regularly demonstrate working code)

      Governance Approach

      Phases and gates

      Artifacts and approvals

      Demo working tested code and get stakeholder feedback

      Support delivery team and eliminate roadblocks

      Approach to Stakeholders

      Involved at beginning and end of project

      "Arm's length" relationship with delivery team

      Involved throughout project (sprint by sprint)

      Closely involved with delivery team (through full time PO)

      Approach to Requirements/Scope

      One-time requirements gathering at start of project

      Scope is fixed at beginning of project ("carved in stone")

      On going requirements gathering and refinement over time

      Scope is roughly determined at beginning (expect change)

      Approach to Changing Requirements

      Treats change like it is "bad"

      Onerous CM process (discourages change)

      Scope changes "require approval" and are disruptive

      Accepts change as natural part of development.

      Light Change Management process (change is welcome)

      Scope changes are handled like all changes

      Hybrid SDLC: Wagile/Agilfall/WaterScrumFall

      Valuable product delivered in multiple releases

      A picture of a hybrid waterfall - Agile approach.

      If moving directly from Waterfall to Agile is too much for your organization, this can be a valuable interim step (but it won't give you the full benefits of Agile, so be careful about getting stuck here).

      Exercise 2.1.6 Identify the challenges of implementing Agile in your organization

      30-60 minutes

      1. As a group, discuss:
        1. Why being Agile may be difficult in your organization?
        2. What are some of the roadblocks and speed bumps you may face?
        3. What incremental steps might the organization take toward becoming Agile?

      Record the results in the Roadmap for Transition to Agile Template

      Output

      • Why being Agile is hard in your organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Step 2.2

      Align teams with Agile fundamentals

      Activities

      2.2.1 Review the results of your Common Agile Challenges Survey (30-60 minutes)
      2.2.2 Align your support with your top five challenges

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your organization's biggest Agile pain points.

      Be aware of common Agile challenges

      The road to Agile is filled with potholes, speedbumps, roadblocks, and brick walls!

      1. Establish an effective product owner role (PO)
      2. Uncertainty about minimum viable product (MVP)
      3. How non-Agile teams (like architecture, infosec, operations, etc.) work with Agile teams
      4. Project governance/gating process
      5. What is the role of a PM/PMO in Agile?
      6. How to budget/plan Agile projects
      7. How to contract and work with an Agile vendor
      8. An Agile skills deficit (e.g. new-to-Agile teams who have difficulty "doing Agile right")
      9. General resistance to change in the organization
      10. Lack of Agile training, piloting, and coaching
      11. Different Agile approaches are used by different teams
      12. Backlog management and user story decomposition challenges
      13. Quality assurance challenges
      14. Hierarchical management practices and organization boundaries
      15. Difficulty with establishing autonomous Agile teams
      16. Lack of management support for Agile
      17. Poor Agile estimation practices
      18. Difficulty creating effective product roadmaps in Agile
      19. How do we know when an Agile project is ready to go live?
      20. Sprint goals are not being consistently met, or sprint deliverables that are full of bugs

      Exercise 2.2.1 Review the results of your Common Agile Challenges Survey

      30-60 minutes

      1. Using the results of your Common Agile Challenges Survey, fill in the bar chart with your top five pain points:

      A screenshot from Common Agile Challenges Survey

      Output

      • Your organization's biggest Agile pain points identified and prioritized

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.2.2 Align your support with your top five challenges

      30 minutes

      Using the Agile Challenges support mapping on the following slides, build your transformation plan and supporting resources. You can build your plan by individual team results or as an enterprise approach.

      Priority Agile Challenge Module Name and Sequence
      1
      1. Agile Foundations
      2. ?
      2
      1. Agile Foundations
      2. ?
      3
      1. Agile Foundations
      2. ?
      4
      1. Agile Foundations
      2. ?
      5
      1. Agile Foundations
      2. ?

      Output

      • Your organization's Agile Challenges transformation plan

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Map challenges to supporting modules

      Agile Challenges

      Supporting Resources

      Difficulty establishing an effective product owner (PO) or uncertainty about the PO role

      Modules:

      • Agile Foundations
      • Establish an Effective Product Owner Role
      Uncertainty about minimum viable product (MVP) and how to identify your MVP

      Modules:

      • Agile Foundations
      • Simulate Effective Scrum Practices
      How non-Agile teams (like architecture, info sec, operations, etc.) work with Agile teams

      Modules:

      • Agile Foundations
      • Work With Non-Agile Teams (Future)
      Project Governance/Gating processes that are unfriendly to Agile

      Modules:

      • Agile Foundations
      • Establish Agile-Friendly Gating (Future)
      Uncertainty about the role of a PM/PMO in Agile

      Modules:

      • Agile Foundations
      • Understand the role of PM/PMO in Agile Delivery (Future)
      Uncertainty about how to budget/plan Agile projects

      Modules:

      • Agile Foundations
      • Simulate Effective Scrum Practices
      • Understand Budgeting and Funding for Agile Delivery (Future)
      Creating an Agile friendly RFP/Contract (e.g. how to contract and work with an Agile vendor)

      Modules:

      • Agile Foundations
      • Work Effectively with Agile Vendors (Future)

      Note: Modules listed as (Future) are in development and may be available in draft format.

      Map challenges to supporting modules

      Agile Challenges

      Supporting Resources

      An Agile skills deficit (e.g. new-to-Agile teams who have difficulty "doing Agile right")

      Modules:

      • Agile Foundations
      General resistance in the organization to process changes required by Agile

      Modules:

      • Agile Foundations
      • Manage Organizational Change to Support Agile Delivery (Future)
      Lack of Agile training, piloting and coaching being offered by the organization

      Modules:

      • Agile Foundations
      Different Agile approaches are used by different teams, making it difficult to work together

      Modules:

      • Agile Foundations
      • Build Your Scrum Playbook (Future)
      Backlog management challenges (e.g. how to manage a backlog, and make effective use of Epics, Features, User Stories, Tasks and Bugs)

      Modules:

      • Agile Foundations
      • Manage Your Backlog Effectively
      Quality Assurance challenges (testing not being done well on Agile projects)

      Modules:

      • Agile Foundations
      • Establish Effect Quality Assurance for Agile Delivery (Future);
      • Use Test Automation Effectively (Future)
      Hierarchical management practices and organization boundaries make it difficult to be Agile

      Modules:

      • Agile Foundations
      • Manage Organizational Change to Support Agile Delivery (Future)

      Note: Modules listed as (Future) are in development and may be available in draft format.

      Map challenges to supporting modules

      Agile Challenges

      Supporting Resources

      Difficulty with establishing autonomous Agile teams (self managing, cross functional teams that are empowered by the organization to deliver)

      Modules:

      • Agile Foundations
      • Manage Organizational Change to Support Agile Delivery (Future)
      Lack of management support for Agile

      Modules:

      • Agile Foundations
      • Manage Organizational Change to Support Agile Delivery (Future)
      Poor understanding of Agile estimation techniques and how to apply them effectively

      Modules:

      • Agile Foundations
      • Estimation Module
      Difficulty creating effective product roadmaps in Agile

      Modules:

      • Agile Foundations
      • Product Roadmapping Tool
      How do we know when an Agile project is ready to go live

      Modules:

      • Agile Foundations
      • Decide When to Go Live (Future)
      Sprint goals are not being consistently met, or Sprint deliverables that are full of bugs

      Modules:

      • Agile Foundations
      • Establish Effect Quality Assurance for Agile Delivery (Future);
      • Use Test Automation Effectively (Future)

      Note: Modules listed as (Future) are in development and may be available in draft format.

      Map challenges to supporting blueprints

      Agile Challenges

      Supporting Resources

      Difficulty establishing an effective product owner (PO) or uncertainty about the PO role

      Blueprints: Build a Better Product Owner; Managing Requirements in an Agile Environment

      Uncertainty about minimum viable product (MVP) and how to identify your MVP

      Blueprints: Deliver on Your Digital Product Vision; Managing Requirements in an Agile Environment

      How non-Agile teams (like architecture, info sec, operations, etc.) work with Agile teams

      Blueprints: Create a Horizontally Optimized SDLC to Better Meet Business Demands, Extend Agile Practices Beyond IT, Implement DevOps Practices That Work; Build Your BizDevOps Playbook, Embed Security into the DevOps Pipeline

      Project Governance/Gating processes that are unfriendly to Agile

      Blueprints: Streamline Your Management Process to Drive Performance, Drive Business Value With a Right-Sized Project Gating Process

      Uncertainty about the role of a PM/PMO in Agile

      Blueprints: Define the Role of Project Management in Agile and Product-Centric Delivery, Create a Horizontally Optimized SDLC to Better Meet Business Demands

      Uncertainty about how to budget/plan Agile projects

      Blueprints: Identify and Reduce Agile Contract Risk

      Creating an Agile friendly RFP/Contract (e.g. how to contract and work with an Agile vendor)

      Blueprints: Identify and Reduce Agile Contract Risk

      Note: Modules listed as (Future) are in development and may be available in draft format.

      Map challenges to supporting blueprints

      Agile Challenges

      Supporting Resources

      An Agile skills deficit (e.g. new-to-Agile teams who have difficulty "doing Agile right")

      Blueprints: Perform an Agile Skills Assessment; Mentoring for Agile Teams

      General resistance in the organization to process changes required by Agile

      Blueprints: Master Organizational Change Management Practices

      Lack of Agile training, piloting and coaching being offered by the organization

      Blueprints: Perform an Agile Skills Assessment; Mentoring for Agile Teams

      Different Agile approaches are used by different teams, making it difficult to work together

      Blueprints: Create a Horizontally Optimized SDLC to Better Meet Business Demands, Extend Agile Practices Beyond IT

      Backlog management challenges (e.g. how to manage a backlog, and make effective use of epics, features, user stories, tasks and bugs)

      Blueprints: Deliver on Your Digital Product Vision, Managing Requirements in an Agile Environment

      Quality Assurance challenges (testing not being done well on Agile projects)

      Blueprints: Build a Software Quality Assurance Program, Automate Testing to Get More Done

      Hierarchical management practices and organization boundaries make it difficult to be Agile

      Blueprints: Master Organizational Change Management Practices

      Map challenges to supporting blueprints

      Agile Challenges

      Supporting Resources

      Difficulty with establishing autonomous Agile teams (self managing, cross functional teams that are empowered by the organization to deliver)

      Blueprints: Master Organizational Change Management Practices

      Lack of management support for Agile

      Blueprints: Master Organizational Change Management Practices

      Poor understanding of Agile estimation techniques and how to apply them effectively

      Blueprints: Estimate Software Delivery with Confidence, Managing Requirements in an Agile Environment

      Difficulty creating effective product roadmaps in Agile

      Blueprints: Deliver on Your Digital Product Vision

      How do we know when an Agile project is ready to go live

      Blueprints: Optimize Applications Release Management,Drive Business Value With a Right-Sized Project Gating Process, Managing Requirements in an Agile Environment

      Sprint goals are not being consistently met, or sprint deliverables that are full of bugs

      Blueprints: Build a Software Quality Assurance Program, Automate Testing to Get More Done, Managing Requirements in an Agile Environment

      Step 2.3

      Move stepwise to iterative Agile delivery (Optional)

      Activities

      2.3.1 (Optional) Identify a hypothetical project
      2.3.2 (Optional) Capture your traditional delivery approach
      2.3.3 (Optional) Consider what a two-phase delivery looks like
      2.3.4 (Optional) Consider what a four-phase delivery looks like
      2.3.5 (Optional) Consider what a four-phase delivery with monthly sprints looks like
      2.3.6 (Optional) Decide on your target state and the steps required to get there

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand the changes that must take place in your organization to support a more Agile delivery approach.

      Moving stepwise from traditional to Agile

      Your transition to Agile and more frequent releases doesn't need to be all at once. Organizations may find it easier to build toward smaller iterations.

      An image of the stepwise approach to adopting Agile.

      Exercise 2.3.1 (Optional) Identify a hypothetical project

      15-30 minutes

      1. As a group, consider some typical, large, mission-critical system deliveries your organization has done in the past (name a few as examples).
      2. Imagine a project like this has been assigned to your team, and the plan calls for delivering the system using your traditional delivery approach and taking two years to complete.
      3. Give this imaginary project a name (e.g. traditional project, our project).

      Name of your imaginary 2-year long project:

      e.g. Big Bang ERP

      Brief Project Description:

      e.g. Replace home-grown legacy ERP with a modern COTS product in a single release scheduled to be delivered in 24 months

      Record this in the Roadmap for Transition to Agile Template

      Info-Tech Best Practice

      For best results, complete these sub-exercises with representatives from as many functional areas as possible
      (e.g. stakeholders, project management, business analysis, development, testing, operations, architecture, infosec)

      Output

      • An imaginary delivery project that is expected to take 2 years to complete

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.2 (Optional) Capture your traditional delivery approach

      30 minutes

      1. As a group, discuss and capture the high-level steps followed (after project approval) in your traditional delivery approach using the table below and on the next page.

      Step

      Description

      Who is involved

      1
      • Gather detailed requirements (work with project stakeholders to capture all requirements of the system and produce a Detailed Requirements Document)

      PM, Business Analysts, Stakeholders, etc.

      2
      • Produce a Detailed Design Document (develop a design that will meet all requirements identified in the Detailed Requirements Document)
      • Produce a Detailed Test Plan for acceptance of the system
      • Produce a Detailed Project Plan for the system delivery
      • Perform threat and privacy assessment (using the detailed requirements and design documents, perform a Threat Risk Assessment and Privacy Impact Analysis)
      • Submit detailed design to Architecture Review Board
      • Provide Operations with full infrastructure requirements
      PM, Architects, InfoSec, ARB, Operations, etc.
      3
      • Develop software (follow the Detailed Design Document and develop a system which meets all requirements)
      • Perform Unit Testing on all modules of the system as they are developed
      PM, Developers, etc.
      4
      • Create Production Environment based on project specification
      • Perform Integration testing of all modules to ensure the system works as designed
      • Produce an Integration Test Report capturing the results of testing and any deficiencies
      PM, Testers, etc.
      5
      • Fix all Sev 1 and Sev 2 deficiencies found during Integration Testing
      • Perform regression testing
      • Perform User Acceptance Testing as per the Detailed Test Plan
      PM, Developers, Testers, Stakeholders, etc.
      6
      • Product Deployment Plan
      • Perform User and Operations Training
      • Produce updated Threat Risk Assessment and Privacy Impact Analysis
      • Seek CAB (Change Approval Board) approval to go live
      PM, Developers, Testers, Operations, InfoSec, CAB, etc.
      7
      • Close out and Lessons Learned
      • Verify value delivery
      PM, etc.

      Output

      • The high-level steps in your current (traditional) delivery approach and who is involved in each step

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.2 (Optional) Capture your traditional delivery approach

      Step

      Description

      Who is involved

      1
      • Gather detailed requirements (work with project stakeholders to capture all requirements of the system and produce a Detailed Requirements Document)

      PM, Business Analysts, Stakeholders, etc.

      2
      • Produce a Detailed Design Document (develop a design that will meet all requirements identified in the Detailed Requirements Document)
      • Produce a Detailed Test Plan for acceptance of the system
      • Produce a Detailed Project Plan for the system delivery
      • Perform threat and privacy assessment (using the detailed requirements and design documents, perform a Threat Risk Assessment and Privacy Impact Analysis)
      • Submit detailed design to Architecture Review Board
      • Provide Operations with full infrastructure requirements
      PM, Architects, InfoSec, ARB, Operations, etc.
      3
      • Develop software (follow the Detailed Design Document and develop a system which meets all requirements)
      • Perform Unit Testing on all modules of the system as they are developed
      PM, Developers, etc.
      4
      • Create Production Environment based on project specification
      • Perform Integration testing of all modules to ensure the system works as designed
      • Produce an Integration Test Report capturing the results of testing and any deficiencies
      PM, Testers, etc.
      5
      • Fix all Sev 1 and Sev 2 deficiencies found during Integration Testing
      • Perform regression testing
      • Perform User Acceptance Testing as per the Detailed Test Plan
      PM, Developers, Testers, Stakeholders, etc.
      6
      • Product Deployment Plan
      • Perform User and Operations Training
      • Produce updated Threat Risk Assessment and Privacy Impact Analysis
      • Seek CAB (Change Approval Board) approval to go live
      PM, Developers, Testers, Operations, InfoSec, CAB, etc.
      7
      • Close out and Lessons Learned
      • Verify value delivery
      PM, etc.

      Output

      • The high-level steps in your current (traditional) delivery approach and who is involved in each step

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.3 (Optional) Consider what a two-phase delivery looks like

      30 minutes

      1. As a group, imagine that project stakeholders tell you two years is too long to wait for the project, and they want to know if they can have something (even if it's not the whole thing) in production sooner.
      2. Now imagine that you are able to convince the stakeholders to work with you to do the following:
        1. Identify their most important project requirements.
        2. Work with you to describe a valuable subset of the project requirements which reflect about ½ of all features they need (call this Phase 1).
        3. Work with you to get this Phase 1 of the project into production in about 1 year.
        4. Agree to leave the remaining requirements (e.g. the less important ones) until Phase 2 (second year of project).
      3. As a group, identify:
        1. How hard this would be for your organization to do, on a scale of 1 to 10.
        2. Identify what changes are needed to make this happen (consider people, processes, and technology).
        3. Capture your results using the table on the following slide.

      Output

      • The high-level steps in your current (traditional) delivery approach and who is involved in each step

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.3 (Optional) Consider what a two-phase delivery looks like

      30 minutes

      1. What would be needed to let you deliver a two-year project in two one-year phases considering people, process, and technology?

      People

      Processes

      Technology

      • e.g. Stakeholders would need to make hard decisions about which features are more valuable/important than others (and stick to them)
      • e.g. Delivery team and stakeholders would need to work closely together to determine what is a feasible and valuable set of features which can go live in Phase 1
      • e.g. Operations will need to be prepared to support Phase 1 (earlier than before), and then support an updated system after Phase 2
      • e.g. No significant change to traditional processes other than delivering in two phases
      • e.g. Need to decide whether requirements for the full project need to be gathered up front, or do you just do Phase 1, and then Phase 2
      • e.g. No significant changes other than we need a production environment sooner, and infrastructure requirements for the full project may be different from what is needed just for Phase 1

      How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)

      e.g. 2

      Output

      • Understand how your organization would deliver a large project in two phases

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.4 (Optional) Consider what a four-phase delivery looks like

      30 minutes

      1. Now, imagine that project stakeholders tell you that even one year is still too long to wait for something of value in production, and they want to know if they can have something (even if it's not the whole thing) in production sooner.
      2. Now imagine that you are able to convince the stakeholders to work with you to do the following:
        1. From the "Phase 1" requirements in Exercise 2.3.3, they will identify the most important ones that they need first.
        2. They will work with you to describe a valuable subset of these project requirements which reflect about ½ of all features they need (call this Phase 1A).
        3. They will work with you to get this Phase 1A of the project into production in about six months.
        4. Agree to leave all the remaining requirements (e.g. the less important ones) until later phases.
      1. As a group, identify:
        1. How hard this would be for your organization to do, on a scale of 1 to 10?
        2. Identify what changes are needed to make this happen (consider people, processes, and technology).
        3. Capture your results using the table on the following slide.

      Output

      • Understand how your organization would deliver a large project in two phases

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.4 (Optional) Consider what a four-phase delivery looks like

      30 minutes

      1. What more would be needed to let you deliver a two-year project in four, six-month phases considering people, process, and technology?

      People

      Processes

      Technology

      • e.g. Stakeholders would need to make even harder (and faster) decisions about which features are most valuable/important than others.
      • e.g. Because we will be delivering releases so quickly, we'll ask the stakeholders to nominate a "primary contact" who can make decisions on requirements for each phase (also to answer questions from the project team, when needed, so they aren't slowed down).
      • e.g. Delivery team and the "primary contact" would work closely together to determine what is a feasible and valuable set of features to go live within Phase 1A, and then repeat this for the remaining Phases.
      • e.g. Operations will need to be prepared to support Phase 1A (even earlier than before), and then support the remaining phases. Ask them to dedicate someone as primary contact for this series of releases, and who provides guidance/support as needed.

      e.g. Heavy and time-consuming process steps (e.g. architecture reviews, data modelling, infosec approvals, change approval board) will need to be streamlined and made more "iteration-friendly."

      e.g. Gather detailed requirements only for Phase 1A, and leave the rest as high-level requirements to be more fully defined at the beginning of each subsequent phase.

      • e.g. We will need (at a minimum) a Production, and a Pre-production environment set up (and earlier in the project lifecycle) and solid regression testing at the end of each phase to ensure the latest Release doesn't break anything.
      • e.g. Since we will be going into production multiple times over this 2-year project, we should consider using automation (e.g. automated build, automated regression testing, and automated deployment).

      How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)

      e.g. 5

      Output

      • Understand how your organization would deliver a large project in two phases

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.5 (Optional) Consider what a four-phase delivery with monthly sprints looks like

      30 minutes

      1. Now, imagine that project stakeholders tell you that they are happy with the six-month release approach (e.g. expect to go live four times over the two-year project, with each release providing increased functionality), but they want to see your team's progress frequently between releases.
      2. Additionally, stakeholders tell you that instead of asking you to provide the traditional monthly project status reports, they want you to demonstrate whatever features you have built and work for the system on a monthly basis. This will be done in the form of a demonstration to a selected list of stakeholders each month.
      3. Each month, your team must show working, tested code (not prototypes or mockups, unless asked for) and demonstrate how this month's deliverable brings value to the business.
      4. Furthermore, the stakeholders would like to be able to test out the system each month, so they can play with it, test it, and provide feedback to your team about what they like and what they feel needs to change.
      5. To help you to achieve this, the stakeholders designate their primary contact as the "product owner" (PO) who will be dedicated to the project and will help your team to decide what is being delivered each month. The PO will be empowered by the stakeholders to make decisions on scope and priority on an expedited basis and will also answer questions on their behalf when your team needs guidance.
      6. You agree with the stakeholders these one-month deliverables will be called "sprints."

      Output

      • Understand how your organization would deliver a large project in two phases

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.5 (Optional) Consider what a four-phase delivery with monthly sprints looks like

      30 minutes

      1. What more would be needed to let you deliver a two-year project in 24 one-month sprints (plus four six-month releases) considering people, process, and technology?

      People

      Processes

      Technology

      • e.g. The team will need to work closely with the product owner (and/or stakeholders) on a continuous basis to understand requirements and their relative priority
      • e.g. Stakeholders will need to be available for demos and testing at the end of each sprint, and provide feedback to the team as quickly as possible
      • e.g. all functional siloes within IT (e.g. analysts, architects, infosec, developers, testers, operations) will need to work hand in hand on a continuous basis to deliver working tested code into a demo/test environment at the end of each sprint
      • e.g. there isn't enough time in each sprint to have team members working in siloes, instead, we will need to work together as a team to ensure that all aspects of the sprint (requirements, design, build, test, etc.) are worked on as needed (team is equally and collectively responsible for delivery of each sprint)
      • e.g. We can't deliver much in 1-month sprints if we work in siloes and are expected to do traditional documentation and handoffs (e.g. requirements document), so we will use a fluid project backlog instead of requirements documents, we will evolve our design iteratively over the course of the many sprints, and we will need to streamline the CAB process to allow for faster (more frequent) deployments
      • e.g. We will need to evolve the system's data model iteratively over the course of many sprints (rather than a one-and-done approach at the beginning of the project)
      • e.g. We will need to quickly decide the scope to be delivered in each sprint (focusing on highest value functionality first). Each sprint should have a well-defined "goal" that the team is trying to achieve
      • We will need any approval processes (e.g. architecture review, infosec review, CAB approval) to be streamlined and simplified in order to support more frequent and iterative deployment of the system
      • e.g. We will need to maximize our use of automation (build, test, and deploy) in order to maximize what we can deliver in each sprint (Note: the ROI on automation is much higher when we deliver in sprints than in a one-and-done delivery because we are iterating repeatedly over the course of the project
      • e.g. We will need to quickly stand-up environments (dev, test, prod, etc.) and to make changes/enhancements to these environments quickly (it makes sense to leverage infrastructure as a service [IaaS] techniques here)
      • e.g. We will need to automate our security related testing (e.g. static and dynamic security testing, penetration testing, etc.) so that it can be run repeatedly before each release moves into production. We may need to evolve this automated testing with each sprint depending on what new features/functions are being delivered in each release

      How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)

      e.g. 8

      Output

      • Understand how your organization would deliver a large project in two phases

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.6 (Optional) Define the steps to reach your target state

      30 minutes

      1. From Exercises 2.3.1-2.3.5, identify your current state on the stepwise transition from traditional to Agile (e.g. one-and-done).
      2. Then, identify your desired future state (e.g. 24 one-month sprints with six-month releases).
      3. Now, review your people, process, and technology changes identified in Exercises 2.3.1-2.3.5 and create a roadmap for this transition using the table on the next slide.

      Identify your current state from Exercises 2.3.1-2.3.5

      e.g. One-and-done

      Identify your desired state from Exercises 2.3.1-2.3.5

      e.g. 24x1 Month Sprints

      Output

      • A roadmap and timeline for adopting a more Agile delivery approach

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.3.6 (Optional) Define the steps to reach your target state

      30 minutes

      1. Fill in the table below with your next steps. Identify who will be responsible for each step along with the timeline for completion: "Now" refers to steps you will take in the immediate future (e.g. days to weeks), "Next" refers to steps you will take in the medium term (e.g. weeks to months), and "Later" refers to long-term items (e.g. months to years).

      Now

      Next Later

      What are you going to do now?

      What are you going to do very soon?

      What are you going to do in the future?

      Roadmap Item

      Who

      Date

      Roadmap Item

      Who

      Date

      Roadmap Item

      Who

      Date

      Work with Stakeholders to identify a product owner for the project.

      AC

      Jan 1

      Break down full deliverable into 4 phases with high level requirements for each phase

      DL

      Feb 15

      Work with operations to set up Dev, Test, Pre-Prod, and Prod environments for first phase (make use of automation/scripting)

      DL

      Apr 15

      Work with PO and stakeholders to help them understand Agile approach

      Jan 15

      Work with PO to create a project backlog for the first phase deliverable

      JK

      Feb 28

      Work with QA group to select and implement test automation for the project (start with smoke and regression tests)

      AC

      Apr 30

      Work with project gating body, architecture, infosec and operations to agree on incremental deliveries for the project and streamlined activities to get there

      AC

      Mar 15

      Record the results in the Roadmap for Transition to Agile Template

      Output

      • A roadmap and timeline for adopting a more Agile delivery approach

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Step 2.4

      Identify insights and team feedback

      Activities

      2.4.1 Identify key insights and takeaways
      2.4.2 Perform an exit survey

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your key insights and takeaways from Phase 2

      Exercise 2.4.1 Identify key insights and takeaways

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the intro to Agile presentation?
        2. What if any takeaways do participants feel are needed as a result of the presentation?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:
      What key insights have you gained? What takeaways have you identified?
      • (e.g. better understanding of Agile mindset, principles, and practices)
      • (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Exercise 2.4.2 Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Agile Modules

      Prioritize Agile support with your top challenges

      Backlog Management

      Scrum Simulation

      Estimation

      Product Owner

      Product Roadmapping

      1: User stories and the art of decomposition

      2: Effective backlog management & refinement

      3: Identify insights and team feedback

      1: Scrum sprint planning and retrospective simulation

      2: Pass the balls – sprint velocity game

      1: Improve product backlog item estimation

      2: Agile estimation fundamentals

      3: Understand the wisdom of crowds

      4: Identify insights and team feedback

      1: Understand product management fundamentals

      2: The critical role of the product owner

      3: Manage effective product backlogs and roadmaps

      4: Identify insights and team feedback

      1: Identify your product roadmapping pains

      2: The six "tools" of product roadmapping

      3: Product roadmapping exercise

      Organizations often struggle with numerous pain points around Agile delivery.
      The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.

      Agile modules provide supporting activities:
      Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Backlog Management Module

      Manage your backlog effectively

      Activities

      Backlog 1.1 Identify your backlog and user story decomposition pains
      Backlog 1.2 What are user stories and why do we use them?
      Backlog 1.3 User story decomposition: password reset
      Backlog 1.4 (Optional) Decompose a real epic

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of backlog management and user story decomposition.

      Backlog Exercise 1.1 Identify your backlog and user story decomposition pains

      30-60 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What specific challenges you are facing with backlog management
        2. What specific challenges you are facing with user story decomposition
      1. Capture your findings in the table below:

      What are your specific backlog management and user story decomposition challenges?

      • (e.g. We have trouble telling the difference between epics, features, user stories, and tasks)
      • (e.g. We often don't finish all user stories in a sprint because some of them turn out to be too big to complete in one sprint)

      Output

      • Your specific backlog management and user story decomposition challenges

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      User stories and the art of decomposition

      User stories are core to Agile delivery.

      Good user story decomposition practices are key to doing Agile effectively.

      Agile doesn't use traditional "shoulds" and "shalls" to capture requirements

      Backlog Exercise 1.2 What are user stories and why do we use them?

      30-60 minutes

      1. User stories are a simple way of capturing requirements in Agile and have the form:

      Why do we capture requirements as user stories (what value do they provide)?

      How do they differ from traditional (should/shall) requirements (and are they better)?

      What else stands out to you about user stories?

      as a someone I want something so that achieve something.

      Example:
      As a banking customer, I want to see the current balance of my accounts so that I can know how much money I have in each account.

      Output

      • A better understanding of user stories and why they are used in Agile delivery

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      User stories are "placeholders for conversations"

      User stories enable collaboration and conversations to fully determine actual business requirements over time.

      e.g. As a banking customer, I want to see the current balance of my accounts so that I can know how much money I have in each account.

      Requirements, determined within the iterations, outline the steps to complete the story: how the user will access their account, the types of funds allowed, etc.

      User stories allow the product owners to prioritize and manage the product needs (think of them as "virtual sticky notes").

      User stories come in different "sizes"

      These items form a four-level hierarchy: epics, features, user stories, and tasks.
      They are collectively referred to as product backlog items or (PBIs)

      A table with the following headings: Agile; Waterfall; Relationship; Definition

      The process of taking large PBIs (e.g. epics and features) and breaking them down in to small PBIs (e.g. user stories and tasks) is called user story decomposition and is often challenging for new-to-Agile teams

      Backlog Exercise 1.3 User story decomposition: password reset

      30-60 minutes

      1. As a group, consider the following feature, which describes a high-level requirement from a hypothetical system:
        • FEATURE: As a customer, I want to be able to set and reset my password, so that I can transact with the system securely.
      2. Imagine your delivery team tells you that this is user story is too large to complete in one sprint, so they have asked you to decompose it into smaller pieces. Work together to break this feature down into several smaller user stories:
      User Story 1: User Story 2: User Story 3:
      As A I Want So That. As A I Want So That. As A I Want So That.

      Output

      • An epic which has been decomposed into smaller user stories which can be completed independently

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Backlog Exercise 1.3 User story decomposition: password reset

      Epic: As a customer, I want to be able to set and reset my password, so that I can transact securely.

      A single epic can be broken down into multiple user stories

      User Story 1: User Story 2: User Story 3: User Story 4:
      This is a picture of user story 1 This is a picture of user story 2 This is a picture of user story 3 This is a picture of user story 4

      Acceptance Criteria:
      Given that the customer has a password that they want to change,
      When the administrator clicks reset password on the admin console,
      Then the system will change the password and send it to the user.

      Acceptance Criteria:
      Given that the customer has a password that they want to change,
      When they click reset password in the system,
      Then the system will allow them to choose a new password and will save it the password and send it to the user.

      Acceptance Criteria:
      Given that the customer has not logged onto the system before,
      When they initially log in,
      Then the system will prompt them to change their password.

      Acceptance Criteria:
      Given that a password is stored in the database,
      When anyone looks at the password field in the database,
      Then the actual password will not be visible or easily decrypted.

      Are enablers included in your backlogs? Should they be?

      An enabler is any support activity needed to provide the means for future functionality. Enablers build out the technical foundations (e.g. architecture) of the product and uphold technical quality standards.

      Your audience will dictate the level of detail and granularity you should include in your enabler, but it is a good rule of thumb to stick to the feature level.

      Enablers

      Description

      Enabler Epics

      Non-functional and other technical requirements that support your features (e.g. data and system requirements)

      Enabler Capabilities of Features

      Enabler Stories

      Consider the various types of enabler

      Exploration

      Architectural

      Any efforts toward learning customer or user needs and creation of solutions and alternatives. Exploration enablers are heavily linked to learning milestones.

      Any efforts toward building components of your architecture. These will often be linked to delivery teams other than your pure development team.

      Infrastructure

      Compliance

      Any efforts toward building various development and testing environments. Again, these are artifacts that will relate to other delivery teams.

      Any efforts toward regulatory and compliance requirements in your development activities. These can be both internal and external.

      Source: Scaled Agile, "Enablers."

      Create, split, and bundle your PBIs

      The following questions can be helpful in dissecting an epic down to the user story level. The same line of thinking can also be useful for bundling multiple small PBIs together.

      An image showing how to Create, split, and bundle your PBIs

      Backlog Exercise 1.4 (Optional)
      Decompose a real epic

      30 minutes

      1. As a group, select a real epic or feature from one of your project backlogs which needs to be decomposed:
      2. Work together to decompose this epic down into several smaller features and/or user stories (user stories must be small enough to reasonably be completed within a sprint):

      Epic to be decomposed:

      As a ____ I want _____ so that ______

      User Story 1: User Story 2: User Story 3:
      As A I Want So That. As A I Want So That. As A I Want So That.

      Output

      • A real epic from your project backlog which has been decomposed into smaller features and user stories

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Backlog Management Module

      Manage your backlog effectively

      Activities

      Backlog 2.1 Identify enablers and blockers

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Backlog PBI filters.
      • A better understanding of backlog types and levels.

      Effective backlog management and refinement

      Working with a tiered backlog

      an image showing the backlog tiers: New Idea; Ideas; Qualified; Ready - sprint.

      Use a tiered approach to managing your backlog, and always work on the highest priority items first.

      Distinguish your specific goals for refining in the product backlog vs. planning for a sprint itself

      Often backlog refinement is used interchangeably or considered a part of sprint planning. The reality is they are very similar, as the required participants and objectives are the same however, there are some key differences.

      An image of a Venn diagram comparing Backlog Refinement to sprint Planning.

      A better way to view them is "pre-planning" and "planning."

      A backlog stores and organizes PBIs at various stages of readiness

      A well-formed backlog can be thought of as a DEEP backlog:

      • Detailed Appropriately: Product backlog items (PBIs) are broken down and refined as necessary.
      • Emergent: The backlog grows and evolves over time as PBIs are added and removed.
      • Estimated: The effort a PBI requires is estimated at each tier.
      • Prioritized: The PBIs value and priority are determined at each tier.

      (Perforce, 2018)

      An image showing the Ideas; Qualified; Ready; funnel leading to the sprint approach.

      Backlog tiers facilitate product planning steps

      An image of the product planning steps facilitated by Backlog Tiers

      Each activity is a variation of measuring value and estimating effort to validate and prioritize a PBI.

      A PBI meets our definition of done and passes through to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.

      Backlog Exercise 2.1 Build a starting checklist of quality filters

      60 minutes

      1. Quality filters provide a checklist to ensure each Product Backlog Item (PBI) meets our definition of Done and is ready to move to the next backlog group (status).
      2. Create a checklist of basic descriptors that must be completed between each backlog level.
      3. If you completed this exercise in a different Module, review and update it here.
      4. Use this information to start your product strategy playbook in Deliver on Your Digital Product Vision.

      An image of the backlog tiers, identifying where product backlog and sprint backlog are

      Output

      • List of enablers and blockers to establishing product owners

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Outline the criteria to proceed to the next tier via quality filters

      Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.

      An image showing the approach you will use to Outline the criteria to proceed to the next tier via quality filters

      Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Facilitator slides: Explaining MVP

      Notes and Instructions

      The primary intent of this exercise is to explain the complex notion of MVP (it is one of the most misunderstood and contentious issues in Agile delivery). The exercise is intended to explain it in a simple and digestible way that will fundamentally change participants' understanding of MVP.

      Note that the slide contains animations.

      Imagine that your stakeholder tells you they want a blue 4-door sedan (consider this our "MVP" at this point), and you decide to build it the traditional way. As you build it (tires, then frame, then body, then joint body with frame and install engine), the stakeholder doesn't have anything they can use, and so they are only happy (and able to get value) at the end when the entire car is finished (point out the stakeholder "faces" go from unhappy to happy in the end).
      Animation 1:
      When we use Agile methods, we don't want to wait until the end before we have something the stakeholders can use. So instead of waiting until the entire car is completed, we decide our first iteration will be to give the stakeholder "a simple (blue) wheeled transportation device"…namely a skateboard that they can use for a little while (it's not a car, but it is something the stakeholder can use to get places).
      Animation 2:
      After the stakeholder has tried out the skateboard, we ask for feedback. They tell us the skateboard helped them to get around faster than walking, but they don't like the fact that it is so hard to maintain your balance on it. So, we add a handle to the skateboard to turn it into a scooter. The stakeholder then uses the scooter for a while. Stakeholder feedback says staying balanced on the scooter is much easier, but they don't have a place to put groceries when they go shopping, so can we do something about that?
      (Continued on next slide…)

      Facilitator slides: Explaining MVP

      Notes and Instructions
      Animation 3:
      Next, we build the stakeholder a bicycle and let them use it for a while before asking for feedback. The stakeholder tells us they love the bicycle, but they admit they get tired on long trips, so is there something we can do about that?
      Animation 4:
      So next we add a motor to the bicycle to turn it into a motorcycle, and again we give it to the stakeholder to use for a while. When we ask the stakeholder for feedback, they tell us that they love the motorcycle so much because they love the feeling of the wind in their hair, they've decided that they no longer want a 4-door sedan, but instead would prefer a blue 2-door convertible.
      Animation 5:
      And so, for our last iteration, we build the stakeholder what they actually wanted (a blue 2-door convertible) instead of what they asked for (a blue 4-door sedan), and we see that they are happier than they would have been if we had delivered the traditional way.

      INSIGHTS:

      • An MVP cannot be fully known at the beginning of a project (it is the "journey" of creating the MVP with stakeholders that defines what it looks like in the end).
      • Sometimes, stakeholders don't (or can't) know what they want until they see it.
      • There is no "straight path" to your MVP, you determine the path forward based on what you learned in the previous iterations.
      • This approach is part of the "power of Agile" and demonstrates why Agile can produce better outcomes and happier stakeholders.

      Understanding minimum viable product

      NOT Like This:

      This is a series of images. The top half of the image, shows building a car by starting with the wheels. The bottom Image shows the progression from skateboard, to scooter, to bike, to motorcycle, to car.

      It's Like This:

      Use iterations to maximize value delivery

      An image showing how to use iterations to maximize value delivery.

      Use iterations to reduce accumulated risk

      An image showing how to use iterations to reduce accumulated risk.

      Understanding MVP
      (always be ready to go live)

      A great and wise pharaoh hires two architects to build his memorial pyramids.

      An image shows two architects contribution to pyramid construction.

      Understanding MVP
      (always be ready to go live)

      Several years go by, and then…

      The pharaoh is on his death bed.

      Backlog Management Module

      Manage your backlog effectively

      Activities

      Backlog 3.1 Identify key insights and takeaways
      Backlog 3.2 Perform exit survey and capture results

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your key insights and takeaways.

      Backlog Exercise 3.1 Identify key insights and takeaways

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the Intro to Agile presentation?
        2. What if any takeaways do participants feel are needed as a result of the presentation?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:

      What key insights have you gained?

      What takeaways have you identified?

      • (e.g. better understanding of Agile mindset, principles, and practices)
      • (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Backlog Exercise 3.2 Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Agile Modules

      Prioritize Agile support with your top challenges

      Backlog Management

      Scrum Simulation

      Estimation

      Product Owner

      Product Roadmapping

      1: User stories and the art of decomposition

      2: Effective backlog management & refinement

      3: Identify insights and team feedback

      1: Scrum sprint planning and retrospective simulation

      2: Pass the balls – sprint velocity game

      1: Improve product backlog item estimation

      2: Agile estimation fundamentals

      3: Understand the wisdom of crowds

      4: Identify insights and team feedback

      1: Understand product management fundamentals

      2: The critical role of the product owner

      3: Manage effective product backlogs and roadmaps

      4: Identify insights and team feedback

      1: Identify your product roadmapping pains

      2: The six "tools" of product roadmapping

      3: Product roadmapping exercise

      Organizations often struggle with numerous pain points around Agile delivery.
      The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.

      Agile modules provide supporting activities:
      Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Scrum Simulation Module

      Scrum sprint planning and retrospective simulation

      Activities

      1.1 Identify your scrum pains
      1.2 Review scrum simulation intro
      1.3 Create a mock backlog
      1.4 Review sprint 0
      1.5 Determine a budget and timeline
      1.6 Understand minimum viable product
      1.7 Plan your first sprint
      1.8 Do a sprint retrospective
      1.9 "What if" exercise (understanding what a fluid backlog really means)
      1.10 A sprint 1 example
      1.11 Simulate more sprints

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of Scrum (particularly backlog management and user story decomposition).

      Facilitator slides: Scrum Simulation Introduction

      Introduction Tab

      Talk to the nature of the Scrum team:

      • Collective ownership/responsibility for delivery.
      • The organization has given you great power. With great power comes great responsibility.
      • You may each be specialists in some way, but you need to be prepared to do anything the project requires (no one goes home until everyone can go home).
      • Product owner: Special role, empowered by the organization to act as a single, authoritative voice for stakeholders (again great power/responsibility), determines requirements and priorities, three ears (business/stakeholders/team), holds the vision for the project, answer questions from the team (or finds someone who can answer questions), must balance autonomy with stakeholder needs, is first among equals on the Scrum team, is laser-focused on getting the best possible outcome with the resources, money, and circumstances ← PO acts as the "pathfinder" for the project.
      • Talk about the criticality and qualities of the PO: well-respected, highly collaborative, wise decision maker, a "get it done" type (healthy bias toward immediacy), has a vision for product, understands stakeholders, can get stakeholders' attention when needed, is dedicated full-time to the project, can access help when needed, etc.
      • The rest of you are the delivery team (have avoided singling out an SM for this – not needed for the exercise – but SM is the servant leader/orchestra conductor for the delivery team. The facilitator should act as a pseudo-SM for this exercise).

      Speak about the "bank realizes that the precise scope of the first release can only be fully known at the end of the project" statement and what it means.

      Discuss exercise and everyone's roles (make sure everyone clear), make it as realistic as possible. Your level of participation will determine how much value you get.

      Discuss any questions the participants might have about the background section on the introduction tab. The exercise has been defined in a way that minimizes the scope and complexity of the work to be done by assuming there are existing web-capable services exposed to the bank's legacy system(s) and that the project is mostly about putting a deployable web front end in place.

      Speak about "definition of done": Why was it defined this way? What are the boundaries? What happens if we define it to be only up to unit testing?

      Facilitator slides: Scrum Simulation, Create a Mock Backlog

      Create a Mock Backlog Tab

      This exercise is intended to help participants understand the steps involved in creating an initial backlog and deciding on their MVP.

      Note: The output from this exercise will not be used in the remainder of the simulation (a backlog for the simulation already exists on tab Sprint 0) so don't overdo it on this exercise. Do enough to help the participants understand the basic steps involved (brainstorm features and functions for the app, group them into epics, and decide which will be in- and out-of-scope for MVP). Examples have been provided for all steps of this exercise and are shown in grey to indicate they should be replaced by the participants.

      Step 1: Have all participants brainstorm "features and functions" that they think should be available in the online banking app (stop once you have what feels like a "good enough" list to move on to the next step) – these do not need to be captured as user stories just yet.

      Step 2: Review the list of features and functions with participants and decide on several epics to capture groups of related features and functions (bill payments, etc.). Think of these as forming the high-level structure of your requirements. Now, organize all the features and functions from Step 1, into their appropriate epic (you can identify as many epics as you like, but try to keep them to a minimum).

      Step 3: Point out that on the Introduction tab, you were told the bank wants the first release to go live as soon as possible. So have participants go over the list of features and functions and identify those that they feel are most important (and should therefore go into the first release – that is, the MVP), and which they would leave for future releases. Help participants think critically and in a structured way about how to make these very hard decisions. Point out that the product owner is the ultimate decision maker here, but that the entire team should have input into the decision. Point out that all the features and functions that make up the MVP will be referred to as the "project backlog," and all the rest will be known as the "product backlog" (these are of course, just logical separations, there is only one physical backlog).

      Step 4: This step is optional and involves asking the participants to create user stories (e.g. "As a __, I want ___ so that ___") for all the epics and features and functions that make up their chosen MVP. This step is to get them used to creating user stories, because they will need to get used to doing this. Note that many who are new to Agile often have difficulty writing user stories and end up overdoing it (e.g. providing a long-winded list of things in the "I want ___" part of the user story for an epic) or struggling to come up with something for the "so that ____" part). Help them to get good at quickly capturing the gist of what should be in the user story (the details come later).

      Facilitator slides: Scrum Simulation, Budget and Timeline

      Project Budget and Timeline

      Total Number of Sprints = 305/20 = 15.25 → ROUND UP TO 16 (Why? You can't do a "partial sprint" – plus, give yourself a little breathing room.)

      Cost Per Sprint = 6 x $75 x 8 x 10 = $36,000

      Total Timeline = 16 * 2 = 32 Weeks

      Total Cost of First Release = $36,000 x 16 = $572,000

      Talk about the "commitment" a Scrum delivery team makes to the organization ("We can't tell you exactly what we will deliver, but based on what we know, if you give the team 32 weeks, we will deliver something like what is in the project backlog – subject to any changes our stakeholder tell us are needed"). Most importantly, the team commits to doing the most important backlog items first, so if we run out of time, the unfinished work will be the least valuable user stories. Lastly, to keep to the schedule/timeline, items may move in and out of the project backlog – this is part of the normal and important "horse trading" that takes place on health Agile projects.

      Speak to the fact that this approach allows you to provide a "deterministic" answer about how long a project will take and how much it will cost while keeping the project requirements flexible.

      Facilitator slides: Scrum Simulation, Sprint 0

      Sprint 0 Tab

      This is an unprioritized list, organized to make sense, and includes a user story (plus some stuff), and "good enough estimates" – How good?... Eh! (shoulder shrug)
      Point out the limited ("lazy") investment → Agile principle: simplicity, the art of maximizing the work not done.
      Point out that only way to really understand a requirement is to see a working example (requirements often change once the stakeholders see a working example – the "that's not what I meant" factor).

      Estimates are a balancing act (good enough that we understand the overall approximate size of this, and still acknowledges that more details will have to wait until we decide to put that requirement into a Sprint – remember, no one knows how long this project is going to take (or even what the final deliverable will look like) so don't over invest in estimates here.)

      Sprint velocity calculation is just a best guess → be prepared to find that your initial guess was off (but you will know this early rather than at the end of the project). This should lead to a healthy discussion about why the discrepancy is happening (sprint retrospectives can help here). Note: Sprint velocity doesn't assume working evenings and weekends!

      Speak to the importance of Sprint velocity being based on a "sustainable pace" by the delivery team. Calculations that implicitly expect sustained overtime in order to meet the delivery date must be avoided. Part of the power of Agile comes from this critical insight. Critical → Your project's execution will need to be adjusted to accommodate the actual sprint velocity of the team!

      Point out the "project backlog" and separation from the "product backlog" (and no sprint backlog yet!).

      Point out the function/benefits of the backlog:

      • A single holding place for all the work that needs to be done (so you don't forget/ignore anything).
      • Can calculate how much work is left to do.
      • A mechanism for prioritizing deliverables.
      • A list of placeholders for further discussion.
      • An evolving list that will grow and shrink over time.
      • A "living document" that must be maintained over the course of the project.

      Talk about large items in backlog (>20 pts) and how to deal with them (do we need to break them up now?).

      Give participants time to review the backlog: Questions/What would you be doing if this were real/We're going to collectively work through this backlog.
      Sprint 0 is your opportunity to: get organized as a team, do high level design, strategize on approach, think about test data, environments, etc. – it is the "Ready-Set" in "Ready-Set-Go."
      Think about doing a High/Med/Low value determination for each user story.

      Simulation Exercise 1.1 Identify your Scrum pains

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        • What specific challenges are you facing with your Scrum practices?
      2. Capture your findings in the table below:

      What are your specific Scrum challenges?

      • (e.g. We don't know how to decide on our minimum viable product (MVP), or what to start working on first)
      • (e.g. We don't have a product owner assigned to the project)
      • (e.g. Our daily standups often take 30-60 minutes to complete)
      • (e.g. We heard Scrum was supposed to reduce the number of meetings we have, but instead, meetings have increased)
      • (e.g. We don't know how to determine the budget for an Agile project)

      Output

      • Your specific Scrum related challenges

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.2 Review Scrum Simulation intro

      30 minutes

      1. Ask participants to read the Introduction tab in the Scrum Simulation Exercise(5 minutes)
      2. Discuss and answer any questions the participants may have about the introduction (5 minutes)
      3. Discuss the approach your org would use to deliver this using their traditional approach (5 minutes)

      This is an image of the Introduction tab in the Scrum Simulation Exercise

      How would your organization deliver this using their traditional approach?

      1. Capture all requirements in a document and get signoff from stakeholders
      2. Create a detailed design for the entire system
      3. Build and test the system
      4. Deploy it into production

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Simulation Exercise 1.3 Create a mock backlog

      30-60 minutes

      Step 1: Brainstorm "Features and Functions" that the group feels would be needed for this app

      Capture anything that you feel might be needed in the Online Banking Application:

      • See account balances
      • Pay a bill online
      • Set up payees for online bill payments
      • Make a deposit online
      • See a history of account transactions
      • Logon and logoff
      • Make an e-transfer
      • Schedule a bill payment for the future
      • Search for a transaction by payee/date/amount/etc.
      • Register for app
      • Reset password

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Create a mock initial backlog for the simulated project

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.3 Create a mock backlog

      30-60 minutes

      Step 2: Identify your epics

      1. Categorize your "Features and Functions" list into several epics for the application:

      Epics

      "Features and Functions" in This Epic

      Administration

      - Logon and logoff
      - Register for app
      - Reset password

      Accounts

      - See account balances
      - See a history of account transactions
      - Search for a transaction by payee/date/amount

      Bill payments

      - Set up payees for online bill payments
      - Pay a bill online
      - Schedule a bill payment for the future

      Deposits

      - Make a deposit online

      E-transfers

      - Make an e-transfer

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Create a mock initial backlog for the simulated project

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.3 Create a mock backlog

      30-60 minutes

      Step 3: Identify your MVP

      1. Decide which "Features and Functions" will be in your MVP and which will be delivered in future releases:

      YOUR MVP (Project Backlog)

      Epics

      "Features and Functions" in This Epic

      Administration

      - Logon and logoff
      - Register for app

      Accounts

      - See account balances
      - See a history of account transactions

      Bill payments

      - Set up payees for online bill payments
      - Pay a bill online

      FOR FUTURE RELEASES (Product Backlog)

      Epics

      In Scope

      Deposits- Make a deposit online
      Accounts- Search for a transaction by payee/date/amount/etc.
      Bill payments- Schedule a bill payment for the future

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Create a mock initial backlog for the simulated project

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.3 Create a mock backlog

      30-60 minutes

      Step 3: Identify your MVP

      1. Decide which "Features and Functions" will be in your MVP and which will be delivered in future releases:

      YOUR MVP EPICS

      Epics

      "Features and Functions" in This Epic

      Administration

      - Logon and logoff
      - Register for app

      Accounts

      - See account balances
      - See a history of account transactions

      Bill payments

      - Set up payees for online bill payments
      - Pay a bill online

      YOUR MVP USER STORIES

      Epics

      In Scope

      Logon and LogoffAs a user, I want to logon/logoff the app so I can do my banking securely
      Register for AppAs a user, I want to register to use the app so I can bank online
      See Account BalancesAs a user, I want to see my account balances so that I know my current financial status
      See a History of Account TransactionsAs a user, I want to see a history of my account transactions, so I am aware of where my money goes
      Set up Payees for Online Bill PaymentsAs a user, I want to set up payees so that I can easily pay my bills
      Pay a Bill OnlineAs a user, I want to pay bills online, so they get paid on time

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Create a mock initial backlog for the simulated project

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.4 Review
      Sprint 0

      The Online Banking Application of the spreadsheet for Sprint 0.

      Step 1: Set aside the Mock Backlog just created (you will be using the Backlog on Sprint 0 for remainder of exercise).
      Step 2: Introduce and walk through the Backlog on the Sprint 0 tab in the Scrum Simulation Exercise.
      Step 3: Discuss and answer any questions the participants may have about the Sprint 0 tab.
      Step 4: Capture any important issues or clarifications from this discussion in the table below.

      Important issues or clarifications from the Sprint 0 tab:

      • (e.g. What is the difference between the project backlog and the product backlog?)
      • (e.g. What do we do with user stories that are bigger than our sprint velocity?)
      • (e.g. Has the project backlog been prioritized?)
      • (e.g. How do we decide what to work on first?)

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Understand Sprint 0 for Scrum Simulation Exercise

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.4 Review
      Sprint 0

      30-60 minutes

      1. Using the information found on the Sprint 0 tab, determine the projected timeline and cost for this project's first release:

      GIVEN

      Total Story Points in Project Backlog (First Release): 307 Story Points
      Expected Sprint Velocity: 20 Story Points/Sprint
      Total Team Size (PO, SM and 4-person Delivery Team): 6 People
      Blended Hourly Rate Per Team Member (assume 8hr day): $75/Hour
      Sprint Duration: 2 Weeks

      DETERMINE

      Expected Number of Sprints to Complete Project Backlog:
      Cost Per Sprint ($):
      Total Expected Timeline (weeks):
      Total Cost of First Release:

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • How to determine expected cost and timeline for an Agile project

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      The Estimation Cone of Uncertainty

      The Estimation Cone of Uncertainty

      Simulation Exercise 1.6 Understanding minimum viable products (MVP)

      30 minutes

      1. Discuss your current understanding of MVP.

      How do you describe/define MVP?

      • (Discuss/capture your understanding of minimum viable product)

      Note: Refer to the facilitator slides for more guidance on how to deliver this exercise

      Output

      • Capture your current understanding of Minimum Viable Product

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Facilitator slides: Explaining MVP

      Notes and Instructions

      The primary intent of this exercise is to explain the complex notion of MVP (it is one of the most misunderstood and contentious issues in Agile delivery). The exercise is intended to explain it in a simple and digestible way that will fundamentally change participants' understanding of MVP.
      Note that the slide contains animations.

      Imagine that your stakeholder tells you they want a blue 4-door sedan (consider this our "MVP" at this point), and you decide to build it the traditional way. As you build it (tires, then frame, then body, then joint body with frame and install engine), the stakeholder doesn't have anything they can use, and so they are only happy (and able to get value) at the end when the entire car is finished (point out the stakeholder "faces" go from unhappy to happy in the end).

      Animation 1:
      When we use Agile methods, we don't want to wait until the end before we have something the stakeholders can use. So instead of waiting until the entire car is completed, we decide our first iteration will be to give the stakeholder "a simple (blue) wheeled transportation device"…namely a skateboard that they can use for a little while (it's not a car, but it is something the stakeholder can use to get places).

      Animation 2:
      After the stakeholder has tried out the skateboard, we ask for feedback. They tell us the skateboard helped them to get around faster than walking, but they don't like the fact that it is so hard to maintain your balance on it. So, we add a handle to the skateboard to turn it into a scooter. The stakeholder then uses the scooter for a while. stakeholder feedback says staying balanced on the scooter is much easier, but they don't have a place to put groceries when they go shopping, so can we do something about that?

      (Continued on next slide…)

      Facilitator slides: Explaining MVP

      Notes and Instructions

      Animation 3:
      So next we build the stakeholder a bicycle and let them use it for a while before asking for feedback. The stakeholder tells us they love the bicycle, but they admit they get tired on long trips, so is there something we can do about that?

      Animation 4:
      So next we add a motor to the bicycle to turn it into a motorcycle, and again we give it to the stakeholder to use for a while. When we ask the stakeholder for feedback, they tell us that they LOVE the motorcycle so much, and that because they love the feeling of the wind in their hair, they've decided that they no longer want a 4-door sedan, but instead would prefer a blue 2-door convertible.

      Animation 5:
      And so, for our last iteration, we build the stakeholder what they wanted (a blue 2-door convertible) instead of what they asked for (a blue 4-door sedan), and we see that they are happier than they would have been if we had delivered the traditional way.

      INSIGHTS:
      An MVP cannot be fully known at the beginning of a project (it is the "journey" of creating the MVP with stakeholders that defines what it looks like in the end).
      Sometimes, stakeholders don't (or can't) know what they want until they see it.
      There is no "straight path" to your MVP, you determine the path forward based on what you learned in the previous iterations.
      This approach is part of the "power of Agile" and demonstrates why Agile can produce better outcomes and happier stakeholders.

      Understanding minimum viable product

      NOT Like This:

      This is a series of images. The top half of the image, shows building a car by starting with the wheels. The bottom Image shows the progression from skateboard, to scooter, to bike, to motorcycle, to car.

      It's Like This:

      Use iterations to maximize value delivery

      An image showing how to use iterations to maximize value delivery

      Use iterations to reduce accumulated risk

      An image showing how to use iterations to reduce accumulated risk.

      Understanding MVP
      (always be ready to go live)

      A great and wise pharaoh hires two architects to build his memorial pyramids.

      An image shows two architects contribution to pyramid construction.

      Understanding MVP
      (always be ready to go live)

      Several years go by, and then…

      The pharaoh is on his death bed.

      Simulation Exercise 1.7 Plan your first sprint

      30-60 minutes

      Step 1: Divide participants into independent Scrum delivery teams (max 7-8 people per team) and assign a PO (5 minutes)
      Step 2: Instruct each team to work together to decide on their "MVP strategy" for delivering this project (10-15 minutes)
      Step 3: Have each team decide on which user stories they would put in their first sprint backlog (5-10 minutes)
      Step 4: Have each team report on their findings. (10 minutes)

      Describe your team's "MVP strategy" for this project (Explain why you chose this strategy):

      Identify your first sprint backlog (Explain how this aligns with your MVP strategy):

      What, if anything, did you find interesting, insightful or valuable by having completed this exercise:

      Output

      • Experience deciding on an MVP strategy and creating your first sprint backlog

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.8 Do a sprint retrospective

      30-60 minutes

      Step 1: Thinking about the work you did in Exercise 3.2.7, identify what worked well and what didn't
      Step 2: Create a list of "Start/Stop/Continue" items using the table below
      Step 3: Present your list and discuss with other teams

      1. Capture findings in the table below:

      Start:
      (What could you start doing that would make Sprint Planning work better?)

      Stop:
      (What didn't work well for the team, and so you should stop doing it?)

      Continue:
      (What worked well for the team, and so you should continue doing?)

      Output

      • Experience performing a sprint retrospective

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.9 "What if" exercise (understanding what a fluid backlog really means)

      30-60 minutes

      1. As a team, consider what you would do in each of the following scenarios (treat each one as an independent scenario rather than cumulative):

      Scenario:

      How would you deal with this:

      After playing with and testing the Sprint 1 deliverable, your stakeholders find several small bugs that need to be fixed, along with some minor changes they would like made to the system. The total amount of effort to address all of these is estimated to be 4 story points in total.

      (e.g. First and foremost, put these requests into the Project Backlog, then…)

      Despite your best efforts, your stakeholders tell you that your Sprint 1 deliverable missed the mark by a wide margin, and they have major changes they want to see made to it.

      Several stakeholders have come forward and stated that they feel strongly that the "DEPOSIT – Deposit a cheque by taking a photo" User Story should be part of the first release, and they would like to see it moved from the Product Backlog to the project backlog (Important Note: they don't want this to change the delivery date for the first release)

      Output

      • A better understanding of how to handle change using a fluid project backlog

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.10 A Sprint 1 example

      30-60 minutes

      1. Consider the following example of what your Sprint 1 deliverable could be:

      An example of what your Sprint 1 deliverable could be.

      Output

      • Better understanding of an MVP strategy

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.10 A Sprint 1 example

      30-60 minutes

      1. As a group, discuss this approach, including:
        1. The pros and cons of the approach.
        2. Is this a shippable increment?
        3. What more would you need to do to make it a shippable increment?
      2. Capture your findings in the table below:

      Discussion

      Output

      • Better understanding of an MVP strategy

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 1.11 Simulate more sprints

      30-60 minutes

      1. As a group, continue to simulate more sprints for the online banking app:
        1. Simulate the planning, execution, demo, and retro stages for additional sprints
        2. Stop when you have had enough
      2. Capture your learnings in the table below:

      Discussion and learnings

      Output

      • Better understanding of an MVP strategy

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Scrum Simulation Module

      Simulate effective scrum practices

      Activities

      2.1 Execute the ball passing sprints

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Model and understand behavioral blockers and patterns affecting Agile teams and organizational culture.

      Pass the balls – sprint velocity game

      Goal 1. Pass as many balls as possible (Story Points) through the system during each sprint.
      Goal 2. Improve your estimation and velocity after each retrospective.

      Backlog

      An image of Sprint, passing balls from one individual to another until you reach the completion point.

      Points Completed

      Rules:

      1. Two people cannot touch the ball at the same time.
      2. Only the first and last person can hold more than one ball at a time.
      3. Every person on the Delivery Team must touch the ball at least once per sprint.
      4. Each team must record its results during the retrospective.

      Scoring:

      1. One point for every ball that completes the system.
      2. Minus one point for every dropped ball.

      Epic 1: 3 sprints

      1. 1-minute Planning
      2. 2-minute Sprints
      3. 1-minute Retrospective

      Group Retrospective
      Epic 2: 3 sprints (repeat)

      1. 1-minute Planning
      2. 2-minute Sprints
      3. 1-minute Retrospective

      Simulation Exercise 1.11 Simulate more sprints

      30-60 minutes

      Goal 1: Pass as many balls (Story Points) through the system during each sprint.
      Goal 2: Improve your estimation and velocity after each retrospective.

      1. Epic 1: 3 sprints
        1. 1-minute Planning
        2. 2-minute Sprints
        3. 1-minute Retrospective
      2. Group Retrospective
      3. Epic 2: 3 sprints
        1. 1-minute Planning
        2. 2-minute Sprints
        3. 1-minute Retrospective
      4. Group Retrospective
      5. Optionally repeat for additional sprints with team configurations or scenarios

      Rules:

      1. Two people cannot touch the ball at the same time.
      2. Only the first and last person can hold more than one ball at a time.
      3. Every person on the delivery team must touch the ball at least once per sprint.
      4. Each team must record its results during the retrospective.

      Scoring:

      1. One point for every ball that completes the system.
      2. Minus one point for every dropped ball.

      Output

      • Understand basic estimation, sprint, and retrospective techniques.
      • Experience common Agile behavior challenges.

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Facilitator slides: Sprint velocity game

      Goal:

      Pass as many balls as possible through the system during each cycle.

      Game Setup

      • Divide into teams of 8-16 people. If you have a smaller group, form one team rather than two smaller teams to start. The idea is to cause chaos with too many people in the delivery flow. See alternate versions for adding additional Epics with smaller teams.
      • Read out the instructions and ensure teams understand each one. Note that no assistance will be given during the sprints.

      Use your phone's timer to create 2-minute cycles:

      • 1-minute sprint planning
      • 2-minute delivery sprint
      • 1-minute retrospective and results recording
      • Run 3-4 cycles, then stop for a facilitated discussion of their observations and challenges.
      • Begin epic 2 and run for 3-4 more cycles.

      Facilitator slides: Sprint velocity game

      • Game Cycles
        • Epic 1: 3 complete cycles
        • 1-minute Planning
        • 2-minute Sprints
        • 1-minute Sprint retrospective
      • Group Retrospective
        • Discuss each sprint, challenges, and changes made to optimize throughput.
      • Epic 2: 3 complete cycles
        • 1-minute Planning
        • 2-minute Sprints
        • 1-minute Sprint retrospective
      • Group Retrospective
        • Discuss each sprint, challenges, and changes made to optimize throughput.
      • Game Rules
        • Each ball must have airtime. No ball cannot touch two people at the same time.
        • No person can hold more than one ball at a time.
        • Ball must be passed by every person on a team.
        • You may not pass a ball to a person directly to the person on your left or right.
        • Each team must keep score and record their results during the Retrospective.
      • Scoring
        • 1 point for every ball that completes the system.
        • Minus 1 point for every dropped ball.

      Facilitator slides: Sprint velocity game

      Facilitator Tips

      • Create a feeling of competition to get the teams to rush and work against each other. The goal is to show how this culture must be broken in Agile and DevOps. Then challenge the teams against natural silos and not focus on enterprise goals.
      • Create false urgency to increase stress, errors, and breakdowns in communication.
      • Look for patterns of traditional delivery and top-down management that limit delivery. These will emerge naturally, and teams will fall back into familiar patterns under stress.
      • Look for key lessons you want to reinforce and bring out ball game examples to help teams relate to something that is easier to understand.

      Alternate Versions

      • Run Epic 1 as one team, then have them break into typical Agile teams of 4-9 people. Compare results.
      • Run Epics with different goals: How would their approach change?
        • Fastest delivery
        • Highest production
        • Lowest defect rate
      • Have teams assign a scrum master to coordinate delivery. A scrum master and product owner are part of the overall team, but not part of the delivery team. They would not need to pass balls during each sprint.
      • Increase sprint time. Discuss right sizing sprint to complete work.
      • Give each team different numbers of balls, but don't tell them. Alternately, start each team with half as many balls, then double for Epic 2. Discuss how the sprint backlog affected their throughput.

      Facilitator slides: Sprint velocity game

      Trends to Look For and Discuss

      • False constraints - patterns where teams unnecessarily limited themselves.
      • Larger teams could have divided into smaller working teams, passing the balls between working groups.
      • Instructions did not limit that "team" meant everyone in the group. They could have formed smaller groups to process more work. LEAN
      • Using the first sprint for planning only. More time to create a POC.
      • Teams will start communicating but will grow silent, especially in later sprints. Stress interactions over the process.
      • Borrowing best practices from other teams.
      • Using retrospectives to share ideas with other teams. Stress needs to align with the company's goals, not just the team's goals.
      • How did they treat dropped balls? Rejected as errors, started over (false constraint), or picked up and continued?

      Trends to Look For and Discuss

      • Did individuals dominate the planning and execution, or did everyone feel like an equal member of the team?
      • Did they consider assigning a scrum master? The scrum master and product owner are part of the overall team, but not part of the Delivery Team. They would not need to pass balls during each Sprint.
      • What impacted their expected number of balls completed? Did it help improve quality or was it a distraction?
      • What caused their improvement in velocity? Draw the connection between how teams must work together and the need for stability.
      • Discuss the overall goal and constraints. Did they understand what the desired outcome was? Where did they make assumptions? Add talking points:
        • What if the goal was overall completed balls?
        • What if it was zero defect? No dropped balls.
        • What if it was the fastest delivery? Each ball through the system in the shortest time? Were they timing each ball?

      Scrum Simulation Module

      Simulate effective scrum practices

      Activities

      3.1 Identify key insights and takeaways

      3.2 Perform exit survey and capture results

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your key insights and takeaways

      Simulation Exercise 3.1
      Identify key insights and takeaways

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the Intro to Agile presentation?
        2. What if any takeaways do participants feel are needed as a result of the presentation?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:

      What key insights have you gained?

      What takeaways have you identified?

      • (e.g. better understanding of Agile mindset, principles, and practices)
      • (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Simulation Exercise 3.2
      Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Agile Modules

      Prioritize Agile support with your top challenges

      Backlog Management

      Scrum Simulation

      Estimation

      Product Owner

      Product Roadmapping

      1: User stories and the art of decomposition

      2: Effective backlog management & refinement

      3: Identify insights and team feedback

      1: Scrum sprint planning and retrospective simulation

      2: Pass the balls – sprint velocity game

      1: Improve product backlog item estimation

      2: Agile estimation fundamentals

      3: Understand the wisdom of crowds

      4: Identify insights and team feedback

      1: Understand product management fundamentals

      2: The critical role of the product owner

      3: Manage effective product backlogs and roadmaps

      4: Identify insights and team feedback

      1: Identify your product roadmapping pains

      2: The six "tools" of product roadmapping

      3: Product roadmapping exercise

      Organizations often struggle with numerous pain points around Agile delivery.
      The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.

      Agile modules provide supporting activities:

      Each module provides guidance and supporting activities related to a specific Agile Challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.

      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Estimation Module

      Improve product backlog item estimation

      Activities

      1.1 Identify your estimation pains

      1.2 (Optional) Why do we estimate?

      1.3 How do you estimate now?

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of Agile estimation practices and how to apply them.

      Establish consistent Agile estimation fundamentals

      an image of a hierarchy answering the question What is an estimate.

      Know the truth about estimates and their potential pitfalls.

      Then, understand how Agile estimation works to avoid these pitfalls.

      Estimation Exercise 1.1 Identify your estimation pains

      30-60 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What specific challenges are you facing with your estimation practices today
        2. Capture your findings in the table below:

      What are your specific Estimation challenges?

      • (e.g. We don't estimate consistently)
      • (e.g. Our estimates are usually off by a large margin)
      • (e.g. We're not sure what approach to use when estimating)

      Output

      • Your specific estimation related challenges

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 1.2 (Optional) Why do we estimate?

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. Why do we do estimates?
        2. What value/merit do estimates have?
      2. Capture your findings in the table below:

      Why would/should you do estimates?

      • (e.g. Our stakeholders need to know how long it will take to deliver a given feature/function)

      Output

      • Better understanding of the need for estimates

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 1.2 (Optional) Why do we estimate?

      30 minutes

      1. Estimation has its merits
      2. Here are some sample reasons for estimates:
        • "Estimates allow us to predict when a sprint goal will be met, and therefore when a substantial increment of value will be delivered."
        • "Our estimates help our stakeholders plan ahead. They are part of the value we provide."
        • "Estimates help us to de-risk scope of uncertain size and complexity."
        • "Estimated work can be traded in and out of scope for other work of similar size. Without estimates, you can't trade."
        • "The very process of estimation adds value. When we estimate we discuss requirements in more detail and gain a better understanding of what is needed."
        • "Demonstrates IT's commitment to delivering valuable products and changes."
        • "Supports business ambitions with customers and stakeholders."
        • "Helps to build a sustainable value-delivery cadence."

      Source: DZone, 2013.

      Output

      • Better understanding of the need for estimates

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 1.3 How do you estimate now?

      30 minutes

      1. As a group, speak about now you currently estimate in your organization.
      2. Capture your findings in the table below:

      Why would/should you do estimates?

      • (e.g. We don't do estimates)
      • (e.g. We ask the person assigned to each task in the project plan to estimate how long it will take)

      Output

      • Your current estimation approach

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Module

      Improve product backlog item estimation

      Activities

      2.1 (Optional) Estimate a real PBI

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of Agile estimation practices and how to apply them.

      Don't expect your estimates to be accurate!

      The average rough order of magnitude estimates for software are off by is up to 400%.
      Source: Boehm, 1981

      Estimate inaccuracy has many serious repercussions on the project and organization

      66%

      Average cost overrun(1)

      33%

      Average schedule overrun (1)

      17%

      Average benefits shortfall)1)

      (1) % of software projects with given issue

      Source: McKinsey & Company, 2012

      The Estimation Cone of Uncertainty

      The Estimation Cone of Uncertainty

      What is Agile estimation?

      There is no single Agile estimation technique. When selecting an approach, adopt an Agile estimation technique that works for your organization, and don't be afraid to adapt it to your circumstances. Remember: all estimates are wrong, so use them with care and skepticism.

      • Understands and accepts the limitations of any estimation process.
      • Leverages good practices to counteract these limitations (e.g. wisdom of crowds, quality-first thinking).
      • Doesn't over-invest in individual estimate accuracy (but sees their value "in aggregate").
      • Approach can change from project to project or team to team and evolves/matures over the project lifespan.
      • Uses the estimation process as an effective tool to:
        • Make commitments about what can be accomplished in a sprint (to establish capacity).
        • Convey a measure of progress and rough expected completion dates to stakeholders (including management).

      Info-Tech Insight

      All estimates are wrong, but some can be useful (leverage the "wisdom of crowds" to improve your estimation practices).

      There are many Agile estimation techniques to choose from…

      Consensus-Building Techniques
      Planning Poker

      Most popular by far (stick with one of these unless there is a good reason to consider others)

      This approach uses the Delphi method, where a group collectively estimates the size of a PBI, or user stories, with cards numbered by story points. See our Estimate Software Delivery With Confidence blueprint.

      T-Shirt Sizing

      This approach involves collaboratively estimating PBIs against a non-numerical system (e.g. small, medium, large). See DZone and C# Corner for more information.

      Dot Voting

      This approach involves giving participants a set number of dot stickers or marks and voting on the PBIs (and options) to deliver. See Dotmocracy and Wikipedia for more information.

      Bucket System

      This approach categorizes PBIs by placing them into defined buckets, which can then be further broken down through dividing and conquering. See Agile Advice and Crisp's Blog for more information.

      Affinity Mapping

      This approach involves the individual sizing and sorting of PBIs, and then the order of these PBIs are collaboratively edited. The grouping is then associated with numerical estimates or buckets if desired. See Getting Agile for more information.

      Ordering Method

      This approach involves randomly ordering items on a scale ranging from low to high. Each member will take turns moving an item one spot lower or higher where it seems appropriate. See Apiumhub, Sheidaei Blog (variant), and SitePoint (Relative Mass Valuation) for more information.

      Ensure your teams have the right information

      Estimate accuracy and consistency improve when it is clear what you are estimating (definition of ready) and what it means to complete the PBI (definition of done).
      Be sure to establish and enforce your definition of ready/done throughout the project.

      Ready

      Done
      • The value of the story to the user is indicated.
      • The acceptance criteria for the story have been clearly described.
      • Person who will accept the user story is identified.
      • The team knows how to demo the story…
      • Design complete, code compiles, static code analysis has been performed and passed.
      • Peer reviewed with coding standards passed.
      • Unit test and smoke test are done/functional (preferably automated).
      • Passes functionality testing including security testing…

      What are story points?

      Many organizations use story point sizing to estimate their PBIs
      (e.g. epics, features, user stories, and tasks)

      • A story point is a (unitless) measure of the relative size, complexity, risk, and uncertainty, of a PBI.
      • Story points do not correspond to the exact number of hours it will take to complete the PBI.
      • When using story points, think about them in terms of their size relative to one another.
      • The delivery team's sprint velocity and capacity should also be tracked in story points.

      How do you assign a point value to a user story? There is no easy answer outside of leveraging the experience of the team. Sizes are based on relative comparisons to other PBIs or previously developed items. Example: "This user story is 3 points because it is expected to take 3 times more effort than that 1-point user story."Therefore, the measurement of a story point is only defined through the team's experience, as the team matures.

      Can you equate a point to a unit of time? First and foremost, for the purposes of backlog prioritization, you don't need to know the time, just its size relative to other PBIs. For sprint planning, release planning, or any scenario where timing is a factor, you will need to have a reasonably accurate sprint capacity determined. Again, this comes down to experience.

      "Planning poker" estimation technique

      Leverage the wisdom of crowds to improve your estimates

      an image of the user story points and the Fibonacci sequence

      Planning poker: This approach uses the Delphi method, where a group collectively estimates the size of a PBI or user story, using cards with story points on them.

      Materials: Each participant has deck of cards, containing the numbers of the Fibonacci sequence.

      Typical Participants: Product owner, scrum master (usually acts as facilitator), delivery team.

      Steps:

      1. The facilitator will select a user story.
      2. The product owner answers any questions about the user story from the group.
      3. The group makes their first round of estimates, where each participant individually selects a card without showing it to anyone, and then all selections are revealed at once.
      4. If there is consensus, the facilitator records the estimate and moves onto step 1 for another user story.
      5. If there are discrepancies, the participants should state their case for their selection (especially high or low outliers) and engage in constructive debate.
      6. The group makes an additional round of estimates, where step 3-6 are completed until there is a reasonable consensus.
      7. If the consensus is the user story is too large to fit into a sprint or too poorly defined, then the user story should be decomposed or rewritten.

      Estimation Exercise 2.1 (Optional) Estimate a real PBI

      30-60 minutes

      Step 1: As a group, select a real epic, feature, or user story from one of your project backlogs which needs to be estimated:

      PBI to be Estimated:

      As a ____ I want _____ so that ______

      Step 2: Select one person in your group to act as the product owner and discuss/question the details of the selected PBI to improve your collective understanding of the requirement (the PO will do their best to explain the PBI and answer any questions).
      Step 3: Make your first round of estimates using either T-shirt sizing or the Fibonacci sequence. Be sure to agree on the boundaries for these estimates (e.g. "extra-small" (XS) is any work that can be completed in less than an hour, while "extra-large" (XL) is anything that would take a single person a full sprint to deliver – a similar approach could be used for Fibonacci where a "1" is less than an hour's work, and "21" might be a single person for a full sprint). Don't share your answer until everyone has had a chance to decide on their Estimate value for the PBI.
      Step 4: Have everyone share their chosen estimate value and briefly explain their reasoning for the estimate. If most estimate values are the same/similar, allow the group to decide whether they have reached a "collective agreement" on the estimate. If not, repeat step 3 now that everyone has had a chance to explain their initial Estimate.
      Step 5: Capture the "collective" estimate for the PBI here:

      Our collective estimate for this PBI:

      e.g. 8 story points

      Output

      • A real PBI from your project backlog which has estimated using planning poker

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Module

      Improve product backlog item estimation

      Activities

      3.1 Guess the number of jelly beans (Round 1) (15 minutes)
      3.2 Compare the average of your guesses (15 minutes)
      3.3 Guess the number of gumballs (Round 2) (15 minutes)
      3.4 Compare your guesses against the actual number

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • A better understanding of why Agile estimation and reconciliation provides reliable estimates for planning.

      Facilitator Slides: Agile Estimation (Wisdom of Crowds Exercise – Rounds 1 and 2)

      Notes and Instructions

      The exercise is intended to mimic the way Planning Poker is performed in Agile Estimation. Use the exercise to demonstrate the power of the Wisdom of Crowds and how, in circumstances where the exact answer to a question is not known, asking several people for their opinion often produces more accurate results than most/any individual opinion.

      Some participants will tend to "shout out an answer" right away, so be sure to tell participants not to share their answers until everyone has had an opportunity to register their guess (this is particularly important in Round 1, where we are trying to get unvarnished guesses from the participants).

      In Round 1:

      • Be sure to emphasize that participants are guessing the total number of jelly beans in the jar (sometimes people think it is just the number visible)
      • Once all guesses are gathered and you've calculated the error for them (and the average guess), review the results with participants (Note: the actual number of jelly beans in the jar is 1600 (it is "greyed out" on the bottom line of the table – you can make it visible by turning off the grey highlight on that cell in the table)
      • Most of the time, the average guess will be closer to the actual than most (if not all) individual guesses (but be prepared for the fact that this doesn't always happen – this is especially true when the number of participants is small)
      • When discussing the results, ask participants to share the "method" they used to make their guess (particularly those who were closest to the actual). This part of the exercise can help them to make more accurate guesses in Round 2

      In Round 2:

      • Note that this time, participants are guessing the total number of visible gumballs in the image (both whole and partial gumballs are counted)
      • Once all guesses are gathered and you've calculated the error for them (and the average guess), review the results with participants (Note: the actual number of visible gumballs is 1600 (it is "greyed out" on the bottom line of the table – you can make it visible by turning off the grey highlight on that cell in the table)
      • Most of the time, the average guess will be closer to the actual in Round 2 than it was in Round 1
      • Talk to participants about the outcomes and how the results varied from Round 1 to Round 2, along with any interesting insights they may have gained from the exercise

      Estimation Exercise 3.1 Guess the number of jelly beans (Round 1)

      15 minutes

      1. Option 1: Microsoft Forms
        1. Create your own local survey by copying the template using the link below.
        2. Add the local Survey link to the exercise instructions or send the link to the participants.
        3. Give the participants 2-3 minutes to complete their guesses.
        4. Collect the consolidated Survey responses and calculate the results on the next slide.
        5. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst or Workshop Specialist can set up the survey for you.
      2. Option 2: Embedded Excel table
        1. On the results slide, double-click the table to open the embedded Excel worksheet.
        2. Record each participant's guess in the table.
      3. Alternatively, this survey can be done with sticky notes, a pen, paper, and a calculator to determine the outcomes.

      Download Survey Template:

      Info-Tech Wisdom of the Crowd 1 (Jelly Bean Guess

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 3.1 Guess the number of jelly beans (Round 1)

      15 minutes

      1. Guess the total number of jelly beans in the entire container (not just the ones you can see).
      2. Be sure not to share your guess with anyone else.
      3. It doesn't matter how you settle on your guess ("gut feel" is fine, so is being "scientific" about it, as well as everything in between).
      4. Again, please don't share your guess (or even how you settled on your guess) with anyone else (this exercise relies on independent guesses).

      See slide notes for instructions.

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 3.2 Compare the average of your guesses

      15 minutes

      A blank table for you to compare the average of your guesses at the number of Jellybeans in the Jar.

      See slide notes for instructions.

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Guess the number of gumballs

      • Option 1: Microsoft Forms
        • Create your own local survey by copying the template using the link below.
        • Add the local Survey link to the exercise instructions or send the link to the participants.
        • Give the participants 2-3 minutes to complete their guesses.
        • Collect the consolidated Survey responses and calculate the results on the next slide.
        • NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst or Workshop Specialist can set up the survey for you.
      • Option 2: Embedded Excel table
        • On the results slide, double-click the table to open the embedded Excel worksheet.
        • Record each participant's guess in the table.
      • Alternatively, this survey can be done with sticky notes, a pen, paper, and a calculator to determine the outcomes.

      Download Survey Template:

      Info-Tech Wisdom of the Crowd 2 (Gumball Guess)

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • PM's, PO's and SM's
      • Delivery Managers
      • Delivery Teams
      • Business Stakeholders
      • Senior Leaders
      • Other Interested Parties

      Estimation Exercise 3.3 Guess the number of gumballs (Round 2)

      15 minutes

      1. Guess the total number of gumballs visible in the photo shown on the right.
      2. Again, please don't share your guess with anyone.

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • PM's, PO's and SM's
      • Delivery Managers
      • Delivery Teams
      • Business Stakeholders
      • Senior Leaders
      • Other Interested Parties

      Estimation Exercise 3.2 Compare the average of your guesses

      15 minutes

      A blank table for you to compare the average of your guesses at the number of Jellybeans in the Jar.

      See slide notes for instructions.

      Output

      • An appreciation for the power of the wisdom of crowds

      Participants

      • PM's, PO's and SM's
      • Delivery Managers
      • Delivery Teams
      • Business Stakeholders
      • Senior Leaders
      • Other Interested Parties

      Estimation Module

      Improve product backlog item estimation

      Activities

      4.1 Identify key insights and takeaways
      4.2 Perform exit survey and capture results

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your key insights and takeaways.

      Estimation Exercise 4.2
      Identify key insights and takeaways

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the Intro to Agile presentation?
        2. What if any takeaways do participants feel are needed as a result of the presentation?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:

      What key insights have you gained?

      What takeaways have you identified?

      • (e.g. better understanding of Agile mindset, principles, and practices)
      • (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Estimation Exercise 4.2
      Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Agile Modules

      Prioritize Agile support with your top challenges

      Backlog Management

      Scrum Simulation

      Estimation

      Product Owner

      Product Roadmapping

      1: User stories and the art of decomposition

      2: Effective backlog management & refinement

      3: Identify insights and team feedback

      1: Scrum sprint planning and retrospective simulation

      2: Pass the balls – sprint velocity game

      1: Improve product backlog item estimation

      2: Agile estimation fundamentals

      3: Understand the wisdom of crowds

      4: Identify insights and team feedback

      1: Understand product management fundamentals

      2: The critical role of the product owner

      3: Manage effective product backlogs and roadmaps

      4: Identify insights and team feedback

      1: Identify your product roadmapping pains

      2: The six "tools" of product roadmapping

      3: Product roadmapping exercise

      Organizations often struggle with numerous pain points around Agile delivery.
      The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.

      Agile modules provide supporting activities:

      Each module provides guidance and supporting activities related to a specific Agile Challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.

      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Product Owner Module

      Establish an effective product owner role

      Activities

      1.1 Identify your product owner pains
      1.2 What is a "product"? Who are your "consumers"?
      1.3 Define your role terminology

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand product management fundamentals.
      • Define your product management roles and terms.

      Product owners ensure we delivery the right changes, for the right people, at the right time.

      The importance of assigning an effective and empowered product owner to your Agile projects cannot be overstated.

      What is a product?

      A tangible solution, tool, or service (physical or digital), which enables the long-term and evolving delivery of value to customers, and stakeholders based on business and user requirements.

      Info-Tech Insight

      A proper definition of a product recognizes three key facts.

      1. A clear recognition that products are long-term endeavors that don't end after the project finishes.
      2. Products are not just 'apps', but can be software or services that drive value.
      3. There is more than one stakeholder group that derives value from the product or service.

      Estimation Exercise 4.2
      Perform an exit survey

      30-60 minutes

      1. As a group, discuss and capture your thoughts on:
        • What specific challenges are you facing with your product owner practices today?
      2. Capture your findings in the table below:

      What are your specific Product Owner challenges?

      • (e.g. We don't have product owners)
      • (e.g. Our product owners have "day jobs" as well, so they don't have enough time to devote to the project)
      • (e.g. Our product owners are unsure about the role and its associated responsibilities)

      Output

      • Your specific product owner challenges

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Product Owner Exercise 1.2 What is a "product"? Who are your "consumers"?

      30-60 minutes

      1. Discussion:
        1. How do you define a product, service, or application?
        2. Who are the consumers that receive value from the product?

      Input

      • Organizational knowledge
      • Internal terms and definitions

      Output

      • Our definition of products and services
      • Our definition of product and service consumers/customers

      Products and services share the same foundation and best practices

      The term "product" is used for consistency but would apply to services as well.

      Product=Service

      "Product" and "Service" are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the different product owner perspectives

      • Business
        • Customer facing, revenue generating
      • Operations
        • Keep the lights on processes
      • Technical
        • IT systems and tools

      "A product owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The product owner is someone who really 'owns' the product."

      – – Robbin Schuurman,
      "Tips for Starting Technical Product Managers"

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Implement Info-Tech's product owner capability model

      An image of Info-Tech’s product owner capability model

      Unfortunately, most product owners operate with an incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Scale products into families to improve alignment

      Operationally align product delivery to enterprise goals

      A hierarchy showing how to break enterprise goals and strategy down into product families.

      The Info-Tech difference:

      Start by piloting product families to determine which approaches work best for your organization.

      Create a common definition of what a product is and identify products in your inventory.

      Use scaling patterns to build operationally aligned product families.

      Develop a roadmap strategy to align families and products to enterprise goals and priorities.

      Use products and families to evaluate the delivery and organizational design improvements.

      Deliver Digital Products at Scale via Enterprise Product Families

      Select the right models for scaling product management

      • Pyramid
        • Logical hierarchy of products rolling into a single service area.
        • Lower levels of the pyramid focus on more discrete services.
        • Example: Human resources mapping down to supporting applications.
      • Service Grouping
        • Organization of related services into service family.
        • Direct hierarchy does not necessarily exist within the family.
        • Example: End user support and ticketing.
      • Technical Grouping
        • Logical grouping of IT infrastructure, platforms, or applications.
        • Provides full lifecycle management when hierarchies do not exist.
        • Example: Workflow and collaboration tools.
      • Market Alignment
        • Grouping of products by customer segments or market strategy.
        • Aligns product to end users and consumers.
        • Example: Customer banking products and services.
      • Organizational Alignment
        • Used at higher levels of the organization where products are aligned under divisions.
        • Separation of product management from organizational structure no longer distinct.

      Match your product management role definitions to your product family levels

      Product Ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply or require a management relationship.

      Product Portfolio
      Groups of product families within an overall value stream or capability grouping.
      Product Portfolio Manager

      Product Family
      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
      Product Family Manager

      Product
      Single product composed of one or more applications and services.
      Product Owner

      Info-Tech Insight

      The primary role conflict occurs when the product owner is a proxy for stakeholders or responsible for the delivery team. The product owner owns the product backlog. The delivery team owns the sprint backlog and delivery.

      Examine the differences between product managers and product owners

      Product management terminology is inconsistent, creating confusion in organizations introducing these roles. Understand the roles, then define terms that work best for you.

      A Table comparing the different roles of product managers to those of product owners.

      Define who manages key milestone

      Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the Product Owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.

      An image of a table with the following column headings: Example Milestones; Project Manager; Product Owner; Scrum Master*

      Product Owner Exercise 1.3 Define your role terminology

      30-60 minutes

      1. Using consistent terms is important for any organizational change and evergreen process. Capture your preferred terms to help align teams and expectations.
      Term

      Definition

      Product Owner

      • Owns and manages the product or service providing continuous delivery of value.
      • Owns the product roadmap and backlog for the product or service.
      • Works with stakeholders, end users, the delivery team, and market research to identify the product features and their estimated return on investment when implemented.
      • Responsible for refining and reprioritizing the product backlog ensuring items are "Ready" for the sprint backlog.
      • Defines KPIs to measure the value and impact of each PBI to help refine the backlog and guide the roadmap.
      • Responsible for refining and reprioritizing the sprint backlog that identifies which features will be delivered in the next sprint based on business importance.
      • Works with the product owner, stakeholders, end users, and SMEs to help define PBIs to ensure they are "Ready" for the Sprint backlog.

      Product Manager

      • Owns and manages a product or service family consisting of multiple products or services.
      • Owns the product family roadmap. Note: Product families do not have a backlog, only products do.
      • Works with stakeholders, end users, product owners, enterprise architecture, and market research to identify the product capabilities needed to accomplish goals.
      • Validates the product PBIs delivered realized the expected value and capability. Feedback is used to refine the product family roadmap and guide product owners.

      Output

      • Product management role definitions

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Product Owner Module

      Establish an effective product owner role

      Activities

      2.1 Identify enablers and blockers

      2.2 (Optional) Dissect this definition of the product owner role

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify cultural enablers and blockers for product owners.
      • Develop a deeper understanding of the product owner role.

      The importance of establishing an effective product owner role

      The critical importance of establishing an effective product owner role (PO) for your Agile projects cannot be overstated.

      Many new-to-Agile organizations do not fully appreciate the critical role played by the PO in Scrum, nor the fundamental changes the organization will need to make in support of the PO role. Both mistakes will reduce an organization's chances of successfully adopting Agile and achieving its promised benefits.

      The PO role is critical to the proper prioritization of requirements and efficient decision-making during the project.

      The PO role helps the organization to avoid "analysis paralysis" challenges often experienced in large command-and-control-style organizations.

      A poorly chosen or disengaged product owner will almost certainly stifle your Agile project.

      Note that for many organizations, "product owner" is not a formally recognized role, which can create HR issues. Some organizational education on Agile may be needed (especially if your organization is unionized).

      Info-Tech Insight

      Failing to establish effective product owners in your organization can be a "species-killing event" for your Agile transformation.

      The three A's of a product owner

      To ensure the effectiveness of a product owner, your organization should select one that meets the three A's:

      Available: Assign a PO that can focus full-time on the project. Make sure your PO can dedicate the time needed to fulfill this critical role.
      Appropriate: It's best for the PO to have strong subject matter expertise (so-called "super users" are often selected to be POs) as well as strong communication, collaboration, facilitation, and arbitration skills. A good PO will understand how to negotiate the best outcomes for the project, considering all project constraints.
      Authoritative: The PO must be empowered by your organization to speak authoritatively about priorities and goals and be able to answer questions from the project team quickly and efficiently. The PO must know when decisions can be made immediately and when they must be made in collaboration with other stakeholders – choosing a PO that is well-known and respected by stakeholders will help to make this more efficient.

      Info-Tech Insight

      It's critical to assign a PO that meets the three A's:

      • Available
      • Appropriate
      • Authoritative

      The three ears of a product owner*

      An effective product owner listens to (and effectively balances) the needs and constraints of three different groups:

      Organizational needs/constraints represent what is most important to the organization overall, and typically revolve around things like cost, schedule, return on investment, time to market, risk mitigation, conforming to policies and regulations, etc.

      Stakeholder needs/constraints represent what is most important to those who will be using the system and typically revolve around the delivery of value, ease of use, better outcomes, making their jobs easier and more efficient, getting what they ask for, etc.

      Delivery Team needs/constraints represent what is most important to those who are tasked with delivering the project and cover a broad range that includes tools, skills, capabilities, technology limitations, capacity limits, adequate testing, architectural considerations, sustainable workload, clear direction and requirements, opportunities to innovate, getting sufficient input and feedback, support for clearing roadblocks, dependencies on other teams, etc.

      Info-Tech Insight

      An effective PO will expertly balance the needs of:

      • The organization
      • Project stakeholders
      • The delivery team

      * For more, see Understanding Scrum: Why do Product Owners Have Three Ears

      A product owner doesn't act alone

      Although the PO plays a unique and central role in the success of an Agile project, it doesn't mean they "act alone."

      The PO is ultimately responsible for managing and maintaining an effective backlog over the project lifecycle, but many people contribute to maintaining this backlog (on large projects, BA's are often the primary contributors to the backlog).

      The PO role also relies heavily on stakeholders (to help define and elaborate user stories, provide input and feedback, answer questions, participate in sprint demos, participate in testing of sprint deliverables, etc.).

      The PO role also relies heavily on the delivery team. Some backlog management and story elaboration is done by delivery team members instead of the PO (think: elaborating user story details, creating acceptance criteria, writing test plans for user stories, etc.).

      The PO both contributes to these efforts and leads/oversees the efforts of others. The exact mix of "doing" and "leading" can be different on a case-by-case basis and is part of establishing the delivery team's norms.

      Given the importance of the role, care must be taken to not overburden the product owner, especially on large projects.

      Info-Tech Insight

      While being ultimately responsible for the product backlog, a PO often relies on others to aid in backlog management and maintenance.

      This is particularly true on large projects.

      The use of a proxy PO

      Sometimes, a proxy product owner is needed.

      It is always best to assign a product owner "from the business," who will bring subject matter expertise and have established relationships with stakeholders.

      When a PO from the business does not have enough time to fulfill the needs of the role completely (e.g. can only be a part-time PO, because they have a day job), assigning a proxy product owner can help to compensate for this.

      The proxy PO acts on behalf of the PO in order to reduce the PO's workload or to otherwise support them.

      Project participants (e.g. delivery team, stakeholders) should treat the PO and proxy PO as roughly equivalent.

      Project managers (PMs) and business analysts (BAs) are often good candidates for the proxy PO role.

      NOTE: It's highly advisable for the PO to attend all/most sprint demos in order to observe progress for themselves, and to identify any misalignment with expectations as early as possible (remember that the PO still has ultimate responsibility for the project outcomes).

      Info-Tech Insight

      Although not ideal, assigning a proxy PO can help to compensate for a PO who doesn't meet all three A's of Product Ownership.

      It is up to the PO and proxy to decide how they will work together (e.g. establish their norms).

      The use of a proxy PO

      The PO and proxy must work together closely and in a highly coordinated way.

      The PO and proxy must:

      • Work closely at the start of the project to agree on the overall approach they will follow, as well as any needs and constraints for the project.
      • Communicate frequently and effectively throughout the project, to ensure progress is being made and to address any challenges.
      • Have a "meeting of the minds" about how the different "parts" of the PO role will be divided between them (including when the proxy must defer to the PO on matters).
      • Focus on ensuring that all the responsibilities of the PO role are fulfilled effectively by the pair (how this is accomplished is up to the two of them to decide).
      • Ensure all project participants clearly understand the POs' and proxies' relative responsibilities to minimize confusion and mistakes.

      The use of multiple POs

      Sometimes, having multiple product owners makes sense.

      It is always best to assign a single product owner to a project. However, under certain circumstances, it can make sense to use multiple POs.

      For example, when implementing a large ERP system with many distinct modules (e.g. Finance, HR) it can be difficult to find a single PO who has sufficient subject matter expertise across all modules.

      When assigning Multiple POs to a project, be sure to identify a "Lead PO" (who is given ultimate responsibility for the entire project) and have the remaining POs act like Proxy POs.

      NOTE: Not surprisingly, it's highly advisable for the Lead PO to attend as many Sprint Demos as possible to observe progress for themselves, and to identify any misalignment with expectations as early as possible (remember that the Lead PO has ultimate responsibility for the project outcomes).

      Info-Tech Best Practice

      Although not ideal, assigning multiple POs to a project sometimes makes sense.

      When needed, be sure to identify a "Lead PO" and have the other PO's act like Proxies.

      Product Owner Exercise 2.1 Identify enablers and blockers

      30-60 minutes

      1. Brainstorm and discuss the key enablers that can help promote and ease your implementation of Product Ownership.
      2. Brainstorm and discuss the key blockers (or risks) that may interrupt or derail your efforts.
      3. Brainstorm mitigation activities for each blocker.
      Enablers Blockers Mitigation
      High business engagement and buy-in Significant time is required to implement and train resources Limit the scope for pilot project to allow time to learn
      Organizational acceptance for change Geographically distributed resources Temporarily collocate all resources and acquire virtual communication technology
      Existing tools can be customized for BRM Difficulty injecting customers in demos Educate customer groups on the importance of attendance and 'what's in it for them'

      Output

      • List of enablers and blockers to establishing product owners

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Establish an effective product owner role

      • The nature of a PO role can be somewhat foreign to many organizations, so candidates for the role will benefit from training along with coaching/mentoring support when starting out.
      • The PO must be able to make decisions quickly around project priorities, goals, and requirements.
      • A PO who is simply a conduit to a slow-moving steering committee will stifle an Agile project.
      • Establish clear boundaries and rules regarding which project decisions can be made directly by the PO and which must be escalated to stakeholders. Lean toward approaches that support the quickest decision-making (e.g. give the PO as much freedom as they need to be effective).
      • An effective PO has a good instinct for what is "good enough for now."
      • The organization can support the PO by focusing attention on goals and accomplishments rather than pushing processes and documentation.
      • Understand the difference between a project sponsor and a PO (the PO role is much more involved in the details, with a higher workload).
      • Agree on and clearly define the roles and responsibilities of PO, PM, dev manager, SM, etc. at the start of the project for clarity and efficiency.

      Characteristics to look for when selecting a product owner

      Here are some "ideal characteristics" for your POs (the more of these that are true for a given PO, the better):

      • Knows how to get things done in your organization
      • Has strong working relationships with project stakeholders (has established trust with them and is well respected by stakeholders as well as others)
      • Comes from the stakeholder community and is invested in the success of the project (ideally, will be an end user of the system)
      • Has proven communication, facilitation, mediation, and negotiation skills
      • Can effectively balance multiple competing priorities and constraints
      • Sees the big picture and strives to achieve the best outcomes possible (grounded in realistic expectations)
      • Works with a sense of urgency and welcomes ongoing feedback and collaboration with stakeholders
      • Understands how to act as an effective "funnel and filter" for stakeholder requests
      • Acts as an informal (but inspirational) leader whom others will follow
      • Has a strong sense of what is "good enough for now"
      • Protects the delivery team from distractions and keeps them focused on goals
      • Thinks strategically and incrementally

      Product Owner Exercise 2.2 (Optional) Dissect this definition of the product owner role

      30-60 minutes

      1. Take a minute or two to review the bullet points below, which describe the product owner's role.
      2. As a group, discuss the "message" for each bullet point in the description, and then identify which aspects would be "easy" and "hard" to achieve in your organization.
        • The product owner is a project team member who has been empowered by both the organization and stakeholders to act on their behalf and to guide the project directly with a single voice (supported by appropriate consultations with the organization and stakeholders).
        • The product owner must be someone with a good understanding of the project deliverable (they are often considered to be a subject matter expert in an area related to the project deliverable) and ideally is both well-known and respected by both the organization and stakeholders.
        • During the project, requirements clarification, prioritization, and scope changes are ultimately decided by the product owner, who must perform the important balancing act required by the project to adequately reflect the needs and constraints of the organization, its stakeholders, and the project team.
        • The product owner role can only be successful in an organization that has established a trusting and supportive culture. Great trust must be placed in the product owner to adequately balance competing needs in a way that leads to good outcomes for the organization. This trust must come with some authority to make important project decisions, and the organization must also support the product owner in addressing risks and roadblocks outside the control of the project team.
        • The product owner is first among equals when it comes to ultimate ownership of success for the project (along with the project delivery team itself). Because of this, any project of any significance will require the full-time effort of the product owner (don't shortchange yourself by under-investing in a willing, able, and available product owner)

      Output

      • Better understanding of the product owner role.

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Product Owner Exercise 2.2 (Optional) Dissect this definition of the product owner role

      Which aspects of the product owner are "easy" in your organization?

      Which aspects of the product owner are "hard" in your organization?

      Product Owner Module

      Establish an effective product owner role

      Activities

      3.1 Build a starting checklist of quality filters

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand the levels in a product backlog and how to create quality filters for PBIs moving through the backlog.
      • Define your product roadmap approach for key audiences.

      Product Owner Step 3: Managing effective product backlogs and roadmaps

      The primary role of the product owner is to manage the backlog effectively.

      When managed properly, the product backlog is a powerful project management tool that directly contributes to project success.

      The product owner's primary responsibility is to ensure this backlog is managed effectively.

      A backlog stores and organizes PBIs at various stages of readiness

      A well-formed backlog can be thought of as a DEEP backlog:

      • Detailed Appropriately: Product backlog items (PBIs) are broken down and refined as necessary.
      • Emergent: The backlog grows and evolves over time as PBIs are added and removed.
      • Estimated: The effort a PBI requires is estimated at each tier.
      • Prioritized: The PBIs value and priority are determined at each tier.

      (Perforce, 2018)

      An image showing the Ideas; Qualified; Ready; funnel leading to the sprint approach.

      Backlog tiers facilitate product planning steps

      An image of the product planning steps facilitated by Backlog Tiers

      Each activity is a variation of measuring value and estimating effort to validate and prioritize a PBI.

      A PBI meets our definition of done and passes through to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.

      Backlog Exercise 2.1 Build a starting checklist of quality filters

      60 minutes

      1. Quality filters provide a checklist to ensure each Product Backlog Item (PBI) meets our definition of Done and is ready to move to the next backlog group (status).
      2. Create a checklist of basic descriptors that must be completed between each backlog level.
      3. If you completed this exercise in a different Module, review and update it here.
      4. Use this information to start your product strategy playbook in Deliver on Your Digital Product Vision.

      An image of the backlog tiers, identifying where product backlog and sprint backlog are

      Output

      • List of enablers and blockers to establishing product owners

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Outline the criteria to proceed to the next tier via quality filters

      Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.

      An image showing the approach you will use to Outline the criteria to proceed to the next tier via quality filters

      Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver.

      Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      This is an image Adapted from: Pichler, What Is Product Management?

      Adapted from: Pichler, "What Is Product Management?"

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      An example of performing planning and analysis at the family level.

      Leverage the product family roadmap for alignment

      It's more than a set of colorful boxes. It's the map to align everyone to where you are going.

      • Your product family roadmap:
        • Lays out a strategy for your product family.
        • Is a statement of intent for your family of products.
        • Communicates direction for the entire product family and product teams.
        • Directly connects to the organization's goals.
      • However, it is not:
        • Representative of a hard commitment.
        • A simple combination of your current product roadmaps.

      Your ideal roadmap approach is a spectrum, not a choice!

      Match your roadmap and backlog to the needs of the product.

      Tactical vs strategic roadmaps.

      Product Managers do not have to choose between being tactical or strategic.
      – Aha!, 2015

      Multiple roadmap views can communicate differently yet tell the same truth

      Audience

      Business/
      IT Leaders

      Users/Customers

      Delivery Teams

      Roadmap

      View

      Portfolio

      Product Family

      Technology

      Objectives

      To provide a snapshot
      of the portfolio and
      priority products

      To visualize and validate product strategy

      To coordinate broad technology and architecture decisions

      Artifacts

      Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level.

      Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize
      those goals.

      Artifacts are grouped by
      the teams who deliver
      that work and consist of technical capabilities that support the broader delivery of value for the product family.

      Product Owner Exercise 3.1 Build a starting checklist of quality filters

      60 minutes

      1. Views provide roadmap information to different audiences in the format and level of detail that is fit to their purpose.
      2. Consider the three primary audiences for roadmap alignment.
      3. Define the roles or people who the view best fits.
      4. Define the level of detail or artifacts shared in the view for each audience.
      5. Use this information to start your product strategy playbook in Deliver on Your Digital Product Vision.

      Business/
      IT Leaders

      Users/Customers

      Delivery Teams

      Audience:

      Audience:

      Audience:

      Level of Detail/Artifacts:

      Level of Detail/Artifacts:

      Level of Detail/Artifacts:

      Output

      • List of enablers and blockers to establishing product owners

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn't available.

      A comparison between product family roadmaps and product roadmaps.

      Use product roadmaps to align cross-team dependencies

      Regardless of how other teams operate, teams need to align to common milestones.

      An image showing how you may Use product roadmaps to align cross-team dependencies

      Product Owner Module

      Establish an effective product owner role

      Activities

      4.1 Identify key insights and takeaways

      4.2 Perform exit survey and capture results

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Identify your key insights and takeaways.

      Product Owner Exercise 4.1
      Identify key insights and takeaways

      30 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the Intro to Agile presentation?
        2. What if any takeaways do participants feel are needed as a result of the presentation?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:
      What key insights have you gained? What takeaways have you identified?
      (e.g. better understanding of Agile mindset, principles, and practices) (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Product Owner Exercise 4.2
      Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Agile Modules

      Prioritize Agile support with your top challenges

      Backlog Management

      Scrum Simulation

      Estimation

      Product Owner

      Product Roadmapping

      1: User stories and the art of decomposition

      2: Effective backlog management & refinement

      3: Identify insights and team feedback

      1: Scrum sprint planning and retrospective simulation

      2: Pass the balls – sprint velocity game

      1: Improve product backlog item estimation

      2: Agile estimation fundamentals

      3: Understand the wisdom of crowds

      4: Identify insights and team feedback

      1: Understand product management fundamentals

      2: The critical role of the product owner

      3: Manage effective product backlogs and roadmaps

      4: Identify insights and team feedback

      1: Identify your product roadmapping pains

      2: The six "tools" of product roadmapping

      3: Product roadmapping exercise

      Organizations often struggle with numerous pain points around Agile delivery.
      The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.

      Agile modules provide supporting activities:

      Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.

      This phase involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Product Roadmapping

      Create effective product roadmaps

      Activities

      Roadmapping 1.1 Identify your product roadmapping pains
      Roadmapping 1.2 The six "tools" of product roadmapping
      Roadmapping 1.3 Product roadmapping exercise

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand product management fundamentals
      • Understand the six "tools" of roadmapping and how to use them

      Roadmapping Exercise 1.1: Tell us what product management means to you and how it differs from a project orientation

      10-15 minutes

      1. Share your current understanding of product management.
      What is product management, and how does it differ from a project orientation?

      Output

      • Your current understanding of product management and its benefits

      Participants

      • PMs, Pos, and SMs
      • Delivery managers
      • Delivery teams
      • Business stakeholders
      • Senior leaders
      • Other interested parties

      Definition of terms

      Project

      "A temporary endeavor undertaken to create a unique product, service, or result. The temporary nature of projects indicates a beginning and an end to the project work or a phase of the project work. Projects can stand alone or be part of a program or portfolio."

      – PMBOK, PMI

      Product

      "A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements."
      Deliver on Your Digital Product Vision,
      Info-Tech Research Group

      Info-Tech Insight

      Any proper definition of product recognizes that they are long-term endeavors that don't end after the project finishes. Because of this, products need well thought out roadmaps.

      Deliver Digital Products at Scale via Enterprise Product Families

      Match your product management role definitions to your product family levels

      Product ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply or require a management relationship.

      Product Portfolio
      Groups of product families within an overall value stream or capability grouping.
      Product Portfolio Manager

      Product Family
      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
      Product Family Manager

      Product
      Single product composed of one or more applications and services.
      Product Owner

      Info-Tech Insight

      The primary role conflict occurs when the product owner is a proxy for stakeholders or responsible for the delivery team. The product owner owns the product backlog. The delivery team owns the sprint backlog and delivery.

      Roadmapping Exercise 1.2 (Optional): Define "product" in your context*

      15-30 minutes

      1. Discuss what "product" means in your organization.
      2. Create a common, enterprise definition for "product."

      For example,

      • An application, platform, or application family.
      • Discrete items that deliver value to a user/customer.

      Capture your organization's definition of product:

      * For more on Product Management see Deliver on Your Digital Product Vision

      Output

      • Your enterprise/ organizational definition of products and services.

      Participants

      • PMs, Pos, and SMs
      • Delivery managers
      • Delivery teams
      • Business stakeholders
      • Senior leaders
      • Other interested parties

      Product Roadmapping

      Create effective product roadmaps

      Activities

      The six "tools" of product roadmapping

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand product management fundamentals
      • Understand the six "tools" of roadmapping and how to use them

      The six "tools" of product roadmapping

      the 6 tools of product roadmapping: Vision; Goals; Strategy; Roadmap; Backlog; Release Plan.

      Product Roadmapping

      Create effective product roadmaps

      Activities

      Roadmapping 3.1 Product roadmapping exercise
      Roadmapping 3.2 Identify key insights and takeaways
      Roadmapping 3.3 Perform an exit survey

      This step involves the following participants:

      • Product owners, product managers, and scrum masters
      • Delivery managers and senior leaders
      • Stakeholders and delivery teams

      Outcomes of this step

      • Understand product management fundamentals
      • Understand the six "tools" of roadmapping and how to use them

      Roadmapping Exercise 1.2 (Optional): Define "product" in your context*

      30 minutes

      1. As a team, read through the exercise back story below:

      The city of Binbetter is a picturesque place that is sadly in decline because local industry jobs are slowly relocating elsewhere. So, the local government has decided to do something to reinvigorate the city. Binbetter City Council has set aside money and a parcel of land they would like to develop into a venue that will attract visitors and generate revenue for the city.

      Your team was hired to develop the site, and you have already spent time with city representatives to create a vision, goals and strategy for building out this venue (captured on the following slides). The city doesn't want to wait until the entire venue is completed before it opens to visitors, and so you have been instructed to build it incrementally in order to bring in much needed revenue as soon as possible.

      Using the vision, goals, and strategy you have created, your team will need to plan out the build (i.e. create a roadmap and release plan for which parts of the venue to build and in which order). You can assume that visitors will come to the venue after your "Release 1", even while the rest is still under construction. Select one member of your team to be designated as the product owner. The entire team will work together to consider options and agree on a roadmap/release plan, but the product owner will be the ultimate decision-maker.

      * Adapted from Rautiainen et al, Toward Agile Product and Portfolio Management, 2015

      Output

      • Practical understanding of how to apply the six tools of product roadmapping.

      Participants

      • PMs, Pos, and SMs
      • Delivery managers
      • Delivery teams
      • Business stakeholders
      • Senior leaders
      • Other interested parties

      Roadmapping Exercise 3.1: Continued

      1. As a team, review vision, goal, and strategy:
        • Is this a "good" vision statement, and if so, why?
        • Does it live up to its definition of being: "notional and inspirational, while also calling out key guidance and constraints"?
        • Does it help you to rule in/out options for the Product?
        • e.g. Would a parking lot fit the vision?
        • What about a bunch of condominiums?
        • What about a theme park?

      Vision, Goals, and Strategy

      Product Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city

      Roadmapping Exercise 3.1: Continued

      1. As a team, review vision, goal, and strategy:

      Vision, Goals, and Strategy

      Product Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city

      An image of a Château-style Hotel (left) and a Gothic-style Cathedral (right)

      Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter.

      Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).

      Roadmapping Exercise 3.1: Continued

      1. As a team, review the following exercise rules:
      • Your construction team has told you that they can divide the structures into 17 "equal" components (see below)
      • Each component will require about the same amount of time and resources to complete
      • You can ask the team to build these components in any order and temporary roofs can be built for components that are not at the top of a "stack" (e.g. you can build C3 without having to build C4 and C5 at the same time)
      • However, you cannot build the tops of any buildings first (e.g. don't build M3 until M2 and M1 are in place)

      An image of the chateau hotel and the Gothic Cathedral from the previous slide, broken down into 7 parts each

      Roadmapping Exercise 3.1: Continued

      1. As a team, review vision, goal, and strategy:
        • The city has asked you to decide on your "Release 1 MVP" and has limited you to selecting between 4 and 8 components for this MVP (fewer components = earlier opening date).
        • As a team, work together to decide which components will be in your MVP (remember, the PO makes the ultimate decision).
        • Drag your (4-8) selected MVP components over from the right and assemble them below (and explain your reasoning for your MVP selections):

      Release 1 (MVP)

      Vision, Goals, and Strategy

      Product Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city

      Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter.

      Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).

      An image of the chateau hotel and the Gothic Cathedral from the previous slide, broken down into 7 parts each

      Roadmapping Exercise 3.1: Continued
      (magnified venue)

      An image of the chateau hotel and the Gothic Cathedral from the previous slide, broken down into 7 parts each

      Roadmapping Exercise 3.1: Continued

      1. As a team, decide the rest of your roadmap:
        • The city has asked you to decide on the remainder of your roadmap
        • They have limited you to selecting between 2 and 4 components for each additional release (drag your selected component into each release below):
      Release 2 Release 3 Release 4 Release 5

      Vision, Goals, and Strategy

      Product Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city

      Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter.

      Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).

      An image of the chateau hotel and the Gothic Cathedral from the previous slide, broken down into 7 parts each

      Roadmapping Exercise 3.1: Continued

      Roadmap, Release Plan and Backlog

      an example roadmap plan; INCREASING: Priority; Requirements detail; Estimate accuracy; Level of commitment.

      Vision, Goals, and Strategy

      Product Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city

      Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter.

      Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).

      An image of the chateau hotel and the Gothic Cathedral from the previous slide, broken down into 7 parts each

      Roadmapping Exercise 3.2:
      Identify key insights and takeaways

      15 minutes

      1. As a group, discuss and capture your thoughts on:
        1. What key insights have participants gained from the product roadmapping module?
        2. What if any takeaways do participants feel are needed as a result of the module?
        3. What changes need to be made in the organization to support/enhance Agile adoption?
      2. Capture your findings in the table below:
      What key insights have you gained?What takeaways have you identified?
      • (e.g. better understanding of Agile mindset, principles, and practices)
      • (e.g. how you can improve/spread Agile practices in the organization)

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Roadmapping Exercise 3.3
      Perform an exit survey

      30 minutes

      1. Wrap up this section by addressing any remaining questions participants still have.
      2. Create your local exit survey by copying the template using the link below. Then copy and distribute your local survey link.
      3. Collect the consolidated survey results in preparation for your next steps.
      4. NOTE: Using this survey template requires having access to Microsoft Forms. If you cannot access Microsoft Forms, an Info-Tech analyst can send the survey for you. Alternatively, this survey can be done with sticky notes and a pen and paper to calculate the outcomes.

      Download Survey Template:

      Develop Your Agile Approach Exit Survey Template

      Output

      • A better understanding of Agile principles and practices
      • Action items that will help solidify Agile practices in the organization

      Participants

      • Product owners, product managers, and scrum masters
      • Delivery managers
      • Delivery teams
      • Stakeholders
      • Senior leaders

      Appendix

      Additional research to start your journey

      Related Info-Tech Research

      Mentoring for Agile Teams

      • Get practical help and guidance on your Agile transformation journey.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      • Deliver value at the scale of your organization through defining enterprise product families.

      Bibliography

      "Agile Estimation Practice." DZone.com, 13 May 2013. Web.
      "Announcing DORA 2021 Accelerate State of DevOps Report." Google Cloud Blog. Accessed 8 Nov. 2022.
      "Are Your IT Strategy and Business Strategy Aligned?" 5Q Partners, 8 Jan. 2015. Accessed Oct. 2016.
      A, Karen. "20 Mental Models for Product Managers." Medium, Product Management Insider, 2 Aug. 2018 . Web.
      ADAMS, PAUL. "Product Teams: How to Build & Structure Product Teams for Growth." Inside Intercom, 30 Oct. 2019. Web.
      Agile Alliance. "Product Owner." Agile Alliance. n.d. Web.
      Ambysoft. "2018 IT Project Success Rates Survey Results." Ambysoft. 2018. Web.
      Banfield, Richard, et al. "On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team." Pluralsight, 31 Jan. 2018. Web.
      Bloch, Michael, Sven Blumberg, and Jurgen Laartz. "Delivering Large-Scale IT Projects on Time, on Budget, and on Value." McKinsey & Company, October 2012.
      Blueprint. "10 Ways Requirements Can Sabotage Your Projects Right From the Start." Blueprint. 2012. Web.
      Boehm, Barry W. Software Engineering Economics. New Jersey: Prentice Hall, 1981.
      Breddels, Dajo, and Paul Kuijten. "Product Owner Value Game." Agile2015 Conference. 2015. Web.
      Cagan, Martin. "Behind Every Great Product." Silicon Valley Product Group. 2005. Web.
      "Chaos Report 2015." The Standish Group, 2015. Accessed 29 July 2022.
      Cohn, Mike. Succeeding With Agile: Software Development Using Scrum. Addison-Wesley. 2010. Web.
      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997. Print.
      Dyba, Tore, and Torgeir Dingsøyr. "Empirical Studies of Agile Software Development: A Systematic Review." Elsevier, ScienceDirect. 24 Jan. 2008. Web.
      "How do you define a product?" Scrum.org. 4 Apr 2017, Web
      EDUCAUSE. "Aligning IT Funding Models to the Pace of Technology Change." EDUCAUSE. 14 Dec. 2015. Web.
      Eick, Stephen. "Does Code Decay? Assessing the Evidence from Change Management Data." IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.
      "Enablers." Scaled Agile. n.d. Web.
      "Epic." Scaled Agile. n.d. Web.
      Eringa, Ron. "Evolution of the Product Owner." RonEringa.com. 12 June 2016. Web.
      Fernandes, Thaisa. "Spotify Squad Framework - Part I." Medium.com. 6 Mar. 2017. Web.
      Fowler, Martin. "Application Boundary." MartinFowler.com. 11 Sept. 2003. Web. 20 Nov. 2017.
      Galen, Robert. "Measuring Technical Product Managership – What Does 'Good' Look Like ...." RGalen Consulting. 5 Aug. 2015. Web.
      Hackshall, Robin. "Product Backlog Refinement." Scrum Alliance. 9 Oct. 2014. Web. Feb. 2019.
      Halisky, Merland, and Luke Lackrone. "The Product Owner's Universe." Agile Alliance, Agile2016. 2016. Web.
      Kamer, Jurriaan. "How to Build Your Own 'Spotify Model'." Medium.com. 9 Feb. 2018. Web.
      Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce. 18 May 2018. Web. Feb. 2019.
      Lindstrom, Lowell. "7 Skills You Need to Be a Great Product Owner." Scrum Alliance. n.d. Web.
      Lawrence, Richard, and Peter Green. "The Humanizing Work Guide to Splitting User Stories." Humanizing Work, 22 Oct. 2020. Web.
      Leffingwell, Dean. "SAFe 5.0." Scaled Agile Inc. 2021. Web. Feb. 2021.
      Lucero, Mario. "Product Backlog – Deep Model." Agilelucero. 8 Oct. 2014. Web.
      Lukassen, Chris. "The Five Belts Of The Product Owner." Xebia.com. 20 Sept. 2016. Web.
      Management 3.0. "Delegation Poker Product Image." Management 3.0. n.d. Web.
      McCloskey, Heather. "Scaling Product Management: Secrets to Defeating Common Challenges." Scaling Product Management: Secrets to Defeating Common Challenges, ProductPlan, 12 July 2019 . Web.
      McCloskey, Heather. "When and How to Scale Your Product Team." UserVoice Blog, UserVoice, 21 Feb. 2017 . Web.
      Medium.com. "Exploring Key Elements of Spotify's Agile Scaling Model." Medium.com. 23 July 2018. Web.
      Mironov, Rich. "Scaling Up Product Manager/Owner Teams: - Rich Mironov's Product Bytes." Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014 . Web.
      "Most Agile Transformations Will Fail." Vitality Chicago Inc., 24 Jan. 2019.
      Overeem, Barry. "A Product Owner Self-Assessment." Barry Overeem. 6 Mar. 2017. Web.
      Overeem, Barry. "Retrospective: Using the Team Radar." Barry Overeem. 27 Feb. 2017. Web.
      "PI Planning." Scaled Agile. n.d. Web.
      "PI Planning."SAFe. 2020.
      Pichler, Roman. "How to Scale the Scrum Product Owner." Roman Pichler, 28 June 2016 . Web.
      Pichler, Roman. "Product Management Framework." Pichler Consulting Limited. 2014. Web.
      Pichler, Roman. "Sprint Planning Tips for Technical Product Managers." LinkedIn. 4 Sept. 2018. Web.
      Pichler, Roman. "What Is Product Management?" Pichler Consulting Limited. 26 Nov. 2014. Web.
      Project Management Institute. A Guide to the Project Management Body of Knowledge (PMBOK Guide). 7th ed., Project Management Institute, 2021.
      Radigan, Dan. "Putting the 'Flow' Back in Workflow With WIP Limits." Atlassian. n.d. Web.
      Royce, Dr. Winston W. "Managing the Development of Large Software Systems." Scf.usc.edu. 1970. Web.
      Schuurman, Robbin. "10 Tips for Technical Product Managers on Agile Product Management." Scrum.org. 28 Nov. 2017. Web.
      Schuurman, Robbin. "10 Tips for Technical Product Managers on (Business) Value." Scrum.org. 30 Nov. 2017. Web.
      Schuurman, Robbin. "10 Tips for Technical Product Managers on Product Backlog Management." Scrum.org. 5 Dec. 2017. Web.
      Schuurman, Robbin. "10 Tips for Technical Product Managers on the Product Vision." Scrum.org. 29 Nov. 2017. Web.
      Schuurman, Robbin. "Tips for Starting Technical Product Managers." Scrum.org. 27 Nov. 2017. Web.
      Sharma, Rohit. "Scaling Product Teams the Structured Way." Monetary Musings, Monetary Musings, 28 Nov. 2016 . Web.
      STEINER, ANNE. "Start to Scale Your Product Management: Multiple Teams Working on Single Product." Cprime, Cprime, 6 Aug. 2019 . Web.
      Shirazi, Reza. "Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong." Austin VOP #50. 2 Oct. 2018. Web.
      Standish Group, The. "The Standish Group 2015 Chaos Report." The Standish Group. 2015. Web.
      Theus, Andre. "When Should You Scale the Product Management Team?" When Should You Scale the Product Management Team?, ProductPlan, 7 May 2019 . Web.
      Todaro, Dave. "Splitting Epics and User Stories." Ascendle. n.d. Web. Feb. 2019.
      Tolonen, Arto. "Scaling Product Management in a Single Product Company." Smartly.io - Digital Advertising Made Easy, Effective, and Enjoyable, Smartly.io, 26 Apr. 2018 . Web.
      Ulrich, Catherine. "The 6 Types of Product Managers. Which One Do You Need?" Medium.com. 19 Dec. 2017. Web.
      Vähäniitty, J. et al. "Chapter 7: Agile Product Management" in Towards Agile Product and Portfolio Management. Aalto University Software Process Research Group, 2010.
      VersionOne. "12th Annual State of Agile Report." VersionOne. 9 April 2018. Web.
      Verwijs, Christiaan. "Retrospective: Do The Team Radar." Medium.com. 10 Feb. 2017. Web.
      "Why Agile Fails Because of Corporate Culture - DZone Agile." Dzone.Com. Accessed 31 Aug. 2021.

      page 1 of the appendix
      page 2 of the appendix
      page 3 of the appendix
      page 4 of the appendix

      Cultural advantages of Agile

      Collaboration

      Team members leverage all their experience working towards a common goal.

      Iterations

      Cycles provide opportunities for more product feedback.

      Prioritization

      The most important needs are addressed in the current iteration.

      Continual Improvement

      Self-managing teams continually improve their approach for next iteration.

      A backlog stores and organizes PBIs at various stages of readiness

      A well-formed backlog can be thought of as a DEEP backlog:

      • Detailed Appropriately: Product backlog items (PBIs) are broken down and refined as necessary.
      • Emergent: The backlog grows and evolves over time as PBIs are added and removed.
      • Estimated: The effort a PBI requires is estimated at each tier.
      • Prioritized: The PBIs value and priority are determined at each tier.

      (Perforce, 2018)

      Info-Tech Best Practice

      Don't fully elaborate all of your PBIs at the beginning of the project instead, make sure they are elaborated "just in time." (Keep no more than 2 or 3 sprints worth of user stories in the Ready state.)

      An image showing the Ideas; Qualified; Ready; funnel leading to the sprint aproach.

      Scrum versus Kanban: Key differences

      page 6 of the appendix

      Scrum versus Kanban: When to use each

      Scrum: Delivering related or grouped changes in fixed time intervals.

      • Coordinating the development or release of related items
      • Maturing a product or service
      • Interdependencies between work items

      Kanban: Delivering independent items as soon as each is ready.

      • Work items from ticketing or individual requests
      • Completing independent changes
      • Releasing changes as soon as possible

      Develop an adaptive governance process

      page 7 of the appendix

      Five key principles for building an adaptive governance framework

      Delegate and Empower

      Decision making must be delegated down within the organization, and all resources must be empowered and supported to make effective decisions.

      Define Outcomes

      Outcomes and goals must be clearly articulated and understood across the organization to ensure decisions are in line and stay within reasonable boundaries.

      Make Risk informed decisions

      Integrated risk information must be available with sufficient data to support decision making and design approaches at all levels of the organization.

      Embed / Automate

      Governance standards and activities need to be embedded in processes and practices. Optimal governance reduces its manual footprint while remaining viable. This also allows for more dynamic adaptation.

      Establish standards and behavior

      Standards and policies need to be defined as the foundation for embedding governance practices organizationally. These guardrails will create boundaries to reinforce delegated decision making.

      Maturing governance is a journey

      Organizations should look to progress in their governance stages. Ad-Hoc, and controlled governance tends to be slow, expensive, and a poor fit for modern practices.

      The goal as you progress in your stages is to delegate governance and empower teams to make optimal decisions in real-time, knowing that they are aligned with the understood best interests of the organization.

      Automate governance for optimal velocity, while mitigating risks and driving value.

      This puts your organization in the best position to be adaptive and able to react effectively to volatility and uncertainty.

      page 8 of the appendix

      Business value is a key component to driving better decision making

      Better Decisions

      • Team Engagement
      • Frequent Delivery
      • Stakeholder Input
      • Market Analysis
      • Articulating Business Value
      • Focus on Business Needs

      Facilitation Planning Tool

      • Double-click the embedded Excel workbook to select and plan your exercises and timing.
      • Place or remove the "X" in the "Add to Agenda" column to add it to the workshop agenda and duration estimate.
      • Verify the exercise and step timing estimates from the blueprint provided on the "Detailed Workshop Planner" in columns C-F and adjust based on your facilitation and intended audience.

      an image of the Facilitation Planning Tool

      Appendix:
      SDLC transformation steps

      Waterfall SDLC: Valuable product delivered at the end of an extended project lifecycle, frequently in years

      Page 1 of the SDLC Appendix.

      • Business separated from delivery of technology it needs, only one third of product is actually valuable (Info-Tech, N=40,000).
      • In Waterfall, a team of experts in specific disciplines hand off different aspects of the lifecycle.
      • Document signoffs are required to ensure integration between silos (Business, Dev, and Ops) and individuals.
      • A separate change request process lays over the entire lifecycle to prevent changes from disrupting delivery.
      • Tools are deployed to support a specific role (e.g. BA) and seldom integrated (usually requirements <-> test).

      Wagile/Agifall/WaterScrumFall SDLC: Valuable product delivered in multiple releases

      Page 2 of the SDLC Appendix.

      • Business is more closely integrated by a business product owner accountable for day-to-day delivery of value for users.
      • The team collaborates and develops cross-functional skills as they define, design, build, and test code over time.
      • Signoffs are reduced but documentation is still focused on satisfying project delivery and operations policy requirements.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Tools start to be integrated to streamline delivery (usually requirements and Agile work management tools).

      Agile SDLC: Valuable product delivered iteratively; frequency depends on Ops' capacity

      Page 3 of the SDLC Appendix.

      • Business users are closely integrated through regularly scheduled demos (e.g. every two weeks).
      • Team is fully cross-functional and collaboratesto plan, define, design, build, and test the code supported by specialists.
      • Documentation is focused on future development and operations needs.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Explore automation for application development (e.g. automated regression testing).

      Agile with DevOps SDLC: High frequency iterative delivery of valuable product (e.g. every two weeks)

      Page 4 of the SDLC Appendix.

      • Business users are closely integrated through regularly scheduled demos.
      • Dev and ops teams collaborate to plan, define, design, build, test, and deploy code supported by automation.
      • Documentation is focused on supporting users, future changes, and operational support.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Build, test, deploy is fully automated (service desk is still separated).

      DevOps SDLC: Continuous integration and delivery

      Page 5 of the SDLC Appendix.

      • Business users are closely integrated through regularly scheduled demos.
      • Fully integrated DevOps team collaborates to plan, define, design, build, test, deploy, and maintain code.
      • Documentation Is focused on future development and use adoption.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Fully integrated development and operations toolchain.

      Fully integrated product SDLC: Agile + DevOps + continuous delivery of valuable product on demand

      Page 6 of the SDLC Appendix.

      • Business users are fully integrated with the teams through dedicated business product owner.
      • Cross-functional teams collaborate across the business and technical life of the product.
      • Documentation supports internal and external needs (business, users, Ops).
      • Change is built into the process to allow the team to respond to change dynamically.
      • Fully integrated toolchain (including service desk).

      Select a Security Outsourcing Partner

      • Buy Link or Shortcode: {j2store}246|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $13,739 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Most organizations do not have a clear understanding of their current security posture, their security goals, and the specific security services they require. Without a clear understanding of their needs, organizations may struggle to identify a partner that can meet their requirements.
      • Breakdowns and lack of communication can be a significant obstacle, especially when clear lines of communication with partners, including regular check-ins, reporting, and incident response protocols, have not been clearly established.
      • Ensuring that security partners’ systems and processes integrate seamlessly with existing systems can be a challenge for most organizations in addition to making sure that security partners have the necessary access and permissions to perform their services effectively.
      • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

      Our Advice

      Critical Insight

      • You can outsource your responsibilities but not your accountability.
      • Be aware that in most cases, the traditional approach is more profitable to MSSPs, and they may push you toward one, so make sure you get the service you want, not what they prescribe.

      Impact and Result

      • Determine which security responsibilities can be outsourced and which should be insourced and the right procedure to outsourcing to gain cost savings, improve resource allocation, and boost your overall security posture.

      Select a Security Outsourcing Partner Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Select a Security Outsourcing Partner Storyboard – A guide to help you determine your requirements and select and manage your security outsourcing partner.

      Our systematic approach will ensure that the correct procedure for selecting a security outsourcing partner is implemented. This blueprint will help you build and implement your security policy program by following our three-phase methodology: determine what to outsource, select the right MSSP, and manage your MSSP.

      • Select a Security Outsourcing Partner – Phases 1-3

      2. MSSP RFP Template – A customizable template to help you choose the right security service provider.

      This modifiable template is designed to introduce consistency and outline key requirements during the request for proposal phase of selecting an MSSP.

      • MSSP RFP Template

      Infographic

      Further reading

      Select a Security Outsourcing Partner

      Outsource the right functions to secure your business.

      Analyst Perspective

      Understanding your security needs and remaining accountable is the key to selecting the right partner.

      The need for specialized security services is fast becoming a necessity to most organizations. However, resource challenges will always mean that organizations will still have to take practical measures to ensure that the time, quality, and service that they require from outsourcing partners have been carefully crafted and packaged to elicit the right services that cover all their needs and requirements.

      Organizations must ensure that security partners are aligned not only with their needs and requirements, but also with the corporate culture. Rather than introducing hindrances to daily operations, security partners must support business goals and protect the organization’s interests at all times.

      And as always, outsource only your responsibilities and do not outsource your accountability, as that will cost you in the long run.

      Photo of Danny Hammond
      Danny Hammond
      Research Analyst
      Security, Risk, Privacy & Compliance Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      A lack of high-skill labor increases the cost of internal security, making outsourcing more appealing.

      A lack of time and resources prevents your organization from being able to enable security internally.

      Due to a lack of key information on the subject, you are unsure which functions should be outsourced versus which functions should remain in-house.

      Having 24/7/365 monitoring in-house is not feasible for most firms.

      There is difficulty measuring the effectiveness of managed security service providers (MSSPs).

      Common Obstacles

      InfoSec leaders will struggle to select the right outsourcing partner without knowing what the organization needs, such as:

      • How to start the process to select the right service provider that will cover your security needs. With so many service providers and technology tools in this field, who is the right partner?
      • Where to obtain guidance on externalization of resources or maintaining internal posture to enable to you confidently select an outsourcing partner.

      InfoSec leaders must understand the business environment and their own internal security needs before they can select an outsourcing partner that fits.

      Info-Tech’s Approach

      Info-Tech’s Select a Security Outsourcing Partner takes a multi-faceted approach to the problem that incorporates foundational technical elements, compliance considerations, and supporting processes:

      • Determine which security responsibilities can be insourced and which should be outsourced, and the right procedure to outsourcing in order to gain cost savings, improve resource allocation, and boost your overall security posture.
      • Understand the current landscape of MSSPs that are available today and the features they offer.
      • Highlight the future financial obligations of outsourcing vs. insourcing to explain which method is the most cost-effective.

      Info-Tech Insight

      Mitigate security risks by developing an end-to-end process that ensures you are outsourcing your responsibilities and not your accountability.

      Your Challenge

      This research is designed to help organizations select an effective security outsourcing partner.

      • A security outsourcing partner is a third-party service provider that offers security services on a contractual basis depending on client needs and requirements.
      • An effective outsourcing partner can help an organization improve its security posture by providing access to more specialized security experts, tools, and technologies.
      • One of the main challenges with selecting a security outsourcing partner is finding a partner that is a good fit for the organization's unique security needs and requirements.
      • Security outsourcing partners typically have access to sensitive information and systems, so proper controls and safeguards must be in place to protect all sensitive assets.
      • Without careful evaluation and due diligence to ensure that the partner is a good fit for the organization's security needs and requirements, it can be challenging to select an outsourcing partner.

      Outsourcing is effective, but only if done right

      • 83% of decision makers with in-house cybersecurity teams are considering outsourcing to an MSP (Syntax, 2021).
      • 77% of IT leaders said cyberattacks were more frequent (Syntax, 2021).
      • 51% of businesses suffered a data breach caused by a third party (Ponemon, 2021).

      Common Obstacles

      The problem with selecting an outsourcing partner isn’t a lack of qualified partners, it’s the lack of clarity about an organization's specific security needs.

      • Most organizations do not have a clear understanding of their current security posture, their security goals, and the specific security services they require. Without a clear understanding of their needs, organizations may struggle to identify a partner that can meet their requirements.
      • Breakdowns and lack of communication can be a significant obstacle, especially when clear lines of communication with partners, including regular check-ins, reporting, and incident response protocols, have not been clearly established.
      • Ensuring that security partner's systems and processes integrate seamlessly with existing systems can be a challenge for most organizations. This is in addition to making sure that security partners have the necessary access and permissions to perform their services effectively.
      • Adhering to security policies is rarely a priority to users, as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

      A diagram that shows Average cost of a data breach from 2019 to 2022.
      Source: IBM, 2022 Cost of a Data Breach; N=537.


      Reaching an all-time high, the cost of a data breach averaged US$4.35 million in 2022. This figure represents a 2.6% increase from 2021, when the average cost of a breach was US$4.24 million. The average cost has climbed 12.7% since 2020.

      Info-Tech’s methodology for selecting a security outsourcing partner

      Determine your responsibilities

      Determine what responsibilities you can outsource to a service partner. Analyze which responsibilities you should outsource versus keep in-house? Do you require a service partner based on identified responsibilities?

      Scope your requirements

      Refine the list of role-based requirements, variables, and features you will require. Use a well-known list of critical security controls as a framework to determine these activities and send out RFPs to pick the best candidate for your organization.

      Manage your outsourcing program

      Adopt a program to manage your third-party service security outsourcing. Trust your managed security service providers (MSSP) but verify their results to ensure you get the service level you were promised.

      Select a Security Outsourcing Partner

      A diagram that shows your organization responsibilities & accountabilities, framework for selecting a security outsourcing partner, and benefits.

      Blueprint benefits

      IT/InfoSec Benefits

      Reduces complexity within the MSSP selection process by highlighting all the key steps to a successful selection program.

      Introduces a roadmap to clearly educate about the do’s and don’ts of MSSP selection.

      Reduces costs and efforts related to managing MSSPs and other security partners.

      Business Benefits

      Assists with selecting outsourcing partners that are essential to your organization’s objectives.

      Integrates outsourcing into corporate culture, leveraging organizational requirements while maximizing value of outsourcing.

      Reduces security outsourcing risk.

      Insight summary

      Overarching insight: You can outsource your responsibilities but not your accountability.

      Determine what to outsource: Assess your responsibilities to determine which ones you can outsource. It is vital that an understanding of how outsourcing will affect the organization, and what cost savings, if any, to expect from outsourcing is clear in order to generate a list of responsibilities that can/should be outsourced.

      Select the right partner: Create a list of variables to evaluate the MSSPs and determine which features are important to you. Evaluate all potential MSSPs and determine which one is right for your organization

      Manage your MSSP: Align the MSSP to your organization. Adopt a program to monitor the MSSP which includes a long-term strategy to manage the MSSP.

      Identifying security needs and requirements = Effective outsourcing program: Understanding your own security needs and requirements is key. Ensure your RFP covers the entire scope of your requirements; work with your identified partner on updates and adaptation, where necessary; and always monitor alignment to business objectives.

      Measure the value of this blueprint

      Phase

      Purpose

      Measured Value

      Determine what to outsource Understand the value in outsourcing and determining what responsibilities can be outsourced. Cost of determining what you can/should outsource:
      • 120 FTE hours at $90K per year = $5,400
      Cost of determining the savings from outsourcing vs. insourcing:
      • 120 FTE hours at $90K per year = $5,400
      Select the right partner Select an outsourcing partner that will have the right skill set and solution to identified requirements. Cost of ranking and selecting your MSSPs:
      • 160 FTE hours at $90K per year = $7,200
      Cost of creating and distributing RFPs:
      • 200 FTE hours at $90K per year = $9,000
      Manage your third-party service security outsourcing Use Info-Tech’s methodology and best practices to manage the MSSP to get the best value. Cost of creating and implementing a metrics program to manage the MSSP:
      • 80 FTE hours at $90K per year = $3,600

      After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

      Overall Impact: 8.9 /10

      Overall Average Cost Saved: $22,950

      Overall Average Days Saved: 9

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Implement DevOps Practices That Work

      • Buy Link or Shortcode: {j2store}155|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $42,916 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices are critical for business value delivery.
      • Organizations are looking to DevOps as an approach to rapidly deliver changes, but they often lack the foundations to use DevOps effectively.

      Our Advice

      Critical Insight

      Even in a highly tool-centric view, it is the appreciation of DevOps core principles that will determine your success in implementing its practices.

      Impact and Result

      • Understand the basics of DevOps-related improvements.
      • Assess the health and conduciveness of software delivery process through Info-Tech Research Group’s MATURE framework.

      Implement DevOps Practices That Work Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement DevOps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Examine your current state

      Understand the current state of your software delivery process and categorize existing challenges in it.

      • DevOps Readiness Survey

      2. MATURE your delivery lifecycle

      Brainstorm solutions using Info-Tech Research Group’s MATURE framework.

      • DevOps Roadmap Template

      3. Choose the right metrics and tools for your needs

      Identify metrics that are insightful and valuable. Determine tools that can help with DevOps practices implementation.

      • DevOps Pipeline Maturity Assessment

      4. Select horizons for improvement

      Lay out a schedule for enhancements for your software process to make it ready for DevOps.

      [infographic]

      Workshop: Implement DevOps Practices That Work

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Examine Your Current State

      The Purpose

      Set the context for improvement.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals that people can align to.

      Activities

      1.1 Review the outcome of the DevOps Readiness Survey.

      1.2 Articulate the current-state delivery process.

      1.3 Categorize existing challenges using PEAS.

      Outputs

      Baseline assessment of the organization’s readiness for introducing DevOps principles in its delivery process

      A categorized list of challenges currently evident in the delivery process

      2 MATURE Your Delivery Lifecycle

      The Purpose

      Brainstorm solutions using the MATURE framework.

      Key Benefits Achieved

      Collaborative list of solutions to challenges that are restricting/may restrict adoption of DevOps in your organization.

      Activities

      2.1 Brainstorm solutions for identified challenges.

      2.2 Understand different DevOps topologies within the context of strong communication and collaboration.

      Outputs

      A list of solutions that will enhance the current delivery process into one which is influenced by DevOps principles

      (Optional) Identify a team topology that works for your organization.

      3 Choose the Right Metrics and Tools for Your Needs

      The Purpose

      Select metrics and tools for your DevOps-inspired delivery pipeline.

      Key Benefits Achieved

      Enable your team to select the right metrics and tool chain that support the implementation of DevOps practices.

      Activities

      3.1 Identify metrics that are sensible and provide meaningful insights into your organization’s DevOps transition.

      3.2 Determine the set of tools that satisfy enterprise standards and can be used to implement DevOps practices.

      3.3 (Optional) Assess DevOps pipeline maturity.

      Outputs

      A list of metrics that will assist in measuring the progress of your organization’s DevOps transition

      A list of tools that meet enterprise standards and enhance delivery processes

      4 Define Your Release, Communication, and Next Steps

      The Purpose

      Build a plan laying out the work needed to be done for implementing the necessary changes to your organization.

      Key Benefits Achieved

      Roadmap of steps to take in the coming future.

      Activities

      4.1 Create a roadmap for future-state delivery process.

      Outputs

      Roadmap for future-state delivery process

      Resilience, It's about your business

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      January 17th, 2025 is when your ability to serve clients without interruption is legislated. At least when you are in the financial services sector, or when you supply such firms.  If you are not active in the financial arena, don’t click away. Many of these requirements can just give you an edge over your competition.

      Many firms underestimated the impact of the legislation, but let’s be honest, so did the European Union. The last pieces of the puzzle are still not delivered only two days before the law comes into effect.

      What is DORA all about again? It is the Digital Operational Resilience Act. In essence, it is about your ability to withstand adverse events that may impact your clients or the financial system.

      Aside from some nasty details, this really is just common sense. You need to be organized so that the right people know what is expected of them, from the accountable top to the staff executing the day to day operations. You need to know what to do when things go wrong. You need to know your suppliers, especially those who supply services to your critical business services. You need to test your defenses and your IT. You may want to share intelligence around cyber-attacks.

      There, all of the 45 business-relevant DORA articles and technical standards in a single paragraph. The remaining articles deal with the competent authorities and make for good reading as they provide some insights into the workings of the regulatory body. The same goes for the preamble of the law. No less than 104 “musings” that elaborate on the operating environment and intent of the law.

      If you’re firm is still in the thick of things trying to become compliant, you are not alone. I have seen at least one regulator indicating that they will be understanding of that situation, but you must have a clear roadmap to compliance in the near future. Your regulator may or may not be in line with that position. In the eastern-most countries of the EU, signals are that the regulator will take a much tougher stance.

      (This kind of negates one of the musings of the law; the need for a single view on what financial services firms must adhere to to be considered compliant and resilient. But I think this is an unavoidable byproduct of having culturally diverse member states.)

      I dare to say that firms typically have the governance in place as well as the IM processes and testing requirements. The biggest open items seem to be in the actual IT hard operational resilience, monitoring and BCM.

      Take a look at your own firm and make an honest assessment in those areas. They key resilience (DORA-related or not) is knowing how your service works and is performing from a client perspective.

      You need to know how a client achieves all their interaction goals with your company. Typically this is mapped in the client journey. Unfortunately, this usually only maps the business flow, not the technical flow. And usually you look at it from the client UX perspective. This is obviously very important, but it does not help you to understand the elements that ensure you that your clients can always complete that journey.

      The other day, I had a customer journey with an online ski-shop. I had bought two ski helmets in size M, the same size my adult son and I had. When the helmets arrived it turned out they were too small. So, ok, no worries, I start the return process online. Once we complete the initial steps, after a few days I notice that the price for only one helmet is shown on the site. This, despite the indicators that both helmets are approved to be returned. Later both helmets are shown as effectively returned. Refund still shows one helmet’s price. What gives? I give it some more time, but after ten days, I decide to enquire. The site still shows refund for one helmet.

      Then I receive an email that both helmets will be refunded as they accepted the state of the helmets (unused) and amount of the refund is now correct. Site still shows the wrong amount.

      This is obviously a small inconvenience, but it does show that the IT team does not have a full view of the entire customer journey and systems interactions. You need to fix this.

      Suppose this is not about two ski helmets, but about ski or home insurance. Or about the sale of a car or a B2B transaction involving tens or hundreds of thousands of dollars or euro, or any other currency? Does your system show the real-time correct status of the transaction? If not, I would, as a consumer, decide to change provider. Why? Because the trust is gone.

      Resilience is about withstanding events that threaten your service to your clients. Events are nit just earthquakes or floods. Events are also wrong or missing information. To protect against that, you need to know what the (value) chain is that leads to you providing that service. Additionally, you need to know if that service chain has any impediments at any moment in time. Aka, you need to know that any service request can be fulfilled at any given time. And to have the right processes and resources in place to fix whatever is not working at that time.

      And that is in my opinion the biggest task still outstanding with many companies to ensure true resilience and customer service.

      Lay the Strategic Foundations of Your Applications Team

      • Buy Link or Shortcode: {j2store}171|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • As an application leader, you are expected to quickly familiarize yourself with the current state of your applications environment.
      • You need to continuously demonstrate effective leadership to your applications team while defining and delivering a strategy for your applications department that will be accepted by stakeholders.

      Our Advice

      Critical Insight

      • The applications department can be viewed as the face of IT. The business often portrays the value of IT through the applications and services they provide and support. IT success can be dominantly driven by the application team’s performance.
      • Conflicting perceptions lead to missed opportunities. Being transparent on how well applications are supporting stakeholders from both business and technical perspectives is critical. This attribute helps validate that technical initiatives are addressing the right business problems or exploiting new value opportunities.

      Impact and Result

      • Get to know what needs to be changed quickly. Use Info-Tech’s advice and tools to perform an assessment of your department’s accountabilities and harvest stakeholder input to ensure that your applications operating model and portfolio meets or exceeds expectations and establishes the right solutions to the right problems.
      • Solidify the applications long-term strategy. Adopt best practices to ensure that you are striving towards the right goals and objectives. Not only do you need to clarify both team and stakeholder expectations, but you will ultimately need buy-in from them as you improve the operating model, applications portfolio, governance, and tactical plans. These items will be needed to develop your strategic model and long-term success.
      • Develop an action plan to show movement for improvements. Hit the ground running with an action plan to achieve realistic goals and milestones within an acceptable timeframe. An expectations-driven roadmap will help establish the critical structures that will continue to feed and grow your applications department.

      Lay the Strategic Foundations of Your Applications Team Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop an applications strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get to know your team

      Understand your applications team.

      • Lay the Strategic Foundations of Your Applications Team – Phase 1: Get to Know Your Team
      • Applications Strategy Template
      • Applications Diagnostic Tool

      2. Get to know your stakeholders

      Understand your stakeholders.

      • Lay the Strategic Foundations of Your Applications Team – Phase 2: Get to Know Your Stakeholders

      3. Develop your applications strategy

      Design and plan your applications strategy.

      • Lay the Strategic Foundations of Your Applications Team – Phase 3: Develop Your Applications Strategy
      [infographic]

      Workshop: Lay the Strategic Foundations of Your Applications Team

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Get to Know Your Team

      The Purpose

      Understand the expectations, structure, and dynamics of your applications team.

      Review your team’s current capacity.

      Gauge the team’s effectiveness to execute their operating model.

      Key Benefits Achieved

      Clear understanding of the current responsibilities and accountabilities of your teams.

      Identification of improvement opportunities based on your team’s performance.

      Activities

      1.1 Define your team’s role and responsibilities.

      1.2 Understand your team’s application and project portfolios.

      1.3 Understand your team’s values and expectations.

      1.4 Gauge your team’s ability to execute your operating model.

      Outputs

      Current team structure, RACI chart, and operating model

      Application portfolios currently managed by applications team and projects currently committed to

      List of current guiding principles and team expectations

      Team effectiveness of current operating model

      2 Get to Know Your Stakeholders

      The Purpose

      Understand the expectations of stakeholders.

      Review the services stakeholders consume to support their applications.

      Gauge stakeholder satisfaction of the services and applications your team provides and supports.

      Key Benefits Achieved

      Grounded understanding of the drivers and motivators of stakeholders that teams should accommodate.

      Identification of improvement opportunities that will increase the value your team delivers to stakeholders.

      Activities

      2.1 Understand your stakeholders and applications services.

      2.2 Define stakeholder expectations.

      2.3 Gauge stakeholder satisfaction of applications services and portfolio.

      Outputs

      Expectations stakeholders have on the applications team and the applications services they use

      List of applications expectations

      Stakeholder satisfaction of current operating model

      3 Develop Your Applications Strategy

      The Purpose

      Align and consolidate a single set of applications expectations.

      Develop key initiatives to alleviate current pain points and exploit existing opportunities to deliver new value.

      Create an achievable roadmap that is aligned to organizational priorities and accommodate existing constraints.

      Key Benefits Achieved

      Applications team and stakeholders are aligned on the core focus of the applications department.

      Initiatives to address the high priority issues and opportunities.

      Activities

      3.1 Define your applications expectations.

      3.2 Investigate your diagnostic results.

      3.3 Envision your future state.

      3.4 Create a tactical plan to achieve your future state.

      3.5 Finalize your applications strategy.

      Outputs

      List of applications expectations that accommodates the team and stakeholder needs

      Root causes to issues and opportunities revealed in team and stakeholder assessments

      Future-state applications portfolio, operating model, supporting people, process, and technologies, and applications strategic model

      Roadmap that lays out initiatives to achieve the future state

      Completed applications strategy

      Manage an IT Budget

      • Buy Link or Shortcode: {j2store}70|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • IT is viewed as a cost center without a clear understanding of the value it provides.
      • After completing the budget, the CIO is faced with changing expectations, disruptions, new risks, and new threats.
      • IT departments often lack a reliable budget management process to keep itself on track towards its budget goals.
      • Over budgeting risks credibility if projects are not all delivered, while under budgeting risks not being able to execute important projects.

      Our Advice

      Critical Insight

      • Managing your budget is not just about numbers; it’s also about people and processes. Better relationships and a proper process leads to better management of your budget. Understand how your relationships and current processes might be leveraged to manage your budget.
      • No one likes to be over budget, but being under budget isn’t necessarily good either. Coming in under budget may mean that you are not accomplishing the initiatives that you promised you would, reflecting poor job performance.

      Impact and Result

      • Implement a formal budget management process that documents your planned budget and actual expenditures, tracks variances, and responds to those variances to stay on track towards budget goals.
      • Manage the expectations of business stakeholders by communicating the links between IT spend and business value in a way that is easily understood by the business.
      • Control for under- or overspending by using Info Tech’s budget management tool and tactics.

      Manage an IT Budget Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the increasing expectations for IT departments to better manage their budgets, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Document

      Create a streamlined documentation process that also considers the elements of people and technology.

      • Manage an IT Budget – Phase 1: Document
      • Manage Your IT Budget Tool

      2. Track

      Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner.

      • Manage an IT Budget – Phase 2: Track

      3. Control

      Leverage control mechanisms to manage variances in your budget.

      • Manage an IT Budget – Phase 3: Control
      [infographic]

      Workshop: Manage an IT Budget

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Document Budget

      The Purpose

      The first step of managing your IT budget is to make sure there is a properly documented budget that everyone agrees upon.

      Key Benefits Achieved

      A properly documented budget facilitates management and communication of the budget.

      Activities

      1.1 Review budget for the year.

      1.2 Document each budget in the tool.

      1.3 Review CAPEX vs. OPEX.

      1.4 Customize accounts to match your organization.

      Outputs

      Budget broken out into monthly increments and by each account.

      Budget documented in tool.

      Tool customized to reflect organization's specific accounts and terminology.

      2 Optimize Documentation Process

      The Purpose

      A proper documentation process forms the backbone for effective budget management.

      Key Benefits Achieved

      A streamlined documentation process with accurate inputs that also considers the elements of people and technology.

      Activities

      2.1 Draw out process flow of current documentation.

      2.2 Identify bottlenecks.

      2.3 Discuss and develop roadmap to solving bottlenecks.

      Outputs

      Process flow of current documentation process with identified bottlenecks.

      Plan to mitigate bottlenecks.

      3 Track and Control for Over- and Underspending

      The Purpose

      Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner. Then, leverage control mechanisms to manage variances in your budget.

      Key Benefits Achieved

      Tracking and controlling for variances will help the IT department stay on track towards its budget goals. It will also help with communicating IT’s value to the business.

      Activities

      3.1 Walk through the “Overview Bar.”

      3.2 Document actual expenses incurred in fiscal to date.

      3.3 Review the risk of over- and underspending.

      3.4 Use the reforecast column to control for over- and underspend.

      Outputs

      Assess the “Overview Bar.”

      Document actual expenditures and committed expenses up to the current date.

      Develop a strategy and roadmap for how you will mitigate any current under- or overspends.

      Reforecast expenditures for each account for each month for the remainder of the fiscal year.

      Develop and Deploy Security Policies

      • Buy Link or Shortcode: {j2store}256|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $19,953 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Employees are not paying attention to policies. Awareness and understanding of what the security policy’s purpose is, how it benefits the organization, and the importance of compliance are overlooked when policies are distributed.
      • Informal, un-rationalized, ad hoc policies do not explicitly outline responsibilities, are rarely comprehensive, and are difficult to implement, revise, and maintain.
      • Data breaches are still on the rise and security policies are not shaping good employee behavior or security-conscious practices.
      • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

      Our Advice

      Critical Insight

      • Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.
      • Policies must be reasonable, auditable, enforceable, and measurable. If the policy items don’t meet these requirements, users can’t be expected to adhere to them. Focus on developing policies to be quantified and qualified for them to be relevant.

      Impact and Result

      • Save time and money using the templates provided to create your own customized security policies mapped to the Info-Tech framework, which incorporates multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA).

      Develop and Deploy Security Policies Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop and Deploy Security Policies Deck – A step-by-step guide to help you build, implement, and assess your security policy program.

      Our systematic approach will ensure that all identified areas of security have an associated policy.

    • Develop the security policy program.
    • Develop and implement the policy suite.
    • Communicate the security policy program.
    • Measure the security policy program.
      • Develop and Deploy Security Policies – Phases 1-4

      2. Security Policy Prioritization Tool – A structured tool to help your organization prioritize your policy suite to ensure that you are addressing the most important policies first.

      The Security Policy Prioritization Tool assesses the policy suite on policy importance, ease to implement, and ease to enforce. The output of this tool is your prioritized list of policies based on our policy framework.

      • Security Policy Prioritization Tool

      3. Security Policy Assessment Tool – A structured tool to assess the effectiveness of policies within your organization and determine recommended actions for remediation.

      The Security Policy Assessment Tool assesses the policy suite on policy coverage, communication, adherence, alignment, and overlap. The output of this tool is a checklist of remediation actions for each individual policy.

      • Security Policy Assessment Tool

      4. Security Policy Lifecycle Template – A customizable lifecycle template to manage your security policy initiatives.

      The Lifecycle Template includes sections on security vision, security mission, strategic security and policy objectives, policy design, roles and responsibilities for developing security policies, and organizational responsibilities.

      • Security Policy Lifecycle Template

      5. Policy Suite Templates – A best-of-breed templates suite mapped to the Info-Tech framework you can customize to reflect your organizational requirements and acquire approval.

      Use Info-Tech's security policy templates, which incorporate multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA), to ensure that your policies are clear, concise, and consistent.

      • Acceptable Use of Technology Policy Template
      • Application Security Policy Template
      • Asset Management Policy Template
      • Backup and Recovery Policy Template
      • Cloud Security Policy Template
      • Compliance and Audit Management Policy Template
      • Data Security Policy Template
      • Endpoint Security Policy Template
      • Human Resource Security Policy Template
      • Identity and Access Management Policy Template
      • Information Security Policy Template
      • Network and Communications Security Policy Template
      • Physical and Environmental Security Policy Template
      • Security Awareness and Training Policy Template
      • Security Incident Management Policy Template
      • Security Risk Management Policy Template
      • Security Threat Detection Policy Template
      • System Configuration and Change Management Policy Template
      • Vulnerability Management Policy Template

      6. Policy Communication Plan Template – A template to help you plan your approach for publishing and communicating your policy updates across the entire organization.

      This template helps you consider the budget time for communications, identify all stakeholders, and avoid scheduling communications in competition with one another.

      • Policy Communication Plan Template

      7. Security Awareness and Training Program Development Tool – A tool to help you identify initiatives to develop your security awareness and training program.

      Use this tool to first identify the initiatives that can grow your program, then as a roadmap tool for tracking progress of completion for those initiatives.

      • Security Awareness and Training Program Development Tool

      Infographic

      Workshop: Develop and Deploy Security Policies

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define the Security Policy Program

      The Purpose

      Define the security policy development program.

      Formalize a governing security policy lifecycle.

      Key Benefits Achieved

      Understanding the current state of policies within your organization.

      Prioritizing list of security policies for your organization.

      Being able to defend policies written based on business requirements and overarching security needs.

      Leveraging an executive champion to help policy adoption across the organization.

      Formalizing the roles, responsibilities, and overall mission of the program.

      Activities

      1.1 Understand the current state of policies.

      1.2 Align your security policies to the Info-Tech framework for compliance.

      1.3 Understand the relationship between policies and other documents.

      1.4 Prioritize the development of security policies.

      1.5 Discuss strategies to leverage stakeholder support.

      1.6 Plan to communicate with all stakeholders.

      1.7 Develop the security policy lifecycle.

      Outputs

      Security Policy Prioritization Tool

      Security Policy Prioritization Tool

      Security Policy Lifecycle Template

      2 Develop the Security Policy Suite

      The Purpose

      Develop a comprehensive suite of security policies that are relevant to the needs of the organization.

      Key Benefits Achieved

      Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.

      Activities

      2.1 Discuss the risks and drivers your organization faces that must be addressed by policies.

      2.2 Develop and customize security policies.

      2.3 Develop a plan to gather feedback from users.

      2.4 Discuss a plan to submit policies for approval.

      Outputs

      Understanding of the risks and drivers that will influence policy development.

      Up to 14 customized security policies (dependent on need and time).

      3 Implement Security Policy Program

      The Purpose

      Ensure policies and requirements are communicated with end users, along with steps to comply with the new security policies.

      Improve compliance and accountability with security policies.

      Plan for regular review and maintenance of the security policy program.

      Key Benefits Achieved

      Streamlined communication of the policies to users.

      Improved end user compliance with policy guidelines and be better prepared for audits.

      Incorporate security policies into daily schedule, eliminating disturbances to productivity and efficiency.

      Activities

      3.1 Plan the communication strategy of new policies.

      3.2 Discuss myPolicies to automate management and implementation.

      3.3 Incorporate policies and processes into your security awareness and training program.

      3.4 Assess the effectiveness of security policies.

      3.5 Understand the need for regular review and update.

      Outputs

      Policy Communication Plan Template

      Understanding of how myPolicies can help policy management and implementation.

      Security Awareness and Training Program Development Tool

      Security Policy Assessment Tool

      Action plan to regularly review and update the policies.

      Further reading

      Develop and Deploy Security Policies

      Enhance your overall security posture with a defensible and prescriptive policy suite.

      Analyst Perspective

      A policy lifecycle can be the secret sauce to managing your policies.

      A policy for policy’s sake is useless if it isn’t being used to ensure proper processes are followed. A policy should exist for more than just checking a requirement box. Policies need to be quantified, qualified, and enforced for them to be relevant.

      Policies should be developed based on the use cases that enable the business to run securely and smoothly. Ensure they are aligned with the corporate culture. Rather than introducing hindrances to daily operations, policies should reflect security practices that support business goals and protection.

      No published framework is going to be a perfect fit for any organization, so take the time to compare business operations and culture with security requirements to determine which ones apply to keep your organization secure.

      Photo of Danny Hammond, Research Analyst, Security, Risk, Privacy & Compliance Practice, Info-Tech Research Group. Danny Hammond
      Research Analyst
      Security, Risk, Privacy & Compliance Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Security breaches are damaging and costly. Trying to prevent and respond to them without robust, enforceable policies makes a difficult situation even harder to handle.
      • Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities and compliance requirements, and they are rarely comprehensive.
      • Without a strong lifecycle to keep policies up to date and easy to use, end users will ignore or work around poorly understood policies.
      • Time and money is wasted dealing with preventable security issues that should be pre-emptively addressed in a comprehensive corporate security policy program.
      Common Obstacles

      InfoSec leaders will struggle to craft the right set of policies without knowing what the organization actually needs, such as:

      • The security policies needed to safeguard infrastructure and resources.
      • The scope the security policies will cover within the organization.
      • The current compliance and regulatory obligations based on location and industry.
      InfoSec leaders must understand the business environment and end-user needs before they can select security policies that fit.
      Info-Tech’s Approach

      Info-Tech’s Develop and Deploy Security Policies takes a multi-faceted approach to the problem that incorporates foundational technical elements, compliance considerations, and supporting processes:

      • Assess what security policies currently exist within the organization and consider additional secure policies.
      • Develop a policy lifecycle that will define the needs, develop required documentation, and implement, communicate, and measure your policy program.
      • Draft a set of security policies mapped to the Info-Tech framework, which incorporates multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA).

      Info-Tech Insight

      Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.

      Your Challenge

      This research is designed to help organizations design a program to develop and deploy security policies

      • A security policy is a formal document that outlines the required behavior and security controls in place to protect corporate assets.
      • The development of policy documents is an ambitious task, but the real challenge comes with communication and enforcement.
      • A good security policy allows employees to know what is required of them and allows management to monitor and audit security practices against a standard policy.
      • Unless the policies are effectively communicated, enforced, and updated, employees won’t know what’s required of them and will not comply with essential standards, making the policies powerless.
      • Without a good policy lifecycle in place, it can be challenging to illustrate the key steps and decisions involved in creating and managing a policy.

      The problem with security policies

      29% Of IT workers say it's just too hard and time consuming to track and enforce.

      25% Of IT workers say they don’t enforce security policies universally.

      20% Of workers don’t follow company security policies all the time.

      (Source: Security Magazine, 2020)

      Common obstacles

      The problem with security policies isn’t development; rather, it’s the communication, enforcement, and maintenance of them.

      • Employees are not paying attention to policies. Awareness and understanding of what the security policy’s purpose is, how it benefits the organization, and the importance of compliance are overlooked when policies are distributed.
      • Informal, un-rationalized, ad hoc policies do not explicitly outline responsibilities, are rarely comprehensive, and are difficult to implement, revise, and maintain.
      • Date breaches are still on the rise and security policies are not shaping good employee behavior or security-conscious practices.
      • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.
      Bar chart of the 'Average cost of a data breach' in years '2019-20', '20-21', and '21-22'.
      (Source: IBM, 2022 Cost of a Data Breach; n=537)

      Reaching an all-time high, the cost of a data breach averaged US$4.35 million in 2022. This figure represents a 2.6% increase from last year, when the average cost of a breach was US$4.24 million. The average cost has climbed 12.7% since 2020.

      Info-Tech’s approach

      The right policy for the right audience. Generate a roadmap to guide the order of policy development based on organizational policy requirements and the target audience.

      Actions

      1. Develop policy lifecycle
      2. Identify compliance requirements
      3. Understand which policies need to be developed, maintained, or decommissioned
      I. Define Security Policy Program

      a) Security policy program lifecycle template

      b) Policy prioritization tool
      Clockwise cycle arrows at the centre of the table. II. Develop & Implement Policy Suite

      a) Policy template set

      Policies must be reasonable, auditable, enforceable, and measurable. Policy items that meet these requirements will have a higher level of adherence. Focus on efficiently creating policies using pre-developed templates that are mapped to multiple compliance frameworks.

      Actions

      1. Differentiate between policies, procedures, standards, and guidelines
      2. Draft policies from templates
      3. Review policies, including completeness
      4. Approve policies
      Gaining feedback on policy compliance is important for updates and adaptation, where necessary, as well as monitoring policy alignment to business objectives.

      Actions

      1. Enforce policies
      2. Measure policy effectiveness
      IV. Measure Policy Program

      a) Security policy tracking tool

      III. Communicate Policy Program

      a) Security policy awareness & training tool

      b) Policy communication plan template
      Awareness and training on security policies should be targeted and must be relevant to the employees’ jobs. Employees will be more attentive and willing to incorporate what they learn if they feel that awareness and training material was specifically designed to help them.

      Actions

      1. Identify any changes in the regulatory and compliance environment
      2. Include policy awareness in awareness and training programs
      3. Disseminate policies
      Build trust in your policy program by involving stakeholder participation through the entire policy lifecycle.

      Blueprint benefits

      IT/InfoSec Benefits

      • Reduces complexity within the policy creation process by using a single framework to align multiple compliance regimes.
      • Introduces a roadmap to clearly educate employees on the do’s and don’ts of IT usage within the organization.
      • Reduces costs and efforts related to managing IT security and other IT-related threats.

      Business Benefits

      • Identifies and develops security policies that are essential to your organization’s objectives.
      • Integrates security into corporate culture while maximizing compliance and effectiveness of security policies.
      • Reduces security policy compliance risk.

      Key deliverable:

      Security Policy Templates

      Templates for policies that can be used to map policy statements to multiple compliance frameworks.

      Sample of Security Policy Templates.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Security Policy Prioritization Tool

      The Info-Tech Security Policy Prioritization Tool will help you determine which security policies to work on first.
      Sample of the Security Policy Prioritization Tool.
      Sample of the Security Policy Assessment Tool.

      Security Policy Assessment Tool

      Info-Tech's Security Policy Assessment Tool helps ensure that your policies provide adequate coverage for your organization's security requirements.

      Measure the value of this blueprint

      Phase

      Purpose

      Measured Value

      Define Security Policy Program Understand the value in formal security policies and determine which policies to prepare to update, eliminate, or add to your current suite. Time, value, and resources saved with guidance and templates:
      1 FTE*3 days*$80,000/year = $1,152
      Time, value, and resources saved using our recommendations and tools:
      1 FTE*2 days*$80,000/year = $768
      Develop and Implement the Policy Suite Select from an extensive policy template offering and customize the policies you need to optimize or add to your own policy program. Time, value, and resources saved using our templates:
      1 consultant*15 days*$150/hour = $21,600 (if starting from scratch)
      Communicate Security Policy Program Use Info-Tech’s methodology and best practices to ensure proper communication, training, and awareness. Time, value, and resources saved using our training and awareness resources:
      1 FTE*1.5 days*$80,000/year = $408
      Measure Security Policy Program Use Info-Tech’s custom toolkits for continuous tracking and review of your policy suite. Time, value, and resources saved by using our enforcement recommendations:
      2 FTEs*5 days*$160,000/year combined = $3,840
      Time, value, and resources saved by using our recommendations rather than an external consultant:
      1 consultant*5 days*$150/hour = $7,200

      After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

      Overall Impact

      9.5 /10

      Overall Average $ Saved

      $29,015

      Overall Average Days Saved

      25

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is six to ten calls over the course of two to four months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      Call #1: Scope security policy requirements, objectives, and any specific challenges.

      Call #2: Review policy lifecycle; prioritize policy development.

      Call #3: Customize the policy templates.

      Call #4: Gather feedback on policies and get approval.

      Call #5: Communicate the security policy program.

      Call #6: Develop policy training and awareness programs.

      Call #7: Track policies and exceptions.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889
      Day 1 Day 2 Day 3 Day 4 Day 5
      Define the security policy program
      Develop the security policy suite
      Develop the security policy suite
      Implement security policy program
      Finalize deliverables and next steps
      Activities

      1.1 Understand the current state of policies.

      1.2 Align your security policies to the Info-Tech framework for compliance.

      1.3 Understand the relationship between policies and other documents.

      1.4 Prioritize the development of security policies.

      1.5 Discuss strategies to leverage stakeholder support.

      1.6 Plan to communicate with all stakeholders.

      1.7 Develop the security policy lifecycle.

      2.1 Discuss the risks and drivers your organization faces that must be addressed by policies.

      2.2 Develop and customize security policies.

      2.1 Discuss the risks and drivers your organization faces that must be addressed by policies (continued).

      2.2 Develop and customize security policies (continued).

      2.3 Develop a plan to gather feedback from users.

      2.4 Discuss a plan to submit policies for approval.

      3.1 Plan the communication strategy for new policies.

      3.2 Discuss myPolicies to automate management and implementation.

      3.3 Incorporate policies into your security awareness and training program.

      3.4 Assess the effectiveness of policies.

      3.5 Understand the need for regular review and update.

      4.1 Review customized lifecycle and policy templates.

      4.2 Discuss the plan for policy roll out.

      4.3 Schedule follow-up Guided Implementation calls.

      Deliverables
      1. Security Policy Prioritization Tool
      2. Security Policy Lifecycle
      1. Security Policies (approx. 9)
      1. Security Policies (approx. 9)
      1. Policy Communication Plan
      2. Security Awareness and Training Program Development Tool
      3. Security Policy Assessment Tool
      1. All deliverables finalized

      Develop and Deploy Security Policies

      Phase 1

      Define the Security Policy Program

      Phase 1

      1.1 Understand the current state

      1.2 Align your security policies to the Info-Tech framework

      1.3 Document your policy hierarchy

      1.4 Prioritize development of security policies

      1.5 Leverage stakeholders

      1.6 Develop the policy lifecycle

      Phase 2

      2.1 Customize policy templates

      2.2 Gather feedback from users on policy feasibility

      2.3 Submit policies to upper management for approval

      Phase 3

      3.1 Understand the need for communicating policies

      3.2 Use myPolicies to automate the management of your security policies

      3.3 Design, build, and implement your communications plan

      3.4 Incorporate policies and processes into your training and awareness programs

      Phase 4

      4.1 Assess the state of security policies

      4.2 Identify triggers for regular policy review and update

      4.3 Develop an action plan to update policies

      This phase will walk you through the following activities:

      • Understand the current state of your organization’s security policies.
      • Align your security policies to the Info-Tech framework for compliance.
      • Prioritize the development of your security policies.
      • Leverage key stakeholders to champion the policy initiative.
      • Inform all relevant stakeholders of the upcoming policy program.
      • Develop the security policy lifecycle.

      1.1 Understand the current state of policies

      Scenario 1: You have existing policies

      1. Use the Security Policy Prioritization Tool to identify any gaps between the policies you already have and those recommended based on your changing business needs.
      2. As your organization undergoes changes, be sure to incorporate new requirements in the existing policies.
      3. Sometimes, you may have more specific procedures for a domain’s individual security aspects instead of high-level policies.
      4. Group current policies into the domains and use the policy templates to create overarching policies where there are none and improve upon existing high-level policies.

      Scenario 2: You are starting from scratch

      1. To get started on new policies, use the Security Policy Prioritization Tool to identify the policies Info-Tech recommends based on your business needs. See the full list of templates in the Appendix to ensure that all relevant topics are addressed.
      2. Whether you’re starting from scratch or have incomplete/ad hoc policies, use Info-Tech’s policy templates to formalize and standardize security requirements for end users.
      Info-Tech Insight

      Policies are living, evolving documents that require regular review and update, so even if you have policies already written, you’re not done with them.

      1.2 Align your security policies to the Info-Tech framework for compliance

      You have an opportunity to improve your employee alignment and satisfaction, improve organizational agility, and obtain high policy adherence. This is achieved by translating your corporate culture into a policy-based compliance culture.

      Align your security policies to the Info-Tech Security Framework by using Info-Tech’s policy templates.

      Info-Tech’s security framework uses a best-of-breed approach to leverage and align with most major security standards, including:
      • ISO 27001/27002
      • COBIT
      • Center for Internet Security (CIS) Critical Controls
      • NIST Cybersecurity Framework
      • NIST SP 800-53
      • NIST SP 800-171

      Info-Tech Security Framework

      Info-Tech Security Framework with policies grouped into categories which are then grouped into 'Governance' and 'Management'.

      1.3 Document your policy hierarchy

      Structuring policy components at different levels allows for efficient changes and direct communication depending on what information is needed.

      Policy hierarchy pyramid with 'Security Policy Lifecycle' on top, then 'Security Policies', then 'IT and/or Supporting Documentation'.

      Defines the cycle for the security policy program and what must be done but not how to do it. Aligns the business, security program, and policies.
      Addresses the “what,” “who,” “when,” and “where.”

      Defines high-level overarching concepts of security within the organization, including the scope, purpose, and objectives of policies.
      Addresses the high-level “what” and “why.”
      Changes when business objectives change.

      Defines enterprise/technology – specific, detailed guidelines on how to adhere to policies.
      Addresses the “how.”
      Changes when technology and processes change.

      Info-Tech Insight

      Design separate policies for different areas of focus. Policies that are written as single, monolithic documents are resistant to change. A hierarchical top-level document supported by subordinate policies and/or procedures can be more rapidly revised as circumstances change.

      1.3.1 Understand the relationship between policies and other documents

      Policy:
      • Provides emphasis and sets direction.
      • Standards, guidelines, and procedures must be developed to support an overarching policy.
      Arrows stemming from the above list, connecting to the three lists below.

      Standard:

      • Specifies uniform method of support for policy.
      • Compliance is mandatory.
      • Includes process, frameworks, methodologies, and technology.
      Two-way horizontal arrow.

      Procedure:

      • Step-by-step instructions to perform desired actions.
      Two-way horizontal arrow.

      Guideline:

      Recommended actions to consider in absence of an applicable standard, to support a policy.
      This model is adapted from a framework developed by CISA (Certified Information Systems Auditor).

      Supporting Documentation

      Considerations for standards

      Standards. These support policies by being much more specific and outlining key steps or processes that are necessary to meet certain requirements within a policy document. Ideally standards should be based on policy statements with a target of detailing the requirements that show how the organization will implement developed policies.

      If policies describe what needs to happen, then standards explain how it will happen.

      A good example is an email policy that states that emails must be encrypted; this policy can be supported by a standard such as Transport Layer Security (TLS) encryption that specifically ensures that all email communication is encrypted for messages “in transit” from one secure email server that has TLS enabled to another.

      There are numerous security standards available that support security policies/programs based on the kind of systems and controls that an organization would like to put in place. A good selection of supporting standards can go a long way to further protect users, data, and other organizational assets
      Key Policies Example Associated Standards
      Access Control Policy
      • Password Management User Standard
      • Account Auditing Standard
      Data Security Policy
      • Cryptography Standard
      • Data Classification Standard
      • Data Handling Standard
      • Data Retention Standard
      Incident Response Policy
      • Incident Response Plan
      Network Security Policy
      • Wireless Connectivity Standard
      • Firewall Configuration Standard
      • Network Monitoring Standard
      Vendor Management Policy
      • Vendor Risk Management Standard
      • Third-Party Access Control Standard
      Application Security Policy
      • Application Security Standard

      1.4 Prioritize development of security policies

      The Info-Tech Security Policy Prioritization Tool will help you determine which security policies to work on first.
      • The tool allows you to prioritize your policies based on:
        • Importance: How relevant is this policy to organizational security?
        • Ease to implement: What is the effort, time, and resources required to write, review, approve, and distribute the policy?
        • Ease to enforce: How much effort, time, and resources are required to enforce the policy?
      • Additionally, the weighting or priority of each variable of prioritization can be adjusted.

      Align policies to recent security concerns. If your organization has recently experienced a breach, it may be crucial to highlight corresponding policies as immediately necessary.

      Info-Tech Insight

      If you have an existing policy that aligns with one of the Info-Tech recommended templates weight Ease to Implement and Ease to Enforce as HIGH (4-5). This will decrease the priority of these policies.

      Sample of the Security Policy Prioritization Tool.

      Download the Security Policy Prioritization Tool

      1.5 Leverage stakeholders to champion policies

      Info-Tech Insight

      While management support is essential to initiating a strong security posture, allow employees to provide input on the development of security policies. This cooperation will lead to easier incorporation of the policies into the daily routines of workers, with less resistance. The security team will be less of a police force and more of a partner.

      Executive champion

      Identify an executive champion who will ensure that the security program and the security policies are supported.

      Focus on risk and protection

      Security can be viewed as an interference, but the business is likely more responsive to the concepts of risk and protection because it can apply to overall business operations and a revenue-generating mandate.

      Communicate policy initiatives

      Inform stakeholders of the policy initiative as security policies are only effective if they support the business requirements and user input is crucial for developing a strong security culture.

      Current security landscape

      Leveraging the current security landscape can be a useful mechanism to drive policy buy-in from stakeholders.

      Management buy-in

      This is key to policy acceptance; it indicates that policies are accurate, align with the business, and are to be upheld, that funds will be made available, and that all employees will be equally accountable.

      Prepare for Post-Quantum Cryptography

      • Buy Link or Shortcode: {j2store}268|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Fault-tolerant quantum computers, capable of breaking existing encryption algorithms and cryptographic systems, are widely expected to be available sooner than originally projected.
      • Data considered secure today may already be at risk due to the threat of harvest-now-decrypt-later schemes.
      • Many current security controls will be completely useless, including today's strongest encryption techniques.

      Our Advice

      Critical Insight

      The advent of quantum computing is closer than you think: some nations have already demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer provide sufficient protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Impact and Result

      • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
      • Organizations need to act now to begin their transformation to quantum-resistant encryption.
      • Data security (especially for sensitive data) should be an organization’s top priority. Organizations with particularly critical information need to be on top of this quantum movement.

      Prepare for Post-Quantum Cryptography Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for Post-Quantum Cryptography Storyboard – Research to help organizations to prepare and implement quantum-resistance cryptography solutions.

      Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications. Organizations need to act now to begin their transformation to quantum-resistant encryption.

      • Prepare for Post-Quantum Cryptography Storyboard
      [infographic]

      Further reading

      Prepare for Post-Quantum Cryptography

      It is closer than you think, and you need to act now.

      Analyst Perspective

      It is closer than you think, and you need to act now.

      The quantum realm presents itself as a peculiar and captivating domain, shedding light on enigmas within our world while pushing the boundaries of computational capabilities. The widespread availability of quantum computers is expected to occur sooner than anticipated. This emerging technology holds the potential to tackle valuable problems that even the most powerful classical supercomputers will never be able to solve. Quantum computers possess the ability to operate millions of times faster than their current counterparts.

      As we venture further into the era of quantum mechanics, organizations relying on encryption must contemplate a future where these methods no longer suffice as effective safeguards. The astounding speed and power of quantum machines have the potential to render many existing security measures utterly ineffective, including the most robust encryption techniques used today. To illustrate, a task that currently takes ten years to crack through a brute force attack could be accomplished by a quantum computer in under five minutes.

      Amid this transition into a quantum future, the utmost priority for organizations remains data security, particularly safeguarding sensitive information. Organizations must proactively prepare for the development of countermeasures and essential resilience measures to attain a state of being "quantum safe."

      This is a picture of Alan Tang

      Alan Tang
      Principal Research Director, Security and Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Anticipated advancements in fault-tolerant quantum computers, surpassing existing encryption algorithms and cryptographic systems, are expected to materialize sooner than previously projected. The timeframe for their availability is diminishing daily.
      • Data that is presently deemed secure faces potential vulnerability due to the emergence of harvest-now-decrypt-later strategies.
      • Numerous contemporary security controls, including the most robust encryption techniques, have become obsolete and offer little efficacy.

      Common Obstacles

      • The complexity involved makes it challenging for organizations to incorporate quantum-resistant cryptography into their current IT infrastructure.
      • The endeavor of transitioning to quantum-resilient cryptography demands significant effort and time, with the specific requirements varying for each organization.
      • A lack of comprehensive understanding regarding the cryptographic technologies employed in existing IT systems poses difficulties in identifying and prioritizing systems for upgrading to post-quantum cryptography.

      Info-Tech's Approach

      • The development of quantum-resistant cryptography capabilities is essential for safeguarding the security and integrity of critical applications.
      • Organizations must proactively initiate their transition toward quantum-resistant encryption to ensure data protection.
      • Ensuring the security of corporate data assets should be of utmost importance for organizations, with special emphasis on those possessing highly critical information in light of the advancements in quantum technology.

      Info-Tech Insight

      The advent of quantum computing (QC) is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Evolvement of QC theory and technologies

      1900-1975

      1976-1997

      1998-2018

      2019-Now

      1. 1900: Max Planck – The energy of a particle is proportional to its frequency: E = hv, where h is a relational constant.
      2. 1926: Erwin Schrödinger – Since electrons can affect each other's states, their energies change in both time and space. The total energy of a particle is expressed as a probability function.
      1. 1976: Physicist Roman Stanisław Ingarden publishes the paper "Quantum Information Theory."
      2. 1980: Paul Benioff describes the first quantum mechanical model of a computer.
      3. 1994: Peter Shor publishes Shor's algorithm.
      1. 1998: A working 2-qubit NMR quantum computer is used to solve Deutsch's problem by Jonathan A. Jones and Michele Mosca at Oxford University.
      2. 2003: DARPA Quantum Network becomes fully operational.
      3. 2011: D-Wave claims to have developed the first commercially available quantum computer, D-Wave One.
      4. 2018: the National Quantum Initiative Act was signed into law by President Donald Trump.
      1. 2019: A paper by Google's quantum computer research team was briefly available, claiming the project has reached quantum supremacy.
      2. 2020: Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system known as Jiuzhang.
      3. 2021: Chinese researchers reported that they have built the world's largest integrated quantum communication network.
      4. 2022: The Quantinuum System Model H1-2 doubled its performance claiming to be the first commercial quantum computer to pass quantum volume 4096.

      Info-Tech Insight

      The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

      Fundamental physical principles and business use cases

      Unlike conventional computers that rely on bits, quantum computers use quantum bits or qubits. QC technology surpasses the limitations of current processing powers. By leveraging the properties of superposition, interference, and entanglement, quantum computers have the capacity to simultaneously process millions of operations, thereby surpassing the capabilities of today's most advanced supercomputers.

      A 2021 Hyperion Research survey of over 400 key decision makers in North America, Europe, South Korea, and Japan showed nearly 70% of companies have some form of in-house QC program.

      Three fundamental QC physical principles

      1. Superposition
      2. Interference
      3. Entanglement

      This is an image of two headings, Optimization; and Simulation. there are five points under each heading, with an arrow above pointing left to right, labeled Qbit Count.

      Info-Tech Insight

      Organizations need to reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.

      Percentage of Surveyed Companies That Have QC Programs

      • 31% Have some form of in-house QC program
      • 69% Have no QC program

      Early adopters and business value

      QC early adopters see the promise of QC for a wide range of computational workloads, including machine learning applications, finance-oriented optimization, and logistics/supply chain management.

      This is an image of the Early Adopters, and the business value drivers.

      Info-Tech Insight

      Experienced attackers are likely to be the early adopters of quantum-enabled cryptographic solutions, harnessing the power of QC to exploit vulnerabilities in today's encryption methods. The risks are particularly high for industries that rely on critical infrastructure.

      The need of quantum-safe solution is immediate

      Critical components of classical cryptography will be at risk, potentially leading to the exposure of confidential and sensitive information to the general public. Business, technology, and security leaders are confronted with an immediate imperative to formulate a quantum-safe strategy and establish a roadmap without delay.

      Case Study – Google, 2019

      In 2019, Google claimed that "Our Sycamore processor takes about 200 seconds to sample one instance of a quantum circuit a million times—our benchmarks currently indicate that the equivalent task for a state-of-the-art classical supercomputer would take approximately 10,000 years."
      Source: Nature, 2019

      Why You Should Start Preparation Now

      • The complexity with integrating QC technology into existing IT infrastructure.
      • The effort to upgrade to quantum-resilient cryptography will be significant.
      • The amount of time remaining will decrease every day.

      Case Study – Development in China, 2020

      On December 3, 2020, a team of Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system (43 average) known as Jiuzhang, which performed calculations at 100 trillion times the speed of classical supercomputers.
      Source: science.org, 2020

      Info-Tech Insight

      The emergence of QC brings forth cybersecurity threats. It is an opportunity to regroup, reassess, and revamp our approaches to cybersecurity.

      Security threats posed by QC

      Quantum computers have reached a level of advancement where even highly intricate calculations, such as factoring large numbers into their primes, which serve as the foundation for RSA encryption and other algorithms, can be solved within minutes.

      Threat to data confidentiality

      QC could lead to unauthorized decryption of confidential data in the future. Data confidentiality breaches also impact improperly disposed encrypted storage media.

      Threat to authentication protocols and digital governance

      A recovered private key, which is derived from a public key, can be used through remote control to fraudulently authenticate a critical system.

      Threat to data integrity

      Cybercriminals can use QC technology to recover private keys and manipulate digital documents and their digital signatures.

      Example:

      Consider RSA-2048, a widely used public-key cryptosystem that facilitates secure data transmission. In a 2021 survey, a majority of leading authorities believed that RSA-2048 could be cracked by quantum computers within a mere 24 hours.
      Source: Quantum-Readiness Working Group, 2022

      Info-Tech Insight

      The development of quantum-safe cryptography capabilities is of utmost importance in ensuring the security and integrity of critical applications' data.

      US Quantum Computing Cybersecurity Preparedness Act

      The US Congress considers cryptography essential for the national security of the US and the functioning of the US economy. The Quantum Computing Cybersecurity Preparedness Act was introduced on April 18, 2022, and became a public law (No: 117-260) on December 21, 2022.

      Purpose

      The purpose of this Act is to encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.

      Scope and Exemption

      • Scope: Systems of government agencies.
      • Exemption: This Act shall not apply to any national security system.

      Main Obligations

      Responsibilities

      Requirements
      Inventory Establishment Not later than 180 days after the date of enactment of this Act, the Director of OMB, shall issue guidance on the migration of information technology to post-quantum cryptography.
      Agency Reports "Not later than 1 year after the date of enactment of this Act, and on an ongoing basis thereafter, the head of each agency shall provide to the Director of OMB, the Director of CISA, and the National Cyber Director— (1) the inventory described in subsection (a)(1); and (2) any other information required to be reported under subsection (a)(1)(C)."
      Migration and Assessment "Not later than 1 year after the date on which the Director of NIST has issued post-quantum cryptography standards, the Director of OMB shall issue guidance requiring each agency to— (1) prioritize information technology described under subsection (a)(2)(A) for migration to post-quantum cryptography; and (2) develop a plan to migrate information technology of the agency to post-quantum cryptography consistent with the prioritization under paragraph (1)."

      "It is the sense of Congress that (1) a strategy for the migration of information technology of the Federal Government to post-quantum cryptography is needed; and (2) the government wide and industry-wide approach to post- quantum cryptography should prioritize developing applications, hardware intellectual property, and software that can be easily updated to support cryptographic agility." – Quantum Computing Cybersecurity Preparedness Act

      The development of post-quantum encryption

      Since 2016, the National Institute of Standards and Technology (NIST) has been actively engaged in the development of post-quantum encryption standards. The objective is to identify and establish standardized cryptographic algorithms that can withstand attacks from quantum computers.

      NIST QC Initiative Key Milestones

      Date Development
      Dec. 20, 2016 Round 1 call for proposals: Announcing request for nominations for public-key post-quantum cryptographic algorithms
      Nov. 30, 2017 Deadline for submissions – 82 submissions received
      Dec. 21, 2017 Round 1 algorithms announced (69 submissions accepted as "complete and proper")
      Jan. 30, 2019 Second round candidates announced (26 algorithms)

      July 22, 2020

      Third round candidates announced (7 finalists and 8 alternates)

      July 5, 2022

      Announcement of candidates to be standardized and fourth round candidates
      2022/2024 (Plan) Draft standards available

      Four Selected Candidates to be Standardized

      CRYSTALS – Kyber

      CRYSTALS – Dilithium

      FALCON

      SPHINCS+

      NIST recommends two primary algorithms to be implemented for most use cases: CRYSTALS-KYBER (key-establishment) and CRYSTALS-Dilithium (digital signatures). In addition, the signature schemes FALCON and SPHINCS+ will also be standardized.

      Info-Tech Insight

      There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

      Prepare for post-quantum cryptography

      The advent of QC is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      This is an infographic showing the three steps: Threat is Imminent; Risks are Profound; and Take Acton Now.

      Insight summary

      Overarching Insight

      The advent of QC is closer than you think as some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Business Impact Is High

      The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

      It's a Collaborative Effort

      Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a Chief Information Security Officer (CISO) alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

      Leverage Industry Standards

      There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

      Take a Holistic Approach

      The advent of QC poses threats to cybersecurity. It's a time to regroup, reassess, and revamp.

      Blueprint benefits

      IT Benefits

      Business Benefits

      • This blueprint will help organizations to discover and then prioritize the systems to be upgraded to post-quantum cryptography.
      • This blueprint will enable organizations to integrate quantum-resistant cryptography into existing IT infrastructure.
      • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
      • This blueprint will help organizations to save effort and time needed upgrade to quantum-resilient cryptography.
      • Organizations will reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.
      • Avoid reputation and brand image by preventing data breach and leakage.
      • This blueprint will empower organizations to protect corporate data assets in the post-quantum era.
      • Be compliant with various security and privacy laws and regulations.

      Info-Tech Project Value

      Time, value, and resources saved to obtain buy-in from senior leadership team using our research material:

      1 FTEs*10 days*$100,000/year = $6,000

      Time, value, and resources saved to implement quantum-resistant cryptography using our research guidance:

      2 FTEs* 30 days*$100,000/year = $24,000

      Estimated cost and time savings from this blueprint:

      $6,000 + $24,000 =$30,000

      Get prepared for a post-quantum world

      The advent of sufficiently powerful quantum computers poses a risk of compromising or weakening traditional forms of asymmetric and symmetric cryptography. To safeguard data security and integrity for critical applications, it is imperative to undertake substantial efforts in migrating an organization's cryptographic systems to post-quantum encryption. The development of quantum-safe cryptography capabilities is crucial in this regard.

      Phase 1 - Prepare

      • Obtain buy-in from leadership team.
      • Educate your workforce about the upcoming transition.
      • Create defined projects to reduce risks and improve crypto-agility.

      Phase 2 - Discover

      • Determine the extent of your exposed data, systems, and applications.
      • Establish an inventory of classical cryptographic use cases.

      Phase 3 - Assess

      • Assess the security and data protection risks posed by QC.
      • Assess the readiness of transforming existing classical cryptography to quantum-resilience solutions.

      Phase 4 - Prioritize

      • Prioritize transformation plan based on criteria such as business impact, near-term technical feasibility, and effort, etc.
      • Establish a roadmap.

      Phase 5 - Mitigate

      • Implement post-quantum mitigations.
      • Decommissioning old technology that will become unsupported upon publication of the new standard.
      • Validating and testing products that incorporate the new standard.

      Phase 1 – Prepare: Protect data assets in the post-quantum era

      The rise of sufficiently powerful quantum computers has the potential to compromise or weaken conventional asymmetric and symmetric cryptography methods. In anticipation of a quantum-safe future, it is essential to prioritize crypto-agility. Consequently, organizations should undertake specific tasks both presently and in the future to adequately prepare for forthcoming quantum threats and the accompanying transformations.

      Quantum-resistance preparations must address two different needs:

      Reinforce digital transformation initiatives

      To thrive in the digital landscape, organizations must strengthen their digital transformation initiatives by embracing emerging technologies and novel business practices. The transition to quantum-safe encryption presents a unique opportunity for transformation, allowing the integration of these capabilities to evolve business transactions and relationships in innovative ways.

      Protect data assets in the post-quantum era

      Organizations should prioritize supporting remediation efforts aimed at ensuring the quantum safety of existing data assets and services. The implementation of crypto-agility enables organizations to respond promptly to cryptographic vulnerabilities and adapt to future changes in cryptographic standards. This proactive approach is crucial, as the need for quantum-safe measures existed even before the complexities posed by QC emerged.

      Preparation for the post-quantum world has been recommended by the US government and other national bodies since 2016.

      In 2016, NIST, the National Security Agency (NSA), and Central Security Service stated in their Commercial National Security Algorithm Suite and QC FAQ: "NSA believes the time is now right [to start preparing for the post-quantum world] — consistent with advances in quantum computing."
      Source: Cloud Security Alliance, 2021

      Phase 1 – Prepare: Key tasks

      Preparing for quantum-resistant cryptography goes beyond simply acquiring knowledge and conducting experiments in QC. It is vital for senior management to receive comprehensive guidance on the challenges, risks, and potential mitigations associated with the post-quantum landscape. Quantum and post-quantum education should be tailored to individuals based on their specific roles and the impact of post-quantum mitigations on their responsibilities. This customized approach ensures that individuals are equipped with the necessary knowledge and skills relevant to their respective roles.

      Leadership Buy-In

      • Get senior management commitment to post-quantum project.
      • Determine the extent of exposed data, systems, and applications.
      • Identify near-term, achievable cryptographic maturity goals, creating defined projects to reduce risks and improve crypto-agility.

      Roles and Responsibilities

      • The ownership should be clearly defined regarding the quantum-resistant cryptography program.
      • This should be a cross-functional team within which members represent various business units.

      Awareness and Education

      • Senior management needs to understand the strategic threat to the organization and needs to adequately address the cybersecurity risk in a timely fashion.
      • Educate your workforce about the upcoming transition. All training and education should seek to achieve awareness of the following items with the appropriate stakeholders.

      Info-Tech Insight

      Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a CISO alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

      Phase 2 – Discover: Establish a data protection inventory

      During the discovery phase, it is crucial to locate and identify any critical data and devices that may require post-quantum protection. This step enables organizations to understand the algorithms in use and their specific locations. By conducting this thorough assessment, organizations gain valuable insights into their existing infrastructure and cryptographic systems, facilitating the implementation of appropriate post-quantum security measures.

      Inventory Core Components

      1. Description of devices and/or data
      2. Location of all sensitive data and devices
      3. Criticality of the data
      4. How long the data or devices need to be protected
      5. Effective cryptography in use and cryptographic type
      6. Data protection systems currently in place
      7. Current key size and maximum key size
      8. Vendor support timeline
      9. Post-quantum protection readiness

      Key Things to Consider

      • The accuracy and thoroughness of the discovery phase are critical factors that contribute to the success of a post-quantum project.
      • It is advisable to conduct this discovery phase comprehensively across all aspects, not solely limited to public-key algorithms.
      • Performing a data protection inventory can be a time-consuming and challenging phase of the project. Breaking it down into smaller subtasks can help facilitate the process.
      • Identifying all information can be particularly challenging since data is typically scattered throughout an organization. One approach to begin this identification process is by determining the inputs and outputs of data for each department and team within the organization.
      • To ensure accountability and effectiveness, it is recommended to assign a designated individual as the ultimate owner of the data protection inventory task. This person should have the necessary responsibilities and authority to successfully accomplish the task.

      Phase 3 – Assess: The workflow

      Quantum risk assessment entails evaluating the potential consequences of QC on existing security measures and devising strategies to mitigate these risks. This process involves analyzing the susceptibility of current systems to attacks by quantum computers and identifying robust security measures that can withstand QC threats.

      Risk Assessment Workflow

      This is an image of the Risk Assessment Workflow

      By identifying the security gaps that will arise with the advent of QC, organizations can gain insight into the substantial vulnerabilities that core business operations will face when QC becomes a prevalent reality. This proactive understanding enables organizations to prepare and implement appropriate measures to address these vulnerabilities in a timely manner.

      Phase 4 – Prioritize: Balance business value, security risks, and effort

      Organizations need to prioritize the mitigation initiatives based on various factors such as business value, level of security risk, and the effort needed to implement the mitigation controls. In the diagram below, the size of the circle reflects the degree of effort. The bigger the size, the more effort is needed.

      This is an image of a chart where the X axis represents Security Risk level, and the Y axis is Business Value.

      QC Adopters Anticipated Annual Budgets

      This is an image of a bar graph showing the Anticipated Annual Budgets for QC Adopters.
      Source: Hyperion Research, 2022

      Hyperion's survey found that the range of expected budget varies widely.

      • The most selected option, albeit by only 38% of respondents, was US$5 million to US$15 million.
      • About one-third of respondents foresaw annual budgets that exceeded US$15 million, and one-fifth expected budgets to exceed US$25 million.

      Build your risk mitigation roadmap

      2 hours

      1. Review the quantum-resistance initiatives generated in Phase 3 – Assessment.
      2. With input from all stakeholders, prioritize the initiatives based on business value, security risks, and effort using the 2x2 grid.
      3. Review the position of all initiatives and adjust accordingly considering other factors such as dependency, etc.
      4. Place prioritized initiatives to a wave chart.
      5. Assign ownership and target timeline for each initiative.

      This is an image the Security Risk Vs. Business value graph, above an image showing Initiatives Numbered 1-7, divided into Wave 1; Wave 2; and Wave 3.

      Input

      • Data protection inventory created in phase 2
      • Risk assessment produced in phase 3
      • Business unit leaders' and champions' understanding (high-level) of challenges posed by QC

      Output

      • Prioritization of quantum-resistance initiatives

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Pen/whiteboard markers

      Participants

      • Quantum-resistance program owner
      • Senior leadership team
      • Business unit heads
      • Chief security officer
      • Chief privacy officer
      • Chief information officer
      • Representatives from legal, risk, and governance

      Phase 5 – Mitigate: Implement quantum-resistant encryption solutions

      To safeguard against cybersecurity risks and threats posed by powerful quantum computers, organizations need to adopt a robust defense-in-depth approach. This entails implementing a combination of well-defined policies, effective technical defenses, and comprehensive education initiatives. Organizations may need to consider implementing new cryptographic algorithms or upgrading existing protocols to incorporate post-quantum encryption methods. The selection and deployment of these measures should be cost-justified and tailored to meet the specific needs and risk profiles of each organization.

      Governance

      Implement solid governance mechanisms to promote visibility and to help ensure consistency

      • Update policies and documents
      • Update existing acceptable cryptography standards
      • Update security and privacy audit programs

      Industry Standards

      • Stay up to date with newly approved standards
      • Leverage industry standards (i.e. NIST's post-quantum cryptography) and test the new quantum-safe cryptographic algorithms

      Technical Mitigations

      Each type of quantum threat can be mitigated using one or more known defenses.

      • Physical isolation
      • Replacing quantum-susceptible cryptography with quantum-resistant cryptography
      • Using QKD
      • Using quantum random number generators
      • Increasing symmetric key sizes
      • Using hybrid solutions
      • Using quantum-enabled defenses

      Vendor Management

      • Work with key vendors on a common approach to quantum-safe governance
      • Assess vendors for possible inclusion in your organization's roadmap
      • Create acquisition policies regarding quantum-safe cryptography

      Research Contributors and Experts

      This is a picture of Adib Ghubril

      Adib Ghubril
      Executive Advisor, Executive Services
      Info-Tech Research Group

      This is a picture of Erik Avakian

      Erik Avakian
      Technical Counselor
      Info-Tech Research Group

      This is a picture of Alaisdar Graham

      Alaisdar Graham
      Executive Counselor
      Info-Tech Research Group

      This is a picture of Carlos Rivera

      Carlos Rivera
      Principal Research Advisor
      Info-Tech Research Group

      This is a picture of Hendra Hendrawan

      Hendra Hendrawan
      Technical Counselor
      Info-Tech Research Group

      This is a picture of Fritz Jean-Louis

      Fritz Jean-Louis
      Principal Cybersecurity Advisor
      Info-Tech Research Group

      Bibliography

      117th Congress (2021-2022). H.R.7535 - Quantum Computing Cybersecurity Preparedness Act. congress.gov, 21 Dec 2022.
      Arute, Frank, et al. Quantum supremacy using a programmable superconducting processor. Nature, 23 Oct 2019.
      Bernhardt, Chris. Quantum Computing for Everyone. The MIT Press, 2019.
      Bob Sorensen. Quantum Computing Early Adopters: Strong Prospects For Future QC Use Case Impact. Hyperion Research, Nov 2022.
      Candelon, François, et al. The U.S., China, and Europe are ramping up a quantum computing arms race. Here's what they'll need to do to win. Fortune, 2 Sept 2022.
      Curioni, Alessandro. How quantum-safe cryptography will ensure a secure computing future. World Economic Forum, 6 July 2022.
      Davis, Mel. Toxic Substance Exposure Requires Record Retention for 30 Years. Alert presented by CalChamber, 18 Feb 2022.
      Eddins, Andrew, et al. Doubling the size of quantum simulators by entanglement forging. arXiv, 22 April 2021.
      Gambetta, Jay. Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. IBM Research Blog, 10 May 2022.
      Golden, Deborah, et al. Solutions for navigating uncertainty and achieving resilience in the quantum era. Deloitte, 2023.
      Grimes, Roger, et al. Practical Preparations for the Post-Quantum World. Cloud Security Alliance, 19 Oct 2021.
      Harishankar, Ray, et al. Security in the quantum computing era. IBM Institute for Business Value, 2023.
      Hayat, Zia. Digital trust: How to unleash the trillion-dollar opportunity for our global economy. World Economic Forum, 17 Aug 2022.
      Mateen, Abdul. What is post-quantum cryptography? Educative, 2023.
      Moody, Dustin. Let's Get Ready to Rumble—The NIST PQC 'Competition.' NIST, 11 Oct 2022.
      Mosca, Michele, Dr. and Dr. Marco Piani. 2021 Quantum Threat Timeline Report. Global Risk Institute, 24 Jan 2022.
      Muppidi, Sridhar and Walid Rjaibi. Transitioning to Quantum-Safe Encryption. Security Intelligence, 8 Dec 2022.
      Payraudeau, Jean-Stéphane, et al. Digital acceleration: Top technologies driving growth in a time of crisis. IBM Institute for Business Value, Nov 2020.
      Quantum-Readiness Working Group (QRWG). Canadian National Quantum-Readiness- Best Practices and Guidelines. Canadian Forum for Digital Infrastructure Resilience (CFDIR), 17 June 2022.
      Rotman, David. We're not prepared for the end of Moore's Law. MIT Technology Review, 24 Feb 2020.
      Saidi, Susan. Calculating a computing revolution. Roland Berger, 2018.
      Shorter., Ted. Why Companies Must Act Now To Prepare For Post-Quantum Cryptography. Forbes.com, 11 Feb 2022.
      Sieger, Lucy, et al. The Quantum Decade, Third edition. IBM, 2022.
      Sorensen, Bob. Broad Interest in Quantum Computing as a Driver of Commercial Success. Hyperion Research, 17 Nov 2021.
      Wise, Jason. How Much Data is Created Every Day in 2022? Earthweb, 22 Sept 2022.
      Wright, Lawrence. The Plague Year. The New Yorker, 28 Dec 2020.
      Yan, Bao, et al. Factoring integers with sublinear resources on a superconducting quantum processor. arXiv, 23 Dec 2022.
      Zhong, Han-Sen, et al. Quantum computational advantage using photons. science.org, 3 Dec 2020.

      Configuration management

      • Buy Link or Shortcode: {j2store}4|cart{/j2store}
      • Related Products: {j2store}4|crosssells{/j2store}
      • Up-Sell: {j2store}4|upsells{/j2store}
      • Download01-Title: Harness the power of Configuration Management Executive Brief
      • Download-01: Visit Link
      • member rating overall impact: 8.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Configuration management is all about being able to manage your assets within the support processes. That means to record what you need. Not less than that, and not more either.

      Asset Management, Configuration Management, Lifecycle Management

      Optimize IT Project Intake, Approval, and Prioritization

      • Buy Link or Shortcode: {j2store}433|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $124,419 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • Companies are approving more projects than they can deliver. Most organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.
      • While organizations want to achieve a high throughput of approved projects, many are unable or unwilling to allocate an appropriate level of IT resourcing to adequately match the number of approved initiatives.
      • Portfolio management practices must find a way to accommodate stakeholder needs without sacrificing the portfolio to low-value initiatives that do not align with business goals.

      Our Advice

      Critical Insight

      • Approve only the right projects that you have capacity to deliver. Failure to align projects with strategic goals and resource capacity are the most common causes of portfolio waste across organizations.
      • More time spent with stakeholders during the ideation phase to help set realistic expectations for stakeholders and enhance visibility into IT’s capacity and processes is key to both project and organizational success.
      • Too much intake red tape will lead to an underground economy of projects that escape portfolio oversight, while too little intake formality will lead to a wild west of approvals that could overwhelm the PMO. Finding the right balance of intake formality for your organization is the key to establishing a PMO that has the ability to focus on the right things.

      Impact and Result

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Develop practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic to help improve the throughput of projects through the portfolio.

      Optimize IT Project Intake, Approval, and Prioritization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize project intake, approval, and prioritization process, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set realistic goals for optimizing project intake, approval, and prioritization process

      Get value early by piloting a scorecard for objectively determining project value, and then examine your current state of project intake to set realistic goals for optimizing the process.

      • Optimize Project Intake, Approval, and Prioritization – Phase 1: Set Realistic Goals for Optimizing Process
      • Project Value Scorecard Development Tool
      • Project Intake Workflow Template - Visio
      • Project Intake Workflow Template - PDF
      • Project Intake, Approval, and Prioritization SOP

      2. Build an optimized project intake, approval, and prioritization process

      Take a deeper dive into each of the three processes – intake, approval, and prioritization – to ensure that the portfolio of projects is best aligned to stakeholder needs, strategic objectives, and resource capacity.

      • Optimize Project Intake, Approval, and Prioritization – Phase 2: Build New Optimized Processes
      • Light Project Request Form
      • Detailed Project Request Form
      • Project Intake Classification Matrix
      • Benefits Commitment Form Template
      • Proposed Project Technology Assessment Tool
      • Fast Track Business Case Template
      • Comprehensive Business Case Template
      • Project Intake and Prioritization Tool

      3. Integrate the new optimized processes into practice

      Plan a course of action to pilot, refine, and communicate the new optimized process using Info-Tech’s expertise in organizational change management.

      • Optimize Project Intake, Approval, and Prioritization – Phase 3: Integrate the New Processes into Practice
      • Intake Process Pilot Plan Template
      • Project Backlog Manager
      • Intake and Prioritization Impact Analysis Tool
      [infographic]

      Workshop: Optimize IT Project Intake, Approval, and Prioritization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Refocus on Project Value to Set Realistic Goals

      The Purpose

      Set the course of action for optimizing project intake, approval, and prioritization by examining the current state of the process, the team, the stakeholders, and the organization as a whole.

      Key Benefits Achieved

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Activities

      1.1 Define the criteria with which to determine project value.

      1.2 Envision your target state for your optimized project intake, approval, and prioritization process.

      Outputs

      Draft project valuation criteria

      Examination of current process, definition of process success criteria

      2 Examine, Optimize, and Document the New Process

      The Purpose

      Drill down into, and optimize, each of the project intake, approval, and prioritization process.

      Key Benefits Achieved

      Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Activities

      2.1 Conduct retrospectives of each process against Info-Tech’s best practice methodology for project intake, approval, and prioritization process.

      2.2 Pilot and customize a toolbox of deliverables that effectively captures the right amount of data developed for informing the appropriate decision makers for approval.

      Outputs

      Documentation of new project intake, approval, and prioritization process

      Tools and templates to aid the process

      3 Pilot, Plan, and Communicate the New Process

      The Purpose

      Reduce the risks of prematurely implementing an untested process.

      Methodically manage the risks associated with organizational change and maximize the likelihood of adoption for the new process.

      Key Benefits Achieved

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Activities

      3.1 Create a plan to pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Outputs

      Process pilot plan

      Organizational change communication plan

      Further reading

      Optimize IT Project Intake, Approval, and Prioritization

      Decide which IT projects to approve and when to start them.

      ANALYST PERSPECTIVE

      Capacity-constrained intake is the only sustainable path forward.

      "For years, the goal of project intake was to select the best projects. It makes sense and most people take it on faith without argument. But if you end up with too many projects, it’s a bad strategy. Don’t be afraid to say NO or NOT YET if you don’t have the capacity to deliver. People might give you a hard time in the near term, but you’re not helping by saying YES to things you can’t deliver."

      Barry Cousins,

      Senior Director, PMO Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • PMO Directors who have trouble with project throughput
      • CIOs who want to improve IT’s responsive-ness to changing needs of the business
      • CIOs who want to maximize the overall business value of IT’s project portfolio

      This Research Will Help You:

      • Align project intake and prioritization with resource capacity and strategic objectives
      • Balance proactive and reactive demand
      • Reduce portfolio waste on low-value projects
      • Manage project delivery expectations and satisfaction of business stakeholders
      • Get optimized project intake processes off the ground with low-cost, high-impact tools and templates

      This Research Will Also Assist:

      • C-suite executives and steering committee members who want to ensure IT’s successful delivery of projects with high business impact
      • Project sponsors and product owners who seek visibility and transparency toward proposed projects

      This Research Will Help Them:

      • Ensure that high-impact projects are approved and delivered in a timely manner
      • Gain clarity and visibility in IT’s project approval process
      • Improve your understanding of IT’s capacity to set more realistic expectations on what gets done

      Executive summary

      Situation

      • As a portfolio manager, you do not have the authority to decline or defer new projects – but you also lack the capacity to realistically say yes to more project work.
      • Stakeholders have unrealistic expectations of what IT can deliver. Too many projects are approved, and it may be unclear why their project is delayed or in a state of suspended animation.

      Complication

      • The cycle of competition is making it increasingly difficult to follow a longer-term strategy during project intake, making it unproductive to approve projects for any horizon longer than one to two years.
      • As project portfolios become more aligned to “transformative” projects, resourcing for smaller, department-level projects becomes increasingly opaque.

      Resolution

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Developing practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic will help improve the throughput of projects through the portfolio.

      Info-Tech Insight

      1. Approve only the right projects… Counterbalance stakeholder needs with strategic objectives of the business and that of IT, in order to maintain the value of your project portfolio at a high level.
      2. …that you have capacity to deliver. Resource capacity-informed project approval process enables you to avoid biting off more than you can chew and, over time, build a track record of fulfilling promises to deliver on projects.

      Most organizations are good at approving projects, but bad at starting them – and even worse at finishing them

      Establishing project intake discipline should be a top priority from a long-term strategy and near-term tactical perspective.

      Most organizations approve more projects than they can finish. In fact, many approve more than they can even start, leading to an ever-growing backlog where project ideas – often good ones – are never heard from again.

      The appetite to approve more runs directly counter to the shortage of resources that plagues most IT departments. This tension of wanting more from less suggests that IT departments need to be more disciplined in choosing what to take on.

      Info-Tech’s data shows that most IT organizations struggle with their project backlog (Source: N=397 organizations, Info-Tech Research Group PPM Current State Scorecard, 2017).

      “There is a minimal list of pending projects”

      A bar graph is depicted. It has 5 bars to show that when it comes to minimal lists of pending projects, 34% strongly disagree, 35% disagree, and 21% are ambivalent. Only 7% agree and 3% strongly agree.

      “Last year we delivered the number of projects we anticipated at the start of the year”

      A bar graph is depicted. It has 5 bars to show that when it comes to the number of projects anticipated at the start of the year, they were delivered. Surveyors strongly disagreed at 24%, disagreed at 31%, and were ambivalent at 30%. Only 13% agreed and 2% strongly agreed.

      The concept of fiduciary duty demonstrates the need for better discipline in choosing what projects to take on

      Unless someone is accountable for making the right investment of resource capacity for the right projects, project intake discipline cannot be established effectively.

      What is fiduciary duty?

      Officers and directors owe their corporation the duty of acting in the corporation’s best interests over their own. They may delegate the responsibility of implementing the actions, but accountability can't be delegated; that is, they have the authority to make choices and are ultimately answerable for them.

      No question is more important to the organization’s bottom line. Projects directly impact the bottom line because they require investment of resource time and money for the purposes of realizing benefits. The scarcity of resources requires that choices be made by those who have the right authority.

      Who approves your projects?

      Historically, the answer would have been the executive layer of the organization. However, in the 1990s management largely abdicated its obligation to control resources and expenditures via “employee empowerment.”

      Controls on approvals became less rigid, and accountability for choosing what to do (and not do) shifted onto the shoulders of the individual worker. This creates a current paradigm where no one is accountable for the malinvestment…

      …of resources that comes from approving too many projects. Instead, it’s up to individual workers to sink or swim as they attempt to reconcile, day after day, seemingly infinite organizational demand with their finite supply of working hours.

      Ad hoc project selection schemes do not work

      Without active management, reconciling the imbalance between demand with available work hours is a struggle that results largely in one of these two scenarios:

      “Squeaky wheel”: Projects with the most vocal stakeholders behind them are worked on first.

      • IT is seen to favor certain lines of business, leading to disenfranchisement of other stakeholders.
      • Everything becomes the highest priority, which reinforces IT’s image as a firefighter, rather than a business value contributor
      • High-value projects without vocal support never get resourced; opportunities are missed.

      “First in, first out”: Projects are approved and executed in the order they are requested.

      • Urgent or important projects for the business languish in the project backlog; opportunities are missed.
      • Low-value projects dominate the project portfolio.
      • Stakeholders leave IT out of the loop and resort to “underground economy” for getting their needs addressed.

      80% of organizations feel that their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      Approve the right projects that you have capacity to deliver by actively managing the intake of projects

      Project intake, approval, and prioritization (collectively “project intake”) reconciles the appetite for new projects with available resource capacity and strategic goals.

      Project intake is a key process of project portfolio management (PPM). The Project Management Institute (PMI) describes PPM as:

      "Interrelated organizational processes by which an organization evaluates, selects, prioritizes, and allocates its limited internal resources to best accomplish organizational strategies consistent with its vision, mission, and values."

      (PMI, Standard for Portfolio Management, 3rd ed.)

      Triple Constraint Model of the Project Portfolio

      Project Intake:

      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      All three components are required for the Project Portfolio

      Organizations practicing PPM recognize available resource capacity as a constraint and aim to select projects – and commit the said capacity – to projects that:

      1. Best satisfy the stakeholder needs that constantly change with the market
      2. Best align to the strategic objectives and contribute the most to business
      3. Have sufficient resource capacity available to best ensure consistent project throughput

      92% vs. 74%: 92% of high-performing organizations in PPM report that projects are well aligned to strategic initiatives vs. 74% of low performers (PMI, 2015).

      82% vs. 55%: 82% of high-performing organizations in PPM report that resources are effectively reallocated across projects vs. 55% of low performers (PMI, 2015)

      Info-Tech’s data demonstrates that optimizing project intake can also improve business leaders’ satisfaction of IT

      CEOs today perceive IT to be poorly aligned to business’ strategic goals:

      43% of CEOs believe that business goals are going unsupported by IT (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      60% of CEOs believe that improvement is required around IT’s understanding of business goals (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      Business leaders today are generally dissatisfied with IT:

      30% of business stakeholders are supporters of their IT departments (Source: Info-Tech’s CIO Business Vision Survey (N=21,367)).

      The key to improving business satisfaction with IT is to deliver on projects that help the business achieve its strategic goals:

      A chart is depicted to show a list of reported important projects, and then reordering the projects based on actual importance.
      Source: Info-Tech’s CIO Business Vision Survey (N=21,367)

      Optimized project intake not only improves the project portfolio’s alignment to business goals, but provides the most effective way to improve relationships with IT’s key stakeholders.

      Benchmark your own current state with overall & industry-specific data using Info-Tech’s Diagnostic Program.

      However, establishing organizational discipline for project intake, approval, and prioritization is difficult

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Unclear definition of value

      Defining the project value is difficult because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Establishing intake discipline requires a great degree of cooperation and conformity among stakeholders that can be cultivated through strong processes.

      Info-Tech’s intake, approval, and prioritization methodology systemically fits the project portfolio to its triple constraint

      Info-Tech’s Methodology

      Info-Tech’s Methodology
      Project Intake Project Approval Project Prioritization
      Project requests are submitted, received, triaged, and scoped in preparation for approval and prioritization. Business cases are developed, evaluated, and selected (or declined) for investment, based on estimated value and feasibility. Work is scheduled to begin, based on relative value, urgency, and availability of resources.
      Stakeholder Needs Strategic Objectives Resource Capacity
      Project Portfolio Triple Constraint

      Info-Tech’s methodology for optimizing project intake delivers extraordinary value, fast

      In the first step of the blueprint, you will prototype a set of scorecard criteria for determining project value.

      Our methodology is designed to tackle your hardest challenge first to deliver the highest-value part of the deliverable. Since the overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects, one must define how “the best projects” are determined.

      In nearly all instances…a key challenge for the PPM team is reaching agreement over how projects should rank.

      – Merkhofer

      A Project Value Scorecard will help you:

      • Evolve the discussions on project and portfolio value beyond a theoretical concept
      • Enable apples-to-apples comparisons amongst many different kinds of projects

      The Project Value Scorecard Development Tool is designed to help you develop the project valuation scheme iteratively. Download the pre-filled tool with content that represents a common case, and then, customize it with your data.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      This blueprint provides a clear path to maximizing your chance of success in optimizing project intake

      Info-Tech’s practical, tactical research is accompanied by a suite of tools and templates to accelerate your process optimization efforts.

      Organizational change and stakeholder management are critical elements of optimizing project intake, approval, and prioritization processes because they require a great degree of cooperation and conformity among stakeholders, and the list of key stakeholders are long and far-reaching.

      This blueprint will provide a clear path to not only optimize the processes themselves, but also for the optimization effort itself. This research is organized into three phases, each requiring a few weeks of work at your team’s own pace – or all in one week, through a workshop facilitated by Info-Tech analysts.

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization

      Tools and Templates:

      • Project Value Scorecard Development Tool (.xlsx)
      • PPM Assessment Report (Info-Tech Diagnostics)
      • Standard Operating Procedure Template (.docx)

      Build Optimized Project Intake, Approval, and Prioritization Processes

      Tools and Templates:

      • Project Request Forms (.docx)
      • Project Classification Matrix (.xlsx)
      • Benefits Commitment Form (.xlsx)
      • Proposed Project Technology Assessment Tool (.xlsx)
      • Business Case Templates (.docx)
      • Intake and Prioritization Tool (.xlsx)

      Integrate the Newly Optimized Processes into Practice

      Tools and Templates:

      • Process Pilot Plan Template (.docx)
      • Impact Assessment and Communication Planning Tool (.xlsx)

      Info-Tech’s approach to PPM is informed by industry best practices and rooted in practical insider research

      Info-Tech uses PMI and ISACA frameworks for areas of this research.

      The logo for PMI is in the picture.

      PMI’s Standard for Portfolio Management, 3rd ed. is the leading industry framework, proving project portfolio management best practices and process guidelines.

      The logo for COBIT 5 is in the picture.

      COBIT 5 is the leading framework for the governance and management of enterprise IT.

      In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Info-Tech's logo is shown.

      33,000+

      Our peer network of over 33,000 happy clients proves the effectiveness of our research.

      1,000+

      Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

      Deliver measurable project intake success for your organization with this blueprint

      Measure the value of your effort to track your success quantitatively and demonstrate the proposed benefits, as you aim to do so with other projects through improved PPM.

      Optimized project intake, approval, and prioritization processes lead to a high PPM maturity, which will improve the successful delivery and throughput of your projects, resource utilization, business alignment, and stakeholder satisfaction ((Source: BCG/PMI).

      A double bar graph is depicted to show high PPM maturity yields measurable benefits. It covers 4 categories: Management for individual projects, financial performance, strategy implementation, and organizational agility.

      Measure your success through the following metrics:

      • Reduced turnaround time between project requests and initial scoping
      • Number of project proposals with articulated benefits
      • Reduction in “off-the-grid” projects
      • Team satisfaction and workplace engagement
      • PPM stakeholder satisfaction score from business stakeholders: see Info-Tech’s PPM Customer Satisfaction Diagnostics

      $44,700: In the past 12 months, Info-Tech clients have reported an average measured value of $44,700 from undertaking a guided implementation of this research.

      Add your own organization-specific goals, success criteria, and metrics by following the steps in the blueprint.

      Case Study: Financial Services PMO prepares annual planning process with Project Value Scorecard Development Tool

      CASE STUDY

      Industry: Financial Services

      Source: Info-Tech Client

      Challenge

      PMO plays a diverse set of roles, including project management for enterprise projects (i.e. PMI’s “Directive” PMO), standards management for department-level projects (i.e. PMI’s “Supportive” PMO), process governance of strategic projects (i.e. PMI’s “Controlling” PMO), and facilitation / planning / reporting for the corporate business strategy efforts (i.e. Enterprise PMO).

      To facilitate the annual planning process, the PMO needed to develop a more data-driven and objective project intake process that implicitly aligned with the corporate strategy.

      Solution

      Info-Tech’s Project Value Scorecard tool was incorporated into the strategic planning process.

      Results

      The scorecard provided a simple way to list the competing strategic initiatives, objectively score them, and re-sort the results on demand as the leadership chooses to switch between ranking by overall score, project value, ability to execute, strategic alignment, operational alignment, and feasibility.

      The Project Value Scorecard provided early value with multiple options for prioritized rankings.

      A screenshot of the Project Value Scorecard is shown in the image.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Optimize Project Intake, Approval, and Prioritization – project overview

      1. Set Realistic Goals for Optimizing Process 2. Build New Optimized Processes 3. Integrate the New Processes into Practice
      Best-Practice Toolkit

      1.1 Define the criteria with which to determine project value.


      2.1 Streamline intake to manage stakeholder expectations.

      2.2 Set up steps of project approval to maximize strategic alignment while right-sizing the required effort.

      2.3 Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity.

      3.1 Pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Guided Implementations
      • Introduce Project Value Scorecard Development Tool and pilot Info-Tech’s example scorecard on your own backlog.
      • Map current project intake, approval, and prioritization process and key stakeholders.
      • Set realistic goals for process optimization.
      • Improve the management of stakeholder expectations with an optimized intake process.
      • Improve the alignment of the project portfolio to strategic objectives with an optimized approval process.
      • Enable resource capacity-constrained greenlighting of projects with an optimized prioritization process.
      • Create a process pilot strategy with supportive stakeholders.
      • Conduct a change impact analysis for your PPM stakeholders to create an effective communication strategy.
      • Roll out the new process and measure success.
      Onsite Workshop

      Module 1:

      Refocus on Project Value to Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Module 2:

      Examine, Optimize, and Document the New Project Intake, Approval, and Prioritization Process

      Module 3:

      Pilot, Plan, and Communicate the New Process and Its Required Organizational Changes

      Phase 1 Outcome:
      • Draft project valuation criteria
      • Examination of current process
      • Definition of process success criteria
      Phase 2 Outcome:
      • Documentation of new project intake, approval, and prioritization process
      • Tools and templates to aid the process
      Phase 3 Outcome:
      • Process pilot plan
      • Organizational change communication plan

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Benefits of optimizing project intake and project value definition

      1.1 Complete and review PPM Current State Scorecard Assessment

      1.2 Define project value for the organization

      1.3 Engage key PPM stakeholders to iterate on the scorecard prototype

      Set realistic goals for process optimization

      2.1 Map current intake, approval, and prioritization workflow

      2.2 Enumerate and prioritize process stakeholders

      2.3 Determine the current and target capability levels

      2.4 Define the process success criteria and KPIs

      Optimize project intake and approval processes

      3.1 Conduct focused retrospectives for project intake and approval

      3.2 Define project levels

      3.3 Optimize project intake processes

      3.4 Optimize project approval processes

      3.5 Compose SOP for intake and approval

      3.6 Document the new intake and approval workflow

      Optimize project prioritization process plan for a process pilot

      4.1 Conduct focused retrospective for project prioritization

      4.2 Estimate available resource capacity

      4.3 Pilot Project Intake and Prioritization Tool with your project backlog

      4.4 Compose SOP for prioritization

      4.5 Document the new prioritization workflow

      4.6 Discuss process pilot

      Analyze stakeholder impact and create communication strategy

      5.1 Analyze stakeholder impact and responses to impending organization change

      5.2 Create message canvas for at-risk change impacts and stakeholders

      5.3 Set course of action for communicating change

      Deliverables
      1. PPM Current State Scorecard
      2. Project Value Scorecard prototype
      1. Current intake, approval, and prioritization workflow
      2. Stakeholder register
      3. Intake process success criteria
      1. Project request form
      2. Project level classification matrix
      3. Proposed project deliverables toolkit
      4. Customized intake and approval SOP
      5. Flowchart for the new intake and approval workflow
      1. Estimated resource capacity for projects
      2. Customized Project Intake and Prioritization Tool
      3. Customized prioritization SOP
      4. Flowchart for the new prioritization workflow
      5. Process pilot plan
      1. Completed Intake and Prioritization Impact Analysis Tool
      2. Communication strategy and plan

      Phase 1

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Set Realistic Goals for Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 1-2 weeks

      Step 1.1: Define the project valuation criteria

      Start with an analyst kick-off call:

      • Discuss how a project value is currently determined
      • Introduce Info-Tech’s scorecard-driven project valuation approach

      Then complete these activities…

      • Create a first-draft version of a project value-driven prioritized list of projects
      • Review and iterate on the scorecard criteria

      With these tools & templates:

      Project Value Scorecard Development Tool

      Step 1.2: Envision your process target state

      Start with an analyst kick-off call:

      • Introduce Info-Tech’s project intake process maturity model
      • Discuss the use of Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      Then complete these activities…

      • Map your current process workflow
      • Enumerate and prioritize your key stakeholders
      • Define process success criteria

      With these tools & templates:

      Project Intake Workflow Template

      Project Intake, Approval, and Prioritization SOP Template

      Phase 1 Results & Insights:
      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Get to value early with Step 1.1 of this blueprint

      Define how to determine a project’s value and set the stage for maximizing the value of your project portfolio using Info-Tech’s Project Value Scorecard Development Tool.

      Where traditional models of consulting can take considerable amounts of time before delivering value to clients, Info-Tech’s methodology for optimizing project intake, approval, and prioritization process gets you to value fast.

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      In the first step of this blueprint, you will pilot a multiple-criteria scorecard for determining project value that will help answer that question. Info-Tech’s Project Value Scorecard Development Tool is pre-populated with a ready-to-use, real-life example that you can leverage as a starting point for tailoring it to your organization – or adopt as is.

      Introduce objectivity and clarity to your discussion of maximizing the value of your project portfolio with Info-Tech’s practical IT research that drives measurable results.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Step 1.1: Define the criteria with which to determine project value

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Learn how to use the Project Value Scorecard Development Tool
      • Create a first-draft version of a project value-driven prioritized list of projects

      This step involves the following participants:

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Outcomes of this step

      • Understand the importance of devising a consensus criteria for project valuation.
      • Try a project value scorecard-driven prioritization process with your currently proposed.
      • Set the stage for optimizing project intake, approval, and prioritization processes.

      Intake, Approval, and Prioritization is a core process in Info-Tech’s project portfolio management (PPM) framework

      PPM is an infrastructure around projects that aims to ensure that the best projects are worked on at the right time with the right people.

      PPM’s goal is to maximize the throughput of projects that provide strategic and operational value to the organization. To do this, a PPM strategy must help to:

      Info-Tech's Project Portfolio Management Process Model
      3. Status & Progress Reporting
      1. Intake, Approval & Prioritization 2. Resource Management 3. Project Management 4. Project Closure 5. Benefits Tracking
      Intake Execution Closure
      1. Select the best projects
      2. Pick the right time and people to execute the projects
      3. Make sure the projects are okay
      4. Make sure the projects get done
      5. Make sure they were worth doing

      If you don’t yet have a PPM strategy in place, or would like to revisit your existing PPM strategy before optimizing your project intake, approval, and prioritization practices, see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      A screenshot of Info-Tech's blueprint Develop a Project Portfolio Management Strategy is shown.

      “Too many projects, not enough resources” is the reality of most IT environments

      A profound imbalance between demand (i.e. approved project work and service delivery commitments) and supply (i.e. people’s time) is the top challenge IT departments face today.

      In today’s organizations, the desires of business units for new products and enhancements, and the appetites of senior leadership to approve more and more projects for those products and services, far outstrip IT’s ability to realistically deliver on everything.

      The vast majority of IT departments lack the resourcing to meet project demand – especially given the fact that day-to-day operational demands frequently trump project work.

      As a result, project throughput suffers – and with it, IT’s reputation within the organization.

      An image is depicted that has several projects laid out near a scale filling one side of it and off of it. On the other part of the scale which is higher, has an image of people in it to help show the relationship between resource supply and project demand.

      Info-Tech Insight

      Where does the time go? The portfolio manager (or equivalent) should function as the accounting department for time, showing what’s available in IT’s human resources budget for projects and providing ongoing visibility into how that budget of time is being spent.

      Don’t weigh your portfolio down by starting more than you can finish

      Focus on what will deliver value to the organization and what you can realistically deliver.

      Most of the problems that arise during the lifecycle of a project can be traced back to issues that could have been mitigated during the initiation phase.

      More than simply a means of early problem detection at the project level, optimizing your initiation processes is also the best way to ensure the success of your portfolio. With optimized intake processes you can better guarantee:

      • The projects you are working on are of high value
      • Your project list aligns with available resource capacity
      • Stakeholder needs are addressed, but stakeholders do not determine the direction of the portfolio

      80% of organizations feel their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      "(S)uccessful organizations select projects on the basis of desirability and their capability to deliver them, not just desirability" (Source: John Ward, Delivering Value from Information Systems and Technology Investments).

      Establishing project value is the first – and difficult – step for optimizing project intake, approval, and prioritization

      What is the best way to “deliver value to the organization”?

      Every organization needs to explicitly define how to determine project value that will fairly represent all projects and provide a basis of comparison among them during approval and prioritization. Without it, any discussions on reducing “low-value initiatives” from the previous slide cannot yield any actionable plan.

      However, defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right and worth considering. For example:

      • Strategic growth vs. operational stability
      • Important work vs. urgent work
      • Return on investment vs. cost containment
      • Needs of a specific line of business vs. business-wide needs
      • Financial vs. intangible benefits

      This challenge is further complicated by the difficulty of identifying the right criteria for determining project value:

      Managers fail to identify around 50% of the important criteria when making decisions (Source: Transparent Choice).

      Info-Tech Insight

      Sometimes it can be challenging to show the value of IT-centric, operational-type projects that maintain critical infrastructure since they don’t yield net-new benefits. Remember that benefits are only half the equation; you must also consider the costs of not undertaking the said project.

      Find the right mix of criteria for project valuation with Info-Tech’s Project Value Scorecard Development Tool

      Scorecard-driven approach is an easy-to-understand, time-tested solution to a multiple-criteria decision-making problem, such as project valuation.

      This approach is effective for capturing benefits and costs that are not directly quantifiable in financial terms. Projects are evaluated on multiple specific questions, or criteria, that each yield a score on a point scale. The overall score is calculated as a weighted sum of the scores.

      Info-Tech’s Project Value Scorecard is pre-populated with a best-practice example of eight criteria, two for each category (see box at bottom right). This example helps your effort to develop your own project scorecard by providing a solid starting point:

      60%: On their own, decision makers could only identify around 6 of their 10 most important criteria for making decisions (Source: Transparent Choice).

      Finally, in addition, the overall scores of approved projects can be used as a metric on which success of the process can be measured over time.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Categories of project valuation criteria

      • Strategic alignment: projects must be aligned with the strategic goals of the business and IT.
      • Operational alignment: projects must be aligned with the operational goals of the business and IT.
      • Feasibility: practical considerations for projects must be taken into account in selecting projects.
      • Financial: projects must realize monetary benefits, in increased revenue or decreased costs, while posing as little risk of cost overrun as possible.

      Review the example criteria and score description in the Project Value Scorecard Development Tool

      1.1.1 Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      This tab lists eight criteria that cover strategic alignment, operational alignment, feasibility, and financial benefits/risks. Each criteria is accompanied by a qualitative score description to standardize the analysis across all projects and analysts. While this tool supports up to 15 different criteria, it’s better to minimize the number of criteria and introduce additional ones as the organization grows in PPM maturity.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      Type: It is useful to break down projects with similar overall scores by their proposed values versus ease of execution.

      Scale: Five-point scale is not required for this tool. Use more or less granularity of description as appropriate for each criteria.

      Blank Criteria: Rows with blank criteria are greyed out. Enter a new criteria to turn on the row.

      Score projects and search for the right mix of criteria weighting using the scorecard tab

      1.1.1 Project Value Scorecard Development Tool, Tab 3: Project Scorecard

      In this tab, you can see how projects are prioritized when they are scored according to the criteria from the previous tab. You can enter the scores of up to 30 projects in the scorecard table (see screenshot to the right).

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Value (V) or Execution (E) & Relative Weight: Change the relative weights of each criteria and review any changes to the prioritized list of projects change, whose rankings are updated automatically. This helps you iterate on the weights to find the right mix.

      Feasibility: Custom criteria category labels will be automatically updated.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Overall: Choose the groupings of criteria by which you want to see the prioritized list. Available groupings are:

      • Overall score
      • By value or by execution
      • By category

      Ranks and weighted scores for each project is shown.

      For example, click on the drop-down and choose “Execution.”

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Project ranks are based only on execution criteria.

      Create a first-draft version of a project value-driven prioritized list of projects

      1.1.1 Estimated Time: 60 minutes

      Follow the steps below to test Info-Tech’s example Project Value Scorecard and examine the prioritized list of projects.

      1. Using your list of proposed, ongoing, and completed projects, identify a representative sample of projects in your project portfolio, varying in size, scope, and perceived value – about 10-20 of them.
      2. Arrange these projects in the order of priority using any processes or prioritization paradigm currently in place in your organization.
      • In the absence of formal process, use your intuition, as well as knowledge of organizational priorities, and your stakeholders.
    • Use the example criteria and score description in Tab 2 of Info-Tech’s Project Value Scorecard Development Tool to score the same list of projects:
      • Avoid spending too much time at this step. Prioritization criteria will be refined in the subsequent parts of the blueprint.
      • If multiple scorers are involved, allow some overlap to benchmark for consistency.
    • Enter the scores in Tab 3 of the tool to obtain the first-draft version of a project value-driven prioritized project list. Compare it with your list from Step 2.
    • INPUT

      • Knowledge of proposed, ongoing, and completed projects in your project portfolio

      OUTPUT

      • Prioritized project lists

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Iterate on the scorecard to set the stage for optimizing project intake, approval, and prioritization

      1.1.2 Estimated Time: 60 minutes

      Conduct a retrospective of the previous activity by asking these questions:

      • How smooth was the overall scoring experience (Step 3 of Activity 1.1.1)?
      • Did you experience challenges in interpreting and applying the example project valuation criteria? Why? (e.g. lack of information, absence of formalized business strategic goals, too much room for interpretation in scoring description)
      • Did the prioritized project list agree with your intuition?

      Iterate on the project valuation criteria:

      • Manipulate the relatives weights of valuation criteria to fine-tune them.
      • Revise the scoring descriptions to provide clarity or customize them to better fit your organization’s needs, then update the project scores accordingly.
      • For projects that did not score well, will this cause concern from any stakeholders? Are the concerns legitimate? If so, this may indicate the need for inclusion of new criteria.
      • For projects that score too well, this may indicate a bias toward a specific type of project or group of stakeholders. Try adjusting the relative weights of existing criteria.

      INPUT

      • Activity 1.1.1

      OUTPUT

      • Retrospective on project valuation
      • Review of project valuation criteria

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Next steps: engage key PPM stakeholders to reach a consensus when establishing how to determine project value

      Engage these key players to create the evaluation criteria that all stakeholders will support:

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Optimize the process with the new project value definition to focus your discussion with stakeholders

      This blueprint will help you not only optimize the process, but also help you work with your stakeholders to realize the benefits of the optimized process.

      In this step, you’ve begun improving the definition of project value. Getting it right will require several more iterations and will require a series of discussions with your key stakeholders.

      The optimized intake process built around the new definition of project value will help evolve a conceptual discussion about project value into a more practical one. The new process will paint a picture of what the future state will look like for your stakeholders’ requested projects getting approved and prioritized for execution, so that they can provide feedback that’s concrete and actionable. To help you with that process, you will be taken through a series of activities to analyze the impact of change on your stakeholders and create a communication plan in the last phase of the blueprint.

      For now, in the next step of this blueprint, you will undergo a series of activities to assess your current state to identify the specific areas for process optimization.

      "To find the right intersection of someone’s personal interest with the company’s interest on projects isn’t always easy. I always try to look for the basic premise that you can get everybody to agree on it and build from there… But it’s sometimes hard to make sure that things stick. You may have to go back three or four times to the core agreement."

      -Eric Newcomer

      Step 1.2: Envision your target state for your optimized project intake, approval, and prioritization process

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Map your current project intake, approval, and prioritization workflow, and document it in a flowchart
      • Enumerate and prioritize your key process stakeholders
      • Determine your process capability level within Info-Tech’s Framework
      • Establish your current and target states for project intake, approval, and prioritization process

      This step involves the following participants:

      • CIO
      • PMO Director/Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Outcomes of this step

      • Current project intake, approval, and prioritization process is mapped out and documented in a flowchart
      • Key process stakeholders are enumerated and prioritized to inform future discussion on optimizing processes
      • Current and target organizational process capability levels are determined
      • Success criteria and key performance indicators for process optimization are defined

      Use Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      This step is highly recommended but not required. Call 1-888-670-8889 to inquire about or request the PPM Diagnostics.

      Info-Tech's Project Portfolio Management Assessmentprovides you with a data-driven view of the current state of your portfolio, including your intake processes. Our PPM Assessment measures and communicates success in terms of Info-Tech’s best practices for PPM.

      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Use the diagnostic program to:

      • Assess resource utilization across the portfolio.
      • Determine project portfolio reporting completeness.
      • Solicit feedback from your customers on the clarity of your portfolio’s business goals.
      • Rate the overall quality of your project management practices and benchmark your rating over time.
      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Scope your process optimization efforts with Info-Tech’s high-level intake, approval, and prioritization workflow

      Info-Tech recommends the following workflow at a high level for a capacity-constrained intake process that aligns to strategic goals and stakeholder need.

      • Intake (Step 2.1)*
        • Receive project requests
        • Triage project requests and assign a liaison
        • High-level scoping & set stakeholder expectations
      • Approval (Step 2.2)*
        • Concept approval by project sponsor
        • High-level technical solution approval by IT
        • Business case approval by business
        • Resource allocation & greenlight projects
      • Prioritization (Step 2.3)*
        • Update project priority scores & available project capacity
        • Identify high-scoring and “on-the-bubble” projects
        • Recommend projects to greenlight or deliberate

      * Steps denote the place in the blueprint where the steps are discussed in more detail.

      Use this workflow as a baseline to examine your current state of the process in the next slide.

      Map your current project intake, approval, and prioritization workflow

      1.2.1 Estimated Time: 60-90 minutes

      Conduct a table-top planning exercise to map out the processes currently in place for project intake, approval, and prioritization.

      1. Use white 4”x6” recipe cards / large sticky notes to write out unique steps of a process. Use the high-level process workflow from the previous slides as a guide.
      2. Arrange the steps into chronological order. Benchmark the arrangement through a group discussion.
      3. Use green cards to identify artifacts or deliverables that result from a step.
      4. Use yellow cards to identify who does the work (i.e. responsible parties), and who makes the decisions (i.e. accountable party). Keep in mind that while multiple parties may be responsible, accountability cannot be shared and only a single party can be accountable for a process.
      5. Use red cards to identify issues, problems, or risks. These are opportunities for optimization.

      INPUT

      • Documentation describing the current process (e.g. standard operating procedures)
      • Info-Tech’s high-level intake workflow

      OUTPUT

      • Current process, mapped out

      Materials

      • 4x6” recipe cards
      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Document the current project intake, approval, and prioritization workflow in a flowchart

      1.2.2 Estimated Time: 60 minutes

      Document the results of the previous table-top exercise (Activity 1.1.1) into a flow chart. Flowcharts provide a bird’s-eye view of process steps that highlight the decision points and deliverables. In addition, swim lanes can be used to indicate process stages, task ownership, or responsibilities (example below).

      An example is shown for activity 1.2.2

      Review and customize section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      "Flowcharts are more effective when you have to explain status and next steps to upper management."

      – Assistant Director-IT Operations, Healthcare Industry

      Browser-based flowchart tool examples

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)

      OUTPUT

      • Flowchart representation of current project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Example of a project intake, approval, and prioritization flow chart – without swim lanes

      An example project intake, approval, and prioritization flow chart without swim lanes is shown.

      Example of a project intake, approval, and prioritization flow chart – with swim lanes

      An example project intake, approval, and prioritization flow chart with swim lanes is shown.

      Download Info-Tech’s Project Intake Workflow Template (Visio and PDF)

      Enumerate your key stakeholders for optimizing intake, approval, and prioritization process

      1.2.3 30-45 minutes

      In the previous activity, accountable and responsible stakeholders for each of the steps in the current intake, approval, and prioritization process were identified.

      1. Based on your knowledge and insight of your organization, ensure that all key stakeholders with accountable and responsible stakeholders are accounted for in the mapped-out process. Note any omissions: it may indicate a missing step, or that the stakeholder ought to be, but are not currently, involved.
      2. For each step, identify any stakeholders that are currently consulted or informed. Then, examine the whole map and identify any other stakeholders that ought to be consulted or informed.
      3. Compile a list of stakeholders from steps 1-2, and write each of their names in two sticky notes.
      4. Put both sets of sticky notes on a wall. Use the wisdom-of-the-crowd approach to arrange one set in a descending order of influence. Record their ranked influence from 1 (least) to 10 (most).
      5. Rearrange the other set in a descending order of interest in seeing the project intake process optimized. Record their ranked interest from 1 (least) to 10 (most).

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)
      • Insight on organizational culture

      OUTPUT

      • List of stakeholders in project intake
      • Ranked list in their influence and interest

      Materials

      • Sticky notes
      • Walls

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Prioritize your stakeholders for project intake, approval, and prioritization process

      There are three dimensions for stakeholder prioritization: influence, interest, and support.

      1. Map your stakeholders in a 2D stakeholder power map (top right) according to their relative influence and interest.
      2. Rate their level of support by asking the following question: how likely is it that your stakeholder would welcome an improved process for project intake?

      These parameters will inform how to prioritize your stakeholders according to the stakeholder priority heatmap (bottom right). This priority should inform how to focus your attention during the subsequent optimization efforts.

      A flowchart is shown to show the relationship between influence and interest.

      Level of Support
      Stakeholder Category Supporter Evangelist Neutral Blocker
      Engage Critical High High Critical
      High Medium Low Low Medium
      Low High Medium Medium High
      Passive Low Irrelevant Irrelevant Low

      Info-Tech Insight

      There may be too many stakeholders to be able to achieve complete satisfaction. Focus your attention on the stakeholders that matter the most.

      Most organizations have low to medium capabilities around intake, approval, and prioritization

      1.2.4 Estimated Time: 15 minutes

      Use Info-Tech’s Intake Capability Framework to help define your current and target states for intake, approval, and prioritization.

      Capability Level Capability Level Description
      Capability Level 5: Optimized Our department has effective intake processes with right-sized administrative overhead. Work is continuously prioritized to keep up with emerging challenges and opportunities.
      Capability Level 4: Aligned Our department has very strong intake processes. Project approvals are based on business cases and aligned with future resource capacity.
      Capability Level 3: Engaged Our department has processes in place to track project requests and follow up on them. Priorities are periodically re-evaluated, based largely on the best judgment of one or several executives.
      Capability Level 2: Defined Our department has some processes in place but no capacity to say no to new projects. There is a formal backlog, but little or no method for grooming it.
      Capability Level 1: Unmanaged Our department has no formal intake processes in place. Most work is done reactively, with little ability to prioritize proactive project work.

      Refer to the subsequent slides for more detail on these capability levels.

      Level 1: Unmanaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Projects are requested through personal conversations and emails, with minimal documentation and oversight.
      Approval Projects are approved by default and rarely (if ever) declined. There is no definitive list of projects in the pipeline or backlog.
      Prioritization Most work is done reactively, with little ability to prioritize proactive project work.

      Symptoms

      • Poorly defined – or a complete absence of – PPM processes.
      • No formal approval committee.
      • No processes in place to balance proactive and reactive demands.

      Long Term

      PMOs at this level should work to have all requests funneled through a proper request form within six months. Decision rights for approval should be defined, and a scorecard should be in place within the year.

      Quick Win

      To get a handle on your backlog, start tracking all project requests using the “Project Data” tab in Info-Tech’s Project Intake and Prioritization Tool.

      Level 2: Defined

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Requests are formally documented in a request form before they’re assigned, elaborated, and executed as projects.
      Approval Projects are approved by default and rarely (if ever) declined. There is a formal backlog, but little or no method for grooming it.
      Prioritization There is a list of priorities but no process for updating it more than annually or quarterly.

      Symptoms

      • Organization does not have clear concept of project capacity.
      • There is a lack of discipline enforced on stakeholders.
      • Immature PPM processes in general.

      Long Term

      PMOs at this level should strive for greater visibility into the portfolio to help make the case for declining (or at least deferring) requests. Within the year, have a formal PPM strategy up and running.

      Quick Win

      Something PMOs at this level can accomplish quickly without any formal approval is to spend more time with stakeholders during the ideation phase to better define scope and requirements.

      Level 3: Engaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Processes and skills are in place to follow up on requests to clarify project scope before going forward with approval and prioritization.
      Approval Projects are occasionally declined based on exceptionally low feasibility or value.
      Prioritization Priorities are periodically re-evaluated based largely on the best judgment of one or several executives.

      Challenges

      • Senior executives’ “best judgement” is frequently fallible or influenced. Pet projects still enter the portfolio and deplete resources.
      • While approval processes “occasionally” filter out some low-value projects, many still get approved.

      Long Term

      PMOs at this level should advocate for a more formal cadence for prioritization and, within the year, establish a formal steering committee that will be responsible for prioritizing and re-prioritizing quarterly or monthly.

      Quick Win

      At the PMO level, employ Info-Tech’s Project Intake and Prioritization Tool to start re-evaluating projects in the backlog. Make this data available to senior executives when prioritization occurs.

      Level 4: Aligned

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized process. Processes and skills are in place for follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Project prioritization is visibly aligned with business goals.

      Challenges

      • The process of developing business cases can be too cumbersome, distracting resources from actual project work.
      • “Future” resource capacity predictions are unreliable. Reactive support work and other factors frequently change actual resource availability.

      Long Term

      PMOs at this level can strive for more accurate and frequent resource forecasting, establishing a more accurate picture of project vs. non-project work within the year.

      Quick Win

      PMOs at this level can start using Info-Tech’s Business Case Template (Comprehensive or Fast Track) to help simplify the business case process.

      Level 5: Optimizing

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized portal. Processes and skills are in place for thorough follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Work is continuously prioritized to keep up with emerging challenges and opportunities.

      Challenges

      • Establishing a reliable forecast for resource capacity remains a concern at this level as well.
      • Organizations at this level may experience an increasing clash between Agile practices and traditional Waterfall methodologies.

      A screenshot of Info-Tech's Manage an Agile Portfolio Blueprint

      PMOs at this level should look at Info-Tech’s Manage an Agile Portfolio for comprehensive tools and guidance on maintaining greater visibility at the portfolio level into work in progress and committed work.

      Establish your current and target states for process intake, approval, and prioritization

      1.2.5 Estimated Time: 20 minutes

      • Having reviewed the intake capability framework, you should be able to quickly identify where you currently reside in the model. Document this in the “Current State” box below.
      • Next, spend some time as a group discussing your target state. Make sure to set a realistic target as well as a realistic timeframe for meeting this target. Level 1s will not be able to become Level 5s overnight and certainly not without passing through the other levels on the way.
        • A realistic goal for a Level 1 to become a Level 2 is within six to eight months.
      Current State:
      Target State:
      Timeline for meeting target

      INPUT

      • Intake, approval, and prioritization capability framework (Activity 1.2.4)

      OUTPUT

      • Current and target state, with stated time goals

      Materials

      • Whiteboard

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Align your intake success with the strategic expectations of overall project portfolio management

      A successful project intake, approval, and prioritization process puts your leadership in a position to best steer the portfolio, like a conductor of an orchestra.

      To frame the discussion on deciding what intake success will look like, review Info-Tech’s PPM strategic expectations:

      • Project Throughput: Maximize throughput of the best projects.
      • Portfolio Visibility: Ensure visibility of current and pending projects.
      • Portfolio Responsiveness: Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
      • Resource Utilization: Minimize resource waste and optimize the alignment of skills to assignments.
      • Benefits Realization: Clarify accountability for post-project benefits attainment for each project, and facilitate the process of tracking/reporting those benefits.
      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint.

      For a more detailed discussion and insight on PPM strategic expectations see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      Decide what successful project intake, approval, prioritization process will look like

      1.2.6 Estimated Time: 60 minutes

      While assessing your current state, it is important to discuss and determine as a team how success will be defined.

      • During this process, it is important to consider tentative timelines for success milestones and to ask the question: what will success look like and when should it occur by?
      • Use the below table to help document success factors and timeliness. Follow the lead of our example in row 1.
      Optimization Benefit Objective Timeline Success Factor
      Facilitate project intake, prioritization, and communication with stakeholders to maximize time spent on the most valuable or critical projects. Look at pipeline as part of project intake approach and adjust priorities as required. July 1st Consistently updated portfolio data. Dashboards to show back capacity to customers. SharePoint development resources.

      Review and customize section 1.5, “Process Success Criteria” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      Info-Tech Insight

      Establish realistic short-term goals. Even with optimized intake procedures, you may not be able to eliminate underground project economies immediately. Make your initial goals realistic, leaving room for those walk-up requests that may still appear via informal channels.

      Prepare to optimize project intake and capture the results in the Intake, Approval, and Prioritization SOP

      Standard Operating Procedure (SOP) is the reference document to get all PPM stakeholders on the same page with the new optimized process.

      The current state explored and documented in this step will serve as a starting point for each step of the next phase of the blueprint. The next phase will take a deeper dive into each of the three components of Info-Tech’s project intake methodology, so that they can achieve the success criteria you’ve defined in the previous activity.

      Info-Tech’s Project Intake, Approval, and Prioritization SOP Template is intended to capture the outcome of your process optimization efforts. This blueprint guides you through numerous activities designed for your core project portfolio management team to customize each section.

      To maximize the chances of success, it is important that the team makes a concerted effort to participate. Schedule a series of working sessions over the course of several weeks for your team to work through it – or get through it in one week, with onsite Info-Tech analyst-facilitated workshops.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Case study: PMO develops mature intake and prioritization processes by slowly evolving its capability level

      CASE STUDY

      Industry: Not-for-Profit

      Source: Info-Tech Interview

      Challenge

      • A PMO for a large not-for-profit benefits provider had relatively high project management maturity, but the enterprise had low PPM maturity.
      • There were strong intake processes in place for following up on requests. For small projects, project managers would assist as liaisons to help control scope. For corporate initiates, PMs were assigned to work with a sponsor to define scope and write a charter.

      Solution

      Prioritization was a challenge. Initially, the organization had ad hoc prioritization practices, but they had developed a scoring criteria to give more formality and direction to the portfolio. However, the activity of formally prioritizing proved to be too time consuming.

      Off-the-grid projects were a common problem, with initiatives consuming resources with no portfolio oversight.

      Results

      After trying “heavy” prioritization, the PMO loosened up the process. PMO staff now go through and quickly rank projects, with two senior managers making the final decisions. They re-prioritize quarterly to have discussions around resource availability and to make sure stakeholders are in tune to what IT is doing on a daily basis. IT has a monthly meeting to go over projects consuming resources and to catch anything that has fallen between the cracks.

      "Everything isn't a number one, which is what we were dealing with initially. We went through a formal prioritization period, where we painstakingly scored everything. Now we have evolved: a couple of senior managers have stepped up to make decisions, which was a natural evolution from us being able to assign a formal ranking. Now we are able to prioritize more easily and effectively without having to painstakingly score everything."

      – PMO Director, Benefits Provider

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1-2

      A screenshot of activities 1.1.1 and 1.1.2 are shown.

      Pilot Info-Tech’s Project Value Scorecard-driven prioritization method

      Use Info-Tech’s example to prioritize your current project backlog to pilot a project value-driven prioritization, which will be used to guide the entire optimization process.

      1.2.1-3

      A screenshot of activities 1.2.1 and 1.2.3 are shown.

      Map out and document current project intake, approval, and prioritization process, and the involved key stakeholders

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 2

      Build an Optimized Project Intake, Approval, and Prioritization Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Build an Optimized Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 3-6 weeks

      Step 2.1: Streamline Intake

      Start with an analyst kick-off call:

      • Challenges of project intake
      • Opportunities for improving the management of stakeholder expectations by optimizing intake

      Then complete these activities…

      • Perform a process retrospective
      • Optimize your process to receive, triage, and follow up on project requests

      With these tools & templates:

      • Project Request Form.
      • Project Intake Classification Matrix

      Step 2.2: Right-Size Approval

      Start with an analyst call:

      • Challenges of project approval
      • Opportunities for improving strategic alignment of the project portfolio by optimizing project approval

      Then complete these activities…

      • Perform a process retrospective
      • Clarify accountability at each step
      • Decide on deliverables to support decision makers at each step

      With these tools & templates:

      • Benefits Commitment Form
      • Technology Assessment Tool
      • Business Case Templates

      Step 3.3: Prioritize Realistically

      Start with an analyst call:

      • Challenges in project prioritization
    • Opportunities for installing a resource capacity-constrained intake by optimizing prioritization
    • Then complete these activities…

      • Perform a process retrospective
      • Pilot the Intake and Prioritization Tool for prioritization within estimated resource capacity

      With these tools & templates:

      • Project Intake and Prioritization Tool

      Phase 2 Results & Insights:

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Step 2.1: Streamline intake to manage stakeholder expectations

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project intake process
      • Optimize your process to receive project requests
      • Revisit the definition of a project for triaging requests
      • Optimize your process to triage project requests
      • Optimize your process to follow up on project requests

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this Step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A streamlined, single-funnel intake channel with the right procedural friction to receive project requests
      • A refined definition of what constitutes a project, and project levels that will determine the necessary standard of rigor with which project requests should be scoped and developed into a proposal throughout the process
      • An optimized process for triaging and following up on project requests to prepare them for the steps of project approval
      • Documentation of the optimized process in the SOP document

      Understand the risks of poor intake practices

      Too much red tape could result in your portfolio falling victim to underground economies. Too little intake formality could lead to the Wild West.

      Off-the-grid projects, i.e. projects that circumvent formal intake processes, lead to underground economies that can deplete resource capacity and hijack your portfolio.

      These underground economies are typically the result of too much intake red tape. When the request process is made too complex or cumbersome, project sponsors may unsurprisingly seek alternative means to get their projects done.

      While the most obvious line of defence against the appearance of underground economies is an easy-to-use and access request form, one must be cautious. Too little intake formality could lead to a Wild West of project intake where everyone gets their initiatives approved regardless of their business merit and feasibility.

      Benefits of optimized intake Risks of poor intake
      Alignment of portfolio with business goals Portfolio overrun by off-the-grid projects
      Resources assigned to high-value projects Resources assigned to low-value projects
      Better throughput of projects in the portfolio Ever-growing project backlog
      Strong stakeholder relations Stakeholders lose faith in value of PMO

      Info-Tech Insight

      Intake is intimately bound to stakeholder management. Finding the right balance of friction for your team is the key to successfully walking the line between asking for too much and not asking for enough. If your intake process is strong, stakeholders will no longer have any reason to circumvent formal process.

      An excess number of intake channels is the telltale sign of a low capability level for intake

      Excess intake channels are also a symptom of a portfolio in turmoil.

      If you relate to the graphic below in any way, your first priority needs to be limiting the means by which projects get requested. A single, centralized channel with review and approval done in batches is the goal. Otherwise, with IT’s limited capacity, most requests will simply get added to the backlog.

      A graphic is shown to demonstrate how one may receive project requests. The following icons are in a circle: Phone, Intranet Request Form, In person, anywhere, anytime, SharePoint Request Form, Weekly Scrum, Document, and Email.

      Info-Tech Insight

      The PMO needs to have the authority – and needs to exercise the authority – to enforce discipline on stakeholders. Organizations that solicit in verbal requests (by phone, in person, or during scrum) lack the orderliness required for PPM success. In these cases, it needs to be the mission of the PMO to demand proper documentation and accountability from stakeholders before proceeding with requests.

      "The golden rule for the project documentation is that if anything during the project life cycle is not documented, it is the same as if it does not exist or never happened…since management or clients will never remember their undocumented requests or their consent to do something."

      – Dan Epstein, “Project Initiation Process: Part Two”

      Develop an intake workflow

      Info-Tech recommends following a four-step process for managing intake.

      1. Requestor fills out form and submits the request.

      Project Request Form Templates

      2. Requests are triaged into the proper queue.

      1. Divert non-project request
      2. Quickly assess value and urgency
      3. Assign specialist to follow up on request
      4. Inform the requestor

      Project Intake Classification Matrix

      3. BA or PM prepares to develop requests into a project proposal.

      1. Follow up with requestor and SMEs to refine project scope, benefits, and risks
      2. Estimate size of project and determine the required level of detail for proposal
      3. Prepare for concept approval

      Benefits Commitment Form Template

      4. Requestor is given realistic expectations for approval process.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.1.1 Estimated Time: 45 minutes

      Optimizing project intake may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Explicitly manage follow-up expectations with project requestor
      • Receiving informal project requests
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project intake workflow (Activity 1.2.2)
      • Project intake success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current intake process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Streamline project requests into a single funnel

      It is important to identify all of the ways through which projects currently get requested and initiated, especially if you have various streams of intake competing with each other for resources and a place in the portfolio. Directing multiple channels into a single, centralized funnel is step number one in optimizing intake.

      To help you identify project sources within your organization, we’ve broken project requests into three archetypes: the good, the bad, and the ugly.

      1. The Good – Proper Requests: written formal requests that come in through one appropriate channel.

      The Bad – Walk-Ups: requests that do not follow the appropriate intake channel(s), but nevertheless make an effort to get into the proper queue. The most common instance of this is a portfolio manager or CIO filling out the proper project request form on behalf of, and under direction from, a senior executive.

      The Ugly – Guerilla Tactics: initiatives that make their way into the portfolio through informal methods or that consume portfolio resources without formal approval, authority, or oversight. This typically involves a key resource getting ambushed to work on a stakeholder’s “side project” without any formal approval from, or knowledge of, the PMO.

      Funnel requests through a single portal to streamline intake

      Decide how you would funnel project requests on a single portal for submitting project requests. Determining the right portal for your organization will depend on your current infrastructure options, as well as your current and target state capability levels.

      Below are examples of a platform for your project request portal.

      Platform Template document, saved in a repository or shared drive Email-based form (Outlook forms) Intranet form (SharePoint, internal CMS) Dedicated intake solution (PPM tool, idea/innovation tool)
      Pros Can be deployed very easily Consolidates requests into a single receiver Users have one place to go from any device All-in-one solution that includes scoring and prioritization
      Cons Manual submission and intake process consumes extra effort Can pose problems in managing requests across multiple people and platforms Requires existing intranet infrastructure and some development effort Solution is costly; requires adoption across all lines of business

      Increasing intake capability and infrastructure availability

      Introduce the right amount of friction into your intake process

      The key to an effective intake process is determining the right amount of friction to include for your organization. In this context, friction comes from the level of granularity within your project request form and the demands or level of accountability your intake processes place on requestors. You will want to have more or less friction on your intake form, depending on your current intake pain points.

      If you are inundated with a high volume of requests:

      • Make your intake form more detailed to deter “half-baked” requests.
      • Have more managerial oversight into the process. Require approval for each request.

      If you want to encourage the use of a formal channel:

      • Make your intake form more concise and lightweight.
      • Have less managerial oversight into the process. Inform managers of each request rather than requiring approval.

      Download Info-Tech’s Detailed Project Request Form.

      Download Info-Tech’s Light Project Request Form.

      A screenshot of Info-Tech's Project Request Form is shown.

      Info-Tech Insight

      Optimizing a process should not automatically mean reducing friction. Blindly reducing friction could generate a tidal wave of poorly thought-out requests, which only drives up unrealistic expectations. Mitigate the risk of unrealistic stakeholder expectations by carefully managing the message: optimize friction.

      Document your process to receive project requests

      2.1.2 Estimated Time: 30-60 minutes

      Review and customize section 2.2, “Receive project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to consolidate multiple intake channels into a single funnel with the right amount of friction to improve visibility and manageability of incoming project requests.

      The important decisions to document for this step include:

      1. What data will be collected, and from whom? For example, Info-Tech’s Light Project Request Form Template will be used to collect project requests from everyone.
      2. How will requests be collected, and from where? For example, the template will be available as a fillable form on a SharePoint site.
      3. Who will be informed of the requests? For example, the PMO Director and the BA team will be notified with a hyperlink to the completed request form.
      4. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Retrospective of current process (Activity 2.1.1)

      OUTPUT

      • Customized Project Request Form
      • Method of implementation

      Materials

      • Project Request Form Templates

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Establish a triage process to improve portfolio success

      Once a request has been submitted, it will need to be triaged. Triage begins as soon as the request is received. The end goal of the triage process is to set appropriate expectations for stakeholders and to ensure that all requests going forward for approval are valid requests.

      PPM Triage Process

      1. Divert non-project requests by validating that what is described on the request form qualifies as a “project.” Make sure requests are in the appropriate queue – for example, service desk request queue, change and release management queue, etc.
      2. Quickly assess value and urgency to determine whether the request requires fast-tracking or any other special consideration.
      3. Assign a specialist to follow up on the request. Match the request to the most suitable BA, PM, or equivalent. This person will become the Request Liaison (“RL”) for the request and will work with the requestor to define preliminary requirements.
      4. Inform the requestor that the request has been received and provide clear direction on what will happen with the request next, such as who will follow up on it and when. See the next slide for some examples of this follow-up.

      The PMO Triage Team

      • Portfolio Manager, or equivalent
      • Request Liaisons (business analysts, project managers, or equivalent)

      “Request Liaison” Role

      The BAs and PMs who follow up on requests play an especially important role in the triage process. They serve as the main point of contact to the requestor as the request evolves into a business case. In this capacity they perform a valuable stakeholder management function, helping to increase confidence and enhance trust in IT.

      To properly triage project requests, define exactly what a project is

      Bring color to the grey area that can exist in IT between those initiatives that fall somewhere in between “clearly a service ticket” and “clearly a project.”

      What constitutes a project?

      Another way of asking this question that gets more to the point for this blueprint – for what types of initiatives is project intake, approval, and prioritization rigor required?

      This is especially true in IT where, for some smaller initiatives, there can be uncertainty in many organizations during the intake and initiation phase about what should be included on the formal project list and what should go to help desk’s queue.

      As the definitions in the table below show, formal project management frameworks each have similar definitions of “a project.”

      Source Definition
      PMI A temporary endeavor undertaken to create a unique product, service, or result.” (553)
      COBIT A structured set of activities concerned with delivering a defined capability (that is necessary but not sufficient to achieve a required business outcome) to the enterprise based on an agreed‐on schedule and budget.” (74)
      PRINCE2 A temporary organization that is created for the purpose of delivering one or more business products according to an agreed business case.

      For each, a project is a temporary endeavor planned around producing a specific organizational/business outcome. The challenge of those small initiatives in IT is knowing when those endeavors require a business case, formal resource tracking, and project management rigor, and when they don’t.

      Separating small projects from non-projects requires a consideration of approval rights

      While conventional wisdom says to base your project definition on an estimation of cost, risk, etc., you also need to ask, “does this initiative require formal approval?”

      In the next step, we will define a suggested minimum threshold for a small “level 1” project. While these level thresholds are good and necessary for a number of reasons – including triaging your project requests – you may still often need to exercise some critical judgment in separating the tickets from the projects. In addition to the level criteria that we will develop in this step, use the checklist below to help with your differentiating.

      Service Desk Ticket Small Project
      • Approval seems implicit given the scope of the task.
      • No expectations of needing to report on status.
      • No indications that management will require visibility during execution.
      • The scope of the task suggests formal approval may be required.
      • You may have to report on status.
      • Possibility that management may require visibility during execution.

      Info-Tech Insight

      Guard the value of the portfolio. Because tickets carry with them an implicit approval, you need to be wary at the portfolio level of those that might possess a larger scope than their status of ticket implies. Sponsors that, for whatever reason, resist the formal intake process may use the ticketing process to sneak projects in through the backdoor. When assessing tickets and small projects at the portfolio level, you need to ask: is it possible that someone at an executive level might want to get updates on this because of its duration, scope, risk, cost, etc.? Could someone at the management level get upset that the initiative came in as a ticket and is burning up time and driving costs without any visibility?

      Sample Project/Non-Project Separation Criteria

      Non-Project Small Project
      e.g. Time required e.g. < 40 hours e.g. 40 > hours
      e.g. Complexity e.g. Very low e.g. Moderate – Low Difficulty: Does not require highly developed or specialized skill sets
      e.g. Collaboration e.g. None required e.g. Limited coordination and collaboration between resources and departments
      e.g. Repeatability of work e.g. Fully repeatable e.g. Less predictable
      e.g. Frequency of request type e.g. Hourly to daily e.g. Weekly to monthly

      "If you worked for the help desk, over time you would begin to master your job since there is a certain rhythm and pattern to the work…On the other hand, projects are unique. This characteristic makes them hard to estimate and hard to manage. Even if the project is similar to one you have done before, new events and circumstances will occur. Each project typically holds its own challenges and opportunities"

      – Jeffrey and Thomas Mochal

      Define the minimum-threshold criteria for small projects

      2.1.3 Estimated Time: 30 minutes

      Follow the steps below to define the specifics of a “level 1” project for your organization.

      1. Using your project list and/or ticketing system, identify a handful of small projects, large service desk tickets, and especially those items that fall somewhere in the grey area in between (anywhere between 10 to 20 of each). Then, determine the organizationally appropriate considerations for defining your project levels. Options include:
      • Duration
      • Budget/Cost
      • Technology requirements
      • Customer involvement
      • Integration
      • Organizational impact
      • Complexity
      • Number of cross-functional workgroups and teams involved
    • Using the list of projects established in the previous step, determine the organizationally appropriate considerations for defining your project levels –anywhere from four to six considerations is a good number.
    • Using these criteria and your list of small projects, define the minimum threshold for your level one projects across each of these categories. Record these thresholds in the table on the next slide.
    • INPUT

      • Data concerning small projects and service desk tickets, including size, duration, etc.

      OUTPUT

      • Clarity around how to define your level 1 projects

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Remove room for stakeholder doubt and confusion by informing requests forward in a timely manner

      During triaging, requestors should be notified as quickly as possible (a) that their request has been received and (b) what to expect next for the request. Make this forum as productive and informative as possible, providing clear direction and structure for the future of the request. Be sure to include the following:

      • A request ID or ticket number.
      • Some direction on who will be following up on the request –provide an individual’s name when possible.
      • An estimated timeframe of when they can expect to hear from the individual following up.

      The logistic of this follow-up will depend on a number of different factors.

      • The number of requests you receive.
      • Your ability to automate the responses.
      • The amount of detail you would like to, or need to, provide stakeholders with.

      Info-Tech Best Practice

      Assign an official request number or project ID to all requests during this initial response. An official request number anchors the request to a specific and traceable dataset that will accompany the project throughout its lifecycle.

      Sample “request received” emails

      If you receive a high volume of requests or need a quick win for improving stakeholder relations:

      Sample #1: Less detailed, automatic response

      Hello Emma,

      Thank you. Your project request has been received. Requests are reviewed and assigned every Monday. A business analyst will follow up with you in the next 5-10 business days. Should you have any questions in the meantime, please reply to this email.

      Best regards,

      Information Technology Services

      If stakeholder management is a priority, and you want to emphasize the customer-facing focus:

      Sample #2: More detailed, tailored response

      Hi Darren,

      Your project request has been received and reviewed. Your project ID number is #556. Business analyst Alpertti Attar has been assigned to follow up on your request. You can expect to hear from him in the next 5-10 business days to set up a meeting for preliminary requirements gathering.

      If you have any questions in the meantime, please contact Alpertti at aattar@projectco.com. Please include the Project ID provided in this email in all future correspondences regarding this request.

      Thank you for your request. We look forward to helping you bring this initiative to fruition.

      Sincerely,

      Jim Fraser

      PMO Director, Information Technology Services

      Info-Tech Insight

      A simple request response will go a long way in terms of stakeholder management. It will not only help assure stakeholders that their requests are in progress but the request confirmation will also help to set expectations and take some of the mystery out of IT’s processes.

      Document your process to triage project requests

      2.1.4 Estimated Time: 30-60 minutes

      Review and customize section 2.3, “Triage project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to divert non-project requests and set an appropriate initial set of stakeholder expectations for next steps. The important decisions to document for this step include:

      1. What defines a project? Record the outcomes of Activities 2.1.3 into the SOP.
      2. Who triages the requests and assign request liaisons? Who are they? For example, a lead BA can assign a set roster of BAs to project requests.
      3. What are the steps to follow for sending the initial response? See the previous slides on automated responses vs. detailed, tailored responses.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of four hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Results of activity 2.1.3

      OUTPUT

      • SOP for triaging project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Follow up on requests to define project scope and set realistic expectations

      The purpose of this follow-up is to foster communication among the requestor, IT, and the sponsor to scope the project at a high level. The follow-up should:

      • Clarify the goals and value of the request.
      • Begin to manage expectations based on initial assessment of feasibility.
      • Ensure the right information is available for evaluating project proposals downstream. Every project should have the below key pieces of scope defined before any further commitments are made.

      Focus on Defining Key Pieces of Scope

      • Budget (funding, source)
      • Business outcome
      • Completion criteria
      • Timeframes (start date and duration)
      • Milestones/deliverables

      Structure the Follow-Up Process to Enhance Alignment Between IT and the Business

      Once a Request Liaison (RL) has been assigned to a request, it is their responsibility to schedule time (if necessary) with the requestor to perform a scoping exercise that will help define preliminary requirements. Ideally, this follow-up should occur no later than a week of the initial request.

      Structure the follow-up for each request based on your preliminary estimates of project size (next slide). Use the “Key Pieces of Scope” to the left as a guide.

      It may also be helpful for RLs and stakeholders to work together to produce a rough diagram or mock-up of the final deliverable. This will ensure that the stakeholder’s idea has been properly communicated, and it could also help refine or broaden this idea based on IT’s capabilities.

      After the scoping exercise, it is the RL’s responsibility to inform the requestor of next steps.

      Info-Tech Insight

      More time spent with stakeholders defining high-level requirements during the ideation phase is key to project success. It will not only improve the throughput of projects, but it will enhance the transparency of IT’s capacity and enable IT to more effectively support business processes.

      Perform a preliminary estimation of project size

      Project estimation is a common pain point felt by many organizations. At this stage, a range-of-magnitude (ROM) estimate is sufficient for the purposes of sizing the effort required for developing project proposals with appropriate detail.

      A way to structure ROM estimates is to define a set of standard project levels. It will help you estimate 80% of projects with sufficient accuracy over time with little effort. The remaining 20% of projects that don’t meet their standard target dates can be managed as exceptions.

      The increased consistency of most projects will enable you to focus more on managing the exceptions.

      Example of standard project sizes:

      Level Primary unit of estimation Target completion date*
      1 Weeks 3 weeks – 3 months
      2 Months 3 months – 6 months
      3 Quarters 2 – 4 quarters
      3+ Years 1 year or more

      * Target completion date is simply that – a target, not a service level agreement (SLA). Some exceptions will far exceed the target date, e.g. projects that depend heavily on external or uncontrollable factors.

      Info-Tech Best Practice

      Project levelling is useful for right-sizing many downstream processes; it sets appropriate levels of detail and scrutiny expected for project approval and prioritization steps, as well as the appropriate extent of requirements gathering, project management, and reporting requirements afterwards.

      Set your thresholds for level 2 and level 3 projects

      2.1.5 Estimated Time: 30 minutes

      Now that the minimum threshold for your smallest projects has been identified, it’s time to identify the maximum threshold in order to better apply project intake, approval, and prioritization rigor where it’s needed.

      1. Looking at your project list (e.g. Activity 1.1.1, or your current project backlog), isolate the medium and large projects. Examine the two categories in turn.
      2. Start with the medium projects. Using the criteria identified in Activity 2.1.3, identify where your level one category ends.
      • What are the commonly recurring thresholds that distinguish medium-sized projects from smaller initiatives?
      • Are there any criteria that would need to take on a greater importance when making the distinction? For instance, will cost or duration take on a greater weighting when determining level thresholds?
      • Once you have reached consensus, record these in the table on the next slide.
    • Now examine your largest projects. Once again relying on the criteria from Activity 2.1.3, determine where your medium-sized projects end and your large projects begin.
      • What are the commonly recurring thresholds that distinguish large and extra-large projects from medium-sized initiatives?
      • Once you have reached consensus, records these in the table on the next slide.

      INPUT

      • Leveling criteria from Activity 2.1.3
      • Project backlog, or list of projects from Activity 1.1.1

      OUTPUT

      • Clarity around how to define your level two and three projects

      Materials

      • Whiteboard
      • The project level table on the next slide

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Sample Project Levels Table

      Project Level Level 1 Level 2 Level 3
      Work Effort 40-100 hours 100-500 hours 500+ hours
      Budget $100,000 and under $100,000 to $500,000 $500,000 and over
      Technology In-house expertise Familiar New or requires system-wide change/training
      Complexity Well-defined solution; no problems expected Solution is known; some problems expected Solution is unknown or not clearly defined
      Cross-Functional Workgroups/Teams 1-2 3-5 > 6

      Apply a computation decision-making method for project levelling

      2.1.5 Project Intake Classification Matrix

      Capture the project levels in Info-Tech’s Project Intake Classification Matrix Tool to benchmark your levelling criteria and to determine project levels for proposed projects.

      Download Info-Tech’s Project Intake Classification Matrix tool.

      A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 2 is shown.
      1. Pick a category to define project levels.
      2. Enter the descriptions for each project level.
      3. Assign a relative weight for each category.
      4. A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 3 is shown.
      5. Enter a project name.
      6. Choose the description that best fits the project. If unknown, leave it blank.
      7. Suggested project levels are displayed.

      Get tentative buy-in and support from an executive sponsor for project requests

      In most organizations a project requires sponsorship from the executive layer, especially for strategic initiatives. The executive sponsor provides several vital factors for projects:

      • Funding and resources
      • Direct support and oversight of the project leadership
      • Accountability, acting as the ultimate decision maker for the project
      • Ownership of, and commitment to, project benefits

      Sometimes a project request may be made directly by a sponsor; in other times, the Request Liaison may need to connect the project request to a project sponsor.

      In either case, project request has a tentative buy-in and support of an executive sponsor before a project request is developed into a proposal and examined for approval – the subject of this blueprint’s next step.

      PMs and Sponsors: The Disconnect

      A study in project sponsorship revealed a large gap between the perception of the project managers and the perception of sponsors relative to the sponsor capability. The widest gaps appear in the areas of:

      • Motivation: 34% of PMs say sponsors frequently motivate the team, compared to 82% of executive sponsors who say they do so.
      • Active listening: 42% of PMs say that sponsors frequently listen actively, compared to 88% of executive sponsors who say they do so.
      • Effective communication: 47% of PMs say sponsors communicate effectively and frequently, compared to 92% of executive sponsors who say they do so.
      • Managing change: 37% of PMs say sponsors manage change, compared to 82% of executive sponsors who say they do so.

      Source: Boston Consulting Group/PMI, 2014

      Actively engaged executive sponsors continue to be the top driver of whether projects meet their original goals and business intent.

      – PMI Pulse of the Profession, 2017

      76% of respondents [organizations] agree that the role of the executive sponsor has grown in importance over the past five years.

      – Boston Consulting Group/PMI, 2014

      Document your process to follow up on project requests

      2.1.6 45 minutes

      Review and customize section 2.4, “Follow up on project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to initiate communication among the requestor, IT, and the sponsor to scope the project requests at a high level. The important decisions to document for this step include:

      1. How will you perform a scoping exercise with the requestor? Leverage existing organizational processes (e.g. high-level requirements gathering). Look to the previous slides for suggested outcomes of the exercise.
      2. How will you determine project levels? Record the outcomes of activities 2.1.5 into the SOP.
      3. How will the RL follow up on the scoped project request with a project sponsor? For example, project requests scoped at a high level will be presented to senior leadership whose lines of business are affected by the proposed project to gauge their initial interest.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of 8 hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Activity 2.1.5
      • Existing processes for scoping exercises

      OUTPUT

      • SOP for following up on project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.1.7 Estimated Time: 30-60 minutes

      Review and customize section 2.1, “Project Intake Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Requestor fills out form and submits the request.
      2. Requests are triaged into the proper queue.
      3. BA or PM prepares to develop requests into a project proposal.
      4. Requestor is given realistic expectations for approval process.

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project intake (Activities 2.1.2-6)

      OUTPUT

      • Flowchart representation of new project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Case study: Portfolio manager achieves intake and project success through detailed request follow-up

      Case Study

      Industry: Municipal Government

      Source: Info-Tech Client

      Challenge

      • There is an IT department with a relatively high level of project management maturity.
      • They have approximately 30 projects on the go, ranging from small to large.
      • To help with intake, IT assembled a project initiation team. It was made up of managers from throughout the county. This group “owned the talent” and met once a month to assess requests. As a group, they were able to assemble project teams quickly.

      Solution

      • Project initiation processes kept failing. A lot of time was spent within IT getting estimations precise, only to have sponsors reject business cases because they did not align with what those sponsors had in mind.
      • Off-the-grid projects were a challenge. Directors did not follow intake process and IT talent was torn in multiple directions. There was nothing in place for protecting the talent and enforcing processes on stakeholders.

      Results

      • IT dedicated a group of PMs and BAs to follow up on requests.
      • Working with stakeholders, this group collects specific pieces of information that allows IT to get to work on requests faster. Through this process, requests reach the charter stage more quickly and with greater success.
      • An intake ticketing system was established to protect IT talent. Workers are now better equipped to redirect stakeholders through to the proper channels.

      Step 2.2: Set up steps of project approval to maximize strategic alignment while right-sizing the required effort

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project approval process
      • Define the approval steps, their accountabilities, and the corresponding terminologies for approval
      • Right-size effort and documentation required for each project level through the approval steps

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A series of approval steps are defined, in which their accountabilities, responsibilities, and the nomenclature for what is approved at each steps are clarified and documented
      • A toolbox of deliverables for proposed projects that captures key information developed to inform project approval decisions at each step of the approval process, and the organizational standard for what to use for which project level
      • Documentation of the optimized process in the SOP document

      Set up an incremental series of approval stage-gates to tackle common challenges in project approval

      This section will help you address key challenges IT leaders face around project approval.

      Challenges Info-Tech’s Advice
      Project sponsors receive funding from their business unit or other source (possibly external, such as a grant), and assume this means their project is “approved” without any regard to IT costs or resource constraints. Clearly define a series of approval steps, and communicate requirements for passing them.
      Business case documentation is rarely updated to reflect unforeseen costs, emerging opportunities, and changing priorities. As a result, time and money is spent finishing diminished priority projects while the value of more recent projects erodes in the backlog. Approve projects in smaller pieces, with early test/pilot phases focused on demonstrating the value of later phases.
      Project business cases often focus on implementation and overlook ongoing operating costs imposed on IT after the project is finished. These costs further diminish IT’s capacity for new projects, unless investment in more capacity (such as hiring) is included in business cases. Make ongoing support and maintenance costs a key element in business case templates and evaluations.
      Organizations approve new projects without regard to the availability of resource capacity (or lack thereof). Project lead times grow and stakeholders become more dissatisfied because IT is unable to show how the business is competing with itself for IT’s time. Increase visibility into what IT is already working on and committed to, and for whom.

      Develop a project approval workflow

      Clearly define a series of approval steps, and communicate requirements for passing them. “Approval” can be a dangerous word in project and portfolio management, so it is important to clarify what is required to pass each step, and how long the process will take.

      1 2 3 4
      Approval step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need / Project sponsorship Technology Organization-wide business need Resource capacity
      Possible dispositions at each gate
      • Approve developing project proposal
      • Reject concept
      • Proceed to business case approval
      • Approve a test/pilot project for feasibility
      • Reject proposal
      • Approve project and funding in full
      • Approve a test/pilot project for viability
      • Reject proposal
      • Begin or continue project work
      • Hold project
      • Outsource project
      • Reject project
      Accountability e.g. Project Sponsor e.g. CIO e.g. Steering Committee e.g. CIO
      Deliverable Benefits Commitment Form Template Proposed Project Technology Assessment Tool Business Case (Fast Track, Comprehensive) Intake and Prioritization Tool

      Identify the decision-making paradigm at each step

      In general, there are three different, mutually exclusive decision-making paradigms for approving projects:

      Paradigm Description Benefits Challenges Recommendation
      Unilateral authority One individual makes decisions. Decisions tend to be made efficiently and unambiguously. Consistency of agenda is easier to preserve. Decisions are subject to one person’s biases and unseen areas. Decision maker should solicit and consider input from others and seek objective rigor.
      Ad hoc deliberation Stakeholders informally negotiate and communicate decisions between themselves. Deliberation helps ensure different perspectives are considered to counterbalance individual biases and unseen areas. Ad hoc decisions tend to lack documentation and objective rationale, which can perpetuate disagreement. Use where unilateral decisions are unfeasible (due to complexity, speed of change, culture, etc.), and stakeholders are very well aligned or highly skilled negotiators and communicators.
      Formal steering committee A select group that represent various parts of the organization is formally empowered to make decisions for the organization. Formal committees can ensure oversight into decisions, with levers available to help resolve uncertainty or disagreement. Formal committees introduce administrative overhead and effort that might not be warranted by the risks involved. Formal steering committees are best where formality is warranted by the risks and costs involved, and the organizational culture has an appetite for administrative oversight.

      Info-Tech Insight

      The individual or party who has the authority to make choices, and who is ultimately answerable for those decisions, is said to be accountable. Understanding the needs of the accountable party is critical to the success of the project approval process optimization efforts.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.2.1 Estimated Time: 45 minutes

      Optimizing project approval may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1.On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3.As a group, discuss the responses and come to an agreement as to which are most valid.
      2.Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4.;Document the responses to help structure your game plan for intake optimization.
      StartStopContinue
      • Inject technical feasibility approval step as an input to final approval
      • Simplify business cases
      • Approve low-value projects
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project approval workflow (Activity 1.2.2)
      • Project approval success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current approval process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Customize the approval steps and describe them at a high level

      2.2.2 Estimated Time: 30-60 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the definition of the approval steps for your organization, so that it makes sense for the existing organizational governance structure, culture, and need. Use the results of the start-stop-continue to inform what to customize. Consider the following factors:

      1. Order of steps: given the current decision-making paradigm, does it make sense to reorder the steps?
      2. Dispositions at each step: what are the possible dispositions, and who is accountable for making the dispositions?
      3. Project levels: do all projects require three-step approval before they’re up for prioritization? For example, IT steering committee may wish to be involved only for Level 3 projects and Level 2 projects with significant business impact, and not for Level 1 projects and IT-centric Level 2 projects.
      4. Accountability at each step: who makes the decisions?
      5. Who will handle exceptions? Aim to prevent the new process from being circumvented by vocal stakeholders, but also allow for very urgent requests. A quick win to strike this balance is to clarify who will exercise this discretion.

      INPUT

      • Retrospective of current process (Activity 2.2.1)
      • Project level definition
      • Approval steps in the previous slide

      OUTPUT

      • Customized project approval steps for each project level

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Specify what “approval” really means to manage expectations for what project work can be done and when

      2.2.3 Estimated Time: 15 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In the old reality, projects were approved and never heard back from again, which effectively gave your stakeholders a blanket default expectation of “declined.” With the new approval process, manage your stakeholder expectations more explicitly by refining your vocabulary around approval.

      Within this, decision makers should view their role in approval as approving that which can and should be done. When a project is approved and slated to backlog, the intention should be to allocate resources to it within the current intake cycle.

      Customize the table to the right with organizationally appropriate definitions, and update your SOP.

      “No” Declined.
      “Not Now” “It’s a good idea, but the time isn’t right. Try resubmitting next intake cycle.”
      “Concept Approval” Approval to add the item to the backlog with the intention of starting it this intake cycle.
      “Preliminary Approval” Approval for consumption of PMO resources to develop a business case.
      “Full Approval” Project is greenlighted and project resources are being allocated to it.

      Info-Tech Insight

      Refine the nomenclature. Add context to “approved” and “declined.” Speak in terms of “not now” or “you can have it when these conditions are met.” With clear expectations of the resources required to support each request, you can place accountability for keeping the request alive back on the sponsors.

      Continuously work out a balance between disciplined decision making and “analysis paralysis"

      A graph is depicted to show the relationship between disciplined decision making and analysis paralysis. The sweet spot for disciplined decisions changes between situations and types of decisions.

      A double bar graph is depicted to show the relative effort spent on management practice. The first bar shows that 20% has a high success of portfolio management. 35% has a low success of portfolio management. A caption on the graph: Spending additional time assessing business cases doesn’t necessarily improve success.

      Info-Tech Insight

      Estimates that form the basis of business cases are often based on flawed assumptions. Use early project phases or sprints to build working prototypes to test the assumptions on which business cases are built, rather than investing time improving precision of estimates without improving accuracy.

      Right-size project approval process with Info-Tech’s toolbox of deliverables

      Don’t paint every project with the same brush. Choose the right set of information needed for each project level to maximize the throughput of project approval process.

      The next several slides will take you through a series of tools and templates that help guide the production of deliverables. Each deliverable wireframes the required analysis of the proposed project for one step of the approval process, and captures that information in a document. This breaks down the overall work for proposal development into digestible chunks.

      As previously discussed, aim to right-size the approval process rigor for project levels. Not all project levels may call for all steps of approval, or the extent of required analysis within an approval step may differ. This section will conclude by customizing the requirement for deliverables for each project level.

      Tools and Templates for the Project Approval Toolbox

      • Benefits Commitment Form Template (.xlsx) Document the project sponsor’s buy-in and commitment to proposed benefits in a lightweight fashion.
      • Proposed Technology Assessment Tool (.xlsx) Determine the proposed project’s readiness for adoption from a technological perspective.
      • Business Case Templates (.docx) Guide the analysis process for the overall project proposal development in varying levels of detail.

      Use Info-Tech’s lightweight Benefits Commitment Form Template to document the sponsor buy-in and support

      2.2.4 Benefits Commitment Form Template

      Project sponsors are accountable for the realization of project benefits. Therefore, for a project to be approved by a project sponsor, they must buy-in and commit to the proposed benefits.

      Defining project benefits and obtaining project sponsor commitment has been demonstrated to improve the project outcome by providing the focal point of the project up-front. This will help reduce wasted efforts to develop parts of the proposals that are not ultimately needed.

      A double bar graph titled: Benefits realization improves project outcome is shown.

      Download Info-Tech’s Benefits Commitment Form Template.

      Contents of a Benefits Commitment Form

      • One-sentence highlight of benefits and risks
      • Primary benefit, hard (quantitative) and soft (qualitative)
      • Proposed measurements for metrics
      • Responsible and accountable parties for benefits
      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      For further discussion on benefits realization, use Info-Tech’s blueprint, Establish the Benefits Realization Process.

      Use Info-Tech’s Proposed Project Technology Assessment Tool to analyze a technology’s readiness for adoption

      2.2.4 Proposed Project Technology Assessment Tool

      In some projects, there needs to be an initial idea of what the project might look like. Develop a high-level solution for projects that:

      • Are very different from previous projects.
      • Are fairly complex, or not business as usual.
      • Require adoption of new technology or skill set.

      IT should advise and provide subject matter expertise on the technology requirements to those that ultimately approve the proposed projects, so that they can take into account additional costs or risks that may be borne from it.

      Info-Tech’s Proposed Project Technology Assessment Tool has a series of questions to address eight categories of considerations to determine the project’s technological readiness for adoption. Use this tool to ensure that you cover all the bases, and help you devise alternate solutions if necessary – which will factor into the overall business case development.

      Download Info-Tech’s Proposed Project Technology Assessment Tool.

      A screenshot of Info-Tech's Proposed Project Technology Assessment Tool is shown.

      Enable project valuation beyond financial metrics with Info-Tech’s Business Case Templates

      2.2.4 Business Case Template (Comprehensive and Fast Track)

      Traditionally, a business case is centered around financial metrics. While monetary benefits and costs are matters of bottom line and important, financial metrics are only part of a project’s value. As the project approval decisions must be based on the holistic comparison of project value, the business case document must capture all the necessary – and only those that are necessary – information to enable it.

      However, completeness of information does not always require comprehensiveness. Allow for flexibility to speed up the process of developing business plan by making a “fast-track” business case template available. This enables the application of the project valuation criteria with all other projects, with right-sized effort.

      Alarming business case statistics

      • Only one-third of companies always prepare a business case for new projects.
      • Nearly 45% of project managers admit they are unclear on the business objectives of their IT projects.

      (Source: Wrike)

      Download Info-Tech’s Comprehensive Business Case Template.

      A screenshot of Info-Tech's Comprehensive Business Case Template is shown.

      Download Info-Tech’s Fast Track Business Case Template.

      A screenshot of Info-Tech's Fast Track Business Case Template is shown.

      Info-Tech Insight

      Pass on that which is known. Valuable information about projects is lost due to a disconnect between project intake and project initiation, as project managers are typically not brought on board until project is actually approved. This will be discussed more in Phase 3 of this blueprint.

      Document the right-sized effort and documentation required for each project level

      2.2.4 Estimated Time:60-90 minutes

      Review and customize section 3.3, “Project Proposal Deliverables” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the requirements for project proposal deliverables, so that it properly informs each of the approval steps discussed in the previous activity. The deliverables will also shape the work effort required for projects of various levels. Consider the following factors:

      1. Project levels: what deliverables should be required, recommended, or suggested for each of the project levels? How will exceptions be handled, and who will be accountable?
      2. Existing project proposal documents: what existing proposal documents, tools and templates can we leverage for the newly optimized approval steps?
      3. Skills availability: do these tools and templates represent a significant departure from the current state? If so, is there capacity (time and skill) to achieve the desired target state?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed the new deliverable standard.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Process steps (Activity 2.2.2)
      • Current approval workflow(Activity 1.2.1)
      • Artifacts introduced in the previous slides

      OUTPUT

      • Requirement for artifacts and effort for each approval step

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project approval workflow as a whole and document it in a flow chart

      2.2.5 Estimated Time: 30-60 minutes

      Review and customize section 3.1, “Project Approval Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1 2 3 4
      Approval Step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need/ Project Sponsorship Technology

      Organization-wide

      Business need

      Resource capacity

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth hand-off between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project approval (Activities 2.2.2-4)

      OUTPUT

      • Flowchart representation of new project approval workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Step 2.3: Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project prioritization process
      • Optimize your process to maintain resource capacity supply and project demand data
      • Optimize your process to formally make disposition recommendations to appropriate decision makers

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project prioritization process: to continue doing, to start doing, and to stop doing
      • Realistic estimate of available resource capacity, in the absence of a resource management practice
      • Optimized process for presenting the decision makers with recommendations and facilitating capacity-constrained steering of the project portfolio
      • Project Intake and Prioritization Tool for facilitating the prioritization process
      • Documentation of the optimized process in the SOP document

      The availability of staff time is rarely factored into IT project and service delivery commitments

      A lot gets promised and worked on, and staff are always busy, but very little actually gets done – at least not within given timelines or to expected levels of quality.

      Organizations tend to bite off more than they can chew when it comes to project and service delivery commitments involving IT resources.

      While the need for businesses to make an excess of IT commitments is understandable, the impacts of systemically over-allocating IT are clearly negative:

      • Stakeholder relations suffer. Promises are made to the business that can’t be met by IT.
      • IT delivery suffers. Project timelines and quality frequently suffer, and service support regularly lags.
      • Employee engagement suffers. Anxiety and stress levels are consistently high among IT staff, while morale and engagement levels are low.

      76%: 76% of organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.

      – Cooper, 2014

      70%: Almost 70% of workers feel as though they have too much work on their plates and not enough time to do it.

      – Reynolds, 2016

      Unconstrained, unmanaged demand leads to prioritization of work based on consequences rather than value

      Problems caused by the organizational tendency to make unrealistic delivery commitments is further complicated by the reality of the matrix environment.

      Today, many IT departments use matrix organization. In this system, demands on a resource’s time come from many directions. While resources are expected to prioritize their work, they lack the authority to formally reject any demand. As a result, unconstrained, unmanaged demand frequently outstrips the supply of work-hours the resource can deliver.

      When this happens, the resource has three options:

      1. Work more hours, typically without compensation.
      2. Choose tasks not to do in a way that minimizes personal consequences.
      3. Diminish work quality to meet quantity demands.

      The result is an unsustainable system for all those involved:

      1. Individual workers cannot meet expectations, leading to frustration and disengagement.
      2. Managers cannot deliver on the projects or services they manage and struggle to retain skilled resources who are looking elsewhere for “greener pastures.”
      3. Executives cannot execute strategic plans as they lose decision-making power over their resources.

      Prioritize project demand by project value to get the most out of constrained project capacity – but practicing it is difficult

      The theory may be simple and intuitive, but the practice is extremely challenging. There are three practical challenges to making project prioritization effective.

      Project Prioritization

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Project Approval

      Unclear definition of value

      Defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Unclear definition of value

      In Step 1.1 of the blueprint, we took the first step toward resolving this challenge by prototyping a project valuation scorecard.

      A screenshot of Step 1.1 of this blueprint is shown.

      "Prioritization is a huge issue for us. We face the simultaneous challenges of not having enough resources but also not having a good way to say no. "

      – CIO, governmental health agency

      Address the challenges of capacity awareness and authority with a project prioritization workflow

      Info-Tech recommends following a four-step process for managing project prioritization.

      1. Collect and update supply and demand data
        1. Re-evaluate project value for all proposed, on-hold and ongoing projects
        2. Estimate available resource capacity for projects
      2. Prioritize project demand by value
        1. Identify highest-value, “slam-dunk” projects
        2. Identify medium-value, “on-the-bubble” projects
        3. Identify lower-value projects that lie beyond the available capacity
      3. Approve projects for initiation or continuation
        1. Submit recommendations for review
        2. Adjust prioritized list with business judgment
        3. Steering committee approves projects to work on
      4. Manage a realistically defined project portfolio
      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      Intake and Prioritization Tool

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.3.1 Estimated Time: 60 minutes

      Optimizing project prioritization may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Periodically review the project value scorecard with business stakeholders
      • “Loud Voices First” prioritization
      • Post-prioritization score changes
      • Updating project value scores for current projects

      INPUT

      • Current project prioritization workflow (Activity 1.2.2)
      • Project prioritization success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current prioritization process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Use Info-Tech’s lightweight Intake and Prioritization Tool to get started on capacity-constrained project prioritization

      Use Info-Tech’s Project Intake and Prioritization Tool to facilitate the scorecard-driven prioritization and ensure effective flow of data.

      This tool builds on the Project Valuation Scorecard Tool to address the challenges in project prioritization:

      1. Lack of capacity awareness: quickly estimate a realistic supply of available work hours for projects for a given prioritization period, in the absence of a reliable and well-maintained resource utilization and capacity data.
      2. Using standard project sizing, quickly estimate the size of the demand for proposed and ongoing projects and produce a report that recommends the list of projects to greenlight – and highlight the projects within that list that are at risk of being short-charged of resources – that will aim to help you tackle:

      3. Lack of authority to say “no” or “not yet” to projects: save time and effort in presenting the results of project prioritization analysis that will enable the decision makers to make well-informed, high-quality portfolio decisions.
      4. The next several slides will walk you through the tool and present activities to facilitate its use for your organization.

      Download Info-Tech’s Project Intake and Prioritization Tool.

      A screenshot of Info-Tech's Project Intake Prioritization Tool is shown.

      Create a high-level estimate of available project capacity to inform how many projects can be greenlighted

      2.3.2 Project Intake and Prioritization Tool, Tab 2: Project Capacity

      Estimate how many work-hours are at your disposal for projects using Info-Tech’s resource calculator.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool, Tab 2: Project Capacity

      1. Compile a list of each role within your department, the number of staff, and the hours in a typical work week.

      2. Enter the foreseeable out-of-office time (vacation, sick time, etc.). Typically, this value is 12-16% depending on the region.

      3. Enter how much working time is spent on non-projects for each role: administrative duties and “keep the lights on” work.

      4. Select a period of time for breaking down available resource capacity in hours.

      Project Work (%): Percentage of your working time that goes toward project work is calculated as what’s left after your non-project working time allocations have been subtracted.

      Project (h) Total Percentage: Take a note of this percentage as your project capacity. This number will put the estimated project demand in context for the rest of the tool.

      Example for a five-day work week:

      • 2 weeks (10 days) of statutory holidays
      • 3 weeks of vacation
      • 1.4 weeks (7 days) of sick days on average
      • 1 week (5 days) for company holidays

      Result: 7.4/52 weeks’ absence = 14%

      Estimate your available project capacity for the next quarter, half-year, or year

      2.3.2 Estimated Time: 30 minutes

      Discover how many work-hours are at your disposal for project work.

      1. Use the wisdom-of-the-crowd approach or resource utilization data to fill out Tab 2 of the tool. This is intended to be somewhat of a rough estimate; avoid the pitfall of being too granular in role or in time split.
      2. Choose a time period that corresponds to your project prioritization period: monthly, quarterly, 4 months, semi-annually (6 months), or annually.
      3. Examine the pie graph representation of your overall capacity breakdown, like the one shown below.

      Screenshot from Tab 2 of Project Intake and Prioritization Tool

      INPUT

      • Knowledge of organization’s personnel and their distribution of time

      OUTPUT

      • Estimate of available project capacity

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      On average, only about half of the available project capacity results in productive project work

      Place realistic expectations on your resources’ productivity.

      Info-Tech’s PPM Current State Scorecard diagnostic provides a comprehensive view of your portfolio management strengths and weaknesses, including project portfolio management, project management, customer management, and resource utilization.

      A screenshot of Info-Tech's PPM Current State Scorecard diagnostic

      Use the wisdom of the crowd to estimate resource waste in:

      • Cancelled projects
      • Inefficiency
      • Suboptimal assignment of resources
      • Unassigned resources
      • Analyzing, fixing, and redeploying

      50% of PPM resource is wasted on average, effectively halving your available project capacity.

      Source: Info-Tech PPM Current State Scorecard

      Define project capacity and project t-shirt sizes

      2.3.3 Project Intake and Prioritization Tool, Tab 3: Settings

      The resource capacity calculator in the previous tab yields a likely optimistic estimate for how much project capacity is available. Based on this estimate as a guide, enter your optimistic (maximum) and pessimistic (minimum) estimates of project capacity as a percentage of total capacity:

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Info-Tech’s data shows that only about 50% of time spent on project work is wasted: cancelled projects, inefficiency, rework, etc. As a general rule, enter half of your maximum estimate of your project capacity.

      Capacity in work hours is shown here from the previous tab, to put the percentages in context. This example shows a quarterly breakdown (Step 4 from the previous slide; cell N5 in Tab 2.).

      Next, estimate the percentage of your maximum estimated project capacity that a single project would typically consume in the given period for prioritization.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      These project sizes might not line up with the standard project levels from Step 2.1 of the blueprint: for example, an urgent mid-sized project that requires all hands on deck may need to consume almost 100% of maximum available project capacity.

      Estimate available project capacity and standard project demand sizes for prioritizing project demand

      2.3.3 Estimated Time: 30 minutes

      Refine your estimates of project capacity supply and demand as it applies to a prioritization period.

      1. The estimated project capacity from Activity 2.3.2 represents a theoretical limit. It is most likely an overestimation (see box below). As a group, discuss and decide on a more realistic available project capacity:
        1. Optimistic estimate, assuming sustained peak productivity from everyone in your organization;
        2. Pessimistic estimate, taking into account the necessary human downtime and the PPM resource waste (see previous slide).
      2. Refine the choices of standard project effort sizes, expressed as percentages of maximum project capacity. As a reminder, this sizing is for the chosen prioritization period, and is independent from the project levels set previously in Activity 2.1.4 and 2.1.5.

      Dedicated work needs dedicated break time

      In a study conducted by the Draugiem Group, the ideal work-to-break ratio for maximizing focus and productivity was 52 minutes of work, followed by 17 minutes of rest (Evans). This translates to 75% of resource capacity yielding productive work, which could inform your optimistic estimate of project capacity.

      INPUT

      • Project capacity (Activity 2.3.2)
      • PPM Current State Scorecard (optional)

      OUTPUT

      • Capacity and demand estimate data for tool use

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Finish setting up the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 3: Settings

      Enter the scoring criteria, which was worked out from Step 1.1 of the blueprint. This workbook supports up to ten scoring criteria; use of more than ten may make the prioritization step unwieldy.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Leave unused criteria rows blank.

      Choose “value” or “execution” from a drop-down.

      Score does not need to add up to 100.

      Finally, set up the rest of the drop-downs used in the next tab, Project Data. These can be customized to fit your unique project portfolio needs.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Enter project data into the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 4: Project Data

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Ensure that each project has a unique name.

      Completed (or cancelled) projects will not be included in prioritization.

      Choose the standard project size defined in the previous tab.

      Change the heading when you customize the workbook.

      Days in Backlog is calculated from the Date Added column.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Overall weighted project prioritization score is calculated as a sum of value and execution scores.

      Weighted value and execution scores are calculated according to the scoring criteria table in the 2. Settings tab.

      Enter the raw scores. Weights will be taken into calculation behind the scenes.

      Spaces for unused intake scores will be greyed out. You can enter data, but they will not affect the calculated scores.

      Document your process to maintain resource capacity supply and project demand data

      2.3.4 Estimated Time: 30 minutes

      Review and customize section 4.2, “Maintain Supply and Demand Data” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to document the process with which the supply and demand information will be updated for projects. Consider the following factors:

      1. Estimates of resource supply: how often will the resource supply be updated? How are you estimating the range (maximum vs. minimum, optimistic vs. pessimistic)? Leverage your existing organizational process assets for resource management.
      2. Updating project data for proposed projects: when and how often will the project valuation scores be updated? Do you have sufficient inputs? Examine the overall project approval process from Step 2.2 of the blueprint, and ensure that sufficient information is available for project valuation (Activity 2.2.3).
      3. Updating project data for ongoing projects: will you prioritize ongoing projects along with proposed projects? When and how often will the project valuation scores be updated? Do you have sufficient inputs?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed in this process.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Organizational process assets for resource management, strategic planning, etc.
      • Activity 2.3.3
      • Activity 2.2.3

      OUTPUT

      • Process steps for refreshing supply and demand data

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Prioritized list of projects shows what fits under available project capacity for realizing maximum value

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The output of the Project Intake and Prioritization Tool is a prioritized list of projects with indicators to show that their demand on project capacity will fit within the estimated available project capacity for the prioritization period.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Status indicates whether the project is proposed or ongoing; completed projects are excluded.

      Disposition indicates the course of recommended action based on prioritization.

      Proposed projects display how long they have been sitting in the backlog.

      Projects highlighted yellow are marked as “deliberate” for their dispositions. These projects pose risks of not getting properly resourced. One must proceed with caution if they are to be initiated or continued.

      Provide better support to decision makers with the prioritized list, and be prepared for their steering

      It is the portfolio manager’s responsibility to provide the project portfolio owners with reliable data and enable them to make well-informed decisions for the portfolio.

      The prioritized list of proposed and ongoing projects, and an approximate indication for how they fill out the estimated available resource capacity, provide a meaningful starting ground for discussion on which projects to continue or initiate, to hold, or to proceed with caution.

      However, it is important to recognize the limitation of the prioritization methodology. There may be legitimate reasons why some projects should be prioritized over another that the project valuation method does not successfully capture. At the end of the day, it’s the prerogative of the portfolio owners who carry on the accountabilities to steer the portfolio.

      The portfolio manager has a responsibility to be prepared for reconciling the said steering with the unchanged available resource capacity for project work. What comes off the list of projects to continue or initiate? Or, will we outsource capacity if we must meet irreconcilable demand? The next slide will show how Info-Tech’s tool helps you with this process.

      Info-Tech Best Practice

      Strive to become the best co-pilot. Constantly iterate on the scoring criteria to better adapt to the portfolio owners’ preference in steering the project portfolio.

      Manipulate the prioritized list with the Force Disposition list

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The Force Disposition list enables you to inject subjective judgment in project prioritization. Force include and outsource override project prioritization scores and include the projects for approval:

      • Force include counts the project demand against capacity.
      • Outsource, on the other hand, does not count the project demand.
      • Force exclude removes a project from prioritized list altogether, without deleting the row and losing its data.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Choose a project name and a disposition using a drop-down.

      Use this list to test out various scenarios, useful for what-if analysis.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Document your process to formally make disposition recommendations to appropriate decision-making party

      2.3.5 Estimated Time: 60 minutes

      Review and customize section 4.3, “Approve projects for initiation or continuation” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to formalize the process of presenting the prioritized list of projects for review, modify the list based on steering decisions, and obtain the portfolio owners’ approval for projects to initiate or continue, hold, or terminate. Consider the following factors:

      1. Existing final approval process: what are the new injections to the current decision-making process for final approval?
      2. Meeting prep, agenda, and follow-up: what are the activities that must be carried out by PMO / portfolio manager to support the portfolio decision makers and obtain final approval?
      3. “Deliberate” projects: what additional information should portfolio owners be presented with, in order to deliberate on the projects at risk of being not properly resourced? For example, consider a value-execution plot (right).

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      INPUT

      • Approval process steps (Activity 2.2.2)
      • Steering Committee process documentation

      OUTPUT

      • Activities for supporting the decision-making body

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Once a project is approved, pass that which is known on to those responsible for downstream processes

      Aim to be responsible stewards of important and costly information developed throughout project intake, approval, and prioritization processes.

      Once the proposed project is given a green light, the project enters an initiation phase.

      No matter what project management methodology is employed, it is absolutely vital to pass on the knowledge gained and insights developed through the intake, approval, and prioritization processes. This ensures that the project managers and team are informed of the project’s purpose, business benefits, rationale for the project approval, etc. and be able to focus their efforts in realizing the project’s business goals.

      Recognize that this does not aim to create any new artifacts. It is simply a procedural safeguard against the loss of important and costly information assets for your organization.

      A flowchart is shown as an example of business documents leading to the development of a project charter.

      Information from the intake process directly feeds into, for example, developing a project charter.

      Source: PMBOK, 6th edition

      "If the project manager can connect strategy to the project they are leading (and therefore the value that the organization desires by sanctioning the project), they can ensure that the project is appropriately planned and managed to realize those benefits."

      – Randall T. Black, P.Eng., PMP; source: PMI Today

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.3.6 Estimated Time: 30-60 minutes

      Review and customize section 4.1, “Project Prioritization Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Collect and update supply and demand data
      2. Prioritize project demand by value
      3. Approve projects for initiation or continuation
      4. Manage a realistically defined project portfolio

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project prioritization (Activities 2.3.x-y)

      OUTPUT

      • Flowchart representation of new project prioritization workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Leverage Info-Tech’s other blueprints to complement your project prioritization processes

      The project capacity estimates overlook a critical piece of the resourcing puzzle for the sake of simplicity: skills. You need the right skills at the right time for the right project.

      Use Info-Tech’s Balance Supply and Demand with Realistic Resource Management Practices blueprint to enhance the quality of information on your project supply.

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint.

      There is more to organizing your project portfolio than a strict prioritization by project value. For example, as with a financial investment portfolio, project portfolio must achieve the right investment mix to balance your risks and leverage opportunities.

      Use Info-Tech’s Maintain an Organized Portfolio blueprint to refine the makeup of your project portfolio.

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint.

      Continuous prioritization of projects allow organizations to achieve portfolio responsiveness.

      Use Info-Tech’s Manage an Agile Portfolio blueprint to take prioritization of your project portfolio to the next level.

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint

      46% of organizations use a homegrown PPM solution. Info-Tech’s Grow Your Own PPM Solution blueprint debuts a spreadsheet-based Portfolio Manager tool that provides key functionalities that integrates those of the Intake and Prioritization Tool with resource management, allocation and portfolio reporting capabilities.

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.2-6

      A screenshot of activities 2.1.2-6 is shown.

      Optimize your process to receive, triage, and follow up on project requests

      Discussion on decision points and topics of consideration will be facilitated to leverage the diverse viewpoints amongst the workshop participants.

      2.3.2-5

      A screenshot of activities 2.3.2-5 is shown.

      Set up a capacity-informed project prioritization process using Info-Tech’s Project Intake and Prioritization Tool

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 3

      Integrate the New Optimized Processes into Practice

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Integrate the New Optimized Processes into Practice

      Proposed Time to Completion: 6-12 weeks

      Step 3.1: Pilot your process to refine it prior to rollout

      Start with an analyst kick-off call:

      • Review the proposed intake, approval, and prioritization process

      Then complete these activities…

      • Select receptive stakeholders to work with
      • Define the scope of your pilot and determine logistics
      • Document lessons learned and create an action plan for any changes

      With these tools & templates:

      • Process Pilot Plan
      • Project Backlog Manager Job Description

      Step 3.2: Analyze the impact of organizational change

      Review findings with analyst:

      • Results of the process pilot and the finalized intake SOP
      • Key PPM stakeholders
      • Current organizational climate

      Then complete these activities…

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders to create an effective communication plan

      With these tools & templates:

      • Intake Process Implementation Impact Analysis Tool

      Phase 3 Results & Insights:

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Step 3.1: Pilot your intake, approval, and prioritization process to refine it before rollout

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Select receptive managers to work with during your pilot
      • Define the scope of your pilot and determine logistics
      • Plan to obtain feedback, document lessons learned, and create an action plan for any changes
      • Finalize Project Intake, Approval, and Prioritization SOP

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A pilot team
      • A process pilot plan that defines the scope, logistics, and process for retrospection
      • Project Backlog Manager job description
      • Finalized Project Intake, Approval, and Prioritization SOP for rollout

      Pilot your new processes to test feasibility and address issues before a full deployment

      Adopting the right set of practices requires a significant degree of change that necessitates buy-in from varied stakeholders throughout IT and the business.

      Rome wasn’t built in a day. Similarly, benefits of optimized project intake, approval, and prioritization process will not be realized overnight.

      Resist the urge to deploy a big-bang roll out of your new intake practices. The approach is ill advised for two main reasons:

      • It will put more of a strain on the implementation team in the near term, with a larger pool of end users to train and collect data from.
      • Putting untested practices in a department-wide spotlight could lead to mass confusion in the near-term and color the new processes in a negative light, leading to a loss of stakeholder trust and engagement right out-of-the-gate.

      Start with a pilot phase. Identify receptive lines of business and IT resources to work with, and leverage their insights to help iron out the kinks in your process before unveiling your practices to IT and all business users at large.

      This step will help you to:

      • Plan and execute a pilot of the processes we developed in Phase 2.
      • Incorporate the lessons learned from that pilot to strengthen your SOP and ease the communication process.

      Info-Tech Insight

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Plan your pilot like you would any project to ensure it’s well defined and its goals are clearly articulated

      Use Info-Tech’s Intake Process Pilot Plan Template to help define the scope of your pilot and set appropriate goals for the test-run of your new processes.

      A process pilot is a limited scope of an implementation (constrained by time and resources involved) in order to test the viability and effectiveness of the process as it has been designed.

      • Investing time and energy into a pilot phase can help to lower implementation risk, enhance the details and steps within a process, and improve stakeholder relations prior to a full scale rollout.
      • More than a dry run, however, a pilot should be approached strategically, and planned out to limit the scope of it and achieve specific outcomes.
      • Leverage a planning document to ensure your process pilot is grounded in a common set of definitions, that the pilot is delivering value and insight, and that ultimately the pilot can serve as a starting point for a full-scale process implementation.

      Download Info-Tech’s Process Pilot Plan Template

      A screenshot of Info-Tech's Process Pilot Plan Template is shown.

      "The advantages to a pilot are several. First, risk is constrained. Pilots are closely monitored so if a problem does occur, it can be fixed immediately. Second, the people working in the pilot can become trainers as you roll the process out to the rest of the organization. Third, the pilot is another opportunity for skeptics to visit the pilot process and learn from those working in it. There’s nothing like seeing a new process working for people to change their minds."

      Daniel Madison

      Select receptive stakeholders to work with during your pilot

      3.1.1 Estimated Time: 20-60 minutes

      Info-Tech recommends selecting PPM stakeholders who are aware of your role and some of the challenges in project intake, approval, and prioritization to assist in the implementation process.

      1. If receptive PPM stakeholders are known, schedule a 15-minute meeting with them to inquire if they would be willing to be part of the pilot process.
      2. If receptive project managers are not known, use Info-Tech’s Stakeholder Engagement Workbook to conduct a formal selection process.
        1. Enter a list of potential participants for pilot in tab 3.
        2. Rate project managers in terms of influence, pilot interest, and potential deployment contribution within tab 4.
        3. Review tab 5 in the workbook. Receptive PPM stakeholders will appear in the top quadrants. Ideal PPM stakeholders for the pilot are located in the top right quadrant of the graph.

      A screenshot of Info-Tech's Stakeholder Engagement Workbook Tab 5 is shown.

      INPUT

      • Project portfolio management stakeholders (Activity 1.2.3)

      OUTPUT

      • Pilot project team

      Materials

      • Stakeholder Engagement Workbook
      • Process Pilot Plan Template

      Participants

      • PMO Director/ Portfolio Manager
      • CIO (optional)

      Document the PPM stakeholders involved in your pilot in Section 3 of Info-Tech’s Process Pilot Plan Template.

      Define the scope of your pilot and determine logistics

      3.1.2 Estimated Time: 60-90 minutes

      Use Info-Tech’s Process Pilot Plan Template to design the details of your pilot.

      Investing time into planning your pilot phase strategically will ensure a clear scope, better communications for those piloting the processes, and – overall – better, more actionable results for the pilot phase. The Pilot Plan Template is broken into five sections to assist in these goals:

      • Pilot Overview and Scope
      • Success and Risk Factors
      • Stakeholders Involved and Communications Plan
      • Pilot Retrospective and Feedback Protocol

      The duration of your pilot should go at least one prioritization period, e.g. one to two quarters.

      Estimates of time commitments should be captured for each stakeholder. During the retrospective at the end of the pilot you should capture actuals to help determine the time-cost of the process itself and measure its sustainability.

      Once the Plan Template is completed, schedule time to share and communicate it with the pilot team and executive sponsors of the process.

      While you should invest time in this planning document, continue to lean on the Intake, Approval, and Prioritization SOP throughout the pilot phase.

      INPUT

      • Sections 1 through 4 of the Process Pilot Plan Template

      OUTPUT

      • A process pilot plan

      Materials

      • Process Pilot Plan Template

      Participants

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Execute your pilot and prepare to make process revisions before the full rollout

      Hit play! Begin the process pilot and get familiar with the work routine and resource management solution.

      Some things to keep in mind during the pilot include:

      • Depending on the solution you are using, you will likely need to spend one day or less to populate the tool. During the pilot, measure the time and effort required to manage the data within the tool. Determine whether time and effort required is viable on an ongoing basis (i.e. can you do it every month or quarter) and has value.
      • Meet with the pilot team and other stakeholders regularly during the pilot, at least biweekly. Allow the team (and yourself) to speak honestly and openly about what isn’t working. The pilot is your chance to make things better.
      • Keep notes about what will need to change in the SOP. For major changes, you may have to tweak the process during the pilot itself. Update the process documents as needed and communicate the changes and why they’re being made. If required, update the scope of the pilot in the Pilot Plan Template.
      An example is shown on how to begin the process pilot and getting familiar with the work routine and resource management solution.

      Obtain feedback from the pilot group to improve your processes before a wider rollout

      3.1.3 Estimated Time: 30 minutes

      Pilot projects allow you to validate your assumptions and leverage lessons learned. During the planning of the pilot, you should have scheduled a retrospective meeting with the pilot team to formally assess strengths and weaknesses in the process you have drafted.

      • Schedule the retrospective shortly after the pilot is completed. Info-Tech recommends performing a Stop/Start/Continue meeting with pilot participants to obtain and capture feedback.
      • Have members of the meeting record any processes/activities on sticky notes that should:
        • Stop: because they are ineffective or not useful
        • Start: because they would be useful for the tool and have not been incorporated into current processes
        • Continue: because they are useful and positively contribute to intended process outcomes.

      An example of how to structure a Stop/Start/Continue activity on a whiteboard using sticky notes.

      An example of stop, start, and continue is activity is shown.

      INPUT

      • What’s working and what isn’t in the process

      OUTPUT

      • Ideas to improve process

      Materials

      • Whiteboard
      • Sticky notes
      • Process Pilot Plan Template

      Participants

      • Process owner (PMO director or portfolio owner)
      • Pilot team

      See the following slide for additional instructions.

      Document lessons learned and create an action plan for any changes to the processes

      3.1.4 Estimated Time: 30 minutes

      An example of stop, start, and continue is activity is shown.

      As a group, discuss everyone’s responses and organize according to top priority (mark with a 1) and lower priority/next steps (mark with a 2). At this point, you can also remove any sticky notes that are repetitive or no longer relevant.

      Once you have organized based on priority, be sure to come to a consensus with the group regarding which actions to take. For example, if the group agrees that they should “stop holding meetings weekly,” come to a consensus regarding how often meetings will be held, i.e. monthly.

      Priority Action Required Who is Responsible Implementation Date
      Stop: Holding meetings weekly Hold meetings monthly Jane Doe, PMO Next Meeting: August 1, 2017
      Start: Discussing backlog during meetings Ensure that backlog data is up to date for discussion on date of next meeting. John Doe, Portfolio Manager August 1, 2017

      Create an action plan for the top priority items that require changes (the Stops and Starts). Record in this slide, or your preferred medium. Be sure to include who is responsible for the action and the date that it will be implemented.

      Document the outcomes of the start/stop/continue and your action plan in Section 6 of Info-Tech’s Process Pilot Plan Template.

      Use Info-Tech’s Backlog Manager Job Description Template to help fill any staffing needs around data maintenance

      3.1 Project Backlog Manager Job Description

      You will need to determine responsibilities and accountabilities for portfolio management functions within your team.

      If you do not have a clearly identifiable portfolio manager at this time, you will need to clarify who will wear which hats in terms of facilitating intake and prioritization, high-level capacity awareness, and portfolio reporting.

      • Use Info-Tech’s Project Backlog Manager job description template to help clarify some of the required responsibilities to support your intake, approval, and prioritization strategy.
        • If you need to bring in an additional staff member to help support the strategy, you can customize the job description template to help advertise the position. Simply edit the text in grey within the template.
      • If you have other PPM tasks that you need to define responsibilities for, you can use the RASCI chart on the final tab of the PPM Strategy Development Tool.

      Download Info-Tech’s Project Backlog Manager job description template.

      A screenshot of Info-Tech's Project Backlog Manager template is shown.

      Finalize the Intake, Approval, and Prioritization SOP and prepare to communicate your processes

      Once you’ve completed the pilot process and made the necessary tweaks, you should finalize your Intake, Approval, and Prioritization SOP and prepare to communicate it.

      Update section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template with the new process flow.

      Revisit your SOP from Phase 2 and ensure it has been updated to reflect the process changes that were identified in activity 3.1.4.

      • If during the pilot process the data was too difficult or time consuming to maintain, revisit the dimensions you have chosen and choose dimensions that are easier to accurately maintain. Tweak your process steps in the SOP accordingly.
      • In the long term, if you are not observing any progress toward achieving your success criteria, revisit the impact analysis that we’ll prepare in step 3.2 and address some of these inhibitors to organizational change.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP template.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP template.

      Info-Tech Best Practice

      Make your SOP high impact. SOPs are often at risk of being left unmaintained and languishing in disuse. Improve the SOP’s succinctness and usability by making it visual; consult Info-Tech’s blueprint, Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind.

      Step 3.2: Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders
      • Set the course of action for communicating changes to your stakeholders

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A thorough organizational change impact analysis, based on Info-Tech’s expertise in organizational change management
      • Message canvases and communication plan for your stakeholders
      • Go-live for the new intake, approval, and prioritization process

      Manage key PPM stakeholders and communicate changes

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Impacts will be felt differently by different stakeholders and stakeholder groups

      As you assess change impacts, keep in mind that no impact will be felt the same across the organization. Depth of impact can vary depending on the frequency (will the impact be felt daily, weekly, monthly?), the actions necessitated by it (e.g. will it change the way the job is done or is it simply a minor process tweak?), and the anticipated response of the stakeholder (support, resistance, indifference?).

      Use the Organizational Change Depth Scale below to help visualize various depths of impact. The deeper the impact, the tougher the job of managing change will be.

      Procedural Behavioral Interpersonal Vocational Cultural
      Procedural change involves changes to explicit procedures, rules, policies, processes, etc. Behavioral change is similar to procedural change, but goes deeper to involve the changing tacit or unconscious habits. Interpersonal change goes beyond behavioral change to involve changing relationships, teams, locations, reporting structures, and other social interactions. Vocational change requires acquiring new knowledge and skills, and accepting the loss or decline in the value or relevance of previously acquired knowledge and skills. Cultural change goes beyond interpersonal and vocational change to involve changing personal values, social norms, and assumptions about the meaning of good vs. bad or right vs. wrong.
      Example: providing sales reps with mobile access to the CRM application to let them update records from the field. Example: requiring sales reps to use tablets equipped with a custom mobile application for placing orders from the field. Example: migrating sales reps to work 100% remotely. Example: migrating technical support staff to field service and sales support roles. Example: changing the operating model to a more service-based value proposition or focus.

      Perform a change impact analysis to maximize the chances of adoption for the new intake process

      Invest time and effort to analyze the impact of change to create an actionable stakeholder communication plan that yields the desirable result: adoption.

      Info-Tech’s Drive Organizational Change from the PMO blueprint offers the OCM Impact Analysis Tool to helps document the change impact across multiple dimensions, enabling the project team to review the analysis with others to ensure that the most important impacts are captured.

      This tool has been customized for optimizing project intake, approval, and prioritization process to deliver the same result in a more streamlined way. The next several slides will take you through the activities to ultimately create an OCM message canvas and a communication plan for your key stakeholders.

      Download Info-Tech’s Intake and Prioritization Impact Analysis Tool.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool is shown.

      "As a general principle, project teams should always treat every stakeholder initially as a recipient of change. Every stakeholder management plan should have, as an end goal, to change recipients’ habits or behaviors."

      -PMI, 2015

      Set up the Intake Process and Prioritization Impact Analysis Tool

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 2-3

      In Tab 2, enter your stakeholders’ names. Represent stakeholders as a group if you expect the impact of change on them to be reasonably uniform, as well as their anticipated responses. Otherwise, consider adding them as individuals or subgroups.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 2 is shown.

      In Tab 3, enter whether you agree or disagree with each statement that represents an element of organizational change that be introduced as the newly optimized intake process is implemented.

      As a result of the change initiative in question:

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 3 is shown.

      Analyze the impact and the anticipated stakeholder responses of each change

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 4: Impact Analysis Inputs

      Each change statement that you agreed with in Tab 3 are listed here in Tab 4 of the Intake and Prioritization Impact Analysis Tool. For each stakeholder, estimate and enter the following data:

      1. Frequency of the Impact: how often will the impact of the change be felt?
      2. Effort Associated with Impact: what is the demand on a stakeholder’s effort to implement the change?
      3. Anticipated Response: rate from enthusiastic response to active subversion. Honest and realistic estimates of anticipated responses are critical to the rest of the impact analysis.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 4 is shown.

      Analyze the stakeholder impact and responses to impending organizational change as a group

      3.2.1 Estimated Time: 60-90 minutes

      Divide and conquer. Leverage the group to get through the seemingly daunting amount of work involved with impact analysis.

      1. Divide the activity participants into subgroups and assign a section of the impact analysis. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      2. Suggested ways to divide up the impact analysis include:

      • By change impact. This would be suitable when the process owners (or would-be process owners) are available and participating.
      • By stakeholders. This would be suitable for large organizations where the activity participants know some stakeholders better than others.

      Tip: use a spreadsheet tool that supports multi-user editing (e.g. Google Sheets, Excel Online).

    • Aggregate the completed work and benchmark one another’s analysis by reviewing them with the entire group.
    • INPUT

      • Organizational and stakeholder knowledge
      • Optimized intake process

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Info-Tech Insight

      Beware of bias. Groups are just as susceptible to producing overly optimistic or pessimistic analysis as individuals, just in different ways. Unrealistic change impact analysis will compromise your chances of arriving at a reasonable, tactful stakeholder communication plan.

      Examine your impact analysis report

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 5: Impact Analysis Outputs

      These outputs are based on the impacts you analyzed in Tab 4 of the tool (Activity 3.2.1). They are organized in seven sections:

      1. Top Five Highest Risk Impacts, based on the frequency and effort inputs across all impacts.
      2. Overall Process Adoption Rating (top right), showing the overall difficulty of this change given likelihood/risk that the stakeholders involved will absorb the anticipated change impacts.
      3. Top Five Most Impacted Stakeholders, based on the frequency and effort inputs across all impacts.
      4. Top Five Process Supporters and;
      5. Top Five Process Resistors, based on the anticipated response inputs across all impacts.
      6. Impact Register (bottom right): this list breaks down each change’s likelihood of adoption.
      7. Potential Impacts to Watch Out For: this list compiles all of the "Don't Know" responses from Tab 3.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 2. Overall process adoption rating. A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 6. Impact Register.

      Tailor messages for at-risk change impacts and stakeholders with Info-Tech’s Message Canvas

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 6: Message Canvas

      Use Info-Tech’s Message Canvas on this tab to help rationalize and elaborate the change vision for each group.

      Elements of a Message Canvas

      • Why is there a need for this process change?
      • What will be new for this audience?
      • What will go away for this audience?
      • What will be meaningfully unchanged for this audience?
      • How will this change benefit this audience?
      • When and how will the benefits be realized for this audience?
      • What does this audience have to do for this change to succeed?
      • What does this audience have to stop doing for this change to succeed?
      • What should this audience continue doing?
      • What support will this audience receive to help manage the transition?
      • What should this audience expect to do/happen next?

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 6 is shown.

      Info-Tech Insight

      Change thy language, change thyself.

      Jargon, acronyms, and technical terms represent deeply entrenched cultural habits and assumptions.

      Continuing to use jargon or acronyms after a transition tends to drag people back to old ways of thinking and working.

      You don’t need to invent a new batch of buzzwords for every change (nor should you), but every change is an opportunity to listen for words and phrases that have lost their meaning through overuse and abuse.

      Create message canvases for at-risk change impacts and stakeholders as a group

      3.2.2 Estimated Time: 90-120 minutes

      1. Decide on the number of message canvases to complete. This will be based on the number of at-risk change impacts and stakeholders.
      2. Divide the activity participants into subgroups and assign a section of the message canvas. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      3. Aggregate the completed work and benchmark the message canvases amongst subgroups.

      Remember these guidelines to help your messages resonate:

      • People are busy and easily distracted. Tell people what they really need to know first, before you lose their attention.
      • Repetition is good. Remember the Aristotelian triptych: “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
      • Don’t use technical terms, jargon, or acronyms. Different groups in organizations tend to develop specialized vocabularies. Everybody grows so accustomed to using acronyms and jargon every day that it becomes difficult to notice how strange it sounds to outsiders. This is especially important when IT communicates with non-technical audiences. Don’t alienate your audience by talking at them in a strange language.
      • Test your message. Run focus groups or deliver communications to a test audience (which could be as simple as asking 2–3 people to read a draft) before delivering messages more broadly.

      – Info-Tech Blueprint, Drive Organizational Change from the PMO

      INPUT

      • Impact Analysis Outputs
      • Organizational and stakeholder knowledge

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Distill the message canvases into a comprehensive communication plan

      3.2.3 Intake and Prioritization Impact Analysis Tool, Tab 7: Communication Plan

      The communication plan creates an action plan around the message canvases to coordinate the responsibilities of delivering them, so the risks of “dropping the ball” on your stakeholders are minimized.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      1. Choose a change impact from a drop-down menu.

      2. Choose an intended audience...

      … and the message canvas to reference.

      3. Choose the method of delivery. It will influence how to craft the message for the stakeholder.

      4. Indicate who is responsible for creating and communicating the message.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      5. Briefly indicate goal of the communication and the likelihood of success.

      6. Record the dates to plan and track the communications that take place.

      Set the course of action for communicating changes to your stakeholders

      3.2.2 Estimated Time: 90-120 minutes

      1. Divide the activity participants into subgroups and assign communication topics to each group. There should be one communication topic for each change impact. Based on the message canvas, create a communication plan draft.
      2. Aggregate the completed work and benchmark the communication topic amongst subgroups.
      3. Share the finished communication plan with the rest of the working group. Do not share this file widely, but keep it private within the group.

      Identify critical points in the change curve:

      1. Honeymoon of “Uninformed Optimism”: There is usually tentative support and even enthusiasm for change before people have really felt or understood what it involves.
      2. Backlash of “Informed Pessimism” (leading to “Valley of Despair”): As change approaches or begins, people realize they’ve overestimated the benefits (or the speed at which benefits will be achieved) and underestimated the difficulty of change.
      3. Valley of Despair and beginning of “Hopeful Realism”: Eventually, sentiment bottoms out and people begin to accept the difficulty (or inevitability) of change.
      4. Bounce of “Informed Optimism”: People become more optimistic and supportive when they begin to see bright spots and early successes.
      5. Contentment of “Completion”: Change has been successfully adopted and benefits are being realized.

      Based on Don Kelley and Daryl Conner’s Emotional Cycle of Change.

      INPUT

      • Change impact analysis results
      • Message canvases
      • List of stakeholders

      OUTPUT

      • Communication Plan

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Roll out the optimized intake, approval, and prioritization process, and continually monitor adoption and success

      As you implement your new project intake process, familiarize yourself with common barriers and challenges.

      There will be challenges to watch for in evaluating the effectiveness of your intake processes. These may include circumvention of process by key stakeholders, re-emergence of off-the-grid projects and low-value initiatives.

      As a quick and easy way to periodically assess your processes, consider the following questions:

      • Are you confident that all work in progress is being tracked via the project list?
      • Are your resources all currently working on high-value initiatives?
      • Since optimizing, have you been able to deliver (or are you on target to deliver) all that has been approved, with no initiatives in states of suspended animation for long periods of time?
      • Thanks to sufficient portfolio visibility and transparency into your capacity, have you been able to successfully decline requests that did not add value or that did not align with resourcing?

      If you answer “no” to any of these questions after a sufficient post-implementation period (approximately six to nine months, depending on the scope of your optimizing), you may need to tweak certain aspects of your processes or seek to align your optimization with a lower capability level in the short term.

      Small IT department struggles to optimize intake and to communicate new processes to stakeholders

      CASE STUDY

      Industry: Government

      Source: Info-Tech Client

      Challenge

      There is an IT department for a large municipal government. Possessing a relatively low level of PPM maturity, IT is in the process of establishing more formal intake practices in order to better track, and respond to, project requests. New processes include a minimalist request form (sent via email) coupled with more thorough follow-up from BAs and PMs to determine business value, ROI, and timeframes.

      Solution

      Even with new user-friendly processes in place, IT struggles to get stakeholders to adopt, especially with smaller initiatives. These smaller requests frequently continue to come in outside of the formal process and, because of this, are often executed outside of portfolio oversight. Without good, reliable data around where staff time is spent, IT lacks the authority to decline new requests.

      Results

      IT is seeking further optimization through better communication. They are enforcing discipline on stakeholders and reiterating that all initiatives, regardless of size, need to be directed through the process. IT is also training its staff to be more critical. “Don’t just start working on an initiative because a stakeholder asks.” With staff being more critical and directing requests through the proper queues, IT is getting better at tracking and prioritizing requests.

      "The biggest challenge when implementing the intake process was change management. We needed to shift our focus from responding to requests to strategically thinking about how requests should be managed. The intake process allows the IT Department to be transparent to customers and enables decision makers."

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1

      A screenshot of activity 3.1.1 is shown

      Select receptive stakeholders to work with during your pilot

      Identify the right team of supportive PPM stakeholders to carry out the process pilot. Strategies to recruit the right people outside the workshop will be discussed if appropriate.

      3.2.1

      A screenshot of activity 3.2.1 is shown.

      Analyze the stakeholder impact and responses to impending organizational change

      Carry out a thorough analysis of change impact in order to maximize the effectiveness of the communication strategy in support of the implementation of the optimized process.

      Insight breakdown

      Insight 1

      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Insight 2

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity to effectively address the challenges of establishing organizational discipline for project intake.

      Insight 3

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Summary of accomplishment

      Knowledge Gained

      • Triple constraint model of project portfolio: stakeholder needs, strategic objectives, and resource capacity
      • Benefits of optimizing project intake, approval, and prioritization for managing a well-behaved project portfolio
      • Challenges of installing well-run project intake
      • Importance of piloting the process and communicating impacts to stakeholders

      Processes Optimized

      • Project valuation process: scorecard, weights
      • Project intake process: reception, triaging, follow-up
      • Project approval process: steps, accountabilities, deliverables
      • Project prioritization process: estimation of resource capacity for projects, project demand
      • Communication for organizational change

      Deliverables Completed

      • Optimized Project Intake, Approval, and Prioritization Process
      • Documentation of the optimized process in the form of a Standard Operating Procedure
      • Project valuation criteria, developed with Project Value Scorecard Development Tool and implemented through the Project Intake and Prioritization Tool
      • Standardized project request form with right-sized procedural friction
      • Standard for project level classification, implemented through the Project Intake Classification Matrix
      • Toolbox of deliverables for capturing information developed to inform decision makers for approval: Benefits Commitment Form, Technology Assessment Tool, Business Case Templates
      • Process pilot plan
      • Communication plan for organizational change, driven by a thorough analysis of change impacts on key stakeholders using the Intake and Prioritization Impact Analysis Tool

      Research contributors and experts

      Picture of Kiron D. Bondale

      Kiron D. Bondale, PMP, PMI - RMP

      Senior Project Portfolio & Change Management Professional

      A placeholder photo is shown here.

      Scot Ganshert, Portfolio Group Manager

      Larimer County, CO

      Picture of Garrett McDaniel

      Garrett McDaniel, Business Analyst II – Information Technology

      City of Boulder, CO

      A placeholder photo is shown here.

      Joanne Pandya, IT Project Manager

      New York Property Insurance Underwriters

      Picture of Jim Tom.

      Jim Tom, CIO

      Public Health Ontario

      Related Info-Tech research

      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint

      Develop a Project Portfolio Management Strategy blueprint"

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint is shown.

      Grow Your Own PPM Solution

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint is shown.

      Balance Supply and Demand with Realistic Resource Management Practices

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint is shown.

      Maintain an Organized Portfolio

      A screenshot of Info-Tech's Manage a Minimum Viable PMO blueprint is shown.

      Manage a Minimum Viable PMO

      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      Establish the Benefits Realization Process

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint is shown.

      Manage an Agile Portfolio

      A screenshot of Info-Tech's Tailor Project Management Processes to Fit Your Projects blueprint is shown.

      Tailor Project Management Processes to Fit Your Projects

      A screenshot of Info-Tech's Project Portfolio Management Diagnostic Program blueprint is shown.

      Project Portfolio Management Diagnostic Program

      The Project Portfolio Management Diagnostic Program is a low-effort, high-impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment to understand where you stand and how you can improve.

      Bibliography

      Boston Consulting Group. “Executive Sponsor Engagement: Top Driver of Project and Program Success.” PMI, 2014. Web.

      Boston Consulting Group. “Winning Through Project Portfolio Management: the Practitioners’ Perspective.” PMI, 2015. Web.

      Bradberry, Travis. “Why The 8-Hour workday Doesn’t Work.” Forbes, 7 Jun 2016. Web.

      Cook, Scott. Playbook: Best Practices. Business Week

      Cooper, Robert, G. “Effective Gating: Make product innovation more productive by using gates with teeth.” Stage-Gate International and Product Development Institute. March/April 2009. Web.

      Epstein, Dan. “Project Initiation Process: Part Two.” PM World Journal. Vol. IV, Issue III. March 2015. Web.

      Evans, Lisa. “The Exact Amount of Time You Should Work Every Day.” Fast Company, 15 Sep. 2014. Web.

      Madison, Daniel. “The Five Implementation Options to Manage the Risk in a New Process.” BPMInstitute.org. n.d. Web.

      Merkhofer, Lee. “Improve the Prioritization Process.” Priority Systems, n.d. Web.

      Miller, David, and Mike Oliver. “Engaging Stakeholder for Project Success.” PMI, 2015. Web.

      Mind Tools. “Kelley and Conner’s Emotional Cycle of Change.” Mind Tools, n.d. Web.

      Mochal, Jeffrey and Thomas Mochal. Lessons in Project Management. Appress: September 2011. Page 6.

      Newcomer, Eric. “Getting Decisions to Stick.” Standish Group PM2go, 20 Oct 2017. Web.

      “PMI Today.” Newtown Square, PA: PMI, Oct 2017. Web.

      Project Management Institute. “Standard for Portfolio Management, 3rd ed.” Newtown Square, PA: PMI, 2013.

      Project Management Institute. “Pulse of the Profession 2017: Success Rates Rise.” PMI, 2017. Web.

      Transparent Choice. “Criteria for Project Prioritization.” n.p., n.d. Web.

      University of New Hampshire (UNH) Project Management Office. “University of New Hampshire IT Intake and Selection Process Map.” UNH, n.d. Web.

      Ward, John. “Delivering Value from Information Systems and Technology Investments: Learning from Success.” Information Systems Research Centre. August 2006. Web.

      Align Projects With the IT Change Lifecycle

      • Buy Link or Shortcode: {j2store}464|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Coordinate IT change and project management to successfully push changes to production.
      • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
      • Communicate effectively between change management, project management, and the business.

      Our Advice

      Critical Insight

      Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value and slowly add improvements to ease buy-in.

      Impact and Result

      • Establish pre-set touchpoints between IT change management and project management at strategic points in the change and project lifecycles.
      • Include appropriate project representation at the change advisory board (CAB).
      • Leverage standard change resources such as the change calendar and request for change form (RFC).

      Align Projects With the IT Change Lifecycle Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Align Projects With the IT Change Lifecycle Deck – A guide to walk through integrating project touchpoints in the IT change management lifecycle.

      Use this storyboard as a guide to align projects with your IT change management lifecycle.

      • Align Projects With the IT Change Lifecycle Storyboard

      2. The Change Management SOP – This template will ensure that organizations have a comprehensive document in place that can act as a point of reference for the program.

      Use this SOP as a template to document and maintain your change management practice.

      • Change Management Standard Operating Procedure
      [infographic]

      Further reading

      Align Projects With the IT Change Lifecycle

      Increase the success of your changes by integrating project touchpoints in the change lifecycle.

      Analyst Perspective

      Focus on frequent and transparent communications between the project team and change management.

      Benedict Chang

      Misalignment between IT change management and project management leads to headaches for both practices. Project managers should aim to be represented in the change advisory board (CAB) to ensure their projects are prioritized and scheduled appropriately. Advanced notice on project progress allows for fewer last-minute accommodations at implementation. Widespread access of the change calendar can also lead project management to effectively schedule projects to give change management advanced notice.

      Moreover, alignment between the two practices at intake allows for requests to be properly sorted, whether they enter change management directly or are governed as a project.

      Lastly, standardizing implementation and post-implementation across everyone involved ensures more successful changes and socialized/documented lessons learned for when implementations do not go well.

      Benedict Chang
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      To align projects with the change lifecycle, IT leaders must:

      • Coordinate IT change and project management to successfully push changes to production.
      • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
      • Communicate effectively between change management, project management, and the business.

      Loose definitions may work for clear-cut examples of changes and projects at intake, but grey-area requests end up falling through the cracks.

      Changes to project scope, when not communicated, often leads to scheduling conflicts at go-live.

      Too few checkpoints between change and project management can lead to conflicts. Too many checkpoints can lead to delays.

      Set up touchpoints between IT change management and project management at strategic points in the change and project lifecycles.

      Include appropriate project representation at the change advisory board (CAB).

      Leverage standard change resources such as the change calendar and request for change form (RFC).

      Info-Tech Insight

      Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value, and slowly add improvements to ease buy-in.

      Info-Tech’s approach

      Use the change lifecycle to identify touchpoints.

      The image contains a screenshot of Info-Tech's approach.

      The Info-Tech difference:

      1. Start with your change lifecycle to define how change control can align with project management.
      2. Make improvements to project-change alignment to benefit the relationship between the two practices and the practices individually.
      3. Scope the alignment to your organization. Take on the improvements to the left one by one instead of overhauling your current process.

      Use this research to improve your current process

      This deck is intended to align established processes. If you are just starting to build IT change processes, see the related research below.

      Align Projects With the IT Change Lifecycle

      02 Optimize IT Project Intake, Approval, and Prioritization

      01 Optimize IT Change Management

      Increase the success of your changes by integrating project touchpoints in your change lifecycle.

      (You are here)

      Decide which IT projects to approve and when to start them.

      Right-size IT change management to protect the live environment.

      Successful change management will provide benefits to both the business and IT

      Respond to business requests faster while reducing the number of change-related disruptions.

      IT Benefits

      Business Benefits

      • Fewer incidents and outages at project go-live
      • Upfront identification of project and change requirements
      • Higher rate of change and project success
      • Less rework
      • Fewer service desk calls related to failed go-lives
      • Fewer service disruptions
      • Faster response to requests for new and enhanced functionalities
      • Higher rate of benefits realization when changes are implemented
      • Lower cost per change
      • Fewer “surprise” changes disrupting productivity

      IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.

      Change management improves core benefits to the business: the four Cs

      Most organizations have at least some form of change control in place, but formalizing change management leads to the four Cs of business benefits:

      Control

      Collaboration

      Consistency

      Confidence

      Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment.

      Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The CAB brings a more formalized and centralized communication method for IT.

      Request-for-change templates and a structured process result in implementation, test, and backout plans being more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently.

      Change management processes will give your organization more confidence through more accurate planning, improved execution of changes, less failure, and more control over the IT environment. This also leads to greater protection against audits.

      1. Alignment at intake

      Define what is a change and what is a project.

      Both changes and projects will end up in change control in the end. Here, we define the intake.

      Changes and projects will both go to change control when ready to go live. However, defining the governance needed at intake is critical.

      A change should be governed by change control from beginning to end. It would typically be less than a week’s worth of work for a SME to build and come in at a nominal cost (e.g. <$20k over operating costs).

      Projects on the other hand, will be governed by project management in terms of scope, scheduling, resourcing, etc. Projects typically take over a week and/or cost more. However, the project, when ready to go live, should still be scheduled through change control to avoid any conflicts at implementation. At triage and intake, a project can be further scoped based on projected scale.

      This initial touchpoint between change control and project management is crucial to ensure tasks and request are executed with the proper governance. To distinguish between changes and projects at intake, list examples of each and determine what resourcing separates changes from projects.

      Need help scoping projects? Download the Project Intake Classification Matrix

      Change

      Project

      • Smaller scale task that typically takes a short time to build and test
      • Generates a single change request
      • Governed by IT Change Management for the entire lifecycle
      • Larger in scope
      • May generate multiple change requests
      • Governed by PMO
      • Longer to build and test

      Info-Tech Insight

      While effort and cost are good indicators of changes and projects, consider evaluating risk and complexity too.

      1 Define what constitutes a change

      1. As a group, brainstorm examples of changes and projects. If you wish, you may choose to also separate out additional request types such as service requests (user), operational tasks (backend), and releases.
      2. Have each participant write the examples on sticky notes and populate the following chart on the whiteboard/flip chart.
      3. Use the examples to draw lines and determine what defines each category.
      • What makes a change distinct from a project?
      • What makes a change distinct from a service request?
      • What makes a change distinct from an operational task?
      • When do the category workflows cross over with other categories? (For example, when does a project interact with change management?
    • Record the definitions of requests and results in section 2.3 of the Change Management Standard Operating Procedure (SOP).
    • Change

      Project

      Service Request (Optional)

      Operational Task (Optional)

      Release (Optional)

      Changing Configuration

      New ERP

      Add new user

      Delete temp files

      Software release

      Download the Change Management Standard Operating Procedure (SOP).

      Input Output
      • List of examples of each category of the chart
      • Definitions for each category to be used at change intake
      Materials Participants
      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers/pens
      • Change Management SOP
      • Change Manager
      • Project Managers
      • Members of the Change Advisory Board

      2. Alignment at build and test

      Keep communications open by pre-defining and communicating project milestones.

      CAB touchpoints

      Consistently communicate the plan and timeline for hitting these milestones so CAB can prioritize and plan changes around it. This will give change control advanced notice of altered timelines.

      RFCs

      Projects may have multiple associated RFCs. Keeping CAB appraised of the project RFC or RFCs gives them the ability to further plan changes.

      Change Calendar

      Query and fill the change calendar with project timelines and milestones to compliment the CAB touchpoints.

      Leverage the RFC to record and communicate project details

      The request for change (RFC) form does not have to be a burden to fill out. If designed with value in mind, it can be leveraged to set standards on all changes (from projects and otherwise).

      When looking at the RFC during the Build and Test phase of a project, prioritize the following fields to ensure the implementation will be successful from a technical and user-adoption point of view.

      Filling these fields of the RFC and communicating them to the CAB at go-live approval gives the approvers confidence that the project will be implemented successfully and measures are known for when that implementation is not successful.

      Download the Request for Change Form Template

      Communication Plan

      The project may be successful from a technical point of view, but if users do not know about go-live or how to interact with the project, it will ultimately fail.

      Training Plan

      If necessary, think of how to train different stakeholders on the project go-live. This includes training for end users interacting with the project and technicians supporting the project.

      Implementation Plan

      Write the implementation plan at a high enough level that gives the CAB confidence that the implementation team knows the steps well.

      Rollback Plan

      Having a well-formulated rollback plan gives the CAB the confidence that the impact of the project is well known and the impact to the business is limited even if the implementation does not go well.

      Provide clear definitions of what goes on the change calendar and who’s responsible

      Inputs

      • Freeze periods for individual business departments/applications (e.g. finance month-end periods, HR payroll cycle, etc. – all to be investigated)
      • Maintenance windows and planned outage periods
      • Project schedules, and upcoming major/medium changes
      • Holidays
      • Business hours (some departments work 9-5, others work different hours or in different time zones, and user acceptance testing may require business users to be available)

      Guidelines

      • Business-defined freeze periods are the top priority.
      • No major or medium normal changes should occur during the week between Christmas and New Year’s Day.
      • Vendor SLA support hours are the preferred time for implementing changes.
      • The vacation calendar for IT will be considered for major changes.
      • Change priority: High > Medium > Low.
      • Minor changes and preapproved changes have the same priority and will be decided on a case-by-case basis.

      Roles

      • The Change Manager will be responsible for creating and maintaining a change calendar.
      • Only the Change Manager can physically alter the calendar by adding a new change after the CAB has agreed upon a deployment date.
      • All other CAB members, IT support staff, and other impacted stakeholders should have access to the calendar on a read-only basis to prevent people from making unauthorized changes to deployment dates.

      Info-Tech Insight

      Make the calendar visible to as many parties as necessary. However, limit the number of personnel who can make active changes to the calendar to limit calendar conflicts.

      3. Alignment at approval

      How can project management effectively contribute to CAB?

      As optional CAB members

      Project SMEs may attend when projects are ready to go live and when invited by the change manager. Optional members provide details on change cross-dependencies, high-level testing, rollback, communication plans, etc. to inform prioritization and scheduling decisions.

      As project management representatives

      Project management should also attend CAB meetings to report in on changes to ongoing projects, implementation timelines, and project milestones. Projects are typically high-priority changes when going live due to their impact. Advanced notice of timeline and milestone changes allow the rest of the CAB to properly manage other changes going into production.

      As core CAB members

      The core responsibilities of CAB must still be fulfilled:

      1. Protect the live environment from poorly assessed, tested, and implemented changes.

      2. Prioritize changes in a way that fairly reflects change impact, urgency, and likelihood.

      3. Schedule deployments in a way the minimizes conflict and disruption.

      If you need to define the authority and responsibilities of the CAB, see Activity 2.1.3 of the Optimize IT Change Management blueprint.

      4. Alignment at implementation

      At this stage, the project or project phase is treated as any other change.

      Verification

      Once the change has been implemented, verify that all requirements are fulfilled.

      Review

      Ensure all affected systems and applications are operating as predicted.

      Update change ticket and change log

      Update RFC status and CMDB as well (if necessary).

      Transition

      Once the change implementation is complete, it’s imperative that the team involved inform and train the operational and support groups.

      If you need to define transitioning changes to production, download Transition Projects to the Service Desk

      5. Alignment at post-implementation

      Tackle the most neglected portion of change management to avoid making the same mistake twice.

      1. Define RFC statuses that need a PIR
      2. Conduct PIRs for failed changes. Successful changes can simply be noted and transitioned to operations.

      3. Conduct a PIR for every failed change
      4. It’s best to perform a PIR once a change-related incident is resolved.

      5. Avoid making the same mistake twice
      6. Include a root-cause analysis, mitigation actions/timeline, and lessons learned in the documentation.

      7. Report to CAB
      8. Socialize the findings of the PIR at the subsequent CAB meeting.

      9. Circle back on previous PIRs
      10. If a similar change is conducted, append the related PIR to avoid the same mistakes.

      Info-Tech Insight

      Include your PIR documentation right in the RFC for easy reference.

      Download the RFC template for more details on post-implementation reviews

      2 Implement your alignments stepwise

      1. As a group, decide on which implementations you need to make to align change management and project management.
      2. For each improvement, list a timeline for implementation.
      3. Update section 3.5 in the Change Management Standard Operating Procedure (SOP). to outline the responsibilities of project management within IT Change Management.

      The image contains a screenshot of the Change Management SOP

      Download the Change Management Standard Operating Procedure (SOP).

      Input Output
      • This deck
      • SOP update
      Materials Participants
      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers/pens
      • Change Management SOP
      • Change Manager
      • Project Managers
      • Members of the Change Advisory Board

      Related Info-Tech Research

      Optimize IT Change Management

      Right-size IT change management to protect the live environment.

      Optimize IT Project Intake, Approval, and Prioritization

      Decide which IT projects to approve and when to start them.

      Maintain an Organized Portfolio

      Align portfolio management practices with COBIT (APO05: Manage Portfolio).

      Considerations to Optimize Container Management

      • Buy Link or Shortcode: {j2store}499|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Center & Facilities Strategy
      • Parent Category Link: /data-center-and-facilities-strategy

      Do you experience challenges with the following:

      • Equipping IT operations processes to manage containers.
      • Choosing the right container technology.
      • Optimizing your infrastructure strategy for containers.

      Our Advice

      Critical Insight

      • Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.
      • When selecting tools from multiple sources, it is important to understand what each tool should and should not meet. This holistic approach is necessary to avoid gaps and duplication of effort.

      Impact and Result

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain, uses your current infrastructure, and reduces costs for compute and image scan time.

      Considerations to Optimize Container Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations to Optimize Container Management Deck – A document to guide you design your container strategy.

      A document that walks you through the components of a container management solution and helps align your business objectives with your current infrastructure services and plan for your future assets.

      • Considerations to Optimize Container Management Storyboard

      2. Container Reference Architecture – A best-of-breed template to help you build a clear, concise, and compelling strategy document for container management.

      Complete the reference architecture tool to strategize your container management.

      • Container Reference Architecture
      [infographic]

      Further reading

      Considerations to Optimize Container Management

      Design a custom reference architecture that meets your requirements.

      Analyst Perspective

      Containers have become popular as enterprises use DevOps to develop and deploy applications faster. Containers require managed services because the sheer number of containers can become too complex for IT teams to handle. Orchestration platforms like Kubernetes can be complex, requiring management to automatically deploy container-based applications to operating systems and public clouds. IT operations staff need container management skills and training.

      Installing and setting up container orchestration tools can be laborious and error-prone. IT organizations must first implement the right infrastructure setup for containers by having a solid understanding of the scope and scale of containerization projects and developer requirements. IT administrators also need to know how parts of the existing infrastructure connect and communicate to maintain these relationships in a containerized environment. Containers can run on bare metal servers, virtual machines in the cloud, or hybrid configurations, depending on your IT needs

      Nitin Mukesh, Senior Research Analyst, Infrastructure and Operations

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      The container software market is constantly evolving. Organizations must consider many factors to choose the right container management software for their specific needs and fit their future plans.

      It's important to consider your organization's current and future infrastructure strategy and how it fits with your container management strategy. The container management platform you choose should be compatible with the existing network infrastructure and storage capabilities available to your organization.

      IT operations staff have not been thinking the same way as developers who have now been using an agile approach for some time. Container image builds are highly automated and have several dependencies including scheduling, testing, and deployment that the IT staff is not trained for or lack the ability to create anything more than a simple image.

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain and reduces costs for compute and image scan time.

      Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.

      Your challenge

      Choosing the right container technology: IT is a rapidly changing and evolving market, with startups and seasoned technology vendors maintaining momentum in everything from container platforms to repositories to orchestration tools. The rapid evolution of container platform components such as orchestration, storage, networking, and system services such as load balancing has made the entire stack a moving target.

      However, waiting for the industry to be standardized can be a recipe for paralysis, and waiting too long to decide on solutions and approaches can put a company's IT operations in catch-up mode.

      Keeping containers secure: Security breaches in containers are almost identical to operating system level breaches in virtual machines in terms of potential application and system vulnerabilities. It is important for any DevOps team working on container and orchestration architecture and management to fully understand the potential vulnerabilities of the platforms they are using.

      Optimize your infrastructure strategy for containers: One of the challenges enterprise IT operations management teams face when it comes to containers is the need to rethink the underlying infrastructure to accommodate the technology. While you may not want to embrace the public cloud for your critical applications just yet, IT operations managers will need an on-premises infrastructure so that applications can scale up and down the same way as they are containerized.

      Common ways organizations use containers

      A Separation of responsibilities
      Containerization provides a clear separation of responsibilities as developers can focus on application logic and dependencies, while IT operations teams can focus on deployment and management instead of application details such as specific software versions and configurations.

      B Workload portability
      Containers can run almost anywhere: physical servers or on-premise data centers on virtual machines or developer machines, as well as public clouds on Linux, Windows, or Mac operating systems, greatly easing development and deployment.

      “Lift and shift” existing applications into a modern cloud architecture. Some organizations even use containers to migrate existing applications to more modern environments. While this approach provides some of the basic benefits of operating system virtualization, it does not provide all the benefits of a modular, container-based application architecture.

      C Application isolation
      Containers virtualize CPU, memory, storage, and network resources at the operating system level, providing developers with a logically isolated view of the operating system from other applications.

      Source: TechTarget, 2021

      What are containers and why should I containerize?

      A container is a partially isolated environment in which an application or parts of an application can run. You can use a single container to run anything from small microservices or software processes to larger applications. Inside the container are all the necessary executable, library, and configuration files. Containers do not contain operating system images. This makes them lighter and more portable with much less overhead. Large application deployments can deploy multiple containers into one or more container clusters (CapitalOne, 2020).

      Containers have the following advantages:

      • Reduce overhead costs: Because containers do not contain operating system images, they require fewer system resources than traditional or hardware virtual machine environments.
      • Enhanced portability: Applications running in containers can be easily deployed on a variety of operating systems and hardware platforms.
      • More consistent operations: DevOps teams know that applications in containers run the same no matter where they are deployed.
      • Efficiency improvement: Containers allow you to deploy, patch, or scale applications faster.
      • Develop better applications: Containers support Agile and DevOps efforts to accelerate development and production cycles.

      Source: CapitalOne, 2020

      Container on the cloud or on-premise?

      On-premises containers Public cloud-based containers

      Advantages:

      • Full control over your container environment.
      • Increased flexibility in networking and storage configurations.
      • Use any version of your chosen tool or container platform.
      • No need to worry about potential compliance issues with data stored in containers.
      • Full control over the host operating system and environment.

      Disadvantages:

      • Lack of easy scalability. This can be especially problematic if you're using containers because you want to be more agile from a DevOps perspective.
      • No turnkey container deployment solution. You must set up and maintain every component of the container stack yourself.

      Advantages:

      • Easy setup and management through platforms such as Amazon Elastic Container Service or Azure Container Service. These products require significant Docker expertise to use but require less installation and configuration than on-premise installations.
      • Integrates with other cloud-based tools for tasks such as monitoring.
      • Running containers in the cloud improves scalability by allowing you to add compute and storage resources as needed.

      Disadvantages:

      • You should almost certainly run containers on virtual machines. That can be a good thing for many people; however, you miss out on some of the potential benefits of running containers on bare metal servers, which can be easily done.
      • You lose control. To build a container stack, you must use the orchestrator provided by your cloud host or underlying operating system.

      Info-Tech Insight
      Start-ups and small businesses that don't typically need to be closely connected to hardware can easily move (or start) to the cloud. Large (e.g. enterprise-class) companies and companies that need to manage and control local hardware resources are more likely to prefer an on-premises infrastructure. For enterprises, on-premises container deployments can serve as a bridge to full public cloud deployments or hybrid private/public deployments. The answer to the question of public cloud versus on premises depends on the specific needs of your business.

      Container management

      From container labeling that identifies workloads and ownership to effective reporting that meets the needs of different stakeholders across the organization, it is important that organizations establish an effective framework for container management.

      Four key considerations for your container management strategy:

      01 Container Image Supply Chain
      How containers are built

      02 Container Infrastructure and Orchestration
      Where and how containers run together

      03 Container Runtime Security and Policy Enforcement
      How to make sure your containers only do what you want them to do

      04 Container Observability
      Runtime metrics and debugging

      To effectively understand container management solutions, it is useful to define the various components that make up a container management strategy.

      1: Container image supply chain

      To run a workload as a container, it must first be packaged into a container image. The image supply chain includes all libraries or components that make up a containerized application. This includes CI/CD tools to test and package code into container images, application security testing tools to check for vulnerabilities and logic errors, registries and mirroring tools for hosting container images, and attribution mechanisms such as image signatures for validating images in registries.

      Important functions of the supply chain include the ability to:

      • Scan container images in registries for security issues and policy compliance.
      • Verify in-use image hashes have been scanned and authorized.
      • Mirror images from public registries to isolate yourself from outages in these services.
      • Attributing images to the team that created them.

      Source: Rancher, 2022

      Info-Tech Insight
      It is important to consider disaster recovery for your image registry. As mentioned above, it is wise to isolate yourself from registry disruptions. However, external registry mirroring is only one part of the equation. You also want to make sure you have a high availability plan for your internal registry as well as proper backup and recovery processes. A highly available, fault-tolerant container management platform is not just a runtime environment.

      2: Container infrastructure and orchestration

      Orchestration tools

      Once you have a container image to run, you need a location to run it. That means both the computer the container runs on and the software that schedules it to run. If you're working with a few containers, you can make manual decisions about where to run container images, what to run with container images, and how best to manage storage and network connectivity. However, at scale, these kinds of decisions should be left to orchestration tools like Kubernetes, Swarm, or Mesos. These platforms can receive workload execution requests, determine where to run based on resource requirements and constraints, and then actually launch that workload on its target. And if a workload fails or resources are low, it can be restarted or moved as needed.

      Source: DevOpsCube, 2022

      Storage

      Storage is another important consideration. This includes both the storage used by the operating system and the storage used by the container itself. First, you need to consider the type of storage you actually need. Can I outsource my storage concerns to a cloud provider using something like Amazon Relational Database Service instead? If not, do you really need block storage (e.g. disk) or can an external object store like AWS S3 meet your needs? If your external object storage service can meet your performance and durability requirements as well as your governance and compliance needs, you're in luck. You may not have to worry about managing the container's persistent storage. Many external storage services can be provisioned on demand, support discrete snapshots, and some even allow dynamic scaling on demand.

      Networking

      Network connectivity inside and outside the containerized environment is also very important. For example, Kubernetes supports a variety of container networking interfaces (CNIs), each providing different functionality. Questions to consider here are whether you can set traffic control policies (and the OSI layer), how to handle encryption between workloads and between workloads and external entities, and how to manage traffic import for containerized workloads. The impact of these decisions also plays a role on performance.

      Backups

      Backups are still an important task in containerized environments, but the backup target is changing slightly. An immutable, read-only container file system can be recreated very easily from the original container image and does not need to be backed up. Backups or snapshots on permanent storage should still be considered. If you are using a cloud provider, you should also consider fault domain and geo-recovery scenarios depending on the provider's capabilities. For example, if you're using AWS, you can use S3 replication to ensure that EBS snapshots can be restored in another region in case of a full region outage.

      3: Container runtime security and policy enforcement

      Ensuring that containers run in a place that meets the resource requirements and constraints set for them is necessary, but not sufficient. It is equally important that your container management solution performs continuous validation and ensures that your workloads comply with all security and other policy requirements of your organization. Runtime security and policy enforcement tools include a function for detecting vulnerabilities in running containers, handling detected vulnerabilities, ensuring that workloads are not running with unnecessary or unintended privileges, and ensuring that only other workloads that need to be allowed can connect.

      One of the great benefits of (well implemented) containerized software is reducing the attackable surface of the application. But it doesn't completely remove it. This means you need to think about how to observe running applications to minimize security risks. Scanning as part of the build pipeline is not enough. This is because an image without vulnerabilities at build time can become a vulnerable container because new flaws are discovered in its code or support libraries. Instead, some modern tools focus on detecting unusual behavior at the system call level. As these types of tools mature, they can make a real difference to your workload’s security because they rely on actual observed behavior rather than up-to-date signature files.

      4: Container observability

      What’s going on in there?

      Finally, if your container images are being run somewhere by orchestration tools and well managed by security and policy enforcement tools, you need to know what your containers are doing and how well they are doing it. Orchestration tools will likely have their own logs and metrics, as will networking layers, and security and compliance checking tools; there is a lot to understand in a containerized environment. Container observability covers logging and metrics collection for both your workloads and the tools that run them.

      One very important element of observability is the importance of externalizing logs and metrics in a containerized environment. Containers come and go, and in many cases the nodes running on them also come and go, so relying on local storage is not recommended.

      The importance of a container management strategy

      A container management platform typically consists of a variety of tools from multiple sources. Some container management software vendors or container management services attempt to address all four key components of effective container management. However, many organizations already have tools that provide at least some of the features they need and don't want to waste existing licenses or make significant changes to their entire infrastructure just to run containers.

      When choosing tools from multiple sources, it's important to understand what needs each tool meets and what it doesn't. This holistic approach is necessary to avoid gaps and duplication of effort.

      For example, scanning an image as part of the build pipeline and then rescanning the image while the container is running is a waste of CPU cycles in the runtime environment. Similarly, using orchestration tools and separate host-based agents to aggregate logs or metrics can waste CPU cycles as well as storage and network resources.

      Planning a container management strategy

      1 DIY, Managed Services, or Packaged Products
      Developer satisfaction is important, but it's also wise to consider the team running the container management software. Migrating from bare metal or virtual machine-based deployment methodologies to containers can involve a significant learning curve, so it's a good idea to choose a tool that will help smooth this curve.
      2 Kubernetes
      In the world of container management, Kubernetes is fast becoming the de facto standard for container orchestration and scheduling. Most of the products that address the other aspects of container management discussed in this post (image supply chain, runtime security and policy enforcement, observability) integrate easily with Kubernetes. Kubernetes is open-source software and using it is possible if your team has the technical skills and the desire to implement it themselves. However, that doesn't mean you should automatically opt to build yourself.
      3 Managed Kubernetes
      Kubernetes is difficult to implement well. As a result, many solution providers offer packaged products or managed services to facilitate Kubernetes adoption. All major cloud providers now offer Kubernetes services that reduce the operational burden on your teams. Organizations that have invested heavily in the ecosystem of a particular cloud provider may find this route suitable. Other organizations may be able to find a fully managed service that provides container images and lets the service provider worry about running the images which, depending on the cost and capacity of the organization, may be the best option.
      4 Third-Party Orchestration Products
      A third approach is packaged products from providers that can be installed on the infrastructure (cloud or otherwise). These products can offer several potential advantages over DIY or cloud provider offerings, such as access to additional configuration options or cluster components, enhanced functionality, implementation assistance and training, post-installation product support, and reduced risk of cloud provider lock-in.

      Source: Kubernetes, 2022; Rancher, 2022

      Infrastructure considerations

      It's important to describe your organization’s current and future infrastructure strategy and how it fits into your container management strategy. It’s all basic for now, but if you plan to move to a virtual machine or cloud provider next year, your container management solution should be able to adapt to your environment now and in the future. Similarly, if you’ve already chosen a public cloud, you may want to make sure that the tool you choose supports some of the cloud options, but full compatibility may not be an important feature.

      Infrastructure considerations extend beyond computing. Choosing a container management platform should be compatible with the existing network infrastructure and storage capacity available to your organization. If you have existing policy enforcement, monitoring, and alerting tools, the ideal solution should be able to take advantage of them. Moving to containers can be a game changer for developers and operations teams, so continuing to use existing tools to reduce complexity where possible can save time and money.

      Leverage the reference architecture to guide your container management strategy

      Questions for support transition

      Using the examples as a guide, complete the tool to strategize your container management

      Download the Reference Architecture

      Bibliography

      Mell, Emily. “What is container management and why is it important?” TechTarget, April 2021.
      https://www.techtarget.com/searchitoperations/definition/container-management-software#:~:text=A%20container%20management%20ecosystem%20automates,operator%20to%20keep%20up%20with

      Conrad, John. “What is Container Orchestration?” CapitalOne, 24 August 2020.
      https://www.capitalone.com/tech/cloud/what-is-container-orchestration/?v=1673357442624

      Kubernetes. “Cluster Networking.” Kubernetes, 2022.
      https://kubernetes.io/docs/concepts/cluster-administration/networking/

      Rancher. “Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave.” Rancher, 2022.
      https://www.suse.com/c/rancher_blog/comparing-kubernetes-cni-providers-flannel-calico-canal-and-weave/

      Wilson, Bob. “16 Best Container Orchestration Tools and Services.” DevopsCube, 5 January 2022.
      https://devopscube.com/docker-container-clustering-tools/

      Lead Staff through Change

      • Buy Link or Shortcode: {j2store}510|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: High Impact Leadership
      • Parent Category Link: /lead
      • Sixty to ninety percent of change initiatives fail, costing organizations dollars off the bottom line and lost productivity.
      • Seventy percent of change initiatives fail because of people-related issues, which place a major burden on managers to drive change initiatives successfully.
      • Managers are often too busy focusing on the process elements of change; as a result, they neglect major opportunities to leverage and mitigate staff behaviors that affect the entire team.

      Our Advice

      Critical Insight

      • Change is costly, but failed change is extremely costly. Managing change right the first time is worth the time and effort.
      • Staff pose the biggest opportunity and risk when implementing a change – managers must focus on their teams in order to maintain positive change momentum.
      • Large and small changes require the same change process to be followed but at different scales.
      • The size of a change must be measured according to the level of impact the change will have on staff, not how executives and managers perceive the change.
      • To effectively lead their staff through change, managers must anticipate staff reaction to change, develop a communication plan, introduce the change well, help their staff let go of old behaviors while learning new ones, and motivate their staff to adopt the change.

      Impact and Result

      • Anticipate and respond to staff questions about the change in order to keep messages consistent, organized, and clear.
      • Manage staff based on their specific concerns and change personas to get the best out of your team during the transition through change.
      • Maintain a feedback loop between staff, executives, and other departments in order to maintain the change momentum and reduce angst throughout the process.

      Lead Staff through Change Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Learn how to manage people throughout the change process

      Set up a successful change adoption.

      • Storyboard: Lead Staff through Change

      2. Learn the intricacies of the change personas

      Correctly identify which persona most closely resembles individual staff members.

      • None

      3. Assess the impact of change on staff

      Ensure enough time and effort is allocated in advance to people change management.

      • Change Impact Assessment Tool

      4. Organize change communications messages for a small change

      Ensure consistency and clarity in change messages to staff.

      • Basic Business Change Communication Worksheet

      5. Organize change communications messages for a large change

      Ensure consistency and clarity in change messages to staff.

      • Advanced Business Change Description Form

      6. Evaluate leadership of the change process with the team

      Improve people change management for future change initiatives.

      • Change Debrief Questionnaire
      [infographic]

      Select a Sourcing Partner for Your Development Team

      • Buy Link or Shortcode: {j2store}508|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Application Development
      • Parent Category Link: /application-development
      • You have identified that a change to your sourcing strategy is required, based on market and company factors.
      • You are ready to select a new sourcing partner to drive innovation, time to market, increased quality, and improved financial performance.
      • Taking on a new partner is a significant investment and risk, and you must get it right the first time.
      • You need to make a change now to prevent losing clients and falling further behind your performance targets and your market.

      Our Advice

      Critical Insight

      Selecting a sourcing partner is a function of matching complex factors to your own firm. It is not a simple RFP exercise; it requires significant introspection, proactive planning, and in-depth investigation of potential partners to choose the right fit.

      Impact and Result

      Choosing the right sourcing partner is a four-step process:

      1. Assess your companies' skills and processes in the key areas of risk to sourcing initiatives.
      2. Based on the current situation, define a profile for the matching sourcing partner.
      3. Seek matching partners from the market, either in terms of vendor partners or in terms of sourcing locations.
      4. Based on the choice of partner, build a plan to implement the partnership, define metrics to measure success, and a process to monitor.

      Select a Sourcing Partner for Your Development Team Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Select a Sourcing Partner for Your Development Team Storyboard – Use this presentation to select a partner to best fit your sourcing needs and deliver long-term value.

      This project helps select a partner for sourcing of your development team so that you can realize the benefits from changing your sourcing strategy.

      • Select a Sourcing Partner for Your Development Team Storyboard

      2. Select a Sourcing Partner for Your Development Team Presentation Template – Use this template to build a presentation to detail your decision on a sourcing partner for your development team.

      This presentation template is designed to capture the results from the exercises within the storyboard and allow users to build a presentation to leadership showing how selection was done.

      • Select a Sourcing Partner for Your Development Team Presentation Template

      3. Select a Sourcing Partner for Your Development Team Presentation Example – Use this as a completed example of the template.

      This presentation template portrays what the completed template looks like by showing sample data in all tables. It allows members to see how each exercise leads to the final selection of a partner.

      • Select a Sourcing Partner for Your Development Team Example Template
      [infographic]

      Further reading

      Select a Sourcing Partner for Your Application Development Team

      Choose the right partner to enable your firm to maximize the value realized from your sourcing strategy.

      Analyst Perspective

      Selecting the right partner for your sourcing needs is no longer a cost-based exercise. Driving long-term value comes from selecting the partner who best matches your firm on a wide swath of factors and fits your needs like a glove.

      Sourcing in the past dealt with a different kind of conversation involving two key questions:

      Where will the work be done?

      How much will it cost?

      How people think about sourcing has changed significantly. People are focused on gaining a partner, and not just a vendor to execute a single transaction. They will add skills your team lacks, and an ability to adapt to your changing needs, all while ensuring you operate within any constraints based on your business.

      Selecting a sourcing partner is a matching exercise that requires you to look deep into yourself, understand key factors about your firm, and then seek the partner who best meets your profile.

      The image contains a picture of Dr. Suneel Ghei.

      Dr. Suneel Ghei
      Principal Research Director, Application Development
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • You have identified that a change to your sourcing strategy is required based on market and company factors.
      • You are ready to select a new sourcing partner to drive innovation, time to market, increased quality, and improve financial performance.
      • Taking on a new partner is a significant investment and risk, and you must get it right the first time.
      • You need to make a change now to avoid falling further behind your performance targets and your market, and losing clients.

      Almost half of all sourcing initiatives do not realize the projected savings, and the biggest reason is the choice of partner.

      The market for Application Development partners has become more diverse, increasing choice and the risk of making a costly mistake by choosing the wrong partner.

      Firms struggle with how best to support the sourcing partner and allocate resources with the right skills to maximize success, increasing the cost and time to implement, and limiting benefits.

      Making the wrong choice means inferior products, and higher costs and losing both clients and reputation.

      • Choosing the right sourcing partner is a four-step process:
      1. Assess your company's skills and processes in the key areas of risk to sourcing initiatives.
      2. Based on the current situation, define a profile for the matching sourcing partner.
      3. Seek matching partners from the market, either in terms of vendor partners or in terms of sourcing locations.
      4. Based on your choice of partner, build a plan to implement the partnership, and define metrics to measure success and a process to monitor.

      Info-Tech Insight

      Successfully selecting a sourcing partner is not a simple RFP exercise to choose the lowest cost. It is a complex process of introspection, detailed examination of partners and locations, and matching the fit. It requires you to seek a partner that is the Yin to your Yang, and failure is not an option.

      You need a new source for development resources

      You are facing immediate challenges that require a new approach to development resourcing.

      • Your firm is under fire; you are facing pressures financially from clients and your competitors.
      • Your pace of innovation and talent sourcing is too slow and too limiting.
      • Your competition is moving faster and your clients are considering their options.
      • Revenues and costs of development are trending in the wrong direction.
      • You need to act now to avoid spiraling further.

      Given how critical our applications are to the business and our clients, there is no room for error in choosing our partner.

      A study of 121 firms outsourcing various processes found that 50% of those surveyed saw no gains from the outsourcing arrangement, so it is critical to make the right choice the first time.

      Source: Zhang et al

      Big challenges await you on the journey

      The road to improving sourcing has many potholes.

      • In a study of 121 firms who moved development offshore, almost 50% of all outsourcing and offshoring initiatives do not achieve the desired results.
      • In another study focused on large corporations, it was shown that 70% of respondents saw negative outcomes from offshoring development.
      • Globalization of IT Services and the ability to work from anywhere have contributed to a significant increase in the number of development firms to choose from.
      • Choosing and implementing a new partner is costly, and the cost of choosing the wrong partner and then trying to correct your course is significant in dollars and reputation:
        • Costs to find a new partner and transition
        • Lost revenue due to product issues
        • Loss of brand and reputation due to poor choice
      • The wrong choice can also cost you in terms of your own resources, increasing the risk of losing more knowledge and skills.

      A survey of 25 large corporate firms that outsourced development offshore found that 70% of them had negative outcomes.

      (Source: University of Oregon Applied Information Management, 2019)

      Info-Tech’s approach

      Selecting the right partner is a matching exercise.

      Selecting the right partner is a complex exercise with many factors

      1. Look inward. Assess your culture, your skills, and your needs.
      • Market
      • People
      • Culture
      • Technical aspects
    • Create a profile for the perfect partner to fit your firm.
      • Sourcing Strategy
      • Priorities
      • Profile
    • Find the partner that best fits your needs
      • Define RFx
      • Target Partners
      • Evaluate
    • Implement the partner and put in metrics and process to manage.
      • Contract Partner
      • Develop Goals
      • Create Process and Metrics

      The Info-Tech difference:

      1. Assess your own organization’s characteristics and capabilities in four key areas.
      2. Based on these characteristics and the sourcing strategy you are seeking to implement, build a profile for your perfect partner.
      3. Define an RFx and assessment matrix to survey the market and select the best partner.
      4. Implement the partner with process and controls to manage the relationship, built collaboratively and in place day 1.

      Insight summary

      Overarching insight

      Successfully selecting a sourcing partner is not a simple RFP exercise to choose the lowest cost. It is a complex process of introspection, detailed examination of partners and locations, and matching the fit. It requires you to seek a partner that is the Yin to your Yang, and failure is not an option.

      Phase 1 insight

      Fitting each of these pieces to the right partner is key to building a long-term relationship of value.

      Selecting a partner requires you to look at your firm in depth from a business, technical, and organizational culture perspective.

      Phase 2 insight

      The factors we have defined serve to build us a profile for the ideal partner to engage in sourcing our development team. This profile will lead us to be able to define our RFP / RFI and assess respondents.

      Phase 3/4 insight

      Implement the relationship the same way you want it to work, as one team. Work together on contract mechanism, shared goals, metrics, and performance measurement. By making this transparent you hasten the development of a joint team, which will lead to long-term success.

      Tactical insight

      Ensure you assess not just where you are but where you are going, in choosing a partner. For example, you must consider future markets you might enter when choosing the right sourcing, or outsourcing location to maintain compliance.

      Tactical insight

      Sourcing is not a replacement for your full team. Skills must be maintained in house as well, so the partner must be willing to work with the in-house team to share knowledge and collaborate on deliverables.

      Addressing the myth – Single country offshoring or outsourcing

      Research shows that a multi-country approach has a higher chance of success.

      • Research shows that firms trying their own captive development centers fail 20% of the time. ( Journal of Information Technology, 2008)
      • Further, the overall cost of ownership for an offshore center has shown to be significantly higher than the cost of outsourcing, as the offshore center requires more internal management and leadership.
      • Research shows that offshoring requires the offshore location to also house business team members to allow key relationships to be built and ensure more access to expertise. (Arxiv, 2021)
      • Given the specificity of employment laws, cultural differences, and leadership needs, it is very beneficial to have a Corporate HR presence in countries where an offshore center is being set up. (Arxiv, 2021)
      • Lastly, given the changing climate on security, geopolitical changes, and economic factors, our research with service providers and corporate clients shows a need to have more diversity in provider location than a single center can provide.

      Info-Tech Insight

      Long-term success of sourcing requires more than a development center. It requires a location that houses business and HR staff to enable the new development team to learn and succeed.

      Addressing the myth – Outsourcing is a simple RFP for skills and lowest cost

      Success in outsourcing is an exercise in finding a match based on complex factors.

      • In the past, outsourcing was a simple RFP exercise to find the cheapest country with the skills.
      • Our research shows this is no longer true; the decision is now more complex.
      • Competition has driven costs higher, while time business integration and security constraints have served to limit the markets available.
      • Company culture fit is key to the ability to work as one team, which research shows is a key element in delivery of long-term value. (University of Oregon, 2019).
      • These are some of the many factors that need to be considered as you choose your outsourcing partner.
      • The right decision is to find the vendor that best matches the current state of your culture, meets your market constraints, and will allow for best integration to your team – it's not about cheapest or pure skills. (IEEE Access, 2020)

      Info-Tech Insight

      Finding the right outsourcing vendor is an exercise in knowing yourself and then finding the best match to align with your key traits. It's not just costs and skills, but the partner who best matches with your ability to mitigate the risks of outsourcing.

      Phase 1

      Look inward to gain insight on key factors

      Introspection

      1.1 Assess your market factors

      1.2 Determine your people factors

      1.3 Review your current culture

      1.4 Document your technical factors

      Profiling

      2.1 Recall your sourcing strategy

      2.2 Prioritize your company factors

      2.3 Create target profile

      Partner selection

      3.1 Review your RFx

      3.2 Identify target vendors

      3.3 Evaluate vendor

      responses

      Implementation

      4.1 Engage partner to choose contract mechanism

      4.2 Engage partner team to define goals

      4.3 Choose your success

      metrics

      This phase will walk you through assessing and documenting the key driving factors about your firm and the current situation.

      By defining these factors, you will be able to apply this information in the matching process to select the best fit in a partner.

      This phase involves the following participants:

      Line of Business leaders

      Technology leaders

      Key criteria to assess your firm

      Research shows firms must assess themselves in different areas.

      Market factors

      • Who are your clients and your competitors, and what legal constraints do you face?

      People / Process factors

      • What employee skills are you seeking, what is your maturity in product management and stakeholder engagement, and what languages are spoken most predominantly?

      Cultural factors

      • What is your culture around communications, collaboration, change management, and conflict resolution?

      Technical factors

      • What is your current / future technical platform, and what is the maturity of your applications?

      Info-Tech Best Practice

      When assessing these areas, consider where you are today and where you want to go tomorrow, as choosing a partner is a long-term endeavor.

      Step 1.1

      Assess your market factors

      Activities

      1.1.1 Review your client list and future projections to determine your market factors.

      1.1.2 Review your competitive analysis to determine your competitive factors

      This step involves the following participants:

      Business leaders

      Product Owners

      Technology leaders

      Outcomes of this step

      Details of key market factors that will drive the selection of the right partner.

      Market factors

      The Market has a lot to say about the best match for your application development partner.

      Research in the space has defined key market-based factors that are critical when selecting a partner.

      1. Market sectors you service or plan to service – This is critical, as many market sectors have constraints on where their data can be accessed or stored. These restrictions also change over time, so they must be consistently reviewed.
      • E.g. Canadian government data must be stored and only accessed in Canada.
      • E.g. US Government contracts require service providers to avoid certain countries.
    • Your competitors – Your competitors can often seize on differences and turn them to differentiators; for example, offshoring to certain countries can be played up as a risk by a competitor who does all their work in a particular country.
    • Your clients – Research shows that clients can have very distinct views on services being performed in certain countries due to perceived risk, culture, and geopolitical factors. Understanding the views of major clients on globalization of services is a key factor in maintaining client satisfaction.
    • Info-Tech Insight

      Understanding your current and future market factors ensure that your business can not only be successful with the chosen partner today, but also in the future.

      1.1.1 Assess your market factors

      30 min

      Market factors

      1. Group your current client list into three categories:
        1. Those that have no restrictions on data security, privacy or location.
        2. Those that ask for assurances on data security, privacy and location.
        3. Those clients who have compliance restrictions related to data security, privacy, and location.
      2. Categorize future markets into the same three categories.
      3. Based on revenue projections, estimate the revenue from each category as a percentage of your total revenue.

      Download the Select a Sourcing Partner Presentation Template

      Input Output
      • Current client list
      • Future market plans
      • Competitive analysis
      • Completion of the Market Factors chart in the Select a Sourcing Partner for Your Development Team template
      Materials Participants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Line of business leaders
      • Finance leaders

      Assess your market factors

      Market and sector

      Market share and constraints

      Market category

      Sector – Public, private or both

      Market share of category

      Key areas of concern

      Not constrained by data privacy, security or location

      Private

      50%

      Require assurances on data security, privacy or location

      Public

      45%

      Data access

      Have constraints that preclude choices related to data security, privacy and location

      Public

      5%

      Data residency

      1.1.2 Review your competitive factors

      30 min

      Competitive factors

      1. List your largest competitors.
      2. Document their sourcing strategies for their development team – are they all onshore or nearshore? Do they outsource?
      3. Based on this, identify competitive threats based on changing sourcing strategies.

      Download the Select a Sourcing Partner Presentation Template

      Input Output
      • Current client list
      • Future market plans
      • Competitive analysis
      • Completion of the Market Factors chart in the Select a Sourcing Partner for Your Development Team template
      Materials Participants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Line of business leaders
      • Finance leaders

      Review your competitive factors

      Competitors

      Competitor sourcing strategy

      Competitive threats

      Competitor

      Where is the market?

      Is this onshore / near shore / offshore?

      Data residency

      How could competitors take advantage of a change in our sourcing strategy?

      Competitor X

      Canada / US

      All work done in house and onshore

      Kept in Canada / US

      If we source offshore, we will face a Made in Canada / US threat

      Step 1.2

      Consider your people-related factors

      Activities

      1.2.1 Define your people factors

      1.2.2 Assess your process factors

      This step involves the following participants:

      Technical leaders

      Outcomes of this step

      Details of key people factors that will drive the selection of the right partner.

      People / process factors

      People and process have a large hand in the success or failure of a partner relationship.

      • Alignment of people and process are critical to the success of the partner relationship over the long term.
      • In research on outsourcing / offshoring, Rahman et al identified ten factors that directly impact success or failure in offshoring or outsourcing of development.
      • Key among them are the following:
        • Employee skills
        • Project management
        • Maturity of process concerning product and client management
        • Language barrier

      Info-Tech Insight

      People are a critical resource in any sourcing strategy. Making sure the people and the processes will mesh seamlessly is how to ensure success.

      1.2.1 Define your people factors

      30 min

      Skills Inventory

      1. List skills needed in the development team to service current needs.
      2. Based on future innovation and product direction, add skills you foresee needing in the next 12-24 months. Where do you see a new technology platform (e.g. move from .NET to Java) or innovation (addition of Mobile)?
      3. List current skills present in the team.
      4. Identify skills gaps.

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Product plans for current and future products
      • Technology platform plans for current products
      • Future innovation plans
      • People- and process-related factors that influence sourcing decisions
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Solution architects

      Assess your people - Skills inventory

      Skills required

      Strategic value

      Skills present

      Skill you are seeking

      Required today or in the future

      Rate the skill level required in this area

      Is this a strategic focus for the firm for future targets?

      Is this skill present in the team today?

      Rate current skill level (H/M/L)

      Java Development

      Future

      High

      Yes

      No

      Low

      .Net Development

      Today

      Med

      No

      Yes

      High

      1.2.2 Assess your process factors

      30 min

      Process factors

      1. Do you have a defined product ownership practice?
      2. How mature is the product ownership for the product you are seeking to change sourcing for (H/M/L)?
      3. Do you have project management principles and governance in place for software releases?
      4. What is the relative maturity / skill in the areas you are seeking sourcing for (H/M/L)?

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Product plans for current and future products
      • Technology platform plans for current products
      • Future innovation plans
      • People- and process-related factors that influence sourcing decisions
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Solution architects

      Assess your process factors

      Product ownership

      Project management

      Product where sourcing is being changed

      Product ownership in place?

      Skills / maturity rating (H/M/L)

      Project management / governance in place for software releases

      Rate current maturity / skill level (H/M/L)

      ABC

      Yes

      High

      Yes

      High

      SQW

      No

      Low

      Yes

      High

      Step 1.3

      Review your current culture

      Activities

      1.3.1 Assess your communications factors

      1.3.2 Assess your conflict resolution factors

      This step involves the following participants:

      Technical leaders

      Product owners

      Project managers

      Outcomes of this step

      Details of key culture factors that will drive the selection of the right partner.

      Cultural factors

      Organization culture fit is a driver of collaboration between the teams, which drives success.

      • In their study of country attractiveness for sourcing development, Kotlarsky and Oshri point to the ability of the client and their sourcing partner to work as one team as a key to success.
      • This requires synergies in many cultural factors to avoid costly miscommunications and misinterpretations that damage collaboration.
      • Key factors in achieving this are:
        • Communications methodology and frequency; managing and communicating to the teams as one team vs two, and communicating at all levels, vs top down.
        • Managing the team as one integrated team, with collaboration enabled between all resources, rather than the more adversarial client vs partner approach.
        • Conflict resolution strategies must align so all members of the extended team work together to resolve conflict vs the traditional “Blame the Contractors”.
        • Strong change management is required to keep all team members aligned.

      Info-Tech Insight

      Synergy of culture is what enables a good partner selection to become a long-term relationship of value.

      1.3.1 Assess your communications factors

      30 min

      1. List all the methods you use to communicate with your development team – face to face, email, conference call, written.
      2. For each form of communication confirm frequency, medium, and audience (team vs one-on-one)
      3. Confirm if these communications take into account External vs Internal resources and different time zones, languages, and cultures.
      4. Is your development team broken up into teams by function, by location, by skill, etc., or do you operate as one team?

      Download the Select a Sourcing Partner Presentation Template

      Input Output
      • Communication process with existing development team
      • Examples of how external staff have been integrated into the process
      • Examples of conflicts and how they were resolved
      • Documentation of key cultural characteristics that need to be part of provider profiling
      Materials Participants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Project managers

      Assess your communications strategy

      Communications

      Type

      Frequency

      Audience

      One communication or one per audience?

      Level of two-way dialogue

      Face-to-face team meetings

      Weekly

      All developers

      One

      High

      Daily standup

      Daily

      Per team

      One per audience

      Low

      1.3.2 Assess your conflict resolution factors

      30 min

      1. How does your organization handle the following types of conflict? Rate from 1-5, with 1 being hierarchical and 5 being openly collaborative.
        1. Developers on a team disagree.
        2. Development team disagrees with manager.
        3. Development team disagrees with product owner.
        4. Development team disagrees with line of business.
      2. Rate each conflict resolution strategy based on effectiveness.
      3. Confirm if this type of strategy is used for internal and external resources, or internal only.

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Communication process with existing development team
      • Examples of how external staff have been integrated into the process
      • Examples of conflicts and how they were resolved
      • Documentation of key cultural characteristics that need to be part of provider profiling
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Product owners
      • Project managers

      Assess your conflict resolution strategy

      Conflict

      Resolution strategy

      Effectiveness

      Audience

      Conflict type

      Rate the resolution strategy from hierarchical to collaborative (1-5)

      How effective is this method of resolution from 1-5?

      Is this strategy used for external parties as well as internal?

      Developer to product owner

      44

      Yes

      Developer to manager

      12

      Yes

      Step 1.4

      Document your technical factors

      Activities

      1.4.1 Document your product / platform factors

      1.4.2 Document your environment details

      This step involves the following participants:

      Technical leaders

      Product owners

      Outcomes of this step

      Details of key technical factors that will drive the selection of the right partner.

      Technical factors

      Technical factors are still the foundation for a Development sourcing relationship.

      • While there are many organizational factors to consider, the matching of technological factors is still the root on which the sourcing relationship is built; the end goal is to build better software.
      • Key technical Items that need to be aligned based on the research are:
        • Technical infrastructure
        • Development environments
        • Development methodology and tools
        • Deployment methodology and tools
        • Lack of/poor-quality technical documentation
      • Most RFPs focus purely on skills, but without alignment on the above items, work becomes impossible to move forward quickly, limiting the chances of success.

      Info-Tech Insight

      Technical factors are the glue that enables teams to function together. Ensuring that they are fully integrated is what enables team integration; seams in that integration represent failure points.

      1.4.1 Document your product / platform factors

      30 mins

      1. How many environments does each software release go through from the start of development through release to production?
      2. What is the infrastructure and development platform?

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Development process
      • Deployment process
      • Operations process
      • IT security policies
      • Documentation of key technical characteristics that need to be part of provider profiling
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Development leaders
      • Deployment team leaders
      • Infrastructure leaders
      • IT operations leaders
      • Product owners
      • Project managers

      Document your product / platform

      Product / Platform

      Product you are seeking a sourcing solution for

      What is the current infrastructure platform?

      How many environments does the product pass through?

      What is the current development toolset?

      ABC

      Windows

      Dev – QA – Preprod - Prod

      .Net / Visual Studio

      1.4.2 Document your environment details

      30 min

      For each environment detail the following:

      1. Environment on premises or in cloud
      2. Access allowed to external parties
      3. Production data present and unmasked
      4. Deployment process: automated or manual
      5. Tools used for automated deployment
      6. Can the environment be restored to last known state automatically?
      7. Does documentation exist on the environment, processes and procedures?

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Development process
      • Deployment process
      • Operations process
      • IT security policies
      • Documentation of key technical characteristics that need to be part of provider profiling
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Development leaders
      • Deployment team leaders
      • Infrastructure leaders
      • IT operations leaders
      • Product owners
      • Project managers

      Document Your Environment Details

      Environment

      Location

      Access

      Deployment

      Data

      Name of Environment

      Is the environment on premises or in the cloud (which cloud)?

      Is external access allowed?

      Is deployment automated or manual?

      Tool used for deployment

      Is reset automated?

      Does the environment contain unmasked production data?

      Dev

      Cloud

      Yes

      Automated

      Azure DevOps

      Yes

      No

      QA

      Cloud

      Yes

      Automated

      Azure DevOps

      Yes

      No

      Preprod

      On Premises

      No

      Manual

      N/A

      No

      Yes

      Phase 2

      Introspection

      1.1 Assess your market factors

      1.2 Determine your people factors

      1.3 Review your current culture

      1.4 Document your technical factors

      Profiling

      2.1 Recall your sourcing strategy

      2.2 Prioritize your company factors

      2.3 Create target profile

      Partner selection

      3.1 Review your RFx

      3.2 Identify target vendors

      3.3 Evaluate vendor

      responses

      Implementation

      4.1 Engage partner to choose contract mechanism

      4.2 Engage partner team to define goals

      4.3 Choose your success

      metrics

      This phase will help you to build a profile of the partner you should target in your search for a sourcing partner.

      This phase involves the following participants:

      Technology leaders

      Procurement leaders

      Product owners

      Project managers

      Build a profile for the right partner

      • Finding the perfect partner is a puzzle to solve, an exercise between the firm and the partners.
      • It is necessary to be able to prioritize and to identify opportunities where you can adapt to create a fit.
      • You must also bring forward the sourcing model you are seeking and prioritize factors based on that; for example, if you are seeking a nearshore partner, language may be less of a factor.

      Review factors based on sourcing choice

      Different factors are more important depending on whether you are insourcing or outsourcing.

      Key risks for insourcing

      • Alignment on communication strategy and method
      • Ability to align culturally
      • Need for face-to-face relationship building
      • Need for coaching skills

      Key risks for outsourcing

      • Giving control to the vendor
      • Legal and regulatory issues
      • Lack of knowledge at the vendor
      • Language and cultural fit

      Assessing your firm's position

      • The model you derived from the Sourcing Strategy research will inform the prioritization of factors for matching partners.

      Info-Tech Insight

      To find the best location for insourcing, or the best vendor for outsourcing, you need to identify your firm's positions on key risk areas.

      Step 2.1

      Recall your sourcing strategy

      Activities

      2.1.1 Define the key factors in your sourcing strategy

      This step involves the following participants:

      Technology Leaders

      Outcomes of this step

      Documentation of the Sourcing Strategy you arrived at in the Define a Sourcing Strategy exercises

      Choosing the right model

      The image contains a screenshot of the legend that will be used down below. The legend contains circles, from the left there is a empty circle, a one quarter filled circle, half filled circle, three-quarter filled circle , and a fully filled in circle.

      Determinant

      Key Questions to Ask

      Onshore

      Nearshore

      Offshore

      Outsource role(s)

      Outsource team

      Outsource product(s)

      Business dependence

      How much do you rely on business resources during the development cycle?

      The image contains a screenshot of the filled in whole circle to demonstrate high. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the empty circle to demonstrate low.

      Absorptive capacity

      How successful has the organization been at bringing outside knowledge back into the firm?

      The image contains a screenshot of the empty circle to demonstrate low. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the filled in whole circle to demonstrate high.

      Integration complexity

      How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10?

      The image contains a screenshot of the filled in whole circle to demonstrate high. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the empty circle to demonstrate low.

      Product ownership

      Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps?

      The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the filled in whole circle to demonstrate high. The image contains a screenshot of the filled in whole circle to demonstrate high.

      Organization culture fit

      What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed?

      The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the filled in whole circle to demonstrate high.

      Vendor mgmt skills

      What is your skill level in vendor management? How old are your longest-standing vendor relationships?

      The image contains a screenshot of the empty circle to demonstrate low. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the one-quarter filled circle to demonstrate medium low. The image contains a screenshot of the half filled circle to demonstrate medium. The image contains a screenshot of the three-quarter filled circle to demonstrate medium high. The image contains a screenshot of the filled in whole circle to demonstrate high.

      2.1.1 Define the key factors in your sourcing strategy

      30 min

      For each product you are seeking a sourcing strategy for, document the following:

      1. Product or team name.
      2. Sourcing strategy based on Define a Sourcing Strategy.
      3. The primary drivers that led to this selection – Business Dependence, Absorptive Capacity, Integration Complexity, Product Ownership, Culture or Vendor Management.
      4. The reasoning for the selection based on that factor – e.g. we chose nearshoring based on high business dependence by our development team.

      Download the Select a Sourcing Partner Presentation Template

      Input Output
      • Sourcing Strategy from Define a Sourcing Strategy for your Development Team
      • Reasoning that drove the sourcing strategy selection
      Materials Participants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leadership

      Define sourcing strategy factors

      Sourcing strategy

      Factors that led to selection

      Product you are seeking a sourcing solution for

      Strategy defined

      Key factors that led to that choice

      Reasoning

      ABC

      Outsourcing - Offshore

      • Product ownership
      • Business integration
      • Product maturity
      • Technical environment

      Mature product ownership and low requirement for direct business involvement.

      Mature product with lower environments in cloud.

      Step 2.2

      Prioritize your company factors

      Activities

      2.2.1 Prioritize the factors from your sourcing strategy and confirm if mitigation or adaptation are possible.

      This step involves the following participants:

      IT Leadership team

      Outcomes of this step

      Prioritized list of key factors

      2.2.1 Prioritize your sourcing strategy factors

      30 min

      1. For each of the factors listed in exercise 2.1, prioritize them by importance to the firm.
      2. For each factor, please confirm if there is room to drive change internally to overcome the lack of a match – for example, if the culture being changed in language and conflict resolution is an option, then say Yes for that factor.

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Sourcing Strategy factors from 2.1
      • Prioritized list of sourcing strategy factors
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders

      Sourcing strategy factors and priority

      Sourcing strategy

      Factors that led to selection

      Priority of factor in decision

      Change possible

      Product you are seeking a sourcing solution for

      Strategy defined

      Key factors that led to your choice

      Reasoning

      Priority of factor 1-x

      Is there an opportunity to adapt this factor to a partner?

      ABC

      Outsourcing - offshore

      • Product ownership
      • Business integration
      • Product maturity
      • Technical environment

      Mature product ownership

      Low requirement for direct business involvement

      Mature product with lower environments in cloud

      2

      1

      3

      N

      N

      Y

      Step 2.3

      Create target profile

      Activities

      2.3.1 Profile your best fit

      This step involves the following participants:

      IT Leadership team

      Outcomes of this step

      Profile of the target partner

      Profiling your best fit

      Creating a target profile will help you determine which partners should be included in the process.

      Given the complexity of all the factors and trying to find the best fit from a multitude of partners, Info-Tech recommends forming a target profile for your best fit of partner.

      This profile provides a detailed assessment matrix to use to review potential partners.

      Profile should be created based on priority; "must haves" are high priority, while properties that have mitigation opportunities are optional or lower priority.

      Criteria

      Priority

      Some US Govt contracts – data and staff in NATO

      1

      Windows environment – Azure DEVOPS

      2

      Clients in FS

      3

      Agile SDLC

      4

      Collaborative communication and conflict resolution

      5

      Mature product management

      6

      Languages English and Spanish

      7

      Partner Profile

      • Teams in NATO and non-NATO countries
      • Windows skills with Azure
      • Financial Services experience
      • Utilize Agile and willing to plug into our teams
      • Used to collaborating with clients in one team environment
      • One centre in Latin / South America

      Info-Tech Insight

      The factors we have defined serve to build us a profile for the ideal partner to engage in sourcing our development team. This profile will lead us to be able to define our RFP / RFI and assess respondents.

      Case study: Cognizant is partnering with clients on product development

      INDUSTRY: Technology Services

      SOURCE: Interview with Jay MacIsaac, Cognizant

      Cognizant is driving quality solutions for clients

      • Strives to be primarily an industry-aligned organization that delivers multiple service lines in multiple geographies.
      • Seeks to carefully consider client culture to create one team.
      • Value proposition is a consultative approach bringing thought leadership and mutually adding value to the relationship vs the more traditional order taker development partner
      • Wants to share in solution development to facilitate shared successes. Geographic alignment drives knowledge of the client and their challenges, not just about time zone and supportability.
      • Offers one of the largest offshore capabilities in the world, supported by local and nearshore resources to drive local knowledge.
      • Realizes today’s clients don’t typically want a black box, they are sophisticated and want transparency around the process and solution, to have a partner.
      • Understands that clients do want to know where the work is being delivered from and how it's being delivered, and want to help manage expectations and overall risk.

      Synergy with Info-Tech’s approach

      • Best relationship comes when teams operate as one.
      • Clients are seeking value, not a development black box.
      • Clients want to have a partner they can engage with, not just an order taker.
      • Goal is a one-team culture with shared goals and delivering business value.
      • Ideal is a partner that will add to their thinking, not echo it.

      Results of this approach

      • Cognizant is continuing to deliver double-digit growth and continues to strive for top quartile performance.
      • Growth in the client base has seen the company grow to over 340,000 associates worldwide.

      Case study: Cabot Technology Solutions uses industry knowledge to drive successful partnerships

      INDUSTRY: Technology Services

      SOURCE: Interview with Shibu Basheer, Cabot Technology Solutions

      Cabot Technology Solutions findings

      • Cabot Technology Solutions looks to partner with clients and deliver expertise and value, not just application development.
        • Focus on building deep knowledge in their chosen vertical, Healthcare.
        • Focus on partnering with clients in this space who are seeking a partner to provide industry knowledge and use this to propel them forward.
        • Look to work with clients seeking a one team philosophy.
        • Avoid clients looking for a cheap provider.
      • Recognizing the initial apprehension to India as a location, they have built a practice in Ontario that serves as a bridge for their offshore team.
      • Cabot overcame initial views and built trust, while integrating the India team in parallel.

      Synergy with Info-Tech approach

      • Preference is partners, not a client/vendor relationship.
      • Single country model is set aside in favor of mix of near and offshore.
      • Culture is a one team approach, not the more adversarial order-taker approach.
      • Goal is to build long-term relationships of value, not task management.

      Results of this approach

      • Cabot is a recognized as a top software development company in many markets across the USA.
      • Cabot continues to drive growth and build referenceable client relationships across North America.

      2.3.1 Profile your best fit

      30 min

      1. Document the list of skills you are seeking from the People Factors – Skills Inventory in Section 1.2 – these represent the skills you are seeking in a partner.
      2. Document the culture you are looking for in a partner with respect to communications and conflict resolution in the culture section of the requirements – this comes from Section 1.3.
      3. Confirm the type of partner you are seeking – nearshore, offshore, or outsourcing based on the sourcing strategy priorities in Section 2.2.
      4. Confirm constraints that the partner must work under based on constraints from your market and competitor factors in Section 1.1.
      5. Confirm your technical requirements in terms of environments, tools, and processes that the vendor must align to from Section 1.4.

      Download the Select a Sourcing Partner Presentation Template

      Input Output

      All exercises done in Steps 11-1.4 and 2.1-2.2

      Profile of a target partner to drive the RFx Criteria

      Materials Participants

      Select a Sourcing Partner for Your Development Team Presentation template

      Development leaders

      Deployment team leaders

      Infrastructure leaders

      IT operations leaders

      Product owners

      Project managers

      RFP skills requirement

      People skills required

      Product ownership

      Project management

      Skill

      Skill level required

      Tools / platform requirement

      Details of product management methodology and skills

      Details of firm's project management methodology

      .NET

      Medium

      Windows

      Highly mature, high skill

      Highly mature, high skill

      Java

      High

      Windows

      Low

      High

      RFx cultural characteristics

      Communication strategy

      Conflict resolution

      Organization / management

      Communication mediums supported

      Frequency of meetings expected

      Conflict resolutions strategies used at the firm

      Management methodology

      Face to face

      Weekly

      Collaborative

      Online

      Daily

      Hierarchical with manager

      Hierarchical

      RFx market constraints

      Constraints

      Partner proposal

      Constraint type

      Restrictions

      Market size required for

      Reasoning

      Data residency

      Data must stay in Canada for Canadian Gov't clients

      5% Canada public sector

      Competitive

      Offshoring dev means competition can take advantage

      95% Clients

      Need strategy to show data and leadership in NA, but delivering more innovation at lower cost by going offshore

      RFx technical requirements

      Technical environments

      Infrastructure

      Alignment of SDLC

      Tools required for development team

      Access control software required

      Infrastructure location

      Number of environments from development to production

      .Net Visual Studio

      Microsoft

      Azure

      4

      RFx scope of services

      Work being sourced

      Team sizing

      Work being sourced

      Skill level required

      Average size of release

      Releases per year

      Java development of new product

      High

      3-month development

      6

      .NET staff augmentation

      Medium

      ½-month development

      12

      Phase 3

      Choose the partner that will best enable you to move forward as one integrated team.

      Introspection

      1.1 Assess your market factors

      1.2 Determine your people factors

      1.3 Review your current culture

      1.4 Document your technical factors

      Profiling

      2.1 Recall your sourcing strategy

      2.2 Prioritize your company factors

      2.3 Create target profile

      Partner selection

      3.1 Review your RFx

      3.2 Identify target vendors

      3.3 Evaluate vendor

      responses

      Implementation

      4.1 Engage partner to choose contract mechanism

      4.2 Engage partner team to define goals

      4.3 Choose your success

      metrics

      For more details on Partner Selection, please refer to our research blueprint entitled Select an ERP Partner

      This phase will help you define your RFx for your provider search

      This phase involves the following participants:

      Vendor Management Team

      IT Leadership

      Finance Team

      Finding the right fit should always come before rates to determine value

      The right fit

      Determined in previous activities

      Negotiating will eventually bring the two together

      Value

      Rates

      Determined by skill and location

      Statement of Work (SOW) quality

      A quality SOW is the result of a quality RFI/RFP (RFx).

      The process up to now has been gathering the materials needed to build a quality RFx. Take this opportunity to review the outputs of the preceding activities to ensure that:

      • All the right stake holders have been engaged.
      • The requirements are complete.

      Info-Tech’s RFP Review as a Service looks for key items to ensure your RFx will generate quality responses and SOWs.

      • Is it well-structured with a consistent use of fonts and bullets?
      • Is it laid out in sections that are easily identifiable and progress from high-level to more detailed information?
      • Can a vendor quickly identify the ten (or fewer) things that are most important to you?

      The image contains a screenshot of the Request for Proposal Review as a Service.

      Step 3.1

      Review your RFx

      Activities

      3.1.1 Select your RFx template

      3.1.2 Finalize your RFx

      3.1.3 Weight each evaluation criteria

      This step involves the following participants:

      • Project team
      • Evaluation team
      • Vendor management team
      • CIO

      Outcomes of this step

      • Completed RFx

      Info-Tech’s RFI/RFP process

      Info-Tech has well-established vendor management templates and practices

      • Identify Need
      • Define Business Requirements
      • Gain Business Authorization
      • Perform RFI/RFP
      • Negotiate Agreement
      • Purchase Goods and Services
      • Assess and Measure Performance

      Info-Tech Best Practice

      You’ll want to customize templates for your organization, but we strongly suggest that you take whatever you feel best meets your needs from both the long- and short-form RFPs presented in this blueprint.

      The secret to managing an RFP is to make it manageable. And the secret to making an RFP manageable is to treat it like any other aspect of business – by developing a process. With a process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.

      Your RFP process should be tailored to fit the needs and specifics of your organization and IT.

      Info-Tech Insight

      Create a better RFP process using Info-Tech’s well-established templates and methodology.

      Create a Better RFP Process

      In a hurry? Consider an enhanced RFI instead of an RFP.

      While many organizations rarely use RFIs, they can be an effective tool in the vendor manager’s toolbox when used at the right time in the right way. RFIs can be deployed in competitive targeted negotiations. An enhanced RFI (ERFI) is a two-stage strategy that speeds up the typical RFP process. The first stage is like an RFI on steroids, and the second stage is targeted competitive negotiation.

      Stage 1:

      Create an RFI with all the customary components. Next, add a few additional RFP-like requirements (e.g. operational and technical requirements). Make sure you include a request for budgetary pricing and provide any significant features and functionality requirements so that the vendors have enough information to propose solutions. In addition, allow the vendors to ask questions through your single point of coordination and share answers with all the vendors. Finally, notify the vendors that you will not be doing an RFP – this is it!

      Stage 2:

      Review the vendors’ proposals and select the best two. Negotiate with both vendors and then make your decision.

      The ERFI shortens the typical RFP process, maintains leverage for your organization, and works great with low- to medium-spend items (however your organization defines them). You’ll get clarification on vendors’ competencies and capabilities, obtain a fair market price, and meet your internal clients’ aggressive timelines while still taking steps to protect your organization.

      RFI Template

      The image contains a screenshot of the RFI Template.

      Use this template to create your RFI baseline template. Be sure to modify and configure the template to your organization’s specifications.

      Request for Information Template

      Long-Form RFP Template

      Configure Info-Tech’s Long-Form RFP Template for major initiatives

      The image contains a screenshot of the long-form RFP Template.

      A long-form or major RFP is an excellent tool for more complex and complicated requirements. This example is for a baseline RFP.

      It starts with best-in-class RFP terms and conditions that are essential to maintaining your control throughout the RFP process. The specific requirements for the business, functional, technical, and pricing areas should be included in the exhibits at the end of the template. That makes it easier to tailor the RFP for each deal, since you and your team can quickly identify specific areas that need modification. Grouping the exhibits together also makes it convenient for both your team to review, and the vendors to respond.

      You can use this sample RFP as the basis for your template RFP, taking it all as is or picking and choosing the sections that best meet the mission and objectives of the RFP and your organization.

      Source: Info-Tech’s The Art of Creating a Quality RFP

      Short-Form RFP Template

      Configure Info-Tech’s Short-Form RFP Template for minor or smaller initiatives

      The image contains a screenshot of the Short-Form RFP Template.

      This example is for a less complex RFP that has relatively basic requirements and perhaps a small window in which the vendors can respond. As with the long-form RFP, exhibits are placed at the end of the RFP, an arrangement that saves time for both your team and the vendors. Of course, the short-form RFP contains fewer specific instructions, guidelines, and rules for vendors’ proposal submissions.

      We find that short-form RFPs are a good choice when you need to use something more than a request for quote (RFQ) but less than an RFP running 20 or more pages. It’s ideal, for example, when you want to send an RFP to only one vendor or to acquire items such as office supplies, contingent labor, or commodity items that require significant vendor's risk assessment.

      Source: The Art of Creating a Quality RFP

      3.1.1 Select your RFx template

      1-3 hours

      1. As a group, download the RFx templates from the previous three slides.
      2. Review your RFx process as a group. Be sure to include the vendor management team.
      3. Be sure to consider organization-specific procurement guidelines. These can be included. The objective here is to find the template that is the best fit. We will finalize the template in the next activity.
      4. Determine the best template for this project.
      Input Output
      • RFx templates
      • The RFx template that will be used for this project
      Materials Participants
      • Info-Tech’s Enhanced RFI Template, Long-Form RFP Template, and Short-Form RFP Template
      • Vendor management team
      • Project team
      • Project manager

      Finalize your RFx

      Key insights

      Leverage the power of the RFP

      • Too often RFPs fail to achieve their intended purposes, and your organization feels the effects of a poorly created RFP for many years.
      • If you are faced with a single source vendor, you can perform an RFP to one to create the competitive leverage.

      Make the response and evaluation process easier

      • Being strategic in your wording and formatting makes it easier on both parties – easier for the vendors to submit meaningful proposals, and easier for customer teams to evaluate.
      • Create a level playing field to encourage competition. Without multiple proposals, your options are limited and your chances for a successful project plummet.

      Maximize the competition

      • Leverage a pre-proposal conference to resolve vendor questions and to ensure all vendors receive the same answers to all questions. No vendor should have an information advantage.

      Do’s

      • Leverage your team’s knowledge.
      • Document and explain your RFP process to stakeholders and vendors.
      • Include contract terms in your RFP.
      • Measure and manage performance after contract award.
      • Seek feedback from the RFP team on your process and improve it as necessary.

      Don'ts

      • Reveal your budget.
      • Do an RFP in a vacuum.
      • Send an RFP to a vendor your team is not willing to award the business to.
      • Hold separate conversations with candidate vendors during your RFP process.
      • Skimp on the requirements definition to speed the process.
      • Tell the vendor they are selected before negotiating.

      3.1.2 Finalize your RFx

      1-3 hours

      1. As a group, review the selected RFI or RFP template.
      2. This is YOUR document. Modify it to suit the needs of the organization and even add sections from the other RFP templates that are relevant to your project.
      3. Use the Supplementary RFx Material as a guide.
      4. Add the content created in Steps 1 and 2.
      5. Add any organization-specific clauses or requirements.
      6. Have the project team review and comment on the RFP.
      7. Optional: Use Info-Tech’s RFP Review Concierge Service.

      Download the RFx Vendor Evaluation Tool

      Download the Supplementary RFx Material

      InputOutput
      • RFx template
      • Organizational specific guidelines
      • Materials from Steps 1 and 2
      • Supplementary RFx Material
      • Finalized RFx
      MaterialsParticipants
      • Electronic RFP document for editing
      • Vendor management team
      • Project team
      • Project manager

      3.1.2 Bring it all together

      Supplementary RFx Material

      The image contains a screenshot of Supplementary RFx Material.

      Review the sample content to get a feel for how to incorporate the results of the activities you have worked through into the RFx template.

      RFx Templates

      Use one of our templates to build a ready-for-distribution implementation partner RFx tailored to the unique success factors of your implementation.

      Exercises in Steps 1 and 2

      The image contains a screenshot of Exercises in Steps 1 and 2

      Use the material gathered during each activity to inform and populate the implementation partner requirements that are specific for your organization and project.

      The image contains a screenshot of the Long Form RFx template.The image contains a screenshot of the Short Form RFx template.

      3.1.3 Weight each evaluation criteria

      1-3 hours

      1. As a group, review the selected RFI or RFP template.
      2. This is your document. Modify it to suit the needs of the organization and even add sections from the other RFP templates that are relevant to your project.
      3. Use the Supplementary RFx Material as a guide.
      4. Utilize the content defined in Steps 1 and 2.
      5. Add any organization-specific clauses or requirements.
      6. Have the project team review and comment on the RFP.
      7. Optional: Use Info-Tech’s RFP Review Concierge Service.

      Download the Supplementary RFx Material

      InputOutput

      RFx Vendor Evaluation Tool

      Exercises from Steps 1 and 2

      • Weighted scoring tool to evaluate responses
      MaterialsParticipants
      • RFx Vendor Evaluation Tool
      • Supplementary RFx Material
      • Vendor management team
      • Project team
      • Project manager

      3.1.3 Apply weight to each evaluation criteria

      Use this tool to weight each critical success factor based on results of the activities within the vendor selection workbook for later scoring results.

      The image contains a screenshot of the RFx Vendor Evaluation Tool.

      Download the RFx Vendor Evaluation Tool

      Step 3.2

      Identify target vendors

      Activities

      3.2.1 Identify target vendors

      3.2.2 Define your RFx timeline

      This step involves the following participants:

      • Project team
      • Vendor management team

      Outcomes of this step

      • Targeted vendor list
      • Initial RFx timeline

      3.2.1 Identify target vendors

      1-3 hours

      1. Based on the profile defined in Step 2.3, research potential partners that fit the profile, starting with those you may have used in the past. From this, build your initial list of vendors to target with your RFx.
      2. Break into smaller groups (or continue as a single group if it is already small) and review each shortlisted vendor to see if they will likely respond to the RFx.
      Input Output
      • Websites
      • Peers
      • Advisory groups
      • A shortlist of vendors to target with your RFx
      Materials Participants
      • RFx Vendor Evaluation Tool
      • CIO
      • Vendor management team
      • Project team
      • Evaluation team

      Download the RFx Vendor Evaluation Tool

      Define your RFx timeline

      Provider RFx timelines need to be clearly defined to keep the project and participants on track. These projects and processes can be long. Set yourself up for success by identifying the time frames clearly and communicating them to participants.

      1. Current
      • Concurrent ERP product selection
      • RFx preparation
      • Release of RFX
    • Near-term
      • Responses received
      • Scoring responses
      • Shortlisting providers
      • Provider interviews
      • Provider selection
      • Provider contract negotiations
      • Contract with provider
    • Future
      • Initiation of knowledge transfer
      • Joint development period
      • Cutover to provider team

      89% of roadmap views have at least some representation of time. (Roadmunk, n.d.)

      Info-Tech Insight

      The true value of time horizons is in dividing your timeline and applying different standards and rules, which allows you to speak to different audiences and achieve different communication objectives.

      3.2.2 Define your RFx timeline

      1-3 hours

      1. As a group identify an appropriate timeline for your RFP process. Info-Tech recommends no less than three months from RFx release to contract signing.

        Keep in mind that you need to allow for time to engage the team and perform some level of knowledge transfer, and to seed the team with internal resources for the initial period.
      2. Leave enough time for vendor responses, interviews, and reference checks.
      3. Once the timeline is finalized, document it and communicate it to the organization.

      Download the RFx Vendor Evaluation Tool

      Input Output
      • RFx template
      • Provider RFx timeline
      Materials Participants
      • RFx Vendor Evaluation Tool
      • Vendor management team
      • Project team
      • Project manager

      Define your RFx timeline

      The image contains a screenshot of an example of an RFx timeline.

      Step 3.3

      Evaluate vendor responses

      Activities

      3.3.1 Evaluate responses

      This step involves the following participants:

      • Evaluation team

      Outcomes of this step

      • Vendor submission scores

      3.3.1 Evaluate responses

      1-3 hours

      1. Use the RFx Vendor Evaluation Tool to collect and record the evaluation team's scores for each vendor's response to your RFx.
      2. Then record and compare each team member's scores to rank the vendors' responses.
      3. The higher the score, the closer the fit.

      Download the RFx Vendor Evaluation Tool

      InputOutput
      • Vendor responses
      • Vendor presentations
      • Vendor scores
      MaterialsParticipants
      • RFx Vendor Evaluation Tool
      • Evaluation team

      3.3.1 Score vendor results

      Use the RFx Vendor Evaluation Tool to score the vendors' responses to your RFx using the weighted scale from Activity 3.1.3.

      The image contains a screenshot of the RFx Vendor Evaluation Tool.

      Download the RFx Vendor Evaluation Tool

      Phase 4

      Measuring the new relationship

      Introspection

      1.1 Assess your market factors

      1.2 Determine your people factors

      1.3 Review your current culture

      1.4 Document your technical factors

      Profiling

      2.1 Recall your sourcing strategy

      2.2 Prioritize your company factors

      2.3 Create target profile

      Partner selection

      3.1 Review your RFx

      3.2 Identify target vendors

      3.3 Evaluate vendor

      responses

      Implementation

      4.1 Engage partner to choose contract mechanism

      4.2 Engage partner team to define goals

      4.3 Choose your success

      metrics

      This phase will allow you to define the relationship with your newly chosen partner, including choosing the right contract mechanism, defining shared goals for the relationship, and selecting the metrics and processes to measure performance.

      This phase involves the following participants:

      IT leadership

      Procurement team

      Product owners

      Project managers

      Implementing the Partner

      Implementing the new partner is an exercise in collaboration

      • Successfully implementing your new partner is an exercise in working together
      1. Define a contract mechanism that is appropriate for the relationship, but is not meant as punitive, contract-based management – this sets you up for failure.
      2. Engage with your team and your partner as one team to build shared, measurable goals
      3. Work with the team to define the metrics and processes by which progress against these goals will be measured
    • Goals, metrics and process should be transparent to the team so all can see how their performance ties to success
    • Make sure to take time to celebrate successes with the whole team as one
    • Info-Tech Insight

      Implement the relationship the same way you want it to work: as one team. Work together on contract mechanism, shared goals, metrics, and performance measurement. This transparency and collaboration will build a one team view, leading to long-term success.

      Step 4.1

      Engage partner to choose contract mechanism

      Activities

      4.1.1 Confirm your contract mechanism

      This step involves the following participants:

      IT leadership

      Procurement team

      Vendor team

      Outcomes of this step

      Contract between the vendor and the firm for the services

      Negotiate agreement

      Evaluate your RFP responses to see if they are complete and if the vendor followed your instructions.

      Then:

      Plan negotiation(s) with one or more vendors based on your questions and opportunities identified during evaluation.

      Select finalist(s).

      Apply selection criteria.

      Resolve vendors' exceptions.

      Negotiate before you select your vendor:

      Negotiating with two or more vendors will maintain your competitive leverage while decreasing the time it takes to negotiate the deal.

      Perform legal reviews as necessary.

      Use sound competitive negotiations principles.

      Info-Tech Insight

      Be certain to include any commitments made in the RFP, presentations, and proposals in the agreement, as the standard for an underperforming vendor.

      Info-Tech Insight

      Providing contract terms in an RFP can dramatically reduce time for this step by understanding the vendor’s initial contractual position for negotiation.

      Leverage ITRG's negotiation process research for additional information

      For more details on this process please see our research Drive Successful Sourcing Outcomes with a Robust RFP Process

      4.1.1 Confirm your contract mechanism

      30 min

      1. Does the firm have prior experience with this type of sourcing arrangement?
      2. Does the firm have an existing services agreement with the selected partner?
      3. What contract mechanisms have been used in the past for these types of arrangements?
      4. What mechanism was proposed by the partner in their RFP response?

      Download the Select a Sourcing Partner Presentation Template

      Input Output
      • Past sourcing agreements from Procurement
      • Proposed agreement from partner
      • Agreed upon contract mechanism
      Materials Participants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Vendor management group
      • Partner leaders

      Choose the appropriate contract method

      Work being sourced

      Partner proposal

      Agreed-upon mechanism

      Work being sourced

      Vendor management experience with type

      Partner proposed contract method

      Agreed-upon contract method

      Java development team to build new product

      Similar work done with fixed price with another vendor

      Time and materials per scrum team

      Time and materials per scrum team to avoid vendor conflicts inherent in fixed price which limit innovation

      Step 4.2

      Engage partner team to define shared goals

      Activities

      4.2.1 Define your shared goals

      This step involves the following participants:

      IT leadership

      Vendor leadership

      Outcomes of this step

      Shared goals for the team

      Define success and shared goals

      Work together to define how you will measure yourselves.

      One team

      • Treating the new center and the existing team as one team is critical to long-term success.
      • Having a plan that allows for teams to meet frequently face-to-face "get to know you" and "stay connected" sessions will help the team gel.

      Shared goals

      • New group must share common goals and measurements.

      Common understanding

      • New team must have a common understanding and culture on key facets such as:
        • Measurement of quality
        • Openness to feedback and knowledge sharing
        • Culture of collaboration
        • Issue and Risk Management

      4.2.1 Define your shared goals

      30 min

      1. List each item in the scope of work for the sourcing arrangement – e.g. development of product XXX.
      2. For each scope item, detail the benefit expected by the firm – e.g. development cost expected to drop by 10% per year, or customer satisfaction improvement.
      3. For each benefit define how you will measure success – e.g. track cost of development for the development team assigned, or track Customer Satisfaction Survey results.
      4. For each measure, define a target for this year – e.g. 10% decrease over last year's cost, or customer satisfaction improvement from 6 to 7.

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Services being procured from RFx
      • Benefits expected from the sourcing strategy
      • Baseline scores for measurements
      • Shared goals agreed upon between team and partner
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Technology leaders
      • Partner leaders

      Define goals collaboratively

      Role and benefit

      Goals and objectives

      Role / work being sourced

      Benefit expected

      Measure of success

      Year over year targets

      Java development team to build new product

      New product to replace aging legacy

      Launch of new product

      Agree on launch schedule and MVP for each release / roadmap

      Step 4.3

      Choose your success metrics

      Activities

      4,3.1 Define metrics and process to monitor

      This step involves the following participants:

      IT leadership

      Product owners

      Project managers

      Vendor leaders

      Outcomes of this step

      Metrics and process to measure performance

      4.3.1 Define metrics and process to monitor

      30 min

      1. For each goal defined and measure of success, break down the measure into quantifiable, measurable factors – e.g. Development cost is defined as all the costs tracked to the project including development, deployment, project management, etc.
      2. For each factor choose the metric that can be reported on – e.g. project actuals.
      3. For each metric define the report and reporting frequency – e.g. monthly project actuals from project manager.

      Download the Select a Sourcing Partner Presentation Template

      InputOutput
      • Development process
      • Deployment process
      • Operations process
      • IT Security policies
      • Documentation of key technical characteristics that need to be part of provider profiling
      MaterialsParticipants
      • Select a Sourcing Partner for Your Development Team Presentation template
      • Development leaders
      • Deployment team leaders
      • Infrastructure leaders
      • IT operations leaders
      • Product owners
      • Project managers

      Agreed-upon metrics

      Goal

      Metrics and process

      Agreed-upon goal

      Year 1 target

      Metric to measure success

      Measurement mechanism

      Deliver roadmap of releases

      3 releases – MVP in roadmap

      Features and stories delivered

      Measure delivery of stories from Jira

      Research Contributor

      The image contains a picture of Alaisdar Graham.

      Alaisdar Graham

      Executive Counsellor

      Info-Tech Research Group

      During Alaisdar’s 35-year career in information and operational technology, Alaisdar has been CIO for public sector organizations and private sector companies. He has been an entrepreneur with his own consultancy and a founder or business advisor with four cyber-security start-ups, Alaisdar has developed experience across a broad range of industries within a number of different countries and become known for his ability to drive business benefits and improvements through the use of technology.

      Alaisdar has worked with CXO-level executives across different businesses. Whether undertaking a digital transformation, building and improving IT functions across your span of control, or helping you create and execute an integrated technology strategy, Alaisdar can provide insight while introducing you to Info-Tech Research Group’s experts. Alaisdar’s experience with organizational turn- around, governance, project, program and portfolio management, change management, risk and security will support your organization’s success.

      Research Contributor

      The image contains a picture of Richard Nachazel.

      Richard Nachazel

      Executive Counsellor

      Info-Tech Research Group

      • Richard has more than 40 years working in various Fortune 500 organizations. His specialties are collaborating with business and IT executives and senior stakeholders to define strategic goals and transform operational protocols, standards, and methodologies. He has established a reputation at multiple large companies for taking charge of critical, high-profile enterprise projects in jeopardy of failure and turning them around. Colleagues and peers recognize his ability to organize enterprise efforts, build, develop, and motivate teams, and deliver outstanding outcomes.
      • Richard has worked as a Global CISO & Head of IT Governance for a Swiss Insurance company, Richard developed and led a comprehensive Cyber-Security Framework that provided leadership and oversight of the cyber-security program. Additionally, he was responsible for their IT Governance Risk & Compliance Operation and the information data security compliance in a complex global environment. Richard’s experience with organizational turn around, governance, risk, and controls, and security supports technology delivery integration with business success. Richard’s ability to engage executive and senior management decision makers and champion vision will prove beneficial to your organization.

      Research Contributor

      The image contains a picture of Craig Broussard.

      Craig Broussard

      Executive Counsellor

      Info-Tech Research Group

      • Craig has over 35 years of IT experience including software development, enterprise system management, infrastructure, and cyber security operations. Over the last 20 years, his focus has been on infrastructure and security along with IT service management. He’s been an accomplished speaker and panelist at industry trade events over the past decade.
      • Craig has served as Global Infrastructure Director for NCH Corporation, VP of Information Technology at ATOS, and earlier in his career as the Global Head of Data Center Services at Nokia Siemens Networks. Craig also worked for MicroSolutions (a Mark Cuban Company). Additionally, Craig received formal consulting training while working for IBM Global Services.
      • Craig’s deep experience across many aspects of IT from Governance through Delivery makes him an ideal partner for Info-Tech members.

      Bibliography

      Offshore, Onshore or Hybrid–Choosing the Best IT Outsourcing Model. (n.d.).
      Offshore Dedicated Development Team – A Compelling Hiring Guide. (n.d.).
      The Three Non-Negotiables Of IT Offshoring. (n.d.). Forbes.
      Top Ten Countries For Offshoring. Forbes, 2004.
      Nearshoring in Europe: Choose the Best Country for IT Outsourcing - The World Financial Review. (n.d.).
      Select an Offshore Jurisdiction. The Best Countries for Business in 2021-2022! | InternationalWealth.info. (n.d.).
      How to Find the Best Country to Set Up an Offshore Company. (n.d.). biz30.
      Akbar, M. A., Alsanad, A., Mahmood, S., & Alothaim, A. (2021). Prioritization-based taxonomy of global software development challenges: A FAHP based analysis. IEEE Access, 9, 37961–37974
      Ali, S. (2018). Practices in Software Outsourcing Partnership: Systematic Literature Review Protocol with Analysis. Journal of Computers, (February), 839–861
      Baird Georgia, A. (2007). MISQ Research Curation on Health Information Technology 2. Progression of Health IT Research in MIS Quarterly. MIS Quarterly, 2007(June), 1–14.
      Akbar, M. A., Alsanad, A., Mahmood, S., & Alothaim, A. (2021). Prioritization-based taxonomy of global software development challenges: A FAHP based analysis. IEEE Access, 9, 37961–37974
      Ali, S. (2018). Practices in Software Outsourcing Partnership: Systematic Literature Review Protocol with Analysis. Journal of Computers, (February), 839–861
      Baird Georgia, A. (2007). MISQ Research Curation on Health Information Technology 2. Progression of Health IT Research in MIS Quarterly. MIS Quarterly, 2007(June), 1–14.
      Carmel, E., & Abbott, P. (2006). Configurations of global software development: offshore versus nearshore. … on Global Software Development for the Practitioner, 3–7.
      Hanafizadeh, P., & Zare Ravasan, A. (2018). A model for selecting IT outsourcing strategy: the case of e-banking channels. Journal of Global Information Technology Management, 21(2), 111–138.
      Ishizaka, A., Bhattacharya, A., Gunasekaran, A., Dekkers, R., & Pereira, V. (2019). Outsourcing and offshoring decision making. International Journal of Production Research, 57(13), 4187–4193.
      Jeong, J. J. (2021). Success in IT offshoring: Does it depend on the location or the company? Arxiv.
      Joanna Minkiewicz, J. E. (2009). Deakin Research Online Online. 2007, Interrelationships between Innovation and Market Orientation in SMEs, Management Research News, Vol. 30, No. 12, Pp. 878-891., 30(12), 878–891.

      Bibliography

      King, W. R., & Torkzadeh, G. (2016). Special Issue Information Systems Offshoring : Research Status and Issues. MIS Quarterly, 32(2), 205–225.
      Kotlarsky, J., & Oshri, I. (2008). Country attractiveness for offshoring and offshore outsourcing: Additional considerations. Journal of Information Technology, 23(4), 228–231.
      Lehdonvirta, V., Kässi, O., Hjorth, I., Barnard, H., & Graham, M. (2019). The Global Platform Economy: A New Offshoring Institution Enabling Emerging-Economy Microproviders. Journal of Management, 45(2), 567–599.
      Mahajan, A. (2018). Risks and Benefits of Using Single Supplier in Software Development. Oulu University of Applied Sciences. Retrieved from
      Murberg, D. (2019). IT Offshore Outsourcing: Best Practices for U.S.-Based Companies. University of Oregon Applied Information Management, 1277(800), 824–2714.
      Nassimbeni, G., Sartor, M., & Dus, D. (2012). Security risks in service offshoring and outsourcing. Industrial Management and Data Systems, 112(3), 405–440.
      Olson, G. M., & Olson, J. S. (2000). Distance matters. Human-Computer Interaction, 15(2–3), 139–178.
      Pilkova, A., & Holienka, M. (2018). Home-Based Business in Visegrad Countries: Gem Perspective. Innovation Management, Entrepreneurship and Sustainability 2018 Proceedings of the 6th International Conference.
      Rahman, H. U., Raza, M., Afsar, P., Alharbi, A., Ahmad, S., & Alyami, H. (2021). Multi-criteria decision making model for application maintenance offshoring using analytic hierarchy process. Applied Sciences (Switzerland), 11(18).
      Rahman, H. U., Raza, M., Afsar, P., Khan, H. U., & Nazir, S. (2020). Analyzing factors that influence offshore outsourcing decision of application maintenance. IEEE Access, 8, 183913–183926.
      Roadmunk. What is a product roadmap? Roadmunk, n.d. Accessed 12 Oct. 2021.
      Rottman, J. W., & Lacity, M. C. (2006). Proven practices for effectively offshoring IT work. MIT Sloan Management Review.
      Smite, D., Moe, N. B., Krekling, T., & Stray, V. (2019). Offshore Outsourcing Costs: Known or Still Hidden? Proceedings - 2019 ACM/IEEE 14th International Conference on Global Software Engineering, ICGSE 2019, 40–47.
      Welsum, D. Van, & Reif, X. (2005). Potential Offshoring: Evidence from Selected OECD Countries. Brookings Trade Forum, 2005(1), 165–194.
      Zhang, Y., Liu, S., Tan, J., Jiang, G., & Zhu, Q. (2018). Effects of risks on the performance of business process outsourcing projects: The moderating roles of knowledge management capabilities. International Journal of Project Management, 36(4), 627–639.

      Exit Plans: Escape from the black hole

      • Large vertical image:
      • member rating overall impact: Highly Valued
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      In early April, I already wrote about exit plans and how they are the latest burning platform.

      As of the end of May 2025, we have both Microsoft and Google reassuring European clients about their sovereign cloud solutions. There are even air-gapped options for military applications. These messages come as a result of the trade war between the US and the rest of the world.

      There is also the other, more mundane example of over-reliance on a single vendor: the Bloomberg-terminal outage of May 21st, 2025. That global outage severely disrupted financial markets. It caused traders to lose access to real-time data, analytics, and pricing information for approximately 90 minutes. This widespread system failure delayed critical government bond auctions in the UK, Portugal, Sweden, and the EU.

      It serves as a reminder of the heavy reliance on the Bloomberg Terminal, which is considered an industry standard despite its high annual cost. While some Bloomberg services like instant messaging remained functional, allowing limited communication among traders, the core disruption led to significant frustration and slowed down trading activities.

      You want to think about this for a moment. Bloomberg is, just like Google and Microsoft are, cornerstones in their respective industries. MS, Google, and Amazon even in many more industries. 

      So the issue goes beyond the “panic of the day.” Every day, there will be some announcement that sends markets reeling and companies fearing. Granted, the period we go through today can have grave consequences, but at the same time, it may be over in the coming months or years.

      Contractual cover

      Let's take a step back and see if we can locate the larger issue at stake. I dare to say that the underlying issue is trust. We are losing trust in one another at a fast pace. Not between business partners, meaning companies who are, in a transaction or relationship, are more or less equal. Regardless of their geolocation, people are keen to do business together in a predictable, mutually beneficial way. And as long as that situation is stable, there is little need, beyond compliance and normal sound practices, to start to distrust each other.

      Trouble brews when other factors come into play. I want to focus on two of them in this article.

      1. Market power
      2. Government interference

      Market Power

      The past few years have seen a large increase in power of the cloud computing platforms. The pandemic of 2019 through to 2023 changed our way of working and gave a big boost to these platforms. Of course, they were already establishing their dominance in the early 2010s.

      Amazon launched SQS in 2004 with S3 (storage)  and EC2 (compute) in 2006. Azure launched in 2008 as a PaaS platform for .NET developers, and became really available in 2010. Since then, it grew into the IaaS (infrastructure as a service) platform we know today. Google's Cloud Platform (GCP) launched in 2008 and added components such as BigQuery, Compute Engine and Storage in the 2010s.

      Since the pandemic, we've seen another boost to their popularity. These platforms solidified their lead through several vectors:

      • Remote working
      • Business continuity and resilience promises
      • Acceleration of digital transformation
      • Scalability
      • Cost optimization 

      Companies made decisions on these premises. A prime example is the use of native cloud functions. These make life easier for developers. Native functions allow for serverless functionality to be made available to clients, and to do so in a non-infra-based way. It gives the impression of less complexity to the management. They are also easily scalable. 

      This comes at a cost, however. The cost is vendor lock-in. And with vendor lock-in, comes increased pricing power for the vendor.

      For a long time, it seems EU companies' attitude was: “It won't be such an issue, after all, there are multiple cloud vendors and if all else fails, we just go back.” The reality is much starker, I suspect that cloud providers with this level of market power will increase their pricing significantly.

       Government interference

      in come two elements:

      • EU laws
      • US laws and unpredictability
      EU laws

       The latest push to their market power came as an unintended consequence of EU Law: DORA. That EU law requires companies to have testable exit plans in place. But it goes well beyond this. The EU has increased the regulatory burden on companies significantly. BusinessEurope, a supranational organization, estimates that in the past five years, the Eu managed to release over 13,000 legislative acts. This is compared to 3,500 in the US.

      Coming back to DORA, this law requires EU companies to actually test their exit plans and show proof of it to the EU ESAs (European Supervisory Agency).  The reaction I have seen in industry representative organizations is complacency. 

      The cost of compliance is significant; hence, companies try to limit their exposure to the law as much as possible. They typically do this by limiting the applicability scope of the law to their business, based on the wording of the law. And herein lies the trap. This is not lost on the IT providers. They see that companies do the heavy lifting for them. What do I mean by that?  Several large providers are looked at by the EU as systemic providers. They fall under direct supervision by the ESAs. 

      For local EU providers, it is what it is, but for non-EU providers, they get to show their goodwill, using sovereign IT services.  I will come back to this in the next point, US unpredictability and laws. But the main point is: we are giving them more market power, and we have less contractual power. Why? Because we are showing them that we will go to great lengths to keep using their services.

      US laws and unpredictability

      US companies must comply with US law. So far, so good. Current US legislation also already requires US companies to share data on non-US citizens.

      • Foreign Intelligence Surveillance Act (FISA), particularly Section 702
      • The CLOUD (Clarifying Lawful Overseas Use of Data) Act of 2018
      • The USA PATRIOT Act (specifically relevant sections like 215 and 314(a)/314(b))
      • Executive Order 14117 and related DOJ Final Rule (Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern)

      This last one is of particular concern. Not so much because of its contents, but because it is an Executive Order.

      We know that the current (May 2025) US government mostly works through executive orders. Let's not forget that executive orders are a legitimate way to implement policy, This means that the US government could use access to cloud services as a lever to obtain more favorable trade rules.

      The EU responds to this (the laws and executive order) by implementing several sovereignty countermeasures like GDPR, DORA, Digital markets Act (DMA), Data Governance Act (DGA), Cybersecurity Act and the upcoming European Health Data Act (EHDS). This is called the “Brussels Effect.”

      EU Answers

      Europe is also investing in several strategic initiatives such as

      This points to a new dynamic between the EU and the US, EU-based companies simply cannot trust their US counterparts anymore to the degree they could before. The sad thing is, that there is no difference on the interpersonal level. It is just that companies must comply with their respective laws.

      Hence, Microsoft, Google, and AWS and any other US provider cannot legally provide sovereign cloud services. In a strict legal sense, Microsoft and Google cannot absolutely guarantee that they can completely insulate EU companies and citizens from all US law enforcement requests for data, despite their robust efforts and sovereign cloud offerings. This is because they are US companies, subject to US law and US jurisdiction. The CLOUD act and FISA section 702 compel US companies to comply. 

      Moreover, there is the nature of sovereign cloud offerings:

      • Increased Control, Not Absolute Immunity: Services like Microsoft's EU Data Boundary and Google's Cloud for Sovereignty are designed to provide customers with greater control over data residency, administrative access (e.g., limiting access to EU-based personnel), and encryption keys
      • Customer-Managed Keys (CMEK): If an EU customer controls their encryption keys, and the data remains encrypted at rest and in transit, it theoretically makes it harder for the cloud provider to provide plaintext data if compelled. However, metadata and other operational data might still be accessible, and the extent to which US authorities could compel a US company to decrypt data remains a point of contention and legal ambiguity.
      • Partnerships and Local Entities: Some “sovereign cloud” models involve partnerships with local EU entities (e.g., Google's partnership with S3NS in France, or Microsoft's with Capgemini and Orange). While this might create a legal buffer, if the core cloud infrastructure and controlling entity are still ultimately US-based, the risk of US legal reach persists.
      • “Limited Security Instances”: Even with the EU Data Boundary, Microsoft explicitly states, “in limited security instances that require a coordinated global response, essential data may be transferred with robust protections that safeguard customer data.” This phrasing acknowledges that some data may still leave the EU boundary under certain circumstances.

       And lastly, there are the legal challenges to the EU data privacy Framework (DPF)

      • Ongoing Scrutiny: The DPF is the current legal basis for EU-US data transfers, but it is under continuous scrutiny and is highly likely to face further legal challenges in the CJEU (a “Schrems III” case is widely anticipated). This uncertainty means that the current framework's longevity and robustness are not guaranteed.
      • Fundamental Conflict: The core legal conflict between the broad scope of US surveillance laws and the EU's fundamental right to privacy has not been fully resolved by the DPF, according to many EU legal experts and privacy advocates.

      This all means that while the cloud providers are doing everything they can, and I'm assuming they are acting in good faith. The fact that they are US entities means however that they are subject to all US legislation and executive orders.  And we cannot trust this last part. Again, this is why the EU is pursuing its digital sovereignty initiatives and why some highly sensitive EU public sector entities are gravitating towards truly EU-owned and operated cloud solutions.

      Bankruptcy

      If your provider goes bankrupt, you do not have a leg to stand on. Most jurisdictions, including the EU and US, have the following elements regarding bankruptcy:

      • Automatic Stay: Upon a bankruptcy filing (in most jurisdictions, including the US and EU), an “automatic stay” is immediately imposed. This is a court order that stops most collection activities against the debtor. For you as a customer, this can mean you might be prevented from:

        • Terminating the contract immediately, even if your contract allows it.
        • Initiating legal proceedings against the provider.
        • Trying to recover your data directly without court permission.
      • Debtor's Estate and Creditor Priority

        • Property of the Estate: All the bankrupt provider's assets become part of the “bankruptcy estate,” to be managed by a court-appointed trustee or receiver. The crucial question becomes: Is your data considered the property of the estate, or does ownership remain unequivocally with you? While most cloud contracts explicitly state that the customer owns their data, a bankruptcy court might still view the possession of that data by the provider as an asset of the estate, potentially subject to monetization to pay off creditors.
        • Secured vs. Unsecured Creditors: You, as a customer seeking to retrieve your data or continue services, are likely to be an “unsecured creditor.” Secured creditors (e.g., banks with liens on assets) get paid first. Your claim for data or service continuity will be far down the priority list, meaning you might recover little, if anything, in compensation.
      • Executory contracts and the Trustee's power
        • Assumption or Rejection: Bankruptcy law generally allows the trustee (or debtor in possession in a Chapter 11 case) to assume (continue) or reject (terminate) “executory contracts” – those where both parties still have significant performance obligations.
        • Trustee's Discretion: The trustee will make this decision based on what benefits the bankruptcy estate and the creditors. If your contract is loss-making for the provider, or if continuing it is not in the best interest of the creditors, the trustee can reject it, even if it has a termination clause unfavorable to them.
        • No Customer Right to Demand Continuation: You typically cannot compel the trustee to continue the service if they choose to reject the contract. Your recourse would then be a claim for damages, which, as noted, is usually a low-priority claim.
      • The practical challenges of data retrieval
          • Even if your contract has strong data return clauses, the practicalities of a bankrupt provider make enforcement difficult. The provider's staff might be laid off, systems might be shut down, and there might be no one left with the technical knowledge or resources to facilitate data export. Not to mention that the trustee may simply refuse to honor the agreement (which is completely within the legal rights of the trustee.)
          • The receiver's priority is liquidation and asset sale, not customer service. They may limit data export speeds or volumes, or prioritize the sale of the business, which might include your data, making retrieval a slow and arduous process.

      Conclusion

      So, while I understand the wait and see stance in regard to exit plans, given where we are, it is in my opinion the wrong thing to do. Companies must make actionable exit plans and prepare beforehand for the exit. That means that you have to:

      1. Design your architecture so that you can port your applications to somewhere else.
      2. Prioritize your data portability and data ownership.
      3. Develop and practice your exit strategy and plans.
      4. Maintain your in-house expertise, especially for all critical business services.
      5. Continuously monitor your vendors and update your risk assessments.

        If you want more detailed steps on how to get there, feel free to contact me.