Define Your Cloud Vision

  • Buy Link or Shortcode: {j2store}448|cart{/j2store}
  • member rating overall impact: 9.5/10 Overall Impact
  • member rating average dollars saved: $182,333 Average $ Saved
  • member rating average days saved: 28 Average Days Saved
  • Parent Category Name: Cloud Strategy
  • Parent Category Link: /cloud-strategy

The cloud permeates the enterprise technology discussion. It can be difficult to separate the hype from the value. Should everything go to the cloud, or is that sentiment stoked by vendors looking to boost their bottom lines? Not everything should go to the cloud, but coming up with a systematic way to determine what belongs where is increasingly difficult as offerings get more complex.

Our Advice

Critical Insight

Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud-first isn’t always the way to go.

Impact and Result

  • Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non-migration) path based on the value of cloud characteristics.
  • Codify risks tied to workloads’ cloud suitability and plan mitigations.
  • Build a roadmap of initiatives for actions by workload and risk mitigation.
  • Define a cloud vision to share with stakeholders.

Define Your Cloud Vision Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Define Your Cloud Vision – A step-by-step guide to generating, validating, and formalizing your cloud vision.

The cloud vision storyboard walks readers through the process of generating, validating and formalizing a cloud vision, providing a framework and tools to assess workloads for their cloud suitability and risk.

  • Define Your Cloud Vision – Phases 1-4

2. Cloud Vision Executive Presentation – A document that captures the results of the exercises, articulating use cases for cloud/non-cloud, risks, challenges, and high-level initiative items.

The executive summary captures the results of the vision exercise, including decision criteria for moving to the cloud, risks, roadblocks, and mitigations.

  • Cloud Vision Executive Presentation

3. Cloud Vision Workbook – A tool that facilitates the assessment of workloads for appropriate service model, delivery model, support model, and risks and roadblocks.

The cloud vision workbook comprises several assessments that will help you understand what service model, delivery model, support model, and risks and roadblocks you can expect to encounter at the workload level.

  • Cloud Vision Workbook
[infographic]

Workshop: Define Your Cloud Vision

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Understand the Cloud

The Purpose

Align organizational goals to cloud characteristics.

Key Benefits Achieved

An understanding of how the characteristics particular to cloud can support organizational goals.

Activities

1.1 Generate corporate goals and cloud drivers.

1.2 Identify success indicators.

1.3 Explore cloud characteristics.

1.4 Explore cloud service and delivery models.

1.5 Define cloud support models and strategy components.

1.6 Create state summaries for the different service and delivery models.

1.7 Select workloads for further analysis.

Outputs

Corporate cloud goals and drivers

Success indicators

Current state summaries

List of workloads for further analysis

2 Assess Workloads

The Purpose

Evaluate workloads for cloud value and action plan.

Key Benefits Achieved

Action plan for each workload.

Activities

2.1 Conduct workload assessment using the Cloud Strategy Workbook tool.

2.2 Discuss assessments and make preliminary determinations about the workloads.

Outputs

Completed workload assessments

Workload summary statements

3 Identify and Mitigate Risks

The Purpose

Identify and plan to mitigate potential risks in the cloud project.

Key Benefits Achieved

A list of potential risks and plans to mitigate them.

Activities

3.1 Generate a list of risks and potential roadblocks associated with the cloud.

3.2 Sort risks and roadblocks and define categories.

3.3 Identify mitigations for each identified risk and roadblock

3.4 Generate initiatives from the mitigations.

Outputs

List of risks and roadblocks, categorized

List of mitigations

List of initiatives

4 Bridge the Gap and Create the Strategy

The Purpose

Clarify your vision of how the organization can best make use of cloud and build a project roadmap.

Key Benefits Achieved

A clear vision and a concrete action plan to move forward with the project.

Activities

4.1 Review and assign work items.

4.2 Finalize the decision framework for each of the following areas: service model, delivery model, and support model.

4.3 Create a cloud vision statement

Outputs

Cloud roadmap

Finalized task list

Formal cloud decision rubric

Cloud vision statement

5 Next Steps and Wrap-Up

The Purpose

Complete your cloud vision by building a compelling executive-facing presentation.

Key Benefits Achieved

Simple, straightforward communication of your cloud vision to key stakeholders.

Activities

5.1 Build the Cloud Vision Executive Presentation

Outputs

Completed cloud strategy executive presentation

Completed Cloud Vision Workbook.

Further reading

Define Your Cloud Vision

Define your cloud vision before it defines you

Analyst perspective

Use the cloud’s strengths. Mitigate its weaknesses.

The cloud isn’t magic. It’s not necessarily cheaper, better, or even available for the thing you want it to do. It’s not mysterious or a cure-all, and it does take a bit of effort to systematize your approach and make consistent, defensible decisions about your cloud services. That’s where this blueprint comes in.

Your cloud vision is the culmination of this effort all boiled down into a single statement: “This is how we want to use the cloud.” That simple statement should, of course, be representative of – and built from – a broader, contextual strategy discussion that answers the following questions: What should go to the cloud? What kind of cloud makes sense? Should the cloud deployment be public, private, or hybrid? What does a migration look like? What risks and roadblocks need to be considered when exploring your cloud migration options? What are the “day 2” activities that you will need to undertake after you’ve gotten the ball rolling?

Taken as a whole, answering these questions is difficult task. But with the framework provided here, it’s as easy as – well, let’s just say it’s easier.

Jeremy Roberts

Research Director, Infrastructure and Operations

Info-Tech Research Group

Executive Summary

Your Challenge

  • You are both extrinsically motivated to move to the cloud (e.g. by vendors) and intrinsically motivated by internal digital transformation initiatives.
  • You need to define the cloud’s true value proposition for your organization without assuming it is an outsourcing opportunity or will save you money.
  • Your industry, once cloud-averse, is now normalizing the use of cloud services, but you have not established a basic cloud vision from which to develop a strategy at a later point.

Common Obstacles

  • Organizations jump to the cloud before defining their cloud vision and without any clear plan for realizing the cloud’s benefits.
  • Many organizations have a foot in the cloud already, but these decisions have been made in an ad hoc rather than systematic fashion.
  • You lack a consistent framework to assess your workloads’ suitability for the cloud.

Info-Tech's Approach

  • Evaluate workloads’ suitability for the cloud using Info-Tech’s methodology to select the optimal migration (or non-migration) path based on the value of cloud characteristics.
  • Codify risks tied to workloads’ cloud suitability and plan mitigations.
  • Build a roadmap of initiatives for actions by workload and risk mitigation.
  • Define a cloud vision to share with stakeholders.

Info-Tech Insight: 1) Base migration decisions on cloud characteristics. If your justification for the migration is simply getting your workload out of the data center, think again. 2) Address the risks up front in your migration plan. 3) The cloud changes roles and calls for different skill sets, but Ops is here to stay.

Your challenge

This research is designed to help organizations who need to:

  • Identify workloads that are good candidates for the cloud.
  • Develop a consistent, cost-effective approach to cloud services.
  • Outline and mitigate risks.
  • Define your organization’s cloud archetype.
  • Map initiatives on a roadmap.
  • Communicate your cloud vision to stakeholders so they can understand the reasons behind a cloud decision and differentiate between different cloud service and deployment models.
  • Understand the risks, roadblocks, and limitations of the cloud.

“We’re moving from a world where companies like Oracle and Microsoft and HP and Dell were all critically important to a world where Microsoft is still important, but Amazon is now really important, and Google also matters. The technology has changed, but most of the major vendors they’re betting their business on have also changed. And that’s super hard for people..” –David Chappell, Author and Speaker

Common obstacles

These barriers make this challenge difficult to address for many organizations:

  • Organizations jump to the cloud before defining their cloud vision and without any clear plan for realizing the cloud’s benefits.
  • Many organizations already have a foot in the cloud, but the choice to explore these solutions was made in an ad hoc rather than systematic fashion. The cloud just sort of happened.
  • The lack of a consistent assessment framework means that some workloads that probably belong in the cloud are kept on premises or with hosted services providers – and vice versa.
  • Securing cloud expertise is remarkably difficult – especially in a labor market roiled by the global pandemic and the increasing importance of cloud services.

Standard cloud challenges

30% of all cloud spend is self-reported as waste. Many workloads that end up in the cloud don’t belong there. Many workloads that do belong in the cloud aren’t properly migrated. (Flexera, 2021)

44% of respondents report themselves as under-skilled in the cloud management space. (Pluralsight, 2021)

Info-Tech’s approach

Goals and drivers

  • Service model
    • What type of cloud makes the most sense for workload archetypes? When does it make sense to pick SaaS over IaaS, for example?
  • Delivery model
    • Will services be delivered over the public cloud, a private cloud, or a hybrid cloud? What challenges accompany this decision?
  • Migration Path
    • What does the migration path look like? What does the transition to the cloud look like, and how much effort will be required? Amazon’s 6Rs framework captures migration options: rehosting, repurchasing, replatforming, and refactoring, along with retaining and retiring. Each workload should be assessed for its suitability for one or more of these paths.
  • Support model
    • How will services be provided? Will staff be trained, new staff hired, a service provider retained for ongoing operations, or will a consultant with cloud expertise be brought on board for a defined period? The appropriate support model is highly dependent on goals along with expected outcomes for different workloads.

Highlight risks and roadblocks

Formalize cloud vision

Document your cloud strategy

The Info-Tech difference:

  1. Determine the hypothesized value of cloud for your organization.
  2. Evaluate workloads with 6Rs framework.
  3. Identify and mitigate risks.
  4. Identify cloud archetype.
  5. Plot initiatives on a roadmap.
  6. Write action plan statement and goal statement.

What is the cloud, how is it deployed, and how is service provided?

Cloud Characteristics

  1. On-demand self-service: the ability to access reosurces instantly without vendor interaction
  2. Broad network access: all services delivered over the network
  3. Resource pooling: multi-tenant environment (shared)
  4. Rapid elasticity: the ability to expand and retract capabilities as needed
  5. Measured service: transparent metering

Service Model:

  1. Software-as-a-Service: all but the most minor configuration is done by the vendor
  2. Platform-as-a-Service: customer builds the application using tools provided by the provider
  3. Infrastructure-as-a-Service: the customer manages OS, storage, and the application

Delivery Model

  1. Public cloud: accessible to anyone over the internet; multi-tenant environment
  2. Private cloud: provisioned for a single organization with multiple units
  3. Hybrid cloud: two or more connected clouds; data is portage across them
  4. Community cloud: provisioned for a specific group of organizations

(National Institute of Standards and Technology)

A workload-first approach will allow you to take full advantage of the cloud’s strengths

  • Under all but the most exceptional circumstances, good cloud strategies will incorporate different service models. Very few organizations are “IaaS shops” or “SaaS shops,” even if they lean heavily in one direction.
  • These different service models (including non-cloud options like colocation and on-premises infrastructure) each have different strengths. Part of your cloud strategy should involve determining which of the services makes the most sense for you.
  • Own the cloud by understanding which cloud (or non-cloud!) offering makes the most sense for you given your unique context.

Migration paths

In a 2016 blog post, Amazon introduced a framework for understanding cloud migration strategies. The framework presented here is slightly modified – including a “relocate” component rather than a “retire” component – but otherwise hews close to the standard.

These migration paths reflect organizational capabilities and desired outcomes in terms of service models – cloud or otherwise. Retention means keeping the workload where it is, in a datacenter or a colocation service, or relocating to a colocation or hosted software environment. These represent the “non-cloud” migration paths.

In the graphic on the right, the paths within the red box lead to the cloud. Rehosting means lifting and shifting to an infrastructure environment. Migrating a virtual machine from your VMware environment on premises to Azure Virtual machines is a quick way to realize some benefits from the cloud. Migrating from SQL Server on premises to a cloud-based SQL solution looks a bit more like changing platforms (replatforming). It involves basic infrastructure modification without a substantial architectural component.

Refactoring is the most expensive of the options and involves engaging the software development lifecycle to build a custom solution, fundamentally rewriting the solution to be cloud native and take advantage of cloud-native architectures. This can result in a PaaS or an IaaS solution.

Finally, repurchasing means simply going to market and procuring a new solution. This may involve migrating data, but it does not require the migration of components.

Migration Paths

Retain (Revisit)

  • Keep the application in its current form, at least for now. This doesn’t preclude revisiting it in the future.

Relocate

  • Move the workload between datacenters or to a hosted software/colocation provider.

Rehost

  • Move the application to the cloud (IaaS) and continue to run it in more or less the same form as it currently runs.

Replatform

  • Move the application to the cloud and perform a few changes for cloud optimizations.

Refactor

  • Rewrite the application, taking advantage of cloud-native architectures.

Repurchase

  • Replace with an alternative, cloud-native application and migrate the data.

Support model

Support models by characteristic

Duration of engagement Specialization Flexibility
Internal IT Indefinite Varies based on nature of business Fixed, permanent staff
Managed Service Provider Contractually defined General, some specialization Standard offering
Consultant Project-based Specific, domain-based Entirely negotiable

IT services, including cloud services, can be delivered and managed in multiple ways depending on the nature of the workload and the organization’s intended path forward. Three high-level options are presented here and may be more or less valuable based on the duration of the expected engagement with the service (temporary or permanent), the skills specialization required, and the flexibility necessary to complete the job.

By way of example, a highly technical, short-term project with significant flexibility requirements might be a good fit for an expensive consultant, whereas post-implementation maintenance of a cloud email system requires relatively little specialization and flexibility and would therefore be a better fit for internal management.

There is no universally applicable rule here, but there are some workloads that are generally a good fit for the cloud and others that are not as effective, with that fit being conditional on the appropriate support model being employed.

Risks, roadblocks, and strategy components

No two cloud strategies are exactly alike, but all should address 14 key areas. A key step in defining your cloud vision is an assessment of these strategy components. Lower maturity does not preclude an aggressive cloud strategy, but it does indicate that higher effort will be required to make the transition.

Component Description Component Description
Monitoring What will system owners/administrators need visibility into? How will they achieve this? Vendor Management What practices must change to ensure effective management of cloud vendors?
Provisioning Who will be responsible for deploying cloud workloads? What governance will this process be subject to? Finance Management How will costs be managed with the transition away from capital expenditure?
Migration How will cloud migrations be conducted? What best practices/standards must be employed? Security What steps must be taken to ensure that cloud services meet security requirements?
Operations management What is the process for managing operations as they change in the cloud? Data Controls How will data residency, compliance, and protection requirements be met in the cloud?
Architecture What general principles must apply in the cloud environment? Skills and roles What skills become necessary in the cloud? What steps must be taken to acquire those skills?
Integration and interoperability How will services be integrated? What standards must apply? Culture and adoption Is there a cultural aversion to the cloud? What steps must be taken to ensure broad cloud acceptance?
Portfolio Management Who will be responsible for managing the growth of the cloud portfolio? Governing bodies What formal governance must be put in place? Who will be responsible for setting standards?

Cloud archetypes – a cloud vision component

Once you understand the value of the cloud, your workloads’ general suitability for cloud, and your proposed risks and mitigations, the next step is to define your cloud archetype.

Your organization’s cloud archetype is the strategic posture that IT adopts to best support the organization’s goals. Info-Tech’s model recognizes seven archetypes, divided into three high-level archetypes.

After consultation with your stakeholders, and based on the results of the suitability and risk assessment activities, define your archetype. The archetype feeds into the overall cloud vision and provides simple insight into the cloud future state for all stakeholders.

The cloud vision itself is captured in a “vision statement,” a short summary of the overall approach that includes the overall cloud archetype.

We can best support the organization's goals by:

More Cloud

Less Cloud

Cloud Focused Cloud-Centric Providing all workloads through cloud delivery.
Cloud-First Using the cloud as our default deployment model. For each workload, we should ask “why NOT cloud?”
Cloud Opportunistic Hybrid Enabling the ability to transition seamlessly between on-premises and cloud resources for many workloads.
Integrated Combining cloud and traditional infrastructure resources, integrating data and applications through APIs or middleware.
Split Using the cloud for some workloads and traditional infrastructure resources for others.
Cloud Averse Cloud-Light Using traditional infrastructure resources and limiting our use of the cloud to when it is absolutely necessary.
Anti-Cloud Using traditional infrastructure resources and avoiding use of the cloud wherever possible.

Info-Tech’s methodology for defining your cloud vision

1. Understand the Cloud 2. Assess Workloads 3. Identify and Mitigate Risks 4. Bridge the Gap and Create the Vision
Phase Steps
  1. Generate goals and drivers
  2. Explore cloud characteristics
  3. Create a current state summary
  4. Select workloads for analysis
  1. Conduct workload assessments
  2. Determine workload future state
  1. Generate risks and roadblocks
  2. Mitigate risks and roadblocks
  3. Define roadmap initiatives
  1. Review and assign work items
  2. Finalize cloud decision framework
  3. Create cloud vision
Phase Outcomes
  1. List of goals and drivers
  2. Shared understanding of cloud terms
  3. Current state of cloud in the organization
  4. List of workloads to be assessed
  1. Completed workload assessments
  2. Defined workload future state
  1. List of risks and roadblocks
  2. List of mitigations
  3. Defined roadmap initiatives
  1. Cloud roadmap
  2. Cloud decision framework
  3. Completed Cloud Vision Executive Presentation

Insight summary

The cloud may not be right for you – and that’s okay!

Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud first isn’t always the way to go.

Not all clouds are equal

It’s not “should I go to the cloud?” but “what service and delivery models make sense based on my needs and risk tolerance?” Thinking about the cloud as a binary can force workloads into the cloud that don’t belong (and vice versa).

Bottom-up is best

A workload assessment is the only way to truly understand the cloud’s value. Work from the bottom up, not the top down, understand what characteristics make a workload cloud suitable, and strategize on that basis.

Your accountability doesn’t change

You are still accountable for maintaining available, secure, functional applications and services. Cloud providers share some responsibility, but the buck stops where it always has: with you.

Don’t customize for the sake of customization

SaaS providers make money selling the same thing to everyone. When migrating a workload to SaaS, work with stakeholders to pursue standardization around a selected platform and avoid customization where possible.

Best of both worlds, worst of both worlds

Hybrid clouds are in fashion, but true hybridity comes with additional cost, administration, and other constraints. A convoy moves at the speed of its slowest member.

The journey matters as much as the destination

How you get there is as important as what “there” actually is. Any strategy that focuses solely on the destination misses out on a key part of the value conversation: the migration strategy.

Blueprint benefits

Cloud Vision Executive Presentation

This presentation captures the results of the exercises and presents a complete vision to stakeholders including a desired target state, a rubric for decision making, the results of the workload assessments, and an overall risk profile.

Cloud Vision Workbook

This workbook includes the standard cloud workload assessment questionnaire along with the results of the assessment. It also includes the milestone timeline for the implementation of the cloud vision.

Blueprint benefits

IT Benefits

  • A consistent approach to the cloud takes the guesswork out of deployment decisions and makes it easier for IT to move on to the execution stage.
  • When properly incorporated, cloud services come with many benefits, including automation, elasticity, and alternative architectures (micro-services, containers). The cloud vision project will help IT readers articulate expected benefits and work towards achieving them.
  • A clear framework for incorporating organizational goals into cloud plans.

Business benefits

  • Simple, well-governed access to high-quality IT resources.
  • Access to the latest and greatest in technology to facilitate remote work.
  • Framework for cost management in the cloud that incorporates OpEx and chargebacks/showbacks. A clear understanding of expected changes to cost modeling is also a benefit of a cloud vision.
  • Clarity for stakeholders about IT’s response (and contribution to) IT strategic initiatives.

Measure the value of this blueprint

Don’t take our word for it:

  • The cloud vision material in various forms has been offered for several years, and members have generally benefited substantially, both from cloud vision workshops and from guided implementations led by analysts.
  • After each engagement, we send a survey that asks members how they benefited from the experience. Of 30 responses, the cloud vision research has received an average score of 9.8/10. Real members have found significant value in the process.
  • Additionally, members reported saving between 2 and 120 days (for an average of 17), and financial savings ranged from $1,920 all the way up to $1.27 million, for an average of $170,577.90! If we drop outliers on both ends, the average reported value of a cloud vision engagement is $37, 613.
  • Measure the value by calculating the time saved from using Info-Tech’s framework vs. a home-brewed cloud strategy alternative and by comparing the overall cost of a guided implementation or workshop with the equivalent offering from another firm. We’re confident you’ll come out ahead.

9.8/10 Average reported satisfaction

17 Days Average reported time savings

$37, 613 Average cost savings (adj.)

Executive Brief Case Study

Industry: Financial

Source: Info-Tech workshop

Anonymous financial institution

A small East Coast financial institution was required to develop a cloud strategy. This strategy had to meet several important requirements, including alignment with strategic priorities and best practices, along with regulatory compliance, including with the Office of the Comptroller of the Currency.

The bank already had a significant cloud footprint and was looking to organize and formalize the strategy going forward.

Leadership needed a comprehensive strategy that touched on key areas including the delivery model, service models, individual workload assessments, cost management, risk management and governance. The output had to be consumable by a variety of audiences with varying levels of technical expertise and had to speak to IT’s role in the broader strategic goals articulated earlier in the year.

Results

The bank engaged Info-Tech for a cloud vision workshop and worked through four days of exercises with various IT team members. The bank ultimately decided on a multi-cloud strategy that prioritized SaaS while also allowing for PaaS and IaaS solutions, along with some non-cloud hosted solutions, based on organizational circumstances.

Bank cloud vision

[Bank] will provide innovative financial and related services by taking advantage of the multiplicity of best-of-breed solutions available in the cloud. These solutions make it possible to benefit from industry-level innovations, while ensuring efficiency, redundancy, and enhanced security.

Bank cloud decision workflow

  • SaaS
    • Platform?
      • Yes
        • PaaS
      • No
        • Hosted
      • IaaS
        • Other

Non-cloud

Cloud

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

"Our team has already made this crticial project a priority, and we have the time and capability, but some guidance along the way would be helpful."

Guided Implementation

"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

Workshop

"We need to hit the ground running and get this project kicked off imediately. Our team has the ability to take this over once we get a framework and strategy in place."

Consulting

"Our team does not have the time or the knowledge the take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks are used throughout all four options.

Guided Implementation

What does a typical GI on this topic look like?

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

Phase 1

  • Call #1: Discuss current state, challenges, etc.
  • Call #2: Goals, drivers, and current state.

Phase 2

  • Call #3: Conduct cloud suitability assessment for selected workloads.

Phase 3

  • Call #4: Generate and categorize risks.
  • Call #5: Begin the risk mitigation conversation.

Phase 4

  • Call #6: Complete the risk mitigation process
  • Call #7: Finalize vision statement and cloud decision framework.

Workshop Overview

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

Day 1 Day 2 Day 3 Day 4 Offsite day
Understand the cloud Assess workloads Identify and mitigate risks Bridge the gap and create the strategy Next steps and wrap-up (offsite)
Activities

1.1 Introduction

1.2 Generate corporate goals and cloud drivers

1.3 Identify success indicators

1.4 Explore cloud characteristics

1.5 Explore cloud service and delivery models

1.6 Define cloud support models and strategy components

1.7 Create current state summaries for the different service and delivery models

1.8 Select workloads for further analysis

2.1 Conduct workload assessments using the cloud strategy workbook tool

2.2 Discuss assessments and make preliminary determinations about workloads

3.1 Generate a list of risks and potential roadblocks associated with the cloud

3.2 Sort risks and roadblocks and define categories

3.3 Identify mitigations for each identified risk and roadblock

3.4 Generate initiatives from the mitigations

4.1 Review and assign work items

4.2 Finalize the decision framework for each of the following areas:

  • Service model
  • Delivery model
  • Support model

4.3 Create a cloud vision statement

5.1 Build the Cloud Vision Executive Presentation
Deliverables
  1. Corporate goals and cloud drivers
  2. Success indicators
  3. Current state summaries
  4. List of workloads for further analysis
  1. Completed workload assessments
  2. Workload summary statements
  1. List of risks and roadblocks, categorized
  2. List of mitigations
  3. List of initiatives
  1. Finalized task list
  2. Formal cloud decision rubric
  3. Cloud vision statement
  1. Completed cloud strategy executive presentation
  2. Completed cloud vision workbook

Understand the cloud

Build the foundations of your cloud vision

Phase 1

Phase 1

Understand the Cloud

Phase 1

1.1 Generate goals and drivers

1.2 Explore cloud characteristics

1.3 Create a current state summary

1.4 Select workloads for analysis

Phase 2

2.1 Conduct workload assessments

2.2 Determine workload future states

Phase 3

3.1 Generate risks and roadblocks

3.2 Mitigate risks and roadblocks

3.3 Define roadmap initiatives

Phase 4

4.1 Review and assign work items

4.2 Finalize cloud decision framework

4.3 Create cloud vision

This phase will walk you through the following activities:

1.1.1 Generate organizational goals

1.1.2 Define cloud drivers

1.1.3 Define success indicators

1.3.1 Record your current state

1.4.1 Select workloads for further assessment

This phase involves the following participants:

IT management, the core working group, security, infrastructure, operations, architecture, engineering, applications, non-IT stakeholders.

It starts with shared understanding

Stakeholders must agree on overall goals and what “cloud” means

The cloud is a nebulous term that can reasonably describe services ranging from infrastructure as a service as delivered by providers like Amazon Web Services and Microsoft through its Azure platform, right up to software as a service solutions like Jira or Salesforce. These solutions solve different problems – just because your CRM would be a good fit for a migration to Salesforce doesn’t mean the same system would make sense in Azure or AWS.

This is important because the language we use to talk about the cloud can color our approach to cloud services. A “cloud-first” strategy will mean something different to a CEO with a concept of the cloud rooted in Salesforce than it will to a system administrator who interprets it to mean a transition to cloud-hosted virtual machines.

Add to this the fact that not all cloud services are hosted externally by providers (public clouds) and the fact that multiple delivery models can be engaged at once through hybrid or multi-cloud approaches, and it’s apparent that a shared understanding of the cloud is necessary for a coherent strategy to take form.

This phase proceeds in four steps, each governed by the principle of shared understanding. The first requires a shared understanding of corporate goals and drivers. Step 2 involves coming to a shared understanding of the cloud’s unique characteristics. Step 3 requires a review of the current state. Finally, in Step 4, participants will identify workloads that are suitable for analysis as candidates for the cloud.

Step 1.1

Generate goals and drivers

Activities

1.1.1 Define organizational goals

1.1.2 Define cloud drivers

1.1.3 Define success indicators

Generate goals and drivers

Explore cloud characteristics

Create a current state summary

Select workloads for analysis

This step involves the following participants:

  • IT management
  • Core working group
  • Security
  • Applications
  • Infrastructure
  • Service management
  • Leadership

Outcomes of this step

  • List of organizational goals
  • List of cloud drivers
  • Defined success indicators

What can the cloud do for you?

The cloud is not valuable for its own sake, and not all users derive the same value

  • The cloud is characterized by on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Any or all of those characteristics might be enough to make the cloud appealing, but in most cases, there is an overriding driver.
  • Multiple paths may lead to the cloud. Consider an organization with a need to control costs by showing back to business units, or perhaps by reducing capital expenditure – the cloud may be the most appropriate way to effect these changes. Conversely, an organization expanding rapidly and with a need to access the latest and greatest technology might benefit from the elasticity and pooled resources that major cloud providers can offer.
  • In these cases, the destination might be the same (a cloud solution) but the delivery model – public, private, or hybrid – and the decisions made around the key strategy components, including architecture, provisioning, and cost management, will almost certainly be different.
  • Defining goals, understanding cloud drivers, and – crucially – understanding what success means, are all therefore essential elements of the cloud vision process.

1.1.1 Generate organizational goals

1-3 hours

Input

  • Strategy documentation

Output

  • Organizational goals

Materials

  • Whiteboard (digital/physical)

Participants

  • IT leadership
  • Infrastructure
  • Applications
  • Security
  1. As a group, brainstorm organizational goals, ideally based on existing documentation
    • Review relevant corporate and IT strategies.
    • If you do not have access to internal documentation, review the standard goals on the next slide and select those that are most relevant for you.
  2. Record the most important business goals in the Cloud Vision Executive Presentation. Include descriptions where possible to ensure wide readability.
  3. Make note of these goals. They should inform the answers to prompts offered in the Cloud Vision Workbook and should be a consistent presence in the remainder of the visioning exercise. If you’re conducting the session in person, leave the goals up on a whiteboard and make reference to them throughout the workshop.

Cloud Vision Executive Presentation

Standard COBIT 19 enterprise goals

  1. Portfolio of competitive products and services
  2. Managed business risk
  3. Compliance with external laws and regulations
  4. Quality of financial information
  5. Customer-oriented service culture
  6. Business service continuity and availability
  7. Quality of management information
  8. Optimization of internal business process functionality
  9. Optimization of business process costs
  10. Staff skills, motivation, and productivity
  11. Compliance with internal policies
  12. Managed digital transformation programs
  13. Product and business innovation

1.1.2 Define cloud drivers

30-60 minutes

Input

  • Organizational goals
  • Strategy documentation
  • Management/staff perspective

Output

  • List of cloud drivers

Materials

  • Sticky notes
  • Whiteboard
  • Markers

Participants

  • IT leadership
  • Infrastructure
  • Applications
  • Security
  1. Cloud drivers sit at a level of abstraction below organizational goals. Keeping your organizational goals in mind, have each participant in the session write down how they expect to benefit from the cloud on a sticky note.
  2. Solicit input one at a time and group similar responses. Encourage participants to bring forward their cloud goals even if similar goals have been mentioned previously. The number of mentions is a useful way to gauge the relative weight of the drivers.
  3. Once this is done, you should have a few groups of similar drivers. Work with the group to name each category. This name will be the driver reported in the documentation.
  4. Input the results of the exercise into the Cloud Vision Executive Presentation, and include descriptions based on the constituent drivers. For example, if a driver is titled “do more valuable work,” the constituent drivers might be “build cloud skills,” “focus on core products,” and “avoid administration work where possible.” The description would be based on these components.

Cloud Vision Executive Presentation

1.1.3 Define success indicators

1 hour

Input

  • Cloud drivers
  • Organizational goals

Output

  • List of cloud driver success indicators

Materials

  • Whiteboard
  • Markers

Participants

  • IT leadership
  • Infrastructure
  • Applications
  • Security
  1. On a whiteboard, draw a table with each of the cloud drivers (identified in 1.1.2) across the top.
  2. Work collectively to generate success indicators for each cloud driver. In this case, a success indicator is some way you can report your progress with the stated driver. It is a real-world proxy for the sometimes abstract phenomena that make up your drivers. Think about what would be true if your driver was realized.
    1. For example, if your driver is “faster access to resources,” you might consider indicators like developer satisfaction, project completion time, average time to provision, etc.
  3. Once you are satisfied with your list of indicators, populate the slide in the Cloud Vision Executive Presentation for validation from stakeholders.

Cloud Vision Executive Presentation

Step 1.2

Explore cloud characteristics

Activities

Understand the value of the cloud:

  • Review delivery models
  • Review support models
  • Review service models
  • Review migration paths

Understand the Cloud

Generate goals and drivers

Explore cloud characteristics

Create a current state summary

Select workloads for analysis

This step involves the following participants:

  • Core working group
  • Architecture
  • Engineering
  • Security

Outcomes of this step

  • Understanding of cloud service models and value

Defining the cloud

Per NIST, the cloud has five fundamental characteristics. All clouds have these characteristics, even if they are executed in somewhat different ways between delivery models, service models, and even individual providers.

Cloud characteristics

On-demand self-service

Cloud customers are capable of provisioning cloud resources without human interaction (e.g. contacting sales), generally through a web console.

Broad network access

Capabilities are designed to be delivered over a network and are generally intended for access by a wide variety of platform types (cloud services are generally device-agnostic).

Resource pooling

Multiple customers (internal, in the case of private clouds) make use of a highly abstracted shared infrastructure managed by the cloud provider.

Rapid elasticity

Customers are capable of provisioning additional resources as required, pulling from a functionally infinite pool of capacity. Cloud resources can be spun-down when no longer needed.

Measured service

Consumption is metered based on an appropriate unit of analysis (number of licenses, storage used, compute cycles, etc.) and billing is transparent and granular.

Cloud delivery models

The NIST definition of cloud computing outlines four cloud delivery models: public, private, hybrid, and community clouds. A community cloud is like a private cloud, but it is provisioned for the exclusive use of a like-minded group of organizations, usually in a mutually beneficial, non-competitive arrangement. Universities and hospitals are examples of organizations that can pool their resources in this way without impacting competitiveness. The Info-Tech model covers three key delivery models – public, private, and hybrid, and an overarching model (multi-cloud) that can comprise more than one of the other models – public + public, public + hybrid, etc.

Public

The cloud service is provisioned for access by the general public (customers).

Private

A private cloud has the five key characteristics, but is provisioned for use by a single entity, like a company or organization.

Hybrid

Hybridity essentially refers to interoperability between multiple cloud delivery models (public +private).

Multi

A multi-cloud deployment requires only that multiple clouds are used without any necessary interoperability (Nutanix, 2019).

Public cloud

This is what people generally think about when they talk about cloud

  • The public cloud is, well, public! Anyone can make use of its resources, and in the case of the major providers, capacity is functionally unlimited. Need to store exabytes of data in the cloud? No problem! Amazon will drive a modified shipping container to your datacenter, load it up, and “migrate” it to a datacenter.
  • Public clouds offer significant variety on the infrastructure side. Major IaaS providers, like Microsoft and Amazon, offer dozens of services across many different categories including compute, networking, and storage, but also identity, containers, machine learning, virtual desktops, and much, much more. (See a list from Microsoft here, and Amazon here)
  • There are undoubtedly strengths to the public cloud model. Providers offer the “latest and greatest” and customers need not worry about the details, including managing infrastructure and physical locations. Providers offer built-in redundancy, multi-regional deployments, automation tools, management and governance solutions, and a variety of leading-edge technologies that would not be feasible for organizations to run in-house, like high performance compute, blockchain, or quantum computing.
  • Of course, the public cloud is not all sunshine and rainbows – there are downsides as well. It can be expensive; it can introduce regulatory complications to have to trust another entity with your key information. Additionally, there can be performance hiccups, and with SaaS products, it can be difficult to monitor at the appropriate (per-transaction) level.

Prominent examples include:

AWS

Microsoft

Azure

Salesforce.com

Workday

SAP

Private cloud

A lower-risk cloud for cloud-averse customers?

  • A cloud is a cloud, no matter how small. Some IT shops deploy private clouds that make use of the five key cloud characteristics but provisioned for the exclusive use of a single entity, like a corporation.
  • Private clouds have numerous benefits. Some potential cloud customers might be uncomfortable with the shared responsibility that is inherent in the public cloud. Private clouds allow customers to deliver flexible, measured services without having to surrender control, but they require significant overhead, capital expenditure, administrative effort, and technical expertise.
  • According to the 2021 State of the Cloud Report, private cloud use is common, and the most frequently cited toolset is VMware vSphere, followed by Azure Stack, OpenStack, and AWS Outposts. Private cloud deployments are more common in larger organizations, which makes sense given the overhead required to manage such an environment.

Private cloud adoption

The images shows a graph titled Private Cloud Adoption for Enterprises. It is a horizontal bar graph, with three segments in each bar: dark blue marking currently use; mid blue marking experimenting; and light blue marking plan to use.

VMware and Microsoft lead the pack among private cloud customers, with Amazon and Red Hat also substantially present across private cloud environments.

Hybrid cloud

The best of both worlds?

Hybrid cloud architectures combine multiple cloud delivery models and facilitate some level of interoperability. NIST suggests bursting and load balancing as examples of hybrid cloud use cases. Note: it is not sufficient to simply have multiple clouds running in parallel – there must be a toolset that allows for an element of cross-cloud functionality.

This delivery model is attractive because it allows users to take advantage of the strengths of multiple service models using a single management pane. Bursting across clouds to take advantage of additional capacity or disaster recovery capabilities are two obvious use cases that appeal to hybrid cloud users.

But while hybridity is all the rage (especially given the impact Covid-19 has had on the workplace), the reality is that any hybrid cloud user must take the good with the bad. Multiple clouds and a management layer can be technically complex, expensive, and require maintaining a physical infrastructure that is not especially valuable (“I thought we were moving to the cloud to get out of the datacenter!”).

Before selecting a hybrid approach through services like VMware Cloud on AWS or Microsoft’s Azure Stack, consider the cost, complexity, and actual expected benefit.

Amazon, Microsoft, and Google dominate public cloud IaaS, but IBM is betting big on hybrid cloud:

The image is a screencap of a tweet from IBM News. The tweet reads: IBM CEO Ginni Rometty: Hybrid cloud is a trillion dollar market and we'll be number one #Think2019.

With its acquisition of Red Hat in 2019 for $34 billion, Big Blue put its money where its mouth is and acquired a substantial hybrid cloud business. At the time of the acquisition, Red Hat’s CEO, Jim Whitehurst, spoke about the benefit IBM expected to receive:

“Joining forces with IBM gives Red Hat the opportunity to bring more open source innovation to an even broader range of organizations and will enable us to scale to meet the need for hybrid cloud solutions that deliver true choice and agility” (Red Hat, 2019).

Multi-cloud

For most organizations, the multi-cloud is the most realistic option.

Multi-cloud is popular!

The image shows a graph titled Multi-Cloud Architectures Used, % of all Respondents. The largest percentage is Apps siloed on different clouds, followed by DAta integration between clouds.

Multi-cloud solutions exist at a different layer of abstraction from public, private, and even hybrid cloud delivery models. A multi-cloud architecture, as the name suggests, requires the user to be a customer of more than one cloud provider, and it can certainly include a hybrid cloud deployment, but it is not bound by the same rules of interoperability.

Many organizations – especially those with fewer resources or a lack of a use case for a private cloud – rely on a multi-cloud architecture to build applications where they belong, and they manage each environment separately (or occasionally with the help of cloud management platforms).

If your data team wants to work in AWS and your enterprise services run on basic virtual machines in Azure, that might be the most effective architecture. As the Flexera 2021 State of the Cloud Report suggests, this architecture is far more common than the more complicated bursting or brokering architectures characteristic of hybrid clouds.

NIST cloud service models

Software as a service

SaaS has exploded in popularity with consumers who wish to avail themselves of the cloud’s benefits without having to manage underlying infrastructure components. SaaS is simple, generally billed per-user per-month, and is almost entirely provider-managed.

Platform as a service

PaaS providers offer a toolset for their customers to run custom applications and services without the requirement to manage underlying infrastructure components. This service model is ideal for custom applications/services that don’t benefit from highly granular infrastructure control.

Infrastructure as a service

IaaS represents the sale of components. Instead of a service, IaaS providers sell access to components, like compute, storage, and networking, allowing for customers to build anything they want on top of the providers’ infrastructure.

Cloud service models

  • This research focuses on five key service models, each of which has its own strengths and weaknesses. Moving right from “on-prem,” customers gradually give up more control over their environments to cloud service providers.
  • An entirely premises-based environment means that the customer is responsible for everything ranging from the dirt under the datacenter to application-level configurations. Conversely, in a SaaS environment, the provider is responsible for everything but those top-level application configurations.
  • A managed service provider or other third party can manage any or of the components of the infrastructure stack. A service provider may, for example, build a SaaS solution on top of another provider’s IaaS, or might offer configuration assistance with a commercially available SaaS.

Info-Tech Insight

Not all workloads fit well in the cloud. Many environments will mix service models (e.g. SaaS for some workloads, some in IaaS, some on-premises), and this can be perfectly effective. It must be consistent and intentional, however.

On-prem Co-Lo IaaS PaaS SaaS
Application Application Application Application Application
Database Database Database Database Database
Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware Runtime/ Middleware
OS OS OS OS OS
Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor
Server Network Storage Server Network Storage Server Network Storage Server Network Storage Server Network Storage
Facilities Facilities Facilities Facilities Facilities

Organization has control

Organization or vendor may control

Vendor has control

Analytics folly

SaaS is good, but it’s not a panacea

Industry: Healthcare

Source: Info-Tech workshop

Situation

A healthcare analytics provider had already moved a significant number of “non-core workloads” to the cloud, including email, HRIS, and related services.

The company CEO was satisfied with the reduced effort required by IT to manage SaaS-based workloads and sought to extend the same benefits to the core analytics platform where there was an opportunity to reduce overhead.

Complication

Many components of the health analytics service were designed to run specifically in a datacenter and were not ready to be migrated to the cloud without significant effort/refactoring. SaaS was not an option because this was a core platform – a SaaS provider would have been the competition.

That left IaaS, which was expensive and would not bring the expected benefits (reduced overhead).

Results

The organization determined that there were no short-term gains from migrating to the cloud. Due to the nature of the application (its extensive customization, the fact that it was a core product sold by the company) any steps to reduce operational overhead were not feasible.

The CEO recognized that the analytics platform was not a good candidate for the cloud and what distinguished the analytics platform from more suitable workloads.

Migration paths

In a 2016 blog post, Amazon Web Services articulated a framework for cloud migration that incorporates elements of the journey as well as the destination. If workload owners do not choose to retain or retire their workloads, there are four alternatives. These alternatives all stack up differently along five key dimensions:

  1. Value: does the workload stand to benefit from unique cloud characteristics? To what degree?
  2. Effort: how much work would be required to make the transition?
  3. Cost: how much money is the migration expected to cost?
  4. Time: how long will the migration take?
  5. Skills: what skills must be brought to bear to complete the migration?

Not all migration paths can lead to all destinations. Rehosting generally means IaaS, while repurchasing leads to SaaS. Refactoring and replatforming have some variety of outcomes, and it becomes possible to take advantage of new IaaS architectures or migrate workloads over fully to SaaS.

As part of the workload assessment process, use the five dimensions (expanded upon on the next slide) to determine what migration path makes sense. Preferred migration paths form an important part of the overall cloud vision process.

Retain (Revisit)

  • Keep the application in its current form, at least for now. This doesn’t preclude revisiting it in the future.

Retire

  • Get rid of the application completely.

Rehost

  • Move the application to the cloud (IaaS) and continue to run it in more or less the same form as it currently runs.

Replatform

  • Move the application to the cloud and perform a few changes for cloud optimizations.

Refactor

  • Rewrite the application, taking advantage of cloud native architectures.

Repurchase

  • Replace with an alternative, cloud-native application and migrate the data.

Migration paths – relative value

Migration path Value Effort Cost Time Skills
Retain No real change in the absolute value of the workload if it is retained. No effort beyond ongoing workload maintenance. No immediate hard dollar costs, but opportunity costs and technical debt abound. No time required! (At least not right away…) Retaining requires the same skills it has always required (which may be more difficult to acquire in the future).
Rehire A retired workload can provide no value, but it is not a drain! Spinning a service down requires engaging that part of the lifecycle. N/A Retiring the service may be simple or complicated depending on its current role. N/A
Rehost Some value comes with rehosting, but generally components stay the same (VM here vs. a VM there). Minimal effort required, especially with automated tools. The effort will depend on the environment being migrated. Relatively cheap compared to other options. Rehosting infrastructure is the simplest cloud migration path and is useful for anyone in a hurry. Rehosting is the simplest cloud migration path for most workloads, but it does require basic familiarity with cloud IaaS.

Replatform

Replatformed workloads can take advantage of cloud-native services (SQL vs. SQLaaS). Replatforming is more effortful than rehosting, but less effortful than refactoring. Moderate cost – does not require fundamental rearchitecture, just some tweaking. Relatively more complicated than a simple rehost, but less demanding than a refactor. Platform and workload expertise is required; more substantial than a simple rehost.
Refactor A fully formed, customized cloud-based workload that can take advantage of cloud-native architectures is generally quite valuable. Significant effort required based on the requirement to engage the full SDLC. Significant cost required to engage SDLC and rebuild the application/service. The most complicated and time-consuming. The most complicated and time-consuming.
Repurchase Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Repurchasing is the quickest way to achieve cloud-native value. There are compromises, however (high cost, vendor-lock-in). Configuration – especially for massive projects – can be time consuming, but in general repurchasing can be quite fast. Buying software does require knowledge of requirements and integrations, but is otherwise quite simple.

Where should you get your cloud skills?

Cloud skills are certainly top of mind right now. With the great upheaval in both work patterns and in the labor market more generally, expertise in cloud-related areas is simultaneously more valuable and more difficult to procure. According to Pluralsight’s 2021 “State of Upskilling” report, 44% of respondents report themselves under-skilled in the cloud management area, making cloud management the most significant skill gap reported on the survey.

Everyone left the office. Work as we know it is fundamentally altered for a generation or more. Cloud services shot up in popularity by enabling the transition. And yet there is a gap – a prominent gap – in skilling up for this critically important future. What is the cloud manager to do?

Per the framework presented here, that manager has three essential options. They may take somewhat different forms depending on specific requirements and the quirks of the local market, but the options are:

  1. Train or hire internal resources: This might be easier said than done, especially for more niche skills, but makes sense for workloads that are critical to operations for the long term.
  2. Engage a managed service provider: MSPs are often engaged to manage services where internal IT lacks bandwidth or expertise.
  3. Hire a consultant: Consultants are great for time-bound implementation projects where highly specific expertise is required, such as a migration or implementation project.

Each model makes sense to some degree. When evaluating individual workloads for cloud suitability, it is critical to consider the support model – both immediate and long term. What makes sense from a value perspective?

Cloud decisions – summary

A key component of the Info-Tech cloud vision model is that it is multi-layered. Not every decision must be made at every level. At the workload level, it makes sense to select service models that make sense, but each workload does not need its own defined vision. Workload-level decisions should be guided by an overall strategy but applied tactically, based on individual workload characteristics and circumstances.

Conversely, some decisions will inevitably be applied at the environment level. With some exceptions, it is unlikely that cloud customers will build an entire private/hybrid cloud environment around a single solution; instead, they will define a broader strategy and fit individual workloads into that strategy.

Some considerations exist at both the workload and environment levels. Risks and roadblocks, as well as the preferred support model, are concerns that exist at both the environment level and at the workload level.

The image is a Venn diagram, with the left side titled Workload level, and the right side titled Environment Level. In the left section are: service model and migration path. On the right section are: Overall vision and Delivery model. In the centre section are: support model and Risks and roadblocks.

Step 1.3

Create a current state summary

Activities

1.3.1 Record your current state

Understand the Cloud

Generate goals and drivers

Explore cloud characteristics

Create a current state summary

Select workloads for analysis

This step involves the following participants: Core working group

Outcomes of this step

  • Current state summary of cloud solutions

1.3.1 Record your current state

30 minutes

Input

  • Knowledge of existing cloud workloads

Output

  • Current state cloud summary for service, delivery, and support models

Materials

  • Whiteboard

Participants

  • Core working group
  • Infrastructure team
  • Service owners
  1. On a whiteboard (real or virtual) draw a table with each of the cloud service models across the top. Leave a cell below each to list examples.
  2. Under each service model, record examples present in your environment. The purpose of the exercise is to illustrate the existence of cloud services in your environment or the lack thereof, so there is no need to be exhaustive. Complete this in turn for each service model until you are satisfied that you have created an effective picture of your current cloud SaaS state, IaaS state, etc.
  3. Input the results into their own slide titled “current state summary” in the Cloud Vision Executive Presentation.
  4. Repeat for the cloud delivery models and support models and include the results of those exercises as well.
  5. Create a short summary statement (“We are primarily a public cloud consumer with a large SaaS footprint and minimal presence in PaaS and IaaS. We retain an MSP to manage our hosted telephony solution; otherwise, everything is handled in house.”

Cloud Vision Executive Presentation

Step 1.4

Select workloads for current analysis

Activities

1.4.1 Select workloads for assessment

This step involves the following participants:

  • Core working group

Outcomes of this step

  • List of workloads for assessment

Understand the cloud

Generate goals and drivers

Explore cloud characteristics

Create a current state summary

Select workloads for analysis

1.4.1 Select workloads for assessment

30 minutes

Input

  • Knowledge of existing cloud workloads

Output

  • List of workloads to be assessed

Materials

  • Whiteboard
  • Cloud Vision Workbook

Participants

  • Core working group
  • IT management
  1. In many cases, the cloud project is inspired by a desire to move a particular workload or set of workloads. Solicit feedback from the core working group about what these workloads might be. Ask everyone in the meeting to suggest a workload and record each one on a sticky note or white board (virtual or physical).
  2. Discuss the results with the group and begin grouping similar workloads together. They will be subject to the assessments in the Cloud Vision Workbook, so try to avoid selecting too many workloads that will produce similar answers. It might not be obvious, but try to think about workloads that have similar usage patterns, risk levels, and performance requirements, and select a representative group.
  3. You should embrace counterintuition by selecting a workload that you think is unlikely to be a good fit for the cloud if you can and subjecting it to the assessment as well for validation purposes.
  4. When you have a list of 4-6 workloads, record them on tab 2 of the Cloud Vision Workbook.

Cloud Vision Workbook

Assess your cloud workloads

Build the foundations of your cloud vision

Phase 2

Phase 2

Evaluate Cloud Workloads

Phase 1

1.1 Generate goals and drivers

1.2 Explore cloud characteristics

1.3 Create a current state summary

1.4 Select workloads for analysis

Phase 2

2.1 Conduct workload assessments

2.2 Determine workload future states

Phase 3

3.1 Generate risks and roadblocks

3.2 Mitigate risks and roadblocks

3.3 Define roadmap initiatives

Phase 4

4.1 Review and assign work items

4.2 Finalize cloud decision framework

4.3 Create cloud vision

This phase will walk you through the following activities:

  • Conduct workload assessments
  • Determine workload future state

This phase involves the following participants:

  • Subject matter experts
  • Core working group
  • IT management

Define Your Cloud Vision

Work from the bottom up and assess your workloads

A workload-first approach will help you create a realistic vision.

The concept of a cloud vision should unquestionably be informed by the nature of the workloads that IT is expected to provide for the wider organization. The overall cloud vision is no greater than the sum of its parts. You cannot migrate to the cloud in the abstract. Workloads need to go – and not all workloads are equally suitable for the transition.

It is therefore imperative to understand which workloads are a good fit for the cloud, which cloud service models make the most sense, how to execute the migration, what support should look like, and what risks and roadblocks you are likely to encounter as part of the process.

That’s where the Cloud Vision Workbook comes into play. You can use this tool to assess as many workloads as you’d like – most people get the idea after about four – and by the end of the exercise, you should have a pretty good idea about where your workloads belong, and you’ll have a tool to assess any net new or previously unconsidered workloads.

It’s not so much about the results of the assessment – though these are undeniably important – but about the learnings gleaned from the collaborative assessment exercise. While you can certainly fill out the assessment without any additional input, this exercise is most effective when completed as part of a group.

Introducing the Cloud Vision Workbook

  • The Cloud Vision Workbook is an Excel tool that answers the age old question: “What should I do with my workloads?”
  • It is divided into eight tabs, each of which offers unique value. Start by reading the introduction and inputting your list of workloads. Work your way through tabs 3-6, completing the suitability, migration, management, and risk and roadblock assessments, and review the results on tab 7.
  • If you choose to go through the full battery of assessments for each workload, expect to answer and weight 111 unique questions across the four assessments. This is an intensive exercise, so carefully consider which assessments are valuable to you, and what workloads you have time to assess.
  • Tab 8 hosts the milestone timeline and captures the results of the phase 3 risk and mitigation exercise.

Understand Cloud Vision Workbook outputs

The image shows a graphic with several graphs and lists on it, with sections highlighted with notes. At the top, there's the title Database with the note Workload title (populated from tab 2). Below that, there is a graph with the note Relative suitability of the five service models. The Risks and roadblocks section includes the note: The strategy components – the risks and roadblocks – are captured relative to one another to highlight key focus areas. To the left of that, there is a Notes section with the note Notes populated based on post-assessment discussion. At the bottom, there is a section titled Where should skills be procured?, with the note The radar diagram captures the recommended support model relative to the others (MSP, consultant, internal IT). To the right of that, there is a section titled Migration path, with the note that Ordered list of migration paths. Note: a disconnect here with the suggested service model may indicate an unrealistic goal state.

Step 2.1

Conduct workload assessments

Activities

2.1.1 Conduct workload assessments

2.1.2 Interpret your results

Phase Title

Conduct workload assessments

Determine workload future state

This step involves the following participants:

  • Core working group
  • Workload subject matter experts

Outcomes of this step

  • Completed workload assessments

2.1.1 Conduct workload assessments

2 hours per workload

Input

  • List of workloads to be assessed

Output

  • Completed cloud vision assessments

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  • Service owners/workload SMEs
  1. The Cloud Vision Workbook is your one stop shop for all things workload assessment. Open the tool to tab 2 and review the workloads you identified at the end of phase 1. Ensure that these are correct. Once satisfied, project the tool (virtually, if necessary) so that all participants can see the assessment questions.
  2. Work through tabs 3-6, answering the questions and assigning a multiplier for each one. A higher multiplier increases the relative weight of the question, giving it a greater impact on the overall outcome.
  3. Do your best to induce participants to offer opinions. Consensus is not absolutely necessary, but it is a good goal. Ask your participants if they agree with initial responses and occasionally take the opposite position (“I’m surprised you said agree – I would have thought we didn’t care about CapEx vs. OpEx”). Stimulate discussion.
  4. Highlight any questions that you will need to return to or run by someone not present. Include a placeholder answer, as the tool requires all cells to be filled for computation.

Cloud Vision Workbook

2.1.2 Interpret your results

10 minutes

Input

  • Completed cloud vision assessments

Output

  • Shared understanding of implications

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  • Service owners/workload SMEs
  1. Once you’ve completed all 111 questions for each workload, you can review your results on tab 7. On tab 7, you will see four populated graphics: cloud suitability, migration path, “where should skills be procured?”, and risks and roadblocks. These represent the components of the overall cloud vision that you will present to stakeholders.
  2. The “cloud suitability” chart captures the service model that the assessment judges to be most suitable for the workload. Ask those present if any are surprised by the output. If there is any disagreement, discuss the source of the surprise and what a more realistic outcome would be. Revisit the assessment if necessary.
  3. Conduct a similar exercise with each of the other outputs. Does it make sense to refactor the workload based on its cloud suitability? Does the fact that we scored so highly on the “consultant” support model indicate something about how we handle upskilling internally? Does the profile of risks and roadblocks identified here align with expectations? What should be ranked higher? What about lower?
  4. Once everyone is generally satisfied with the results, close the tool and take a break! You’ve earned it.

Cloud Vision Workbook

Understand the cloud strategy components

Each cloud strategy will take a slightly different form, but all should contain echoes of each of these components. This process will help you define your vision and direction, but you will need to take steps to execute on that vision. The remainder of the cloud strategy, covered in the related blueprint Document Your Cloud Strategy comprises these fourteen topics divided across three categories: people, governance, and technology. The workload assessment covers these under risks and roadblocks and highlights areas that may require specific additional attention. When interpreting the results, think of these areas as comprising things that you will need to do to make your vision a reality.

People

  • Skills and roles
  • Culture and adoption
  • Governing bodies

Governance

  • Architecture
  • Integration and interoperability
  • Operations management
  • Cloud portfolio management
  • Cloud vendor management
  • Finance management
  • Security
  • Data controls

Technology

  • Monitoring
  • Provisioning
  • Migration

Strategy component: People

People form the core of any good strategy. As part of your cloud vision, you will need to understand the implications a cloud transition will have on your staff and users, whether those users are internal or external.

Component Description Challenges
Skills and roles The move to the cloud will require staff to learn how to handle new technology and new operational processes. The cloud is a different way of procuring IT resources and may require the definition of new roles to handle things like cost management and provisioning. Staff may not have the necessary experience to migrate to a cloud environment or to effectively manage resources once the cloud transition is made. Cloud skills are difficult to hire for, and with the ever-changing nature of the platforms themselves, this shows no sign of abating. Redefining roles can also be politically challenging and should be done with due care and consideration.
Culture and adoption If you build it, they will come…right? It is not always the case that a new service immediately attracts users. Ensuring that organizational culture aligns with the cloud vision is a critical success factor. Equally important is ensuring that cloud resources are used as intended. Those unfamiliar with cloud resources may be less willing to learn to use them. If alternatives exist (e.g. a legacy service that has not been shut down), or if those detractors are influential, this resistance may impede your cloud execution. Also, if the cloud transition involves significant effort or a fundamental rework (e.g. a DevOps transition) this role redefinition could cause some internal turmoil.
Governing bodies A large-scale cloud deployment requires formal governance. Formal governance requires a governing body that is ultimately responsible for designing the said governance. This could take the form of a “center of excellence” or may rest with a single cloud architect in a smaller, less complicated environment. Governance is difficult. Defining responsibilities in a way that includes all relevant stakeholders without paralyzing the decision-making process is difficult. Implementing suggestions is a challenge. Navigating the changing nature of service provision (who can provision their own instances or assign licenses?) can be difficult as well. All these concerns must be addressed in a cloud strategy.

Strategy component: Governance

Without guardrails, the cloud deployment will grow organically. This has strengths (people tend to adopt solutions that they select and deploy themselves), but these are more than balanced out by the drawbacks that come with inconsistency, poor administration, duplication of services, suboptimal costing, and any number of other unique challenges. The solution is to develop and deploy governance. The following list captures some of the necessary governance-related components of a cloud strategy.

Component Description Challenges
Architecture Enterprise architecture is an important function in any environment with more than one interacting workload component (read: any environment). The cloud strategy should include an approach to defining and implementing a standard cloud architecture and should assign responsibility to an individual or group. Sometimes the cloud transition is inspired by the desire to rearchitect. The necessary skills and knowledge may not be readily available to design and transition to a microservices-based environment, for example, vs. a traditional monolithic application architecture. The appropriateness of a serverless environment may not be well understood, and it may be the case that architects are unfamiliar with cloud best practices and reference architectures.
Integration and interoperability Many services are only highly functional when integrated with other services. What is a database without its front-end? What is an analytics platform without its data lake? For the cloud vision to be properly implemented, a strategy for handling integration and interoperability must be developed. It may be as simple as “all SaaS apps must be compatible with Okta” but it must be there. Migration to the cloud may require a fundamentally new approach to integration, moving away from a point-to-point integrations and towards an ESB or data lake. In many cases, this is easier said than done. Centralization of management may be appealing, but legacy applications – or those acquired informally in a one-off fashion – might not be so easy to integrate into a central management platform.
Operations management Service management (ITIL processes) must be aligned with your overall cloud strategy. Migrating to the cloud (where applicable) will require refining these processes, including incident, problem, request, change, and configuration management, to make them more suitable for the cloud environment. Operations management doesn’t go away in the cloud, but it does change in line with the transition to shared responsibility. Responding to incidents may be more difficult on the cloud when troubleshooting is a vendor’s responsibility. Change management in a SaaS environment may be more receptive than staff are used to as cloud providers push changes out that cannot be rolled back.

Strategy component: Governance (cont.)

Component Description Challenges
Cloud portfolio management This component refers to the act of managing the portfolio of cloud services that is available to IT and to business users. What requirements must a SaaS service meet to be onboarded into the environment? How do we account for exceptions to our IaaS policy? What about services that are only available from a certain provider? Rationalizing services offers administrative benefits, but may make some tasks more difficult for end users who have learned things a certain way or rely on niche toolsets. Managing access through a service catalog can also be challenging based on buy-in and ongoing administration. It is necessary to develop and implement policy.
Cloud vendor management Who owns the vendor management function, and what do their duties entail? What contract language must be standard? What does due diligence look like? How should negotiations be conducted? What does a severing of the relationship look like? Cloud service models are generally different from traditional hosted software and even from each other (e.g. SaaS vs. PaaS). There is a bit of a learning curve when it comes to dealing with vendors. Also relevant: the skills that it takes to build and maintain a system are not necessarily the same as those required to coherently interact with a cloud vendor.
Finance management Cloud services are, by definition, subject to a kind of granular, operational billing that many shops might not be used to. Someone will need to accurately project and allocate costs, while ensuring that services are monitored for cost abnormalities. Cloud cost challenges often relate to overall expense (“the cloud is more expensive than an alternative solution”), expense variability (“I don’t know what my budget needs to be this quarter”), and cost complexity (“I don’t understand what I’m paying for – what’s an Elastic Beanstalk?”).
Security The cloud is not inherently more or less secure than a premises-based alternative, though the risk profile can be different. Applying appropriate security governance to ensure workloads are compliant with security requirements is an essential component of the strategy.

Technical security architecture can be a challenge, as well as navigating the shared responsibility that comes with a cloud transition. There are also a plethora of cloud-specific security tools like cloud access security brokers (CASBs), cloud security posture management (CSPM) solutions, and even secure access services edge (SASE) technology.

Data controls Data residency, classification, quality, and protection are important considerations for any cloud strategy. With cloud providers taking on outsized responsibility, understanding and governing data is essential. Cloud providers like to abstract away from the end user, and while some may be able to guarantee residency, others may not. Additionally, regulations may prevent some data from going to the cloud, and you may need to develop a new organizational backup strategy to account for the cloud.

Strategy component: Technology

Good technology will never replace good people and effective process, but it remains important in its own right. A migration that neglects the undeniable technical components of a solid cloud strategy is doomed to mediocrity at best and failure at worst. Understanding the technical implications of the cloud vision – particularly in terms of monitoring, provisioning, and migration – makes all the difference. You can interpret the results of the cloud workload assessments by reviewing the details presented here.

Component Description Challenges
Monitoring The cloud must be monitored in line with performance requirements. Staff must ensure that appropriate tools are in place to properly monitor cloud workloads and that they are capturing adequate and relevant data. Defining requirements for monitoring a potentially unfamiliar environment can be difficult, as can consolidating on a monitoring solution that both meets requirements and covers all relevant areas. There may be some upskilling and integration work required to ensure that monitoring works as required.
Provisioning How will provisioning be done? Who will be responsible for ensuring the right people have access to the right resources? What tooling must be deployed to support provisioning goals? What technical steps must be taken to ensure that the provisioning is as seamless as possible? There is the inevitable challenge of assigning responsibility and accountability in a changing infrastructure and operations environment, especially if the changes are substantial (e.g. a fundamental operating model shift, reoriented around the cloud). Staff may also need to familiarize themselves with cloud-based provisioning tools like Ansible, Terraform, or even CloudFormation.
Migration The act of migrating is important as well. In some cases, the migration is as simple as configuring the new environment and turning it up (e.g. with a net new SaaS service). In other cases, the migration itself can be a substantial undertaking, involving large amounts of data, a complicated replatforming/refactoring, and/or a significant configuration exercise.

Not all migration journeys are created equal, and challenges include a general lack of understanding of the requirements of a migration, the techniques that might be necessary to migrate to a particular cloud (there are many) and the disruption/risk associated with moving large amounts of data. All of these challenges must be considered as part of the overall cloud strategy, whether in terms of architectural principles or skill acquisition (or both!).

Step 2.2

Determine workload future state

Activities

2.2.1 Determine workload future state

Conduct workload assessments

Determine workload future state

This step involves the following participants:

  • IT management
  • Core working group

Outcomes of this step

  • Completed workload assessments
  • Defined workload future state

2.2.1 Determine workload future state

1-3 hours

Input

  • Completed workload assessments

Output

  • Preliminary future state outputs

Materials

  • Cloud Vision Workbook
  • Cloud Vision Executive Presentation

Participants

  • Core working group
  • Service owners
  • IT management
  1. After you’ve had a chance to validate your results, refer to tab 7 of the tool, where you will find a blank notes section.
  2. With the working group, capture your answers to each of the following questions:
    1. What service model is the most suitable for the workload? Why?
    2. How will we conduct the migration? Which of the six models makes the most sense? Do we have a backup plan if our primary plan doesn’t work out?
    3. What should the support model look like?
    4. What are some workload-specific risks and considerations that must be taken into account for the workload?
  3. Once you’ve got answers to each of these questions for each of the workloads, include your summary in the “notes” section of tab 7.

Cloud Vision Executive Presentation

Paste the output into the Cloud Vision Executive Presentation

  • The Cloud Vision Workbook output is a compact, consumable summary of each workload’s planned future state. Paste each assessment in as necessary.
  • There is no absolutely correct way to present the information, but the output is a good place to start. Do note that, while the presentation is designed to lead with the vision statement, because the process is workload-first, the assessments are populated prior to the overall vision in a bottom-up manner.
  • Be sure to anticipate the questions you are likely to receive from any stakeholders. You may consider preparing for questions like: “What other workloads fit this profile?” “What do we expect the impact on the budget to be?” “How long will this take?” Keep these and other questions in mind as you progress through the vision definition process.

The image shows the Cloud Vision Workbook output, which was described in an annotated version in an earlier section.

Info-Tech Insight

Keep your audience in mind. You may want to include some additional context in the presentation if the results are going to be presented to non-technical stakeholders or those who are not familiar with the terms or how to interpret the outputs.

Identify and Mitigate Risks

Build the foundations of your cloud vision

PHASE 3

Phase 3

Identify and Mitigate Risks

Phase 1

1.1 Generate goals and drivers

1.2 Explore cloud characteristics

1.3 Create a current state summary

1.4 Select workloads for analysis

Phase 2

2.1 Conduct workload assessments

2.2 Determine workload future states

Phase 3

3.1 Generate risks and roadblocks

3.2 Mitigate risks and roadblocks

3.3 Define roadmap initiatives

Phase 4

4.1 Review and assign work items

4.2 Finalize cloud decision framework

4.3 Create cloud vision

This phase will walk you through the following activities:

  • Generate risks and roadblocks
  • Mitigate risks and roadblocks
  • Define roadmap initiatives

This phase involves the following participants:

  • Core working group
  • Workload subject matter experts

You know what you want to do, but what do you have to do?

What questions remain unanswered?

There are workload-level risks and roadblocks, and there are environment-level risks. This phase is focused primarily on environment-level risks and roadblocks, or those that are likely to span multiple workloads (but this is not hard and fast rule – anything that you deem worth discussing is worth discussing). The framework here calls for an open forum where all stakeholders – technical and non-technical, pro-cloud and anti-cloud, management and individual contributor – have an opportunity to articulate their concerns, however specific or general, and receive feedback and possible mitigation.

Start by soliciting feedback. You can do this over time or in a single session. Encourage anyone with an opinion to share it. Focus on those who are likely to have a perspective that will become relevant at some point during the creation of the cloud strategy and the execution of any migration. Explain the preliminary direction; highlight any major changes that you foresee. Remind participants that you are not looking for solutions (yet), but that you want to make sure you hear any and every concern as early as possible. You will get feedback and it will all be valuable.

Before cutting your participants loose, remind them that, as with all business decisions, the cloud comes with trade-offs. Not everyone will have every wish fulfilled, and in some cases, significant effort may be needed to get around a roadblock, risks may need to be accepted, and workloads that looked like promising candidates for one service model or another may not be able to realize that potential. This is a normal and expected part of the cloud vision process.

Once the risks and roadblocks conversation is complete, it is the core working group’s job to propose and validate mitigations. Not every risk can be completely resolved, but the cloud has been around for decades – chances are someone else has faced a similar challenge and made it through relatively unscathed. That work will inevitably result in initiatives for immediate execution. Those initiatives will form the core of the initiative roadmap that accompanies the completed Cloud Vision Executive Presentation.

Step 3.1

Generate risks and roadblocks

Activities

3.1.1 Generate risks and roadblocks

3.1.2 Generate mitigations

Identify and mitigate risks

Generate risks and roadblocks

Mitigate risks and roadblocks

Define roadmap initiatives

This step involves the following participants:

  • Core working group
  • IT management
  • Infrastructure
  • Applications
  • Security
  • Architecture

Outcomes of this step

  • List of risks and roadblocks

Understand risks and roadblocks

Risk

  • Something that could potentially go wrong.
  • You can respond to risks by mitigating them:
    • Eliminate: take action to prevent the risk from causing issues.
    • Reduce: take action to minimize the likelihood/severity of the risk.
    • Transfer: shift responsibility for the risk away from IT, towards another division of the company.
    • Accept: where the likelihood or severity is low, it may be prudent to accept that the risk could come to fruition.

Roadblock

  • There are things that aren’t “risks” that we care about when migrating to the cloud.
  • We know, for example, that a complicated integration situation will create work items for any migration – this is not an “unknown.”
  • We respond to roadblocks by generating work items.

3.1.1 Generate risks and roadblocks

1.5 hours

Input

  • Completed cloud vision assessments

Output

  • List of risks and roadblocks

Materials

  • Whiteboard
  • Sticky notes

Participants

  • Core working group
  • Service owners/workload SMEs
  • Anyone with concerns about the cloud
  1. Gather your core working group – and really anyone with an intelligent opinion on the cloud – into a single meeting space. Give the group 5-10 minutes to list anything they think could present a difficulty in transitioning workloads to the cloud. Write each risk/roadblock on its own sticky note. You will never be 100% exhaustive, but don’t let anything your users care about go unaddressed.
  2. Once everyone has had time to write down their risks and roadblocks, have everyone share one by one. Make sure you get them all. Overlap in risks and roadblocks is okay! Group similar concerns together to give a sort of heat map of what your participants are concerned about. (This is called “affinity diagramming.”)
  3. Assign names to these categories. Many of these categories will align with the strategy components discussed in the previous phase (governance, security, etc.) but some will be specific whether by nature or by degree.
  4. Sort each of the individual risks into its respective category, collapsing any exact duplicates, and leaving room for notes and mitigations (see the next slide for a visual).

Understand risks and roadblocks

The image is two columns--on the left, the column is titled Affinity Diagramming. Below the title, there are many colored blocks, randomly arranged. There is an arrow pointing right, to the same coloured blocks, now sorted by colour. In the right column--titled Categorization--each colour has been assigned a category, with subcategories.

Step 3.2

Mitigate risks and roadblocks

Activities

3.2.1 Generate mitigations

Identify and mitigate risks

Generate risks and roadblocks

Mitigate risks and roadblocks

Define roadmap initiatives

This step involves the following participants:

  • Core working group

Outcomes of this step

  • List of mitigations

Is the public cloud less secure?

This is the key risk-related question that most cloud customers will have to answer at some point: does migrating to the cloud for some services increase their exposure and create a security problem?

As with all good questions, the answer is “it depends.” But what does it depend on? Consider these cloud risks and potential mitigations:

  1. Misconfiguration: An error grants access to unauthorized parties (as happened to Capital One in 2019). This can be mitigated by careful configuration management and third-party tooling.
  2. Unauthorized access by cloud provider/partner employees: Though rare, it is possible that a cloud provider or partner can be a vector for a breach. Careful contract language, choosing to own your own encryption keys, and a hybrid approach (storing data on-premises) are some possible ways to address this problem.
  3. Unauthorized access to systems: Cloud services are designed to be accessed from anywhere and may be accessed by malicious actors. Possible mitigations include risk-based conditional access, careful identity access management, and logging and detection.

“The cloud is definitely more secure in that you have much more control, you have much more security tooling, much more visibility, and much more automation. So it is more secure. The caveat is that there is more risk. It is easier to accidentally expose data in the cloud than it is on-premises, but, especially for security, the amount of tooling and visibility you get in cloud is much more than anything we’ve had in our careers on-premises, and that’s why I think cloud in general is more secure.” –Abdul Kittana, Founder, ASecureCloud

Breach bests bank

No cloud provider can protect against every misconfiguration

Industry: Finance

Source: The New York Times, CNET

Background

Capital One is a major Amazon Web Services customer and is even featured on Amazon’s site as a case study. That case study emphasizes the bank’s commitment to the cloud and highlights how central security and compliance were. From the CTO: “Before we moved a single workload, we engaged groups from across the company to build a risk framework for the cloud that met the same high bar for security and compliance that we meet in our on-premises environments. AWS worked with us every step of the way.”

Complication

The cloud migration was humming along until July 2019, when the bank suffered a serious breach at the hands of a hacker. That hacker was able to steal millions of credit card applications and hundreds of thousands of Social Security numbers, bank account numbers, and Canadian social insurance numbers.

According to investigators and to AWS, the breach was caused by an open reverse proxy attack against a misconfigured web app firewall, not by an underlying vulnerability in the cloud infrastructure.

Results

Capital One reported that the breach was expected to cost it $150 million, and AWS fervently denied any blame. The US Senate got involved, as did national media, and Capital One’s CEO issued a public apology, writing, “I sincerely apologize for the understandable worry this incident must be causing those affected, and I am committed to making it right.”

It was a bad few months for IT at Capital One.

3.2.1 Generate mitigations

3-4.5 hours

Input

  • Completed cloud vision assessments

Output

  • List of risks and roadblocks

Materials

  • Whiteboard
  • Sticky notes

Participants

  • Core working group
  • Service owners/workload SMEs
  • Anyone with concerns about the cloud
  1. Recall the four mitigation strategies: eliminate, reduce, transfer, or accept. Keep these in mind as you work through the list of risks and roadblocks with the core working group. For every individual risk or roadblock raised in the initial generation session, suggest a specific mitigation. If the concern is “SaaS providers having access to confidential information,” a mitigation might be encryption, specific contract language, or proof of certifications (or all the above).
  2. Work through this for each of the risks and roadblocks, identifying the steps you need to take that would satisfy your requirements as you understand them.
  3. Once you have gone through the whole list – ideally with input from SMEs in particular areas like security, engineering, and compliance/legal – populate the Cloud Vision Workbook (tab 8) with the risks, roadblocks, and mitigations (sorted by category). Review tab 8 for an example of the output of this exercise.

Cloud Vision Workbook

Cloud Vision Workbook – mitigations

The image shows a large chart titled Risks, roadblocks, and mitigations, which has been annotated with notes.

Step 3.3

Define roadmap initiatives

Activities

3.3.1 Generate roadmap initiatives

Identify and mitigate risks

Generate risks and roadblocks

Mitigate risks and roadblocks

Define roadmap initiatives

This step involves the following participants:

  • Core working group

Outcomes of this step

  • Defined roadmap initiatives

3.3.1 Generate roadmap initiatives

1 hour

Input

  • List of risk and roadblock mitigations

Output

  • List of cloud initiatives

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  1. Executing on your cloud vision will likely require you to undertake some key initiatives, many of which have already been identified as part of your mitigation exercise. On tab 8 of the Cloud Vision Workbook, review the mitigations you created in response to the risks and roadblocks identified. Initiatives should generally be assignable to a party and should have a defined scope/duration. For example, “assess all net new applications for cloud suitability” might not be counted as an initiative, but “design a cloud application assessment” would likely be.
  2. Design a timeline appropriate for your specific needs. Generally short-term (less than 3 months), medium-term (3-6 months), and long-term (greater than 6 months) will work, but this is entirely based on preference.
  3. Review and validate the parameters with the working group. Consider creating additional color-coding (highlighting certain tasks that might be dependent on a decision or have ongoing components).

Cloud Vision Workbook

Bridge the gap and create the vision

Build the foundations of your cloud vision

Phase 4

Phase 4

Bridge the Gap and Create the Vision

Phase 1

1.1 Generate goals and drivers

1.2 Explore cloud characteristics

1.3 Create a current state summary

1.4 Select workloads for analysis

Phase 2

2.1 Conduct workload assessments

2.2 Determine workload future states

Phase 3

3.1 Generate risks and roadblocks

3.2 Mitigate risks and roadblocks

3.3 Define roadmap initiatives

Phase 4

4.1 Review and assign work items

4.2 Finalize cloud decision framework

4.3 Create cloud vision

This phase will walk you through the following activities:

  • Assign initiatives and propose timelines
  • Build a delivery model rubric
  • Build a service model rubric
  • Built a support model rubric
  • Create a cloud vision statement
  • Map cloud workloads
  • Complete the Cloud Vision presentation

This phase involves the following participants:

  • IT management, the core working group, security, infrastructure, operations, architecture, engineering, applications, non-IT stakeholders

Step 4.1

Review and assign work items

Activities

4.1.1 Assign initiatives and propose timelines

Bridge the gap and create the vision

Review and assign work items

Finalize cloud decision framework

Create cloud vision

This step involves the following participants:

  • Core working group
  • IT management

Outcomes of this step

  • Populated cloud vision roadmap

4.1.1 Assign initiatives and propose timelines

1 hour

Input

  • List of cloud initiatives

Output

  • Initiatives assigned by responsibility and timeline

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  1. Once the list is populated, begin assigning responsibility for execution. This is not a RACI exercise, so focus on the functional responsibility. Once you have determined who is responsible, assign a timeline and include any notes. This will form the basis of a more formal project plan.
  2. To assign the initiative to a party, consider 1) who will be responsible for execution and 2) if that responsibility will be shared. Be as specific as possible, but be sure to be consistent to make it easier for you to sort responsibility later on.
  3. When assigning timelines, we suggest including the end date (when you expect the project to be complete) rather than the start date, though whatever you choose, be sure to be consistent. Make use of the notes column to record anything that you think any other readers will need to be aware of in the future, or details that may not be possible to commit to memory.

Cloud Vision Workbook

Step 4.2

Finalize cloud decision framework

Activities

4.2.1 Build a delivery model rubric

4.2.2 Build a service model rubric

4.2.3 Build a support model rubric

Bridge the gap and create the vision

Review and assign work items

Finalize cloud decision framework

Create cloud vision

This step involves the following participants:

  • Core working group

Outcomes of this step

  • Cloud decision framework

4.2.1 Build a delivery model rubric

1 hour

Input

  • List of cloud initiatives

Output

  • Initiatives assigned by responsibility and timeline

Materials

Participants

  • Core working group
  1. Now that we have a good understanding of the cloud’s key characteristics, the relative suitability of different workloads for the cloud, and a good understanding of some of the risks and roadblocks that may need to be overcome if a cloud transition is to take place, it is time to formalize a delivery model rubric. Start by listing the delivery models on a white board vertically – public, private, hybrid, and multi-cloud. Include a community cloud option as well if that is feasible for you. Strike any models that do not figure into your vision.
  2. Create a table style rubric for each delivery model. Confer with the working group to determine what characteristics best define workloads suitable for each model. If you have a hybrid cloud option, you may consider workloads that are highly dynamic; a private cloud hosted on-premises may be more suitable for workloads that have extensive regulatory requirements.
  3. Once the table is complete, include it in the Cloud Vision Executive Presentation.

Cloud Vision Executive Presentation

Vision for the cloud future state (example)

Delivery model Decision criteria
Public cloud
  • Public cloud is the primary destination for all workloads as the goal is to eliminate facilities and infrastructure management
  • Offers features, broad accessibility, and managed updates along with provider-managed facilities and hardware
Legacy datacenter
  • Any workload that is not a good fit for the public cloud
  • Dependency (like a USB key for license validation)
  • Performance requirements (e.g. workloads highly sensitive to transaction thresholds)
  • Local infrastructure components (firewall, switches, NVR)

Summary statement: Everything must go! Public cloud is a top priority. Anything that is not compatible (for whatever reason) with a public cloud deployment will be retained in a premises-based server closet (downgraded from a full datacenter). The private cloud does not align with the overall organizational vision, nor does a hybrid solution.

4.2.2 Build a service model rubric

1 hour

Input

  • Output of workload assessments
  • Output of risk and mitigation exercise

Output

  • Service model rubric

Materials

  • Whiteboard
  • Cloud Vision Executive Presentation

Participants

  • Core working group
  1. This next activity is like the delivery model activity, but covers the relevant cloud service models. On a whiteboard, make a vertical list of the cloud service models (SaaS, PaaS, IaaS, etc.) that will be considered for workloads. If you have an order of preference, place your most preferred at the top, your least preferred at the bottom.
  2. Describe the circumstances under which you would select each service model. Do your best to focus on differentiators. If a decision criterion appears for multiple service models, consider refining or excluding it. (For additional information, check out Info-Tech’s Reimagine IT Operations for a Cloud-First World blueprint.)
  3. Create a summary statement to capture your overall service model position. See the next slide for an example. Note: this can be incorporated into your cloud vision statement, so be sure that it reflects your genuine cloud preferences.
  4. Record the results in the Cloud Vision Executive Presentation.

Cloud Vision Executive Presentation

Vision for the cloud future state (example)

Service model Decision criteria
SaaS

SaaS first; opt for SaaS when:

  • A SaaS option exists that meets all key business requirements
  • There is a strong desire to have someone else (the vendor) manage infrastructure components/the platform
  • Not particularly sensitive to performance thresholds
  • The goal is to transition management of the workload outside of IT
  • SaaS is the only feasible way to consume the desired service
PaaS
  • Highly customized service/workload – SaaS not feasible
  • Still preferable to offload as much management as possible to third parties
  • Customization required, but not at the platform level
  • The workload is built using a standard framework
  • We have the time/resources to replatform
IaaS
  • Service needs to be lifted and shifted out of the datacenter quickly
  • Customization is required at the platform level/there is value in managing components
  • There is no need to manage facilities
  • Performance is not impacted by hosting the workload offsite
  • There is value in right-sizing the workload over time
On-premises Anything that does not fit in the cloud for performance or other reasons (e.g. licensing key)

Summary statement: SaaS will be the primary service model. All workloads will migrate to the public cloud where possible. Anything that cannot be migrated to SaaS will be migrated to PaaS. IaaS is a transitory step.

4.2.3 Build a support model rubric

1 hour

Input

  • Results of the cloud workload assessments

Output

  • Support model rubric

Materials

  • Whiteboard
  • Cloud Vision Executive Presentation

Participants

  • Core working group
  1. The final rubric covered here is that for the support model. Where will you procure the skills necessary to ensure the vision’s proper execution? Much like the other rubric activities, write the three support models vertically (in order of preference, if you have one) on a whiteboard.
  2. Next to each model, describe the circumstances under which you would select each support model. Focus on the dimensions: the duration of the engagement, specialization required, and flexibility required. If you have existing rules/practices around hiring consultants/MSPs, consider those as well.
  3. Once you have a good list of decision criteria, form a summary statement. This should encapsulate your position on support models and should mention any notable criteria that will contribute to most decisions.
  4. Record the results in the Cloud Vision Executive Presentation.

Cloud Vision Executive Presentation

Vision for the cloud future state (example)

Support model Decision criteria
Internal IT

The primary support model will be internal IT going forward

  • Chosen where the primary work required is administrative
  • Where existing staff can manage the service in the cloud easily and effectively
  • Where the chosen solution fits the SaaS service model
Consultant
  • Where the work required is time-bound (e.g. a migration/refactoring exercise)
  • Where the skills do not exist in house, and where the skills cannot easily be procured (specific technical expertise required in areas of the cloud unfamiliar to staff)
  • Where opportunities for staff to learn from consultant SMEs are valuable
  • Where ongoing management and maintenance can be handled in house
MSP
  • Where an ongoing relationship is valued
  • Where ongoing administration and maintenance are disproportionately burdensome on IT staff (or where this administration and maintenance is likely to be burdensome)
  • Where the managed services model has already been proven out
  • Where specific expertise in an area of technology is required but this does not rise to the need to hire an FTE (e.g. telephony)

Summary statement: Most workloads will be managed in house. A consultant will be employed to facilitate the transition to micro-services in a cloud container environment, but this will be transitioned to in-house staff. An MSP will continue to manage backups and telephony.

Step 4.3

Create cloud vision

Activities

4.3.1 Create a cloud vision statement

4.3.2 Map cloud workloads

4.3.3 Complete the Cloud Vision Presentation

Review and assign work items

Finalize cloud decision framework

Create cloud vision

This step involves the following participants:

  • Core working group
  • IT management

Outcomes of this step

Completed Cloud Vision Executive Presentation

4.3.1 Create a cloud vision statement

1 hour

Input

  • List of cloud initiatives

Output

  • Initiatives assigned by responsibility and timeline

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  1. Now that you know what service models are appropriate, it’s time to summarize your cloud vision in a succinct, consumable way. A good vision statement should have three components:
    • Scope: Which parts of the organization will the strategy impact?
    • Goal: What is the strategy intended to accomplish?
    • Key differentiator: What makes the new strategy special?
  2. On a whiteboard, make a chart with three columns (one column for each of the features of a good mission statement). Have the group generate a list of words to describe each of the categories. Ideally, the group will produce multiple answers for each category.
  3. Once you’ve gathered a few different responses for each category, have the team put their heads down and generate pithy mission statements that capture the sentiments underlying each category.
  4. Have participants read their vision statements in front of the group. Use the rest of the session to produce a final statement. Record the results in the Cloud Strategy Executive Presentation.

Example vision statement outputs

“IT at ACME Corp. hereby commits to providing clients and end users with an unparalleled, productivity-enabling technology experience, leveraging, insofar as it is possible and practical, cloud-based services.”

“At ACME Corp. our employees and customers are our first priority. Using new, agile cloud services, IT is devoted to eliminating inefficiency, providing cutting-edge solutions for a fast-paced world, and making a positive difference in the lives of our colleagues and the people we serve.”

As a global leader in technology, ACME Corp. is committed to taking full advantage of new cloud services, looking first to agile cloud options to optimize internal processes wherever efficiency gaps exist. Improved efficiency will allow associates to spend more time on ACME’s core mission: providing an unrivalled customer experience.”

Scope

Goal

Key differentiator

4.3.2 Map cloud workloads

1 hour

Input

  • List of workloads
  • List of acceptable service models
  • List of acceptable migration paths

Output

  • Workloads mapped by service model/migration path

Materials

  • Whiteboard
  • Sticky notes

Participants

  • Core working group
  1. Now that you have defined your overall cloud vision as well as your service model options, consider aligning your service model preferences with your migration path preferences. Draw a table with your expected migration strategies across the top (retain, retire, rehost, replatform, refactor, repurchase, or some of these) and your expected service models across the side.
  2. On individual sticky notes, write a list of workloads in your environment. In a smaller environment, this list can be exhaustive. Otherwise take advantage of the list you created as part of phase 1 along with any additional workloads that warrant discussion.
  3. As a group, go through the list, placing the sticky notes first in the appropriate row based on their characteristics and the decision criteria that have already been defined, and then in the appropriate column based on the appropriate migration path. (See the next slide for an example of what this looks like.)
  4. Record the results in the Cloud Vision Executive Presentation. Note: not every cell will be filled; some migration path/service model combinations are impossible or otherwise undesirable.

Cloud Vision Executive Presentation

Example cloud workload map

Repurchase Replatform Rehost Retain
SaaS

Office suite

AD

PaaS SQL Database
IaaS File Storage DR environment
Other

CCTV

Door access

4.3.3 Complete the Cloud Vision Presentation

1 hour

Input

  • List of cloud initiatives

Output

  • Initiatives assigned by responsibility and timeline

Materials

  • Cloud Vision Workbook

Participants

  • Core working group
  1. Open the Cloud Vision Executive Presentation to the second slide and review the templated executive brief. This comprises several sections (see the next slide). Populate each one:
    • Summary of the exercise
    • The cloud vision statement
    • Key cloud drivers
    • Risks and roadblocks
    • Top initiatives and next steps
  2. Review the remainder of the presentation. Be sure to elaborate on any significant initiatives and changes (where applicable) and to delete any slides that you no longer require.

Cloud Vision Workbook

Sample cloud vision executive summary

  • From [date to date], a cross-functional group representing IT and its constituents met to discuss the cloud.
  • Over the course of the week, the group identified drivers for cloud computing and developed a shared vision, evaluated several workloads through an assessment framework, identified risks, roadblocks, and mitigations, and finally generated initiatives and next steps.
  • From the process, the group produced a summary and a cloud suitability assessment framework that can be applied at the level of the workload.

Cloud Vision Statement

[Organization] will leverage public cloud solutions and retire existing datacenter and colocation facilities. This transition will simplify infrastructure administration, support, and security, while modernizing legacy infrastructure and reducing the need for additional capital expenditure.

Cloud Drivers Retire the datacenter Do more valuable work
Right-size the environment Reduce CapEx
Facilitate ease of mgmt. Work from anywhere
Reduce capital expenditure Take advantage of elasticity
Performance and availability Governance Risks and roadblocks
Security Rationalization
Cost Skills
Migration Remaining premises resources
BC, backup, and DR Control

Initiatives and next steps

  • Close the datacenter and colocation site in favor of a SaaS-first cloud approach.
  • Some workloads will migrate to infrastructure-as-a-service in the short term with the assistance of third-party consultants.

Document your cloud strategy

You did it!

Congratulations! If you’ve made it this far, you’ve successfully articulated a cloud vision, assessed workloads, developed an understanding (shared with your team and stakeholders) of cloud concepts, and mitigated risks and roadblocks that you may encounter along your cloud journey. From this exercise, you should understand your mission and vision, how your cloud plans will interact with any other relevant strategic plans, and what successful execution looks like, as well as developing a good understanding of overall guiding principles. These are several components of your overall strategy, but they do not comprise the strategy in its entirety.

How do you fix this?

First, validate the results of the vision exercise with your stakeholders. Socialize it and collect feedback. Make changes where you think changes should be made. This will become a key foundational piece. The next step is to formally document your cloud strategy. This is a separate project and is covered in the Info-Tech blueprint Document Your Cloud Strategy.

The vision exercise tells you where you want to go and offers some clues as to how to get there. The formal strategy exercise is a formal documentation of the target state, but also captures in detail the steps you’ll need to take, the processes you’ll need to refine, and the people you’ll need to hire.

A cloud strategy should comprise your organizational stance on how the cloud will change your approach to people and human resources, technology, and governance. Once you are confident that you can make and enforce decisions in these areas, you should consider moving on to Document Your Cloud Strategy. This blueprint, Define Your Cloud Vision, often serves as a prerequisite for the strategy documentation conversation(s).

Appendix

Summary of Accomplishment

Additional Support

Research Contributors

Related Info-Tech Research

Vendor Resources

Bibliography

Summary of Accomplishment

Problem Solved

You have now documented what you want from the cloud, what you mean when you say “cloud,” and some preliminary steps you can take to make your vision a reality.

You now have at your disposal a framework for identifying and evaluating candidates for their cloud suitability, as well as a series of techniques for generating risks and mitigations associated with your cloud journey. The next step is to formalize your cloud strategy using the takeaways from this exercise. You’re well on your way to a completed cloud strategy!

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

Contact your account representative for more information.

workshops@infotech.com

1-888-670-8889

Additional Support

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

Generate drivers for cloud adoption

Work with stakeholders to understand the expected benefits of the cloud migration and how these drivers will impact the overall vision.

Conduct workload assessments

Assess your individual cloud workloads for their suitability as candidates for the cloud migration.

Bibliography

“2021 State of the Cloud Report.” Flexera, 2021. Web.

“2021 State of Upskilling Report.” Pluralsight, 2021. Web.

“AWS Snowmobile.” Amazon Web Services, n.d. Web.

“Azure products.” Microsoft, n.d. Web.

“Azure Migrate Documentation.” Microsoft, n.d. Web.

Bell, Harold. “Multi-Cloud vs. Hybrid Cloud: What’s the Difference?” Nutanix, 2019. Web.

“Cloud Products.” Amazon Web Services, n.d. Web.

“COBIT 2019 Framework: Introduction and Methodology.” ISACA, 2019. Web.

Edmead, Mark T. “Using COBIT 2019 to Plan and Execute an Organization’s Transformation Strategy.” ISACA, 2020. Web.

Flitter, Emily, and Karen Weise. “Capital One Data Breach Compromises Data of Over 100 Million.” The New York Times, 29 July 2019. Web.

Gillis, Alexander S. “Cloud Security Posture Management (CSPM).” TechTarget, 2021. Web.

“’How to Cloud’ with Capital One.” Amazon Web Services, n.d. Web.

“IBM Closes Landmark Acquisition of Red Hat for $34 Billion; Defines Open, Hybrid Cloud Future.” Red Hat, 9 July 2019. Web.

Mell, Peter, and Timothy Grance. “The NIST Definition of Cloud Computing.” National Institute of Standards and Technology, Sept. 2011. Web.

Ng, Alfred. “Amazon Tells Senators it Isn't to Blame for Capital One Breach.” CNET, 2019. Web.

Orban, Stephen. “6 Strategies for Migrating Applications to the Cloud.” Amazon Web Services, 2016. Web.

Sullivan, Dan. “Cloud Access Security Broker (CASB).” TechTarget, 2021. Web.

“What Is Secure Access Service Edge (SASE)?” Cisco, n.d. Web.

Applications Priorities 2023

  • Buy Link or Shortcode: {j2store}186|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Architecture & Strategy
  • Parent Category Link: /architecture-and-strategy
  • Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.
  • These tools and technologies must meet the top business goals of CXOs: ensure service continuity, improve customer experience, and make data-driven decisions.
  • While today’s business applications are good and well received, there is still room for improvement. The average business application satisfaction score among IT leadership was 72% (n=1582, CIO Business Vision).

Our Advice

Critical Insight

  • Applications are critical components in any business strategic plan. They can directly influence an organization’s internal and external brand and reputation, such as their uniqueness, competitiveness and innovativeness in the industry
  • Business leaders are continuously looking for innovative ways to better position their application portfolio to satisfy their goals and objectives, i.e., application priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfies the different needs very different customers, stakeholders, and users.
  • Unfortunately, expectations on your applications team have increased while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

Impact and Result

Learn and explore the technology and practice initiatives in this report to determine which initiatives should be prioritized in your application strategy and align to your business organizational objectives:

  • Optimize the effectiveness of the IT organization.
  • Boost the productivity of the enterprise.
  • Enable business growth through technology.

Applications Priorities 2023 Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Applications Priorities Report 2023 – A report that introduces and describes five opportunities to prioritize in your 2023 application strategy.

In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the ambitions of your organization.

  • Applications Priorities 2023 Report

Infographic

Further reading

Applications Priorities 2023

Applications are the engine of the business: keep them relevant and modern

What we are facing today is transforming the ways in which we work, live, and relate to one another. Applications teams and portfolios MUST change to meet this reality.

Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.

As organizations continue to strengthen business continuity, disaster recovery, and system resilience, activities to simply "keep the lights on" are not enough. Be pragmatic in the prioritization and planning of your applications initiatives, and use your technologies as a foundation for your growth.

Your applications must meet the top business goals of your CXOs

  • Ensure service continuity
  • Improve customer experience
  • Make data-driven decisions
  • Maximize stakeholder value
  • Manage risk

Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

Select and align your applications priorities to your business goals and objectives

Applications are critical components in any business strategic plan. They can directly influence an organization's internal and external brand and reputation, such as their:

  • Uniqueness, competitiveness, and innovativeness in the industry.
  • Ability to be dynamic, flexible, and responsive to changing expectations, business conditions, and technologies.

Therefore, business leaders are continuously looking for innovative ways to better position their application portfolios to satisfy their goals and objectives, i.e. applications priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfy
the different needs of very different customers, stakeholders, and users.

Today's business applications are good but leave room for improvement

72%
Average business application satisfaction score among IT leadership in 1582 organizations.

Source: CIO Business Vision, August 2021 to July 2022, N=190.

Five Applications Priorities for 2023

In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the Ambitions of your organization.

this is an image of the Five Applications Priorities for which will be addressed in this blueprint.

Strengthen your foundations to better support your applications priorities

These key capabilities are imperative to the success of your applications strategy.

KPI and Metrics

Easily attainable and insightful measurements to gauge the progress of meeting strategic objectives and goals (KPIs), and the performance of individual teams, practices and processes (metrics).

BUSINESS ALIGNMENT

Gain an accurate understanding and interpretation of stakeholder, end-user, and customer expectations and priorities. These define the success of business products and services considering the priorities of individual business units and teams.

EFFICIENT DELIVERY & SUPPORT PRACTICE

Software delivery and support roles, processes, and tools are collaborative, well equipped and resourced, and optimized to meet changing stakeholder expectations.

Data Management & Governance

Ensuring data is continuously reliable and trustworthy. Data structure and integrations are defined, governed, and monitored.

Product & Service Ownership

Complete inventory and rationalization of the product and service portfolio, prioritized backlogs, roadmaps, and clear product and service ownership with good governance. This helps ensure this portfolio is optimized to meet its goals and objectives.

Strengthen your foundations to better support your applications priorities (cont'd)

These key capabilities are imperative to the success of your applications strategy.

Organizational Change Management

Manage the adoption of new and modified processes and technologies considering reputational, human, and operational concerns.

IT Operational Management

Continuous monitoring and upkeep of products and services to assure business continuity, and system reliability, robustness and disaster recovery.

Architectural Framework

A set of principles and standards that guides the consistent, sustainable and scalable growth of enterprise technologies. Changes to the architecture are made in collaboration with affected parties, such as security and infrastructure.

Application Security

The measures, controls, and tactics at the application layer that prevent vulnerabilities against external and internal threats and ensure compliance to industry and regulatory security frameworks and standards.

There are many factors that can stand in your team's way

Expectations on your applications team have increased, while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

  1. Attracting and retaining talent
  2. Maximizing the return on technology
  3. Confidently shifting to digital
  4. Addressing competing priorities
  5. Fostering a collaborative culture
  6. Creating high-throughput teams

CIOs agree that at least some improvement is needed across key IT activities

A bar graph is depicted which shows the proportion of CIOs who believe that some, or significant improvement is necessary for the following categories: Measure IT Project Success; Align IT Budget; Align IT Project Approval Process; Measure Stakeholder Satisfaction With IT; Define and Align IT Strategy; Understand Business Goals

Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

Pressure Point 1:
Attracting and Retaining Talent

Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

Address the underlying challenges

  • Lack of employee empowerment and few opportunities for learning and development.
  • Poor coworker and manager relationships.
  • Compensation and benefits are inadequate to maintain desired quality of life.
  • Unproductive work environment and conflicting balance of work and life.
  • Unsatisfactory employee experience, including lack of employee recognition
    and transparency of organizational change.

While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing.
62% of organizations reported increased working hours, while 80% reported an increase in flexibility.
Source: McLean & Company, 2022; n=394.

Be strategic in how you fill and train key IT skills and capabilities

  • Cybersecurity
  • Big Data/Analytics
  • Technical Architecture
  • DevOps
  • Development
  • Cloud

Source: Harvey Nash Group, 2021; n=2120.

Pressure Point 2:
Maximizing the Return of Technology

Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

Address the underlying challenges

  • Inability to analyze, propose, justify, and communicate modernization solutions in language the stakeholders understand and in a way that shows they clearly support business priorities and KPIs and mitigate risks.
  • Little interest in documenting and rationalizing products and services through business-IT collaboration.
  • Lack of internal knowledge of the system and loss of vendor support.
  • Undefined, siloed product and service ownership and governance, preventing solutions from working together to collectively deliver more value.
  • Little stakeholder appetite to invest in activities beyond "keeping the lights on."

Only 64% of applications were identified as effective by end users.
Effective applications are identified as at least highly important and have high feature and usability satisfaction.
Source: Application Portfolio Assessment, August 2021 to July 2022; N=315.

"Regardless of the many definitions of modernization floating around, the one characteristic that we should be striving for is to ensure our applications do an outstanding job of supporting the users and the business in the most effective and efficient manner possible."
Source: looksoftware.

Pressure Point 3:
Confidently Shifting to Digital

"Going digital" reshapes how the business operates and drives value by optimizing how digital and traditional technologies and tactics work together. This shift often presents significant business and technical risks to business processes, enterprise data, applications, and systems which stakeholders and teams are not aware of or prepared to accommodate.

Address the underlying challenges

  • Differing perspectives on digital can lead to disjointed transformation initiatives, oversold benefits, and a lack of synergy among digital technologies and processes.
  • Organizations have difficulty adapting to new technologies or rethinking current business models, processes, and ways of working because of the potential human, ethical, and reputational impacts and restrictions from legacy systems.
  • Management lacks a framework to evaluate how their organization manages and governs business value delivery.
  • IT is not equipped or resourced to address these rapidly changing business, customer, and technology needs.
  • The wrong tools and technologies were chosen to support the shift to digital.

The shift to digital processes is starting, but slowly.
62% of respondents indicated that 1-20% of their processes were digitized during the past year.
Source: Tech Trends and Priorities 2023; N=500

Resistance to change and time/budget constraints are top barriers preventing companies from modernizing their applications.
Source: Konveyor, 2022; n=600.

Pressure Point 4:
Addressing Competing Priorities

Enterprise products and services are not used, operated, or branded in isolation. The various parties involved may have competing priorities, which often leads to disagreements on when certain business and technology changes should be made and how resources, budget, and other assets should be allocated. Without a broader product vision, portfolio vision, and roadmap, the various dependent or related products and services will not deliver the same level of value as if they were managed collectively.

Address the underlying challenges

  • Undefined product and service ownership and governance, including escalation procedures when consensus cannot be reached.
  • Lack of a unified and grounded set of value and quality definitions, guiding principles, prioritization standards, and broad visibility across portfolios, business capabilities, and business functions.
  • Distrust between business units and IT teams, which leads to the scaling of unmanaged applications and fragmented changes and projects.
  • Decisions are based on opinions and experiences without supporting data.

55% of CXOs stated some improvement is necessary in activities to understand business goals.
Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

CXOs are moderately satisfied with IT's performance as a business partner (average score of 69% among all CXOs). This sentiment is similarly felt among CIOs (64%).
Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

Pressure Point 5:
Fostering a Collaborative Culture

Culture impacts business results, including bottom-line revenue and productivity metrics. Leaders appreciate the impact culture can have on applications initiatives and wish to leverage this. How culture translates from an abstract concept to something that is measurable and actionable is not straightforward. Executives need to clarify how the desired culture will help achieve their applications strategy and need to focus on the items that will have the most impact.

Address the underlying challenges

  • Broad changes do not consider the unique subcultures, personalities, and behaviors of the various teams and individuals in the organization.
  • Leaders mandate cultural changes without alleviating critical barriers and do not embody the principles of the target state.
  • Bureaucracy and politics restrict changes and encourage the status quo.
  • Industry standards, technologies, and frameworks do not support or cannot be tailored to fit the desired culture.
  • Some teams are deliberately excluded from the scoping, planning, and execution of key product and service delivery and management activities.

Agile does not solve team culture challenges.
43% of organizations cited organizational culture as a significant barrier to adopting and scaling Agile practices.
Source: Digital.ai, 2021.

"Providing a great employee experience" as the second priority (after recruiting) highlights the emphasis organizations are placing on helping employees adjust after having been forced to change the way work gets done.
Source: McLean & Company, 2022; N=826.

Use your applications priorities to help address your pressure points

Success can be dependent on your ability to navigate around or alleviate your pressure points. Design and market your applications priorities to bring attention to your pressure points and position them as key risk factors to their success.

Applications Priorities
Digital Experience (DX) Intelligent Automation Proactive Application Management Multisource Systems Digital Organization as a Platform
Attracting and Retaining Talent Enhance the employee experience Be transparent and support role changes Shift focus from maintenance to innovation Enable business-managed applications Promote and showcase achievements and successes
Maximizing the Return on Technology Modernize or extend the use of existing investments Automate applications across multiple business functions Improve the reliability of mission-critical applications Enhance the functionality of existing applications Increase visibility of underused applications
Confidently Shifting to Digital Prioritize DX in your shift to digital Select the capabilities that will benefit most from automation Prepare applications to support digital tools and technologies Use best-of-breed tools to meet specific digital needs Bring all applications up to a common digital standard
Addressing Competing Priorities Ground your digital vision, goals, and objectives Recognize and evaluate the architectural impact Rationalize the health of the applications Agree on a common philosophy on system composition Map to a holistic platform vision, goals, and objectives
Fostering a Collaborative Culture Involve all perspectives in defining and delivering DX Involve the end user in the delivery and testing of the automated process Include the technical perspective in the viability of future applications plans Discuss how applications can work together better in an ecosystem Ensure the platform is configured to meet the individual needs of the users
Creating High-Throughput Teams Establish delivery principles centered on DX Remove manual, error-prone, and mundane tasks Simplify applications to ease delivery and maintenance Alleviate delivery bottlenecks and issues Abstract the enterprise system to expedite delivery

Digital Experience (DX)

PRIORITY 1

  • Deliver Valuable User, Customer, Employee, and Brand Experiences

Delivering valuable digital experiences requires the adoption of good management, governance, and operational practices to accommodate stakeholder, employee, customer, and end-user expectations of digital experiences (e.g. product management, automation, and iterative delivery). Technologies are chosen based on what best enables, delivers, and supports these expectations.

Introduction

Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

What is digital experience (DX)?

Digital experience (DX) refers to the interaction between a user and an organization through digital products and services. Digital products and services are tools, systems, devices, and resources that gather, store, and process data; are continuously modernized; and embody eight key attributes that are described on the following slide. DX is broken down into four distinct perspectives*:

  • Customer Experience – The immediate perceptions of transactions and interactions experienced through a customer's journey in the use of the organization's digital
    products and services.
  • End-User Experience – Users' emotions, beliefs, and physical and psychological responses
    that occur before, during, or after interacting with a digital product or service.
  • Brand Experience – The broader perceptions, emotions, thoughts, feelings and actions the public associate with the organization's brand and reputation or its products and services. Brand experience evolves over time as customers continuously engage with the brand.
  • Employee Experience – The satisfaction and experience of an employee through their journey with the organization, from recruitment and hiring to their departure. How an employee embodies and promotes the organization brand and culture can affect their performance, trust, respect, and drive to innovate and optimize.
Digital Products and Services
Customer Experience Brand Experience Employee Experience End-User Experience

Digital products and services have a common set of attributes

Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

  • Digital products and services must keep pace with changing business and end-user needs as well as tightly supporting your maturing business model with continuous modernization. Focus your continuous modernization on the key characteristics that drive business value.
  • Fit for purpose: Functionalities are designed and implemented for the purpose of satisfying the end user's needs and solving their problems.
  • User-centric: End users see the product as rewarding, engaging, intuitive, and emotionally satisfying. They want to come back to it.
  • Adaptable: The product can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components.
  • Accessible: The product is available on demand and on the end user's preferred interface.
    End users have a seamless experience across all devices.
  • Private and secured: The end user's activity and data are protected from unauthorized access.
  • Informative and insightful: The product delivers consumable, accurate, and trustworthy real-time data that is important to the end user.
  • Seamless application connection: The product facilitates direct interactions with one or more other products through an uninterrupted user experience.
  • Relationship and network building: The product enables and promotes the connection and interaction of people.

The Business Value cycle of continuous modernization.

Signals

DX is critical for business growth and maturity, but the organization may not be ready

A good DX has become a key differentiator that gives organizations an advantage over their competition and peers. Shifts in working environments; employee, customer, and stakeholder expectations; and the advancements in modern technologies have raised the importance of adopting and transitioning to digital processes and tools to stay relevant and responsive to changing business and technology conditions.

Applications teams are critical to ensuring the successful delivery and operation of these digital processes and tools. However, they are often under-resourced and challenged to meet their DX goals.

  • 7% of both business and IT respondents think IT has the resources needed to keep up with digital transformation initiatives and meet deadlines (Cyara, 2021).
  • 43% of respondents said that the core barrier to digital transformation is a lack of skilled resources (Creatio, 2021).
A circle graph is shown with 91% of the circle coloured in dark blue, with the number 91% in the centre.

of organizations stated that at least 1% of processes were shifted from being manually completed to digitally completed in the last year. 29% of organizations stated at least 21% were shifted.

Source: Tech Trends and Priorities 2023; N=500.

A circle graph is shown with 98% of the circle coloured in dark blue, with the number 98% in the centre.

of organizations recognized digital transformation is important for competitive advantage. 94% stated it is important to enhance customer experience, and 91% stated it will have a positive impact on revenue.

Source: Cyara, 2021.

Drivers

Brand and reputation

Customers are swayed by the innovations and advancements in digital technologies and expect your applications team to deliver and support them. Your leaders recognize the importance of these expectations and are integrating them into their business strategy and brand (how the organization presents itself to its customers, employees and the public). They hope that their actions will improve and shape the company's reputation (public perception of the company) as effective, customer-focused, and forward-thinking.

Worker productivity

As you evolve and adopt more complex tools and technology, your stakeholders will expect more from business units and IT teams. Unfortunately, teams employing manual processes and legacy systems will struggle to meet these expectations. Digital products and services promote the simplification of complex operations and applications and help the business and your teams better align operational practices with strategic goals and deliver valuable DX.

Organization modernization

Legacy processes, systems, and ways of working are no longer suitable for meeting the strategic digital objectives and DX needs stakeholders expect. They drive up operational costs without increased benefits, impede business growth and innovation, and consume scarce budgets that could be used for other priorities. Shifting to digital tools and technologies will bring these challenges to light and demonstrate how modernization is an integral part of DX success.

Benefits & Risks

Benefits

  • Flexibility & Satisfaction
  • Adoption
  • Reliability

Employees and customers can choose how they want to access, modify, and consume digital products and services. They can be tailored to meet the specific functional needs, behaviors, and habits of the end user.

The customer, end user, brand, and employee drive selection, design, and delivery of digital products and services. Even the most advanced technologies will fail if key roles do not see the value in their use.

Digital products and services are delivered with technical quality built into them, ensuring they meet the industry, regulatory, and company standards throughout their lifespan and in various conditions.

Risks

  • Legacy & Lore
  • Bureaucracy & Politics
  • Process Inefficiencies
  • No Quality Standards

Some stakeholders may not be willing to change due to their familiarity and comfort of business practices.

Competing and conflicting priorities of strategic products and services undermine digital transformation and broader modernization efforts.

Business processes are often burdened by wasteful activities. Digital products and services are only as valuable as the processes they support.

The performance and support of your digital products and services are hampered due to unmanageable technical debt because of a deliberate decision to bypass or omit quality good practices.

Address your pressure points to fully realize the benefits of this priority

Success can be dependent on your ability to address your pressure points.

Attracting and Retaining Talent

Enhance the employee experience.

Design the digital processes, tools, and technologies to meet the individual needs of the employee.

Maximizing the Return on Technology

Modernize or extend the use of existing investments.

Drive higher adoption of applications and higher user value and productivity by implementing digital capabilities to the applications that will gain the most.

Confidently Shifting to Digital

Prioritize DX in your shift to digital. Include DX as part of your definition of success.

Your products and services are not valuable if users, customers, and employees do not use them.

Addressing Competing Priorities

Ground your digital vision, goals, and objectives

Establish clear ownership of DX and digital products and services with a cross-functional prioritization framework.

Fostering a Collaborative Culture

Involve all perspectives in defining and delivering DX.

Maintain a committee of owners, stakeholders, and delivery teams to ensure consensus and discuss how to address cross-functional opportunities and risks.

Creating High-Throughput Teams

Establish delivery principles centered on DX.

Enforce guiding principles to streamline and simplify DX delivery, such as plug-and-play architecture and quality standards.

Recommendations

Build a digital business strategy

A digital business strategy clearly articulates the goals and ambitions of the business to adopt digital practices, tools, and technologies. This document:

  • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
  • Unifies digital possibilities with your customer experiences.
  • Establishes accountability with the executive leadership.
  • States the importance of cross-functional participation from senior management across the organization.

Related Research:

Learn, understand, and empathize with your users, employees, and customers

  • To create a better product, solution, or service, understanding those who use it, their needs, and their context is critical.
  • A great experience design practice can help you balance those goals so that they are in harmony with those of your users.
  • IT leaders must find ways to understand the needs of the business and develop empathy on a much deeper level. This empathy is the foundation for a thriving business partnership.

Related Research:

Recommendations

Center product and service delivery decisions and activities on DX and quality

User, customer, employee, and brand are integral perspectives on the software development lifecycle (SDLC) and the management and governance practices supporting digital products and services. It ensures quality standards and controls are consistently upheld while maintaining alignment with various needs and priorities. The goal is to come to a consensus on a universal definition and approach to embed quality and DX-thinking throughout the delivery process.

Related Research:

Instill collaborative delivery practices

Today's rapidly scaling and increasingly complex digital products and services create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality. This pressure is further compounded by the competing priorities of individual stakeholders and the nuances among different personas of digital products and services.

A collaborative delivery practice sets the activities, channels, and relationships needed to deliver a valuable and quality product or service with cross-functional awareness, accountability, and agreement.

Related Research:

Recommendations

Continuously monitor and modernize your digital products and services

Today's modern digital products and services are tomorrow's shelfware. They gradually lose their value, and the supporting technologies will become obsolete. Modernization is a continuous need.

Data-driven insights help decision makers decide which products and services to retire, upgrade, retrain on, or maintain to meet the demands of the business.

Enhancements focusing on critical business capabilities strengthen the case for investment and build trust with all stakeholders.

Related Research:

CASE STUDY
Mastercard in Asia

Focus on the customer journey

Chief Marketing Officer M.V. Rajamannar (Raja) wanted to change Mastercard's iconic "Priceless" ad campaign (with the slogan "There are some things money can't buy. For everything else there's Mastercard."). The main reasons were that the campaign relied on one-way communication and targeted end customers, even though Mastercard doesn't issue cards directly to customers; partner banks do. To drive the change in campaign, Raja and his team created a digital engine that leveraged digital and social media. Digital engine is a seven-step process based on insights gleaned from data and real-time optimization.

  1. Emotional spark: Using data to understand customers' passion points, Mastercard builds videos and creatives to ignite an emotional spark and give customers a reason to engage. For example, weeks before New Year's Eve, Mastercard produced a video with Hugh Jackman to encourage customers to submit a story about someone who deeply mattered to them. The authors of the winning story would be flown to reunite with those both distant and dear.
  2. Engagement: Mastercard targets the right audience with a spark video through social media to encourage customers to share their stories.
  3. Offers: To help its partner banks and merchants in driving their business, the company identifies the best offers to match consumers' interests. In the above campaign, Mastercard's Asia-Pacific team found that Singapore was a favorite destination for Indian customers, so they partnered with Singapore's Resorts World Sentosa with an attractive offer.
  4. Real-time optimization: Mastercard optimizes, in real time, a portfolio of several offers through A/B testing and other analysis.
  5. Amplification: Real-time testing provides confidence to Mastercard about the potential success of these offers and encourages its bank and merchant partners to co-market and co-fund these campaigns.
  6. Network effects: A few weeks after consumers submitted their stories about distant loved ones, Mastercard selected winners, produced videos of them surprising their friends and families, and used these videos in social media to encourage sharing.
  7. Incremental transactions: These programs translate into incremental business for banks who issue cards, for merchants where customers spend money, and for Mastercard, which gets a portion of every transaction.

Source: Harvard Business Review Press

CASE STUDY
Mastercard in Asia (cont'd)

Focus on the customer journey

  1. Emotional Spark
    Drives genuine personal stories
  2. Engagement
    Through Facebook
    and social media
  3. Offers
    From merchants
    and Mastercard assets
  4. Optimization
    Real-time testing of offers and themes
  5. Amplification
    Paid and organic programmatic buying
  6. Network Effects
    Sharing and
    mass engagement
  7. Incremental Transactions
    Win-win for all parties

CASE STUDY
Mastercard in Asia (cont'd)

The Mastercard case highlights important lessons on how to engage customers:

  • Have a broad message. Brands need to connect with consumers over how they live and spend their time. Organizations need to go beyond the brand or product message to become more relevant to consumers' lives. Dove soap was very successful in creating a conversation among consumers with its "Real Beauty" campaign, which focused not on the brand or even the product category, but on how women and society view beauty.
  • Shift from storytelling to story making. To break through the clutter of advertising, companies need to move from storytelling to story making. A broader message that is emotionally engaging allows for a two-way conversation.
  • Be consistent with the brand value. The brand needs to stand for something, and the content should be relevant to and consistent with the image of the brand. Pepsi announced an award of $20 million in grants to individuals, businesses, and nonprofits that promote a new idea to make a positive impact on community. A large number of submissions were about social causes that had nothing to do with Pepsi, and some, like reducing obesity, were in conflict with Pepsi's product.
  • Create engagement that drives business. Too much entertainment in ads may engage customers but detract from both communicating the brand message and increasing sales. Simply measuring the number of video views provides only a partial picture of a program's success.

Intelligent Automation

PRIORITY 2

  • Extend Automation Practices with AI and ML

AI and ML are rapidly growing. Organizations see the value of machines intelligently executing high-performance and dynamic tasks such as driving cars and detecting fraud. Senior leaders see AI and ML as opportunities to extend their business process automation investments.

Introduction

Intelligent automation is the next step in your business process automation journey

What is intelligent automation (IA)?

Intelligent automation (IA) is the combination of traditional automation technologies, such as business process management (BPM) and robotic process automation (RPA), with AI and ML. The goal is to further streamline and scale decision making across various business processes by:

  • Removing human interactions.
  • Addressing decisions that involve complex variables.
  • Automatically adapting processes to changing conditions.
  • Bridging disparate automation technologies into an integrated end-to-end value delivery pipeline.

"For IA to succeed, employees must be involved in the transformation journey so they can experience firsthand the benefits of a new way of working and creating business value," (Cognizant).

What is the difference between IA and hyperautomation?

"Hyperautomation is the act of automating everything in an organization that can be automated. The intent is to streamline processes across an organization using intelligent automation, which includes AI, RPA and other technologies, to run without human intervention. … Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible" (IBM, 2021).

Note that hyperautomation often enables IA, but teams solely adopting IA do not need to abide to its automation-first principles.

IA is a combination of various tools and technologies

What tools and technologies are involved in IA?

  • Artificial intelligence (AI) & Machine Learning (ML) – AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. AI is making its own decisions without human intervention. Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned. AI is a combination of technologies and can include machine learning.
  • Intelligent Business Process Management System (iBPMS) – Combination of BPM tools with AI and other intelligence capabilities.
  • Robotic Process Automation (RPA) – Robots leveraging an application's UI rather than programmatic access. Automate rules-based, repetitive tasks performed by human workers with AI/ML.
  • Process Mining & Discovery – Process mining involves reading system event logs and application transactions and applying algorithmic analysis to automatically identify and map inferred business processes. Process discovery involves unintrusive virtual agents that sit on a user's desktop and record and monitor how they interact with applications to perform tasks and processes. Algorithms are then used to map and analyze the processes.
  • Intelligent Document Processing – The conversion of physical or unstructured documents into a structured, digital format that can be used in automation solutions. Optical character recognition (OCR) and natural language processing (NPL) are common tools used to enable this capability.
  • Advanced Analytics – The gathering, synthesis, transformation, and delivery of insightful and consumable information that supports data-driven decision making. Data is queried from various disparate sources and can take on a variety of structured and unstructured formats.

The cycle of IA technologies

Signals

Process automation is an executive priority and requires organizational buy-in

Stakeholders recognize the importance of business process automation and AI and are looking for ways to deliver more value using these technologies.

  • 90% of executives stated automating business workflows post-COVID-19 will ensure business continuity (Kofax, 2022).
  • 88% of executives stated they need to fast-track their end-to-end digital transformation (Kofax, 2022).

However, the advertised benefits to vendors of enabling these desired automations may not be easily achievable because of:

  • Manual and undocumented business processes.
  • Fragmented and inaccessible systems.
  • Poor data quality, insights, and security.
  • The lack of process governance and management practice.
A circle graph is shown with 49% of the circle coloured in dark blue, with the number 49% in the centre.

of CXOs stated staff sufficiency, skill and engagement issues as a minor IT pain point compared to 51% of CIOs stated this issue as a major pain point.

Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

A circle graph is shown with 36% of the circle coloured in dark blue, with the number 36% in the centre.

of organizations have already invested in AI or machine learning.

Source: Tech Trends and Priorities 2023; N=662

Drivers

Quality & throughput

Products and services delivered through an undefined and manual process risk the creation of preventable and catchable defects, security flaws and holes, missing information, and other quality issues. IA solutions consistently reinforce quality standards the same way across all products and services while tailoring outputs to meet an individual's specific needs. Success is dependent on the accurate interpretation and application of quality standards and the user's expectations.

Worker productivity

IA removes the tedious, routine, and mundane tasks that distract and restrict employees from doing more valuable, impactful, and cognitively focused activities. Practical insights can also be generated through IA tools that help employees make data-driven decisions, evaluate problems from different angles, and improve the usability and value of the products and services they produce.

Good process management practices

Automation magnifies existing inefficiencies of a business process management practice, such as unclear and outdated process documentation and incorrect assumptions. IA reinforces the importance of good business process optimization practices, such as removing waste and inefficiencies in a thoughtful way, choosing the most appropriate automation solution, and configuring the process in the right way to maximize the solution's value.

Benefits & Risks

Benefits

  • Documentation
  • Hands-Off
  • Reusability

All business processes must be mapped and documented to be automated, including business rules, data entities, applications, and control points.

IA can be configured and orchestrated to automatically execute when certain business, process, or technology conditions are met in an unattended or attended manner.

IA is applicable in use cases beyond traditional business processes, such as automated testing, quality control, audit, website scraping, integration platform, customer service, and data transfer.

Risks

  • Data Quality & Bias
  • Ethics
  • Recovery & Security
  • Management

The accuracy and relevance of the decisions IA makes are dependent on the overall quality of the data
used to train it.

Some decisions can have significant reputational, moral, and ethical impacts if made incorrectly.
The question is whether it is appropriate for a non-human to make that decision.

IA is composed of technologies that can be compromised or fail. Without the proper monitoring, controls,
and recovery protocols, impacted IA will generate significant business and IT costs and can potentially harm customers, employees, and the organization.

Low- and no-code capabilities ease and streamline IA development, which makes it susceptible to becoming unmanageable. Discipline is needed to ensure IA owners are aware of the size and health of the IA portfolio.

Address your pressure points to fully realize the benefits of this priority

Success can be dependent on your ability to address your pressure points.

Attracting and Retaining Talent

Be transparent and support role changes.

Plan to address the human sentiment with automation (e.g. job security) and the transition of the role to other activities.

Maximizing the Return on Technology

Automate applications across multiple business functions.

Recognize the value opportunities of improving and automating the integration of cross-functional processes.

Confidently Shifting to Digital

Maximize the learning of automation fit.

Select the right capabilities to demonstrate the value of IA while using lessons learned to establish the appropriate support.

Addressing Competing Priorities

Recognize automation opportunities with capability maps.

Use a capability diagram to align strategic IA objectives with tactical and technical IA initiatives.

Fostering a Collaborative Culture

Involve the user in the delivery process.

Maximize automation adoption by ensuring the user finds value in its use before deployment.

Creating High-Throughput Teams

Remove manual, error-prone, and mundane tasks.

Look for ways to improve team throughput by removing wasteful activities, enforcing quality, and automating away tasks driving down productivity.

Recommendations

Build your business process automation playbook and practice

Formalize your business process automation practice with a good toolkit and a repeatable set of tactics and techniques.

  • Clarify the problem being solved with IA.
  • Optimate your processes. Apply good practices to first optimize (opti-) and then automate (-mate) key business processes.
  • Deliver minimum viable automations (MVAs). Maximize the learning of automation solutions and business operational changes through small, strategic automation use cases.

Related Research:

Explore the various IA tooling options

Each IA tool will address a different problem. Which tool to choose is dependent on a variety of factors, such as functional suitability, technology suitability, delivery and support capabilities, alignment to strategic business goals, and the value it is designed to deliver.

Related Research:

Recommendations

Introduce AI and ML thoughtfully and with a plan

Despite the many promises of AI, organizations are struggling to fully realize its potential. The reasons boil down to a lack of understanding of when these technologies should and shouldn't be used, as well as a fear of the unknown. The plan to adopt AI should include:

  • Understanding of what AI really means in practice.
  • Identifying specific applications of AI in the business.
  • Understanding the type of AI applicable for the situation.

Related Research:

Mitigate AI and ML bias

Biases can be introduced into an IA system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used and what assumptions were made. In most cases, AI and ML bias is a is a social, political, and business problem.

While bias may not be intentional nor completely prevented or eliminated, early detection, good design, and other proactive preventative steps can be taken to minimize its scope and impact.

Related Research:

CASE STUDY
University Hospitals

Challenge

University Hospitals Cleveland (UH) faces the same challenge that every major hospital confronts regarding how to deliver increasingly complex, high-quality healthcare to a diverse population efficiently and economically. In 2017, UH embarked on a value improvement program aiming to improve quality while saving $400 million over a five-year period.

In emergency department (ED) and inpatient units, leaders found anticipating demand difficult, and consequently units were often over-staffed when demand was low and under-staffed when demand was high. Hospital leaders were uncertain about how to reallocate resources based on capacity needs.

Solution

UH turned to Hospital IQ's Census Solution to proactively manage capacity, staff, and flow in the ED and inpatient areas.

By applying AI, ML, and external data (e.g. weather forecasts) to the hospital's own data (including EMR data and hospital policies), the solution helped UH make two-day census forecasts that managers used to determine whether to open or close in-patient beds and, when necessary, divert low-acuity patients to other hospitals in the system to handle predicted patient volume.

Source: University Hospitals

Results

ED boarding hours have declined by 10% and the hospital has seen a 50% reduction in the number of patients who leave the hospital without
being seen.

UH also predicts in advance patients ready for discharge and identifies roadblocks, reducing the average length of stay by 15%. UH is able to better manage staff, reducing overtime and cutting overall labor costs.

The hospital has also increased staff satisfaction and improved patient safety by closing specific units on weekends and increasing the number of rooms that can be sterilized.

Proactive Application Management

PRIORITY 3

  • Strengthen Applications to Prevent and Minimize the Impact of Future Issues

Application management is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on application management when it becomes a problem. The lack of governance and practice accountability leaves this practice in a chaotic state: politics take over, resources are not strategically allocated, and customers are frustrated. As a result, application management is often reactive and brushed aside for new development.

Introduction

What is application management?

Application management ensures valuable software is successfully delivered and is maintained for continuous and sustainable business operations. It contains a repeatable set of activities needed to rationalize and roadmap products and services while balancing priorities of new features and maintenance tasks.

Unfortunately, application management is commonly perceived as a practice that solely addresses issues, updates, and incidents. However, application management teams are also tasked with new value delivery that was not part of the original release.

Why is an effective application maintenance (reactive) practice not good enough?

Application maintenance is the "process of modifying a software system or its components after delivery to correct faults, improve performance or other attributes, or adapt to a changed environment or business process," (IEEE, 1998). While it is critical to quickly fix defects and issues when they occur, reactively addressing them is more expensive than discovering them early and employing the practices to prevent them.

Even if an application is working well, its framework, architecture, and technology may not be compatible with the possible upcoming changes stakeholders and vendors may want to undertake. Applications may not be problems now, but they soon can be.

What motivates proactive application changes?

This image shows the motivations for proactive application changes, sorted by external and internal sources.

Proactive application management must be disciplined and applied strategically

Proactive application management practices are critical to maintaining business continuity. They require continuous review and modification so that applications are resilient and can address current and future scenarios. Depending on the value of the application, its criticality to business operations, and its susceptibility to technology change, a more proactive management approach may be warranted. Stakeholders can then better manage resources and budget according to the needs of specific products.

Reactive Management

Run-to-Failure

Fix and enhance the product when it breaks. In most cases, a plan is in place ahead of a failure, so that the problem can be addressed without significant disruption and costs.

Preventive

Regularly inspect and optimize the product to reduce the likelihood that it will fail in the future. Schedule inspections based on a specific timeframe or usage threshold.

Predictive

Predict failures before they happen using performance and usage data to alert teams when products are at risk of failure according to specified conditions.

Reliability and Risk Based

Analyze all possible failure scenarios for each component of the product and create tailored delivery plans to improve the stability, reliability, and value of each product.

Proactive Management

Signals

Applications begin to degrade as soon as they are used

Today's applications are tomorrow's shelfware. They gradually lose their value, stability, robustness, and compatibility with other enterprise technologies. The longer these applications are left unattended or simply "keeping the lights on," the more risks they will bring to the application portfolio, such as:

  • Discovery and exploitation of security flaws and gaps.
  • Increasing the lock-in to specific vendor technologies.
  • Inconsistent application performance across various workloads.

These impacts are further compounded by the continuous work done on a system burdened with technical debt. Technical debt describes the result of avoided costs that, over time, cause ongoing business impacts. Left unaddressed, technical debt can become an existential threat that risks your organization's ability to effectively compete and serve its customers. Unfortunately, most organizations have a significant, growing, unmanageable technical debt portfolio.

A circle graph is shown with 60% of the circle coloured in dark green, with the number 60% in the centre.

of respondents stated they saw an increase in perceived change in technical debt during the past three years. A quarter of respondents indicated that it stayed the same.

Source: McKinsey Digital, 2020.

US
$4.35
Million

is the average cost of a data breach in 2022. This figure represents a 2.6% increase from last year. The average cost has climbed 12.7% since 2020.

Source: IBM, 2022; N=537.

Drivers

Technical debt

Historical decisions to meet business demands by deferring key quality, architectural, or other software delivery activities often lead to inefficient and incomplete code, fragile legacy systems, broken processes, data quality problems, and the other contributors to technical debt. The impacts for this challenge is further heightened if organizations are not actively refactoring and updating their applications behind the scenes. Proactive application management is intended to raise awareness of application fragility and prioritize comprehensive refactoring activities alongside new feature development.

Long-term application value

Applications are designed, developed, and tested against a specific set of parameters which may become less relevant over time as the business matures, technology changes, and user behaviors and interactions shift. Continuous monitoring of the application system, regular stakeholder and user feedback, and active technology trend research and vendor engagement will reveal tasks to prepare an application for future value opportunities or stability and resilience concerns.

Security and resiliency

Innovative approaches to infiltrating and compromising applications are becoming prevailing stakeholder concerns. The loopholes and gaps in existing application security protocols, control points, and end-user training are exploited to gain the trust of unsuspecting users and systems. Proactive application management enforces continuous security reviews to determine whether applications are at risk. The goal is to prevent an incident from happening by hardening or complementing measures already in place.

Benefits & Risks

Benefits

  • Consistent Performance
  • Robustness
  • Operating Costs

Users expect the same level of performance and experience from their applications in all scenarios. A proactive approach ensures the configurations meet the current needs of users and dependent technologies.

Proactively managed applications are resilient to the latest security concerns and upcoming trends.

Continuous improvements to the underlying architecture, codebase, and interfaces can minimize the cost to maintain and operate the application, such as the transition to a loosely coupled architecture and the standardization of REST APIs.

Risks

  • Stakeholder Buy-In
  • Delayed Feature Releases
  • Team Capacity
  • Discipline

Stakeholders may not see the association between the application's value and its technical quality.

Updates and enhancements are system changes much like any application function. Depending
on the priority of these changes, new functions may be pushed off to a future release cycle.

Applications teams require dedicated capacity to proactively manage applications, but they are often occupied meeting other stakeholder demands.

Overinvesting in certain application management activities (such as refactoring, re-architecture, and redesign) can create more challenges. Knowing how much to do is important.

Address your pressure points to fully realize the benefits of this priority

Success can be dependent on your ability to address your pressure points.

Attracting and Retaining Talent

Shift focus from maintenance to innovation.

Work on the most pressing and critical requests first, with a prioritization framework reflecting cross-functional priorities.

Maximizing the Return on Technology

Improve the reliability of mission-critical applications.

Regularly verify and validate applications are up to date with the latest patches and fixes and comply with industry good practices and regulations.

Confidently Shifting to Digital

Prepare applications to support digital tools and technologies.

Focus enhancements on the key components required to support the integration, performance, and security needs of digital.

Addressing Competing Priorities

Rationalize the health of the applications.

Use data-driven, compelling insights to justify the direction and prioritization of applications initiatives.

Fostering a Collaborative Culture

Include the technical perspective in the viability of future applications plans.

Demonstrate how poorly maintained applications impede the team's ability to deliver confidently and quickly.

Creating High-Throughput Teams

Simplify applications to ease delivery and maintenance.

Refactor away application complexities and align the application portfolio to a common quality standard to reduce the effort to deliver and test changes.

Recommendations

Reinforce your application maintenance practice

Maintenance is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on maintenance when it becomes a problem.

  • Justify the necessity of streamlined maintenance.
  • Strengthen triaging and prioritization practices.
  • Establish and govern a repeatable process.

Ensure product issues, incidents, defects, and change requests are promptly handled to minimize business and IT risks.

Related Research:

Build an application management practice

Apply the appropriate management approaches to maintain business continuity and balance priorities and commitments among maintenance and new development requests.

This practice serves as the foundation for creating exceptional customer experience by emphasizing cross-functional accountability for business value and product and service quality.

Related Research:

Recommendations

Manage your technical debt

Technical debt is a type of technical risk, which in turn is business risk. It's up to the business to decide whether to accept technical debt or mitigate it. Create a compelling argument to stakeholders as to why technical debt should be a business priority rather than just an IT one.

  • Define and identify your technical debt.
  • Conduct a business impact analysis.
  • Identify opportunities to better manage technical debt.

Related Research:

Gauge your application's health

Application portfolio management is nearly impossible to perform without an honest and thorough understanding of your portfolio's alignment to business capabilities, business value, total cost of ownership, end-user reception and satisfaction, and technical health.

Develop data-driven insights to help you decide which applications to retire, upgrade, retrain on, or maintain to meet the demands of the business.

Related Research:

Recommendations

Adopt site reliability engineering (SRE) and DevOps practices

Site reliability engineering (SRE) is an operational model for running online services more reliably by a team of dedicated reliability-focused engineers.

DevOps, an operational philosophy promoting development and operations collaboration, can bring the critical insights to make application management practices through SRE more valuable.

Related Research:

CASE STUDY
Government Agency

Goal

A government agency needed to implement a disciplined, sustainable application delivery, planning, and management process so their product delivery team could deliver features and changes faster with higher quality. The goal was to ensure change requests, fixes, and new features would relieve requester frustrations, reduce regression issues, and allow work to be done on agreeable and achievable priorities organization-wide. The new model needed to increase practice efficiency and visibility in order to better manage technical debt and focus on value-added solutions.

Solution

This organization recognized a number of key challenges that were inhibiting its team's ability to meet its goals:

  • The product backlog had become too long and unmanageable.
  • Delivery resources were not properly allocated to meet the skills and capabilities needed to successfully meet commitments.
  • Quality wasn't defined or enforced, which generated mounting technical debt.
  • There was a lack of clear metrics and defined roles and responsibilities.
  • The business had unrealistic and unachievable expectations.

Source: Info-Tech Workshop

Key practices implemented

  • Schedule quarterly business satisfaction surveys.
  • Structure and facilitate regular change advisory board meetings.
  • Define and enforce product quality standards.
  • Standardize a streamlined process with defined roles.
  • Configure management tools to better handle requests.

Multisource Systems

PRIORITY 4

  • Manage an Ecosystem Composed of In-House and Outsourced Systems

Various market and company factors are motivating a review on resource and system sourcing strategies. The right sourcing model provides key skills, resources, and capabilities to meet innovation, time to market, financial, and quality goals of the business. However, organizations struggle with how best to support sourcing partners and to allocate the right number of resources to maximize success.

Introduction

A multisource system is an ecosystem of integrated internally and externally developed applications, data, and infrastructure. These technologies can be custom developed, heavily configured vendor solutions, or they may be commercial off-the-shelf (COTS) solutions. These systems can also be developed, supported, and managed by internal staff, in partnership with outsourced contractors, or be completely outsourced. Multisource systems should be configured and orchestrated in a way that maximizes the delivery of specific value drivers for the targeted audience.

Successfully selecting a sourcing approach is not a simple RFP exercise to choose the lowest cost

Defining and executing a sourcing approach can be a significant investment and risk because of the close interactions third-party services and partners will have with internal staff, enterprise applications and business capabilities. A careful selection and design is necessary.

The selection of a sourcing partner is not simple. It involves the detailed inspection and examination of different candidates and matching their fit to the broader vision of the multisource system. In cases where control is critical, technology stack and resource sourcing consolidation to a few vendors and partners is preferred. In other cases, where worker productivity and system flexibility are highly prioritized, a plug-and-play best-of-breed approach is preferred.

Typical factors involved in sourcing decisions.

Sourcing needs to be driven by your department and system strategies

How does the department want to be perceived?

The image that your applications department and teams want to reflect is frequently dependent on the applications they deliver and support, the resources they are composed of, and the capabilities they provide.

Therefore, choosing the right sourcing approach should be driven by understanding who the teams are and want to be (e.g. internal builder, an integrator, a plug-in player), what they can or want to do (e.g. custom-develop or implement), and what they can deliver or support (e.g. cloud or on-premises) must be established.

What value is the system delivering?

Well-integrated systems are the lifeblood of your organization. They provide the capabilities needed to deliver value to customers, employees, and stakeholders. However, underlying system components may not be sourced under a unified strategy, which can lead to duplicate vendor services and high operational costs.

The right sourcing approach ensures your partners address key capabilities in your system's delivery and support, and that they are positioned to maximize the value of critical and high-impact components.

Signals

Business demand may outpace what vendors can support or offer

Outsourcing and shifting to a buy-over-build applications strategy are common quick fixes to dealing with capacity and skills gaps. However, these quick fixes often become long-term implementations that are not accounted for in the sourcing selection process. Current application and resource sourcing strategies must be reviewed to ensure that vendor arrangements meet the current and upcoming demands and challenges of the business, customers, and enterprise technologies, such as:

  • Pressure from stakeholders to lower operating costs while maintaining or increasing quality and throughput.
  • Technology lock-in that addresses short-term needs but inhibits long-term growth and maturity.
  • Team capacity and talent acquisition not meeting the needs of the business.
A circle graph is shown with 42% of the circle coloured in dark brown, with the number 42% in the centre.

of respondents stated they outsourced software development fully or partly in the last 12 months (2021).

Source: Coding Sans, 2021.

A circle graph is shown with 65% of the circle coloured in dark brown, with the number 65% in the centre.

of respondents stated they were at least somewhat satisfied with the result of outsourcing software development.

Source: Coding Sans, 2021.

Drivers

Business-managed applications

Employees are implementing and building applications without consulting, notifying, or heeding the advice of IT. IT is often ill-equipped and under-resourced to fight against shadow IT. Instead, organizations are shifting the mindset of "fight shadow IT" to "embrace business-managed applications," using good practices in managing multisource systems. A multisource approach strikes the right balance between user empowerment and centralized control with the solutions and architecture that can best enable it.

Unique problems to solve

Point solutions offer features to address unique use cases in uncommon technology environments. However, point solutions are often deployed in siloes with limited integration or overlap with other solutions. The right sourcing strategy accommodates the fragmented nature of point solutions into a broader enterprise system strategy, whether that be:

  • Multisource best of breed – integrate various technologies that provide subsets of the features needed for supporting business functions.
  • Multisource custom – integrate systems built in-house with technologies developed by external organizations.
  • Vendor add-ons and integrations – enhance an existing vendor's offering by using their system add-ons as upgrades, new add-ons, or integrations.

Vendor services

Some vendor services in a multisource environment may be redundant, conflicting, or incompatible. Given that multisource systems are regularly changing, it is difficult to identify what services are affected, what would be needed to fill the gap of the removed solution, or which redundant services should be removed.

A multisource approach motivates the continuous rationalization of your vendor services and partners to determine the right mixture of in-house and outsourced resources, capabilities, and technologies.

Benefits & Risks

Benefits

  • Business-Focused Solution
  • Flexibility
  • Cost Optimization

Multisource systems can be designed to support an employee's ability to select the tools they want and need.

The environment is architected in a loosely coupled approach to allow applications to be easily added, removed, and modified with minimized impact to other integrated applications.

Rather than investing in large solutions upfront, applications are adopted when they are needed and are removed when little value is gained. Disciplined application portfolio management is necessary to see the full value of this benefit.

Risks

  • Manageable Sprawl
  • Policy Adherence
  • Integration & Compatibility

The increased number and diversity of applications in multisource system environments can overwhelm system managers who do not have an effective application portfolio management practice.

Fragmented application implementations risk inconsistent adherence to security and other quality policies, especially in situations where IT is not involved.

Application integration can quickly become tangled, untraceable, and unmanageable because of varying team and vendor preferences for specific integration technologies and techniques.

Address your pressure points to fully realize the benefits of this priority

Success can be dependent on your ability to address your pressure points.

Attracting and Retaining Talent

Enable business-managed applications.

Create the integrations to enable the easy connection of desired tools to enterprise systems with the appropriate guardrails.

Maximizing the Return on Technology

Enhance the functionality of existing applications.

Complement current application capability gaps with data, features, and services from third-party applications.

Confidently Shifting to Digital

Use best-of-breed tools to meet specific digital needs.

Select the best tools to meet the unique and special functional needs of the digital vision.

Addressing Competing Priorities

Agree on a common philosophy on system composition.

Establish an owner of the multisource system to guide how the system should mature as the organization grows.

Fostering a Collaborative Culture

Discuss how applications can work together better in an ecosystem.

Build committees to discuss how applications can better support each other and drive more value.

Creating High-Throughput Teams

Alleviate delivery bottlenecks and issues.

Leverage third-party sources to fill skills and capacity gaps until a long-term solution can be implemented.

Recommendations

Define the goals of your applications department and product vision

Understanding the applications team's purpose and image is critical in determining how the system they are managing and the skills and capacities they need should be sourced.

Changing and conflicting definitions of value and goals make it challenging to convey an agreeable strategy of the multisource system. An achievable vision and practical tactics ensure all parties in the multisource system are moving in the same direction.

Related Research:

Develop a sourcing partner strategy

Almost half of all sourcing initiatives do not realize projected savings, and the biggest reason is the choice of partner (Zhang et al., 2018). Making the wrong choice means inferior products, higher costs and the loss of both clients and reputation.

Choosing the right sourcing partner involves understanding current skills and capacities, finding the right matching partner based on a desired profile, and managing a good working relationship that sees short-term gains and supports long-term goals.

Related Research:

Recommendations

Strengthen enterprise integration practices

Integration strategies that are focused solely on technology are likely to complicate rather than simplify because little consideration is given on how other systems and processes will be impacted. Enterprise integration needs to bring together business process, applications, and data – in that order.

Kick-start the process of identifying opportunities for improvement by mapping how applications and data are coordinated to support business activities.

Related Research:

Manage your solution architecture and application portfolio

Haphazardly implementing and integrating applications can generate significant security, performance, and data risks. A well-thought-through solution architecture is essential in laying the architecture quality principles and roadmap on how the multisource system can grow and evolve in a sustainable and maintainable way.

Good application portfolio management complements the solution architecture as it indicates when low-value and unused applications should be removed to reduce system complexity.

Related Research:

Recommendations

Embrace business-managed applications

Multisource systems bring a unique opportunity to support the business and end users' desire to implement and develop their own applications. However, traditional models of managing applications may not accommodate the specific IT governance and management practices required to operate business-managed applications:

  • A collaborative and trusting business-IT relationship is key.
  • The role of IT must be reimagined.
  • Business must be accountable for its decisions.

Related Research:

CASE STUDY
Cognizant

Situation

  • Strives to be primarily an industry-aligned organization that delivers multiple service lines in multiple geographies.
  • Cognizant seeks to carefully consider client culture to create a one-team environment.
  • Value proposition is a consultative approach bringing thought leadership and mutually adding value to the relationship vs. the more traditional order-taker development partner.
  • Wants to share in solution development to facilitate shared successes. Geographic alignment drives knowledge of the client and their challenges, not just about time zone and supportability.
  • Offers one of the largest offshore capabilities in the world, supported by local and nearshore resources to drive local knowledge.
  • Today's clients don't typically want a black box, they are sophisticated and want transparency around the process and solution, to have a partner.
  • Clients do want to know where the work is being delivered from, how it's being done.

Source: interview with Jay MacIsaac, Cognizant.

Approach

  • Best relationship comes where teams operate as one.
  • Clients are seeking value, not a development black box.
  • Clients want to have a partner they can engage with, not just an order taker.
  • Want to build a one-team culture with shared goals and deliver business value.
  • Seek a partner that will add to their thinking not echo it.

Results

  • Cognizant is continuing to deliver double-digit growth and continues to strive for top quartile performance.
  • Growth in the client base has seen the company grow to over 340,000 associates worldwide.

Digital Organization as a Platform

PRIORITY 5

  • Create a Common Digital Interface to Access All Products and Services

A digital platform enables organizations to leverage a flexible, reliable, and scalable foundation to create a valuable DX, ease delivery and management efforts, maximize existing investments, and motivate the broader shift to digital. This approach provides a standard to architect, integrate, configure, and modernize the applications that compose the platform.

Introduction

What is digital organization as a platform (DOaaP)?

Digital organization as a platform (DOaaP) is a collection of integrated digital services, products, applications, and infrastructure that is used as a vehicle to meet and exceed an organization's digital strategies. It often serves as an accessible "place for exchanges of information, goods, or services to occur between producers and consumers as well as the community that interacts
with said platform" (Watts, 2020).

DOaaP involves a strategy that paves the way for organizations to be digital. It helps organizations use their assets (e.g. data, processes, products, services) in the most effective ways and become more open to cooperative delivery, usage, and management. This opens opportunities for innovation and cross-department collaborations.

How is DOaaP described?

  1. Open and Collaborative
    • Open organization: open data, open APIs, transparency, and user participation.
    • Collaboration, co-creation, crowdsourcing, and innovation
  2. Accessible and Connected
    • Digital inclusion
    • Channel ubiquity
    • Integrity and interoperability
    • Digital marketplace
  3. Digital and Programmable
    • Digital identity
    • Policies and processes as code
    • Digital products and services
    • Enabling digital platforms

Digital organizations follow a common set of principles and practices

Customer-centricity

Digital organizations are driven by customer focus, meeting and exceeding customer expectations. It must design its services with a "digital first" principle, providing access through every expected channel and including seamless integration and interoperability with various departments, partners, and third-party services. It also means creating trust in its ability to provide secure services and to keep privacy and ethics as core pillars.

Leadership, management, and strategies

Digital leadership brings customer focus to the enterprise and its structures and organizes efficient networks and ecosystems. Accomplishing this means getting rid of silos and a siloed mentality and aligning on a digital vision to design policies and services that are efficient, cost-effective, and provide maximum benefit to the user. Asset sharing, co-creation, and being open and transparent become cornerstones of a digital organization.

Infrastructure

Providing digital services across demographics and geographies requires infrastructure, and that in turn requires long-term vision, smart investments, and partnerships with various source partners to create the necessary foundational infrastructure upon which to build digital services.

Digitization and automation

Automation and digitization of processes and services, as well as creating digital-first products, lead to increased efficiency and reach of the organization across demographics and geographies. Moreover, by taking a digital-first approach, digital organizations future-proof their services and demonstrate their commitment to stakeholders.

Enabling platforms

DOaaP embraces open standards, designing and developing organizational platforms and ecosystems with a cloud-first mindset and sound API strategies. Developer experience must also take center stage, providing the necessary tools and embracing Agile and DevOps practices and culture become prerequisites. Cybersecurity and privacy are central to the digital platform; hence they must be part of the design and development principles and practices.

Signals

The business expects support for digital products and services

Digital transformation continues to be a high-priority initiative for many organizations, and they see DOaaP as an effective way to enable and exploit digital capabilities. However, DOaaP unleashes new strategies, opportunities, and challenges that are elusive or unfamiliar to business leaders. Barriers in current business operating models may limit DOaaP success, such as:

  • Department and functional silos
  • Dispersed, fragmented and poor-quality data
  • Ill-equipped and under-skilled resources to support DOaaP adoption
  • System fragmentation and redundancies
  • Inconsistent integration tactics employed across systems
  • Disjointed user experience leading to low engagement and adoption

DOaaP is not just about technology, and it is not the sole responsibility of either IT or business. It is the collective responsibility of the organization.

A circle graph is shown with 47% of the circle coloured in dark blue, with the number 47% in the centre.

of organizations plan to unlock new value through digital. 50% of organizations are planning major transformation over the next three years.

Source: Nash Squared, 2022.

A circle graph is shown with 70% of the circle coloured in dark blue, with the number 70% in the centre.

of organizations are undertaking digital expansion projects focused on scaling their business with technology. This result is up from 57% in 2021.

Source: F5 Inc, 2022.

Drivers

Unified brand and experience

Users should have the same experience and perception of a brand no matter what product or service they use. However, fragmented implementation of digital technologies and inconsistent application of design standards makes it difficult to meet this expectation. DOaaP embraces a single design and DX standard for all digital products and services, which creates a consistent perception of your organization's brand and reputation irrespective of what products and services are being used and how they are accessed.

Accessibility

Rapid advancement of end-user devices and changes to end-user behaviors and expectations often outpace an organization's ability to meet these requirements. This can make certain organization products and services difficult to find, access and leverage. DOaaP creates an intuitive and searchable interface to all products and services and enables the strategic combination of technologies to collectively deliver more value.

Justification for modernization

Many opportunities are left off the table when legacy systems are abstracted away rather than modernized. However, legacy systems may not justify the investment in modernization because their individual value is outweighed by the cost. A DOaaP initiative motivates decision makers to look at the entire system (i.e. modern and legacy) to determine which components need to be brought up to a minimum digital state. The conversation has now changed. Legacy systems should be modernized to increase the collective benefit of the entire DOaaP.

Benefits & Risks

Benefits

  • Look & Feel
  • User Adoption
  • Shift to Digital

A single, modern, customizable interface enables a common look and feel no matter what and how the platform is being accessed.

Organizations can motivate and encourage the adoption and use of all products and services through the platform and increase the adoption of underused technologies.

DOaaP motivates and supports the modernization of data, processes, and systems to meet the goals and objectives outlined in the broader digital transformation strategy.

Risks

  • Data Quality
  • System Stability
  • Ability to Modernize
  • Business Model Change

Each system may have a different definition of commonly used entities (e.g. customer), which can cause data quality issues when information is shared among these systems.

DOaaP can stress the performance of underlying systems due to the limitations of some systems to handle increased traffic.

Some systems cannot be modernized due to cost constraints, business continuity risks, vendor lock-in, legacy and lore, or other blocking factors.

Limited appetite to make the necessary changes to business operations in order to maximize the value of DOaaP technologies.

Address your pressure points to fully realize the benefits of this priority

Success can be dependent on your ability to address your pressure points.

Attracting and Retaining Talent Promote and showcase achievements and successes. Share the valuable and innovative work of your teams across the organization and with the public.
Maximizing the Return on Technology Increase visibility of underused applications. Promote the adoption and use of all products and services through the platform and use the lessons learned to justify removal, updates or modernizations.
Confidently Shifting to Digital Bring all applications up to a common digital standard. Define the baseline digital state all applications, data, and processes must be in to maximize the value of the platform.
Addressing Competing Priorities Map to a holistic platform vision, goals and objectives. Work with relevant stakeholders, teams and end users to agree on a common directive considering all impacted perspectives.
Fostering a Collaborative Culture Ensure the platform is configured to meet the individual needs of the users. Tailor the interface and capabilities of the platform to address users' functional and personal concerns.
Creating High-Throughput Teams Abstract the enterprise system to expedite delivery. Use the platform to standardize application system access to simplify platform changes and quicken development and testing.

Recommendations

Define your platform vision

Organizations realize that a digital model is the way to provide more effective services to their customers and end users in a cost-effective, innovative, and engaging fashion. DOaaP is a way to help support this transition.

However, various platform stakeholders will have different interpretations of and preferences for what this platform is intended to solve, what benefits it is supposed to deliver, and what capabilities it will deliver. A grounded vision is imperative to steer the roadmap and initiatives.

Related Research:

Assess and modernize your applications

Certain applications may not sufficiently support the compatibility, flexibility, and efficiency requirements of DOaaP. While workaround technologies and tactics can be employed to overcome these application challenges, the full value of the DOaaP may not be realized.

Reviewing the current state of the application portfolio will indicate the functional and value limitations of what DOaaP can provide and an indication of the scope of investment needed to bring applications up to a minimum state.

Related Research:

Recommendations

Understand and evaluate end-user needs

Technology has reached a point where it's no longer difficult for teams to build functional and valuable digital platforms. Rather, the difficulty lies in creating an interface and platform that people want to use and use frequently.

While it is important to increase the access and promotion of all products and services, orchestrating and configuring them in a way to deliver a satisfying experience is even more important. Applications teams must first learn about and empathize with the needs of end users.

Related Research:

Architect your platform

Formalizing and constructing DOaaP just for the sake of doing so often results in an initiative that is lengthy and costly and ends up being considered a failure.

The build and optimization of the platform must be predicated on a thorough understanding of the DOaaP's goals, objectives, and priorities and the business capabilities and process they are meant to support and enable. The appropriate architecture and delivery practices can then be defined and employed.

Related Research:

CASE STUDY
e-Estonia

Situation

The digital strategy of Estonia resulted in e-Estonia, with the vision of "creating a society with more transparency, trust, and efficiency." Estonia has addressed the challenge by creating structures, organizations, and a culture of innovation, and then using the speed and efficiency of digital infrastructure, apps, and services. This strategy can reduce or eliminate bureaucracy through transparency and automation.

Estonia embarked on its journey to making digital a priority in 1994-1996, focusing on a committed investment in infrastructure and digital literacy. With that infrastructure in place, they started providing digital services like an e-banking service (1996), e-tax and mobile parking (2002), and then went full steam ahead with a digital information interoperability platform in 2001, digital identity in 2002, e-health in 2008, and e-prescription in 2010. The government is now strategizing for AI.

Results

This image contains the results of the e-Estonia case study results

Source: e-Estonia

Practices employed

The e-Estonia digital government model serves as a reference for governments across the world; this is acknowledged by the various awards it has received, like #2 in "internet freedom," awarded by Freedom House in 2019; #1 on the "digital health index," awarded by the Bertelsmann Foundation in 2019; and #1 on "start-up friendliness," awarded by Index Venture in 2018.

References

"15th State of Agile Report." Digital.ai, 2021. Web.
"2022 HR Trends Report." McLean & Company, 2022.
"2022: State of Application Strategy Report." F5 Inc, 2022.
"Are Executives Wearing Rose-Colored Glasses Around Digital Transformation?" Cyara, 2021. Web.
"Cost of a Data Breach Report 2022." IBM, 2022. Web.
Dalal, Vishal, et al. "Tech Debt: Reclaiming Tech Equity." McKinsey Digital, Oct. 2020. Web.
"Differentiating Between Intelligent Automation and Hyperautomation." IBM, 15 October 2021. Web.
"Digital Leadership Report 2021." Harvey Nash Group, 2021.
"Digital Leadership Report 2022: The State of Digital." Nash Squared, 2022. Web.
Gupta, Sunil. "Driving Digital Strategy: A Guide to Reimagining Your Business." Harvard Business Review Press, 2018. Web.
Haff, Gordon. "State of Application Modernization Report 2022." Konveyor, 2022. Web.
"IEEE Standard for Software Maintenance: IEEE Std 1219-1998." IEEE Standard for Software Maintenance, 1998. Accessed Dec. 2015.
"Intelligent Automation." Cognizant, n.d. Web.
"Kofax 2022: Intelligent Automation Benchmark Study". Kofax, 2021. Web.
McCann, Leah. "Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?" rAVe, 2 July 2020, Web.
"Proactive Staffing and Patient Prioritization to Decompress ED and Reduce Length of Stay." University Hospitals, 2018. Web.
"Secrets of Successful Modernization." looksoftware, 2013. Web.
"State of Software Development." Coding Sans, 2021. Web.
"The State of Low-Code/No-Code." Creatio, 2021. Web.
"We Have Built a Digital Society and We Can Show You How." e-Estonia. n.d. Web.
Zanna. "The 5 Types of Experience Series (1): Brand Experience Is Your Compass." Accelerate in Experience, 9 February 2020. Web.
Zhang, Y. et al. "Effects of Risks on the Performance of Business Process Outsourcing Projects: The Moderating Roles of Knowledge Management Capabilities." International Journal of Project Management, 2018, vol. 36 no. 4, 627-639.

Research Contributors and Experts

This is a picture of Chris Harrington

Chris Harrington
Chief Technology Officer
Carolinas Telco Federal Credit Union

Chris Harrington is Chief Technology Officer (CTO) of Carolinas Telco Federal Credit Union. Harrington is a proven leader with over 20 years of experience developing and leading information technology and cybersecurity strategies and teams in the financial industry space.

This is a picture of Benjamin Palacio

Benjamin Palacio
Senior Information Technology Analyst County of Placer

Benjamin Palacio has been working in the application development space since 2007 with a strong focus on system integrations. He has seamlessly integrated applications data across multiple states into a single reporting solution for management teams to evaluate, and he has codeveloped applications to manage billions in federal funding. He is also a CSAC-credentialed IT Executive (CA, USA).

This is a picture of Scott Rutherford

Scott Rutherford
Executive Vice President, Technology
LGM Financial Services Inc.

Scott heads the Technology division of LGM Financial Services Inc., a leading provider of warranty and financing products to automotive OEMs and dealerships in Canada. His responsibilities include strategy and execution of data and analytics, applications, and technology operations.

This is a picture of Robert Willatts

Robert Willatts
IT Manager, Enterprise Business Solutions and Project Services
Town of Newmarket

Robert is passionate about technology, innovation, and Smart City Initiatives. He makes customer satisfaction as the top priority in every one of his responsibilities and accountabilities as an IT manager, such as developing business applications, implementing and maintaining enterprise applications, and implementing technical solutions. Robert encourages communication, collaboration, and engagement as he leads and guides IT in the Town of Newmarket.

This is a picture of Randeep Grewal

Randeep Grewal
Vice President, Enterprise Applications
Red Hat

Randeep has over 25 years of experience in enterprise applications, advanced analytics, enterprise data management, and consulting services, having worked at numerous blue-chip companies. In his most recent role, he is the Vice President of Enterprise Applications at Red Hat. Reporting to the CIO, he is responsible for Red Hat's core business applications with a focus on enterprise transformation, application architecture, engineering, and operational excellence. He previously led the evolution of Red Hat into a data-led company by maturing the enterprise data and analytics function to include data lake, streaming data, data governance, and operationalization of analytics for decision support.

Prior to Red Hat, Randeep was the director of global services strategy at Lenovo, where he led the strategy using market data to grow Lenovo's services business by over $400 million in three years. Prior to Lenovo, Randeep was the director of advanced analytics at Alliance One and helped build an enterprise data and analytics function. His earlier work includes seven years at SAS, helping SAS become a leader in business analytics, and at KPMG consulting, where he managed services engagements at Fortune 100 companies.

Secure Your Hybrid Workforce

  • Buy Link or Shortcode: {j2store}271|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Secure Cloud & Network Architecture
  • Parent Category Link: /secure-cloud-network-architecture
  • Many IT and security leaders struggle to cope with the challenges associated with an hybrid workforce and how best to secure it.
  • Understanding the main principles of zero trust: never trust, always verify, assume breach, and verify explicitly.
  • How to go about achieving a zero trust framework.
  • Understanding the premise of SASE as it pertains to a hybrid workforce.

Our Advice

Critical Insight

Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will assist you determine which of the options is a good fit for your organization.

Impact and Result

Every organization's strategy to secure their hybrid workforce should include introducing zero trust principles in certain areas. Our unique approach:

  • Assess the suitability of SASE/SSE and zero trust.
  • Present capabilities and feature benefits.
  • Procure SASE product and/or build a zero trust roadmap.

Secure Your Hybrid Workforce Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Secure Your Hybrid Workforce Deck – The purpose of the storyboard is to provide a detailed description of the steps involved in securing your hybrid workforce with zero trust.

The storyboard contains two easy-to-follow steps on securing your hybrid workforce with zero trust, from assessing the suitability of SASE/SSE to taking a step in building a zero trust roadmap.

  • Secure Your Hybrid Workforce – Phases 1-2

2. Suitability Assessment Tool – A tool to identify whether SASE/SSE or a zero trust roadmap is a better fit for your organization.

Use this tool to identify your next line of action in securing your hybrid workforce by assessing key components that conforms to the ideals and principles of Zero Trust.

  • Zero Trust - SASE Suitability Assessment Tool

3. RFP Template – A document to guide you through requesting proposals from vendors.

Use this document to request proposals from select vendors.

  • Request for Proposal (RFP) Template
[infographic]

Further reading

Secure Your Hybrid Workforce

SASE as a driver to zero trust.

Analyst Perspective

Consolidate your security and network.

Remote connections like VPNs were not designed to be security tools or to have the capacity to handle a large hybrid workforce; hence, organizations are burdened with implementing controls that are perceived to be "security solutions." The COVID-19 pandemic forced a wave of remote work for employees that were not taken into consideration for most VPN implementations, and as a result, the understanding of the traditional network perimeter as we always knew it has shifted to include devices, applications, edges, and the internet. Additionally, remote work is here to stay as recruiting talent in the current market means you must make yourself attractive to potential hires.

The shift in the network perimeter increases the risks associated with traditional VPN solutions as well as exposing the limitations of the solution. This is where zero trust as a principle introduces a more security-focused strategy that not only mitigates most (if not all) of the risks, but also eliminates limitations, which would enhance the business and improve customer/employee experience.

There are several ways of achieving zero trust maturity, and one of those is SASE, which consolidates security and networking to better secure your hybrid workforce as implied trust is thrown out of the window and verification of everything becomes the new normal to defend the business.

This is a picture of Victor Okorie

Victor Okorie
Senior Research Analyst, Security and Privacy
Info-Tech Research Group

Executive Summary

Your Challenge

CISOs are looking to zero trust to fill the gaps associated with their traditional remote setup as well as to build an adaptable security strategy. Some challenges faced include:

  • Understanding the main principles of zero trust: never trust, always verify, assume breach, and verify explicitly.
  • Understanding how to achieve a zero trust framework.
  • Understanding the premise of SASE as it pertains to a hybrid workforce.

Common Obstacles

The zero trust journey may seem tedious because of a few obstacles like:

  • Knowing what the principle is all about and the components that align with it.
  • Knowing where to start. Due to the lack of a standardized path for the zero trust journey, going about the journey can be confusing.
  • Not having a uniform definition of what makes up a SASE solution as it is heavily dependent on vendors.

Info-Tech's Approach

Info-Tech provides a three-service approach to helping organizations better secure their hybrid workforce.

  • Understand your current, existing technological capabilities and challenges with your hybrid infrastructure, and prioritize those challenges.
  • Gain insight into zero trust and SASE as a mitigation/control/tool to those challenges.
  • Identify the SASE features that are relevant to your needs and a source guide for a SASE vendor.

Info-Tech Insight

Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will assist you in determining which of the options is a good fit for your organization.

Turn your challenges into opportunities

Hybrid workforce is the new normal

The pandemic has shown there is no going back to full on-prem work, and as such, security should be looked at differently with various considerations in mind.

Understand that current hybrid solutions are susceptible to various forms of attack as the threat attack surface area has now expanded with users, devices, applications, locations, and data. The traditional perimeter as we know it has expanded beyond just the corporate network, and as such, it needs a more mature security strategy.

Onboarding and offboarding have been done remotely, and with some growth recorded, the size of companies has also increased, leading to a scaling issue.

Employees are now demanding remote work capabilities as part of contract negotiation before accepting a job.

Attacks have increased far more quickly during the pandemic, and all indications point to them increasing even more.

Scarce available security personnel in the job market for hire.

Reality Today

This image is a circle graph and 67% of it is coloured with the number 67% in the middle of the graph

The number of breach incidents by identity theft.
Source: Security Magazine, 2022.

This image is a circle graph and 78% of it is coloured with the number 78% in the middle of the graph

IT security teams want to adopt zero trust.
Source: Cybersecurity Insiders, 2019.

Reduce the risks of remote work by using zero trust

$1.07m

$1.76m

235

Increase in breaches related to remote work

Cost difference in a breach where zero trust is deployed

Days to identify a breach

The average cost of a data breach where remote work was a factor rose by $1.07 million in 2021. COVID-19 brought about rapid changes in organizations, and digital transformation changes curbed some of its excesses. Organizations that did not make any digital transformation changes reported a $750,000 higher costs compared to global average.

The average cost of a breach in an organization with no zero trust deployed was $5.04 million in 2021 compared to the average cost of a breach in an organization with zero trust deployed of $3.28 million. With a difference of $1.76 million, zero trust makes a significant difference.

Organizations with a remote work adoption rate of 50% took 235 days to identify a breach and 81 days to contain that breach – this is in comparison to the average of 212 days to identify a breach and 75 days to contain that breach.

Source: IBM, 2021.

Network + Security = SASE

What exactly is a SASE product?

The convergence and consolidation of security and network brought about the formation of secure access service edge (SASE – pronounced like "sassy"). Digital transformation, hybrid workforce, high demand of availability, uninterrupted access for employees, and a host of other factors influenced the need for this convergence that is delivered as a cloud service.

The capabilities of a SASE solution being delivered are based on certain criteria, such as the identity of the entity (users, devices, applications, data, services, location), real-time context, continuous assessment and verification of risk and "trust" throughout the lifetime of a session, and the security and compliance policies of the organization.

SASE continuously identifies users and devices, applies security based on policy, and provides secure access to the appropriate and requested application or data regardless of location.

image contains a list of the SASE Network Features and Security Features. the network Features are: WAN optimization; SD WAN; CDN; Network-as-a-service. The Security Features are: CASB; IDPS; ZTNA/VPN; FWaaS; Browser isolation; DLP; UEBA; Secure web gateway; Sandboxing

Current Approach

The traditional perimeter security using the castle and moat approach is depicted in the image here. The security shields valuable resources from external attack; however, it isn't foolproof for all kinds of external attacks. Furthermore, it does not protect those valuable resources from insider threat.

This security perimeter also allows for lateral movement when it has been breached. Access to these resources is now considered "trusted" solely because it is now behind the wall/perimeter.

This approach is no longer feasible in our world today where both external and internal threats pose continuous risk and need to be contained.

Determine the suitability of SASE and zero trust

The Challenge:

Complications facing traditional infrastructure

  • Increased hybrid workforce
  • Regulatory compliance
  • Limited Infosec personnel
  • Poor threat detection
  • Increased attack surface

Common vulnerabilities in traditional infrastructure

  • MITM attack
  • XSS attack
  • Session hijacking
  • Trust-based model
  • IP spoofing
  • Brute force attack
  • Distributed denial of service
  • DNS hijacking
  • Latency issues
  • Lateral movement once connection is established

TRADITIONAL INFRASTRUCTURE

NETWORK

SECURITY

AUTHENTICATION

IDENTITY

ACCESS

  • MPLS
  • Corporate Network
  • Antivirus installed
  • Traditional Firewall
  • Intrusion Detection and Prevention System
  • Allow and Deny rules
  • Businesses must respond to consumer requests to:
  • LDAP
  • AAA
  • Immature password complexity
  • Trusted device with improperly managed endpoint protection.
  • Little or no DNS security
  • Web portal (captive)
  • VPN client

Candidate Solutions

Proposed benefits of SASE

  • Access is only granted to the requested resource
  • Consolidated network and security as a service
  • Micro-segmentation on application and gateway
  • Adopts a zero trust security posture for all access
  • Managed detection and response
  • Uniform enforcement of policy
  • Distributed denial of service shield

SASE

NETWORK

SECURITY

AUTHENTICATION

IDENTITY

ACCESS

  • Software defined – WAN
  • Content delivery network
  • WAN optimization
  • Network-as-a-service
  • Firewall-as-a-service/NGFW
  • Zero trust network access
  • Endpoint detection & response
  • Secure web gateway
  • Cloud access security broker
  • Data loss prevention
  • Remote browser isolation
  • Multifactor authentication
  • Context-based security policy for authentication
  • Authorization managed with situational awareness and real-time risk analytics
  • Continuous verification throughout an access request lifecycle
  • Zero trust identity on users, devices, applications, and data.
  • Strong password complexity enforced
  • Privilege access management
  • Secure internet access
  • SASE client

ZERO TRUST

TENETS OF ZERO TRUST

ZERO TRUST PILLARS

  • Continuous, dynamic authentication and verification
  • Principle of least privilege
  • Always assume a breach
  • Implement the tenets of zero trust across the following domains of your environment:
    • IDENTITY
    • APPLICATION
    • NETWORK
    • DEVICES
    • DATA

Proposed benefits of zero trust

  • Identify and protect critical and non-critical resources in accordance with business objectives.
  • Produce initiatives that conform to the ideals of zero trust and are aligned with the corresponding pillars above.
  • Formulate policies to protect resources and aid segmentation.

Info-Tech Insight

Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will help you determine which of the options is a good fit for your organization.

Measure the value of using Info-Tech's approach

IT and business value

PHASE 1

PHASE 2

Assess the benefits of adopting SASE or zero trust

Vendors will try to control the narrative in terms of what they can do for you, but it's time for you to control the narrative and identify pain points to IT and the business, and with that, to understand and define what the vendor solution can do for you.

PHASE 2

Assess the benefits of adopting SASE or zero trust

Vendors will try to control the narrative in terms of what they can do for you, but it's time for you to control the narrative and identify pain points to IT and the business, and with that, to understand and define what the vendor solution can do for you.

Short-term benefits

  • Gain awareness of your zero trust readiness.
  • Embed a zero trust mindset across your architecture.
  • Control the narrative of what SASE brings to your organization.

Long-term benefits

  • Identified controls to mitigate risks with current architecture while on a zero trust journey.
  • Improved security posture that reduces risk by increasing visibility into threats and user connections.
  • Reduced CapEx and OpEx due to the scalability, low staffing requirements, and improved time to respond to threats using a SASE or SSE solution.

Determine SASE cost factors

IT and business value

Info-Tech Insight

IT leaders need to examine different areas of their budget and determine how the adoption of a SASE solution could influence several areas of their budget breakdown.

Determining the SASE cost factors early could accelerate the justification the business needs to move forward in making an informed decision.

01- Infrastructure

  • Physical security
  • Cabling
  • Power supply and HVAC
  • Hosting

02- Administration

  • Human hours to analyze logs and threats
  • Human hours to secure infrastructure
  • Fees associated with maintenance

03- Inbound

  • DPI
  • DDoS
  • Web application firewall
  • VPN concentrators

04- Outbound

  • IDPS
  • DLP on-prem
  • QoS
  • Sandbox & URL filtering

04- Data Protection

  • Real-time URL
    insights
  • Threat hunting
  • Data loss prevention

06- Monitoring

  • Log storage
  • Logging engine
  • Dashboards
  • Managed detection
    and response

Info-Tech's methodology for securing your hybrid workforce

1. Current state and future mitigation

2. Assess the benefits of moving to SASE/zero trust

Phase Steps

1.1 Limitations of legacy infrastructure

1.2 Zero trust principle as a control

1.3 SASE as a driver of zero trust

2.1 Sourcing out a SASE/SSE vendor

2.2 Build a zero trust roadmap

Phase Outcomes

Identify and prioritize risks of current infrastructure and several ways to mitigate them.

RFP template and build a zero trust roadmap.

Consider several factors needed to protect your growing hybrid workforce and assess your current resource capabilities, solutions, and desire for a more mature security program. The outcome should either address a quick pain point or a long-term roadmap.

The internet is the new corporate network

The internet is the new corporate network, which opens the organization up to more risks not protected by the current security stack. Using Info-Tech's methodology of zero trust adoption is a sure way to reduce the attack surface, and SASE is one useful tool to take you on the zero trust journey.

Current-state risks and future mitigation

Securing your hybrid workforce via zero trust will inevitably include (but is not limited to) technological products/solutions.

SASE and SSE features sit as an overlay here as technological solutions that will help on the zero trust journey by aggregating all the disparate solutions required for you to meet zero trust requirements into a single interface. The knowledge and implementation of this helps put things into perspective of where and what our target state is.

The right solution for the right problem

It is critical to choose a solution that addresses the security problems you are actually trying to solve.

Don't allow the solution provider to tell you what you need – rather, start by understanding your capability gaps and then go to market to find the right partner.

Take advantage of the RFP template to source a SASE or SSE vendor. Additionally, build a zero trust roadmap to develop and strategize initiatives and tasks.

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

Zero Trust and SASE Suitability Tool
Identify critical and vulnerable DAAS elements to protect and align them to business goals.

Zero Trust Program Gap Analysis Tool
Perform a gap analysis between current and target states to build a zero trust roadmap.

Key deliverable:

Secure Your Hybrid Workforce With Zero Trust Communication deck
Present your zero trust strategy in a prepopulated document that summarizes the work you have completed as a part of this blueprint.

Phase 1

Current state and future mitigation

Phase 1

Phase 2

1.1 Limitations of legacy infrastructure

1.2 Zero trust principle as a control

1.3 SASE as a driver of zero trust

2.1 Sourcing out a SASE/SSE vendor

2.2 Build a zero trust roadmap

This phase will walk you through the following activities:

  • Introduction to the tool, how to use the input tabs to identify current challenges, technologies being used, and to prioritize the challenges. The prioritized list will highlight existing gaps and eventually be mapped to recommended mitigations in the following phase.

This phase involves the following participants:

  • CIO
  • CISO
  • CSO
  • IT security team
  • IT network team

Secure Your Hybrid Workforce

1.1 Limitations of legacy infrastructure

Traditional security & remote access solutions must be modernized

Info-Tech Insight
Traditional security is architected with a perimeter in mind and is poorly suited to the threats in hybrid or distributed environments.

Ensure you minimize or eliminate weak points on all layers.

  • SECURITY
    • DDoS
    • DNS hijacking
    • Weak VPN protocols
  • IDENTITY
    • One-time verification allowing lateral movement
  • NETWORK
    • Risk perimeter stops at corporate network edge
    • Split tunneling
  • AUTHENTICATION
    • Weak authentication
    • Weak passwords
  • ACCESS
    • Man-in-the-middle attack
    • Cross-site scripting
    • Session hijacking

1.1.1 For example: traditional VPNs are poorly suited to a hybrid workforce

There are many limitations that make it difficult for traditional VPNs to adapt to an ever-growing hybrid workforce.

The listed limitations are tied to associated risks of legacy infrastructure as well as security components that are almost non-existent in a VPN implementation today.

Scaling

VPNs were designed for small-scale remote access to corporate network. An increase in the remote workforce will require expensive hardware investment.

Visibility

Users and attackers are not restricted to specific network resources, and with an absence of activity logs, they can go undetected.

Managed detection & response

Due to the reduction in or lack of visibility, threat detections are poorly managed, and responses are already too late.

Hardware

Limited number of locations for VPN hardware to be situated as it can be expensive.

Hybrid workforce

The increase in the hybrid workforce requires the risk perimeter to be expanded from the corporate network to devices and applications. VPNs are built for privacy, not security.

Info-Tech Insight

Hybrid workforces are here to stay, and adopting a strategy that is adaptable, flexible, simple, and cost-effective is a recommended road to take on the journey to bettering your security and network.

1.1 Identify risk from legacy infrastructure

Estimated Time: 1-2 hours

  1. Ensure all vulnerabilities described on slide 17 are removed.
  2. Note any forecasted challenge you think you might have down the line with your current hybrid setup.
  3. Identify any trend that may be of interest to you with regards to your hybrid setup.

This is a screenshot of the organizational profile table found in the Zero Trust - SASE Suitability Assessment Tool

Download the Zero Trust - SASE Suitability Assessment Tool

Input

  • List of key pain points and challenges
  • List of forecasted challenges and trends of interest

Output

  • Prioritized list of pain points and/or challenges

Materials

  • Excel tool
  • Whiteboard

Participants

  • CISO
  • InfoSec team
  • IT manager
  • CIO
  • Infrastructure team

1.2 Zero trust principle as a control

A zero trust implementation comes with benefits/initiatives that mitigate the challenges identified in earlier activities.

Info-Tech Insight

Zero trust/"always verify" is applied to identity, workloads, devices, networks, and data to provide a greater control for risks associated with traditional network architecture.

Improve IAM maturity

Zero trust identity and access will lead to a mature IAM process in an organization with the removal of implicit trust.

Secure your remote access

With a zero trust network architecture (ZTNA), both the remote and on-prem network access are more secure than the traditional network deployment. The software-defined parameter ensures security on each network access.

Reduce threat surface area

With zero trust principle applied on identity, workload, devices, network, and data, the threat surface area which births some of the risks identified earlier will be significantly reduced.

Improve hybrid workforce

Scaling, visibility, network throughput, secure connection from anywhere, micro-segmentation, and a host of other benefits to improve your hybrid workforce.

1.2 SASE as an overlay to zero trust

Security and network initiatives of a zero trust roadmap converged into a single pane of glass.

Info-Tech Insight

Security and network converged into a single pane of glass giving you some of the benefits and initiatives of a zero trust implemented architecture in one package.

Improve IAM maturity

The identity-centric nature of SASE solutions helps to improve your IAM maturity as it applies the principle of least privilege. The removal of implicit trust and continuous verification helps foster this more.

Secure your remote access

With ZTNA, both the remote and on-prem network access are more secure than the traditional network deployment. The software defined parameter ensures security on each network access.

Reduce threat surface area

Secure web gateway, cloud access security broker, domain name system, next-generation firewall, data loss prevention, and ZTNA protect against data leaks, prevent lateral movement, and prevent malicious actors from coming in.

Improve hybrid workforce

Reduced costs and complexity of IT, faster user experience, and reduced risk as a result of the scalability, visibility, ease of IT administration, network throughput, secure connection from anywhere, micro-segmentation, and a host of other benefits will surely improve your hybrid workforce.

Align SASE features to zero trust core capabilities

Verify Identity

  • Authentication & verification are enforced for each app request or session.
  • Use of multifactor authentication.
  • RBAC/ABAC and principle of least privilege are applied on the identity regardless of user, device, or location.

Verify Device

  • Device health is checked to ensure device is not compromised or vulnerable.
  • No admin permissions on user devices.
  • Device-based risk assessment is enforced as part of UEBA.

Verify Access

  • Micro-segmentation built around network, user, device, location and roles.
  • Use of context and content-based policy enforced to the user, application, and device identity.
  • Network access only granted to specified application request and not to the entire network.

Verify Services

  • Applications and services are checked before access is granted.
  • Connections to the application and services are inspected with the security controls built into the SASE solution.

Info-Tech Insight

These features of SASE and zero trust mitigate the risks associated with a traditional VPN and reduce the threat surface area. With security at the core, network optimization is not compromised.

Security components of SASE

Otherwise known as security service edge (SSE)

Security service edge is the convergence of all security services typically found in SASE. At its core, SSE consists of three services which include:

  • Secure web gateway – secure access to the internet and web.
  • Cloud access security broker – secure access to SaaS and cloud applications.
  • Zero trust network access – secure remote access to private applications.

SSE components are also mitigations or initiatives that make up a zero trust roadmap as they comply with the zero trust principle, and as a result, they sit up there with SASE as an overlay/driver of a zero trust implementation. SSE's benefits are identical to SASE's in that it provides zero trust access, risk reduction, low costs and complexity, and a better user experience. The difference is SSE's sole focus on security services and not the network component.

SASE

NETWORK FEATURES

SECURITY FEATURES

  • WAN optimization
  • SD WAN
  • CDN
  • Network-as-a-service
  • CASB
  • IDPS
  • ZTNA/VPN
  • FWaaS
  • Browser isolation
  • DLP
  • UEBA
  • Secure web gateway
  • Sandboxing

1.3 Pros & cons of zero trust and SASE

Zero Trust

SASE

Pros

Cons

Pros

Cons

  • Robust IAM process and technologies with role-based access control.
  • Strong and continuous verification of identity of user accounts, devices, data, location, and principle of least privilege applied.
  • Micro-segmentation applied around users, network, devices, roles, and applications to prevent lateral movement.
  • Threat attack surface eliminated, which reduces organizational risks.
  • Protection of data strengthened based on sensitivity and micro-segmentation.
  • Difficult to identify the scope of the zero trust initiative.
  • Requires continuous and ongoing update of access controls.
  • Zero trust journey/process could take years and is prone to being abandoned without commitment from executives.
  • Legacy systems can be hard to replace, which would require all stakeholders to prioritize resource allocation.
  • Can be expensive to implement.
  • Adopts a zero trust security posture for all access requests.
  • Converged and consolidated network and security delivered as a cloud service to the user rather than a single point of enforcement.
  • Centralized visibility of devices, data in transit and at rest, user activities, and threats.
  • Cheaper than a zero trust roadmap implementation.
  • Managed detection and response.
  • The limited knowledge of SASE.
  • No universally agreed upon SASE definition.
  • SASE products are still being developed and are open to vendors' interpretation.
  • Existing vendor relationships could be a hinderance to deployment.
  • Hard to manage MSSPs.

Understand SASE and zero trust suitability for your needs

Estimated Time: 1 hour

Use the dashboard to understand the value assessment of adopting a SASE product or building a zero trust roadmap.

This is an image of the SASE Suitability Assessment

This is the image of the Zero Trust Suitability Assessment

Info-Tech Insight

This tool will help steer you on a path to take as a form of mitigation/control to some or all the identified challenges.

Phase 2

Make a decision and next steps

Phase 1

Phase 2

1.1 Limitations of legacy infrastructure

1.2 Zero trust principle as a control

1.3 SASE as a driver of zero trust

2.1 Sourcing out a SASE/SSE vendor

2.2 Build a zero trust roadmap

This phase will walk you through the following activities:

  • Introduction to the tool activity, how to use the input tabs and considerations to generate an output that could help understand the current state of your hybrid infrastructure and what direction is to be followed next to improve.

This phase involves the following participants:

  • CIO
  • CISO
  • CSO
  • IT security
  • IT network team

Secure Your Hybrid Workforce

Step 2.1

Sourcing out a SASE/SSE vendor

Activities

2.1.1 Use the RFP template to request proposal from vendors

2.1.2 Use SoftwareReviews to compare vendors

This step involves the following participants:

  • CIO, CISO, IT manager, Infosec team, executives.

Outcomes of this step

  • Zero Trust Roadmap

2.1.1 Use the RFP template to request proposal from vendors

Estimated Time: 1-3 hours

  1. As a group, use the RFP Template to include technical capabilities of your desired SASE product and to request proposals from vendors.
  2. The features that are most important to your organization generated from phase one should be highlighted in the RFP.

Input

  • List of SASE features
  • Technical capabilities

Output

  • RFP

Materials

  • RFP Template

Participants

  • Security team
  • IT leadership

Download the RFP Template

2.1.2 Use SoftwareReviews to compare vendors

SoftwareReviews

  • The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
  • Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.
  • The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
  • Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

Step 2.2

Zero trust readiness and roadmap

Activities

2.2.1 Assess the maturity of your current zero trust implementation

2.2.2 Understand business needs and current security projects

2.2.3 Set target maturity state with timeframe

This step involves the following participants:

CIO, CISO, IT manager, Infosec team, executives.

Outcomes of this step

Zero Trust Roadmap

2.2.1 Assess the maturity of your current zero trust implementation

Estimated Time: 1-3 hours

  • Realizing that zero trust is a journey helps create a better roadmap and implementation. Identify the current controls or solutions in your organization that align with the principle of zero trust.
  • Break down these controls or solutions into different silos (e.g. identity, security, network, data, device, applications, etc.).
  • Determine your zero trust readiness.

Input

  • List of zero trust controls/solutions
  • Siloed list of zero trust controls/solutions
  • Current state of zero trust maturity

Output

  • Zero trust readiness and current maturity state

Materials

  • Zero Trust Security Benefit Assessment tool

Participants

  • Security team
  • IT leadership

Download the Zero Trust Security Benefit Assessment tool

2.2.2 Understand business needs and current security projects

Estimated Time: 1-3 hours

  1. Identify the business and IT executives, application owners, and board members whose vision aligns with the zero trust journey.
  2. Identify existing projects within security, IT, and the business and highlight interdependencies or how they fit with the zero trust journey.
  3. Build a rough sketch of the roadmap that fits the business needs, current projects and the zero trust journey.

Input

  • Meetings with stakeholders
  • List of current and future projects

Output

  • Sketch of zero trust roadmap

Materials

  • Whiteboard activity

Participants

  • Security team
  • IT leadership
  • IT ops team
  • Business executives
  • Board members

Download Zero Trust Protect Surface Mapping Tool

2.2.3 Set target maturity state with a given timeframe

Estimated Time: 1-3 hours

  1. With the zero trust readiness, current business, IT and security projects, current maturity state, and sketch of the roadmap, setting a target maturity state within some timeframe is at the top of the list. The target maturity state will include a list of initiatives that could be siloed and confined to a timeframe.
  2. A Gantt chart or graph could be used to complete this task.

Input

  • Results from previous activity slides

Output

  • Current state and target state assessment for gap analysis
  • List of initiatives and timeframe

Materials

  • Zero Trust Program Gap Analysis Tool

Participants

  • Security team
  • IT leadership
  • IT ops team
  • Business executives
  • Board members

Download the Zero Trust Program Gap Analysis Tool

Summary of Accomplishment

Insights Gained

  • Difference between zero trust as a principle and SASE as a framework
  • Difference between SASE and SSE platforms.
  • Assessment of which path to take in securing your hybrid workforce

Deliverables Completed

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

Contact your account representative for more information

workshops@infotech.com

1-888-670-8889

Additional Support

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

The following are sample activities that will be conducted by Info-Tech analysts with your team:

This is a screenshot from the Zero Trust - SASE Suitability Assessment Tool

Zero Trust - SASE Suitability Assessment Tool

Assess current security capabilities and build a roadmap of tasks and initiatives that close maturity gaps.

Research Contributors

  • Aaron Shum, Vice President, Security & Privacy
  • Cameron Smith, Research Lead, Security & Privacy
  • Brad Mateski, Zones, Solutions Architect for CyberSecurity
  • Bob Smock, Info-Tech Research Group, Vice President of Consulting
  • Dr. Chase Cunningham, Ericom Software, Chief Strategy Officer
  • John Kindervag, ON2IT Cybersecurity, Senior Vice President, Cybersecurity Strategy and ON2IT Group Fellow
  • John Zhao, Fonterra, Enterprise Security Architect
  • Rongxing Lu, University of New Brunswick, Associate Professor
  • Sumanta Sarkar, University of Warwick, Assistant Professor
  • Tim Malone, J.B. Hunt Transport, Senior Director Information Security
  • Vana Matte, J.B. Hunt Transport, Senior Vice President of Technology Services

Related Info-Tech Research

This is a screenshot from Info-Tech's Security Strategy Model

Build an Information Security Strategy

Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations. This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current state assessment, prioritizing initiatives, and building out a security roadmap.

This is a screenshot from Info-Tech's research: Determine Your Zero Trust Readiness

Determine Your Zero Trust Readiness

IT security was typified by perimeter security. However, the way the world does business has mandated a change to IT security. In response, zero trust is a set of principles that can add flexibility to planning your IT security strategy.

Use this blueprint to determine your zero trust readiness and understand how zero trust can benefit both security and the business.

This is a screenshot from Info-Tech's research: Mature Your Identity and Access Management Program

Mature Your Identity and Access Management Program

Many organizations are looking to improve their identity and access management (IAM) practices but struggle with where to start and whether all areas of IAM have been considered. This blueprint will help you improve the organization's IAM practices by following our three-phase methodology:

  • Assess identity and access requirements.
  • Identify initiatives using the identity lifecycle.
  • Prioritize initiatives and build a roadmap.

Bibliography

"2021 Data Breach Investigations Report." Verizon, 2021. Web.
"Fortinet Brings Networking and Security to the Cloud" Fortinet, 2 Mar. 2021. Web.
"A Zero Trust Strategy Has 3 Needs – Identify, Authenticate, and Monitor Users and Devices on and off the Network." Fortinet, 15 July 2021. Web.
"Applying Zero Trust Principles to Enterprise Mobility." CISA, Mar. 2022. Web.
"CISA Zero Trust Maturity Model." CISA, Cybersecurity Division, June 2021. Web.
"Continuous Diagnostics and Mitigation Program Overview." CISA, Jan. 2022. Web.
"Cost of a Data Breach Report 2021 | IBM." IBM, July 2021. Web.
English, Melanie. "5 Stats That Show The Cost Saving Effect of Zero Trust." Teramind, 29 Sept. 2021. Web.
Hunter, Steve. "The Five Business Benefits of a Zero Trust Approach to Security." Security Brief - Australia, 19 Aug. 2020. Web.
"Improve Application Access and Security With Fortinet Zero Trust Network Access." Fortinet, 2 Mar. 2021. Web.
"Incorporating zero trust Strategies for Secure Network and Application Access." Fortinet, 21 Jul. 2021. Web.
Jakkal, Vasu. "Zero Trust Adoption Report: How Does Your Organization Compare?" Microsoft, 28 July 2021. Web.
"Jericho Forum™ Commandments." The Open Group, Jericho Forum, May 2007. Web.
Schulze, Holger. "2019 Zero Trust Adoption Report." Cybersecurity Insiders, 2019. Web.
"67% of Organizations Had Identity-Related Data Breaches Last Year." Security Magazine, 22 Aug. 2022. Web.
United States, Executive Office of the President Joseph R. Biden, Jr. "Executive Order on Improving the Nation's Cybersecurity." The White House, 12 May 2021. Web.

Data security consultancy

Data security consultancy

Based on experience
Implementable advice
human-based and people-oriented

Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.

How our data security consultancy services can help your company

Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.

Security and risk management

Our security and risk services

Security strategy

Security Strategy

Embed security thinking through aligning your security strategy to business goals and values

Read more

Disaster Recovery Planning

Disaster Recovery Planning

Create a disaster recovey plan that is right for your company

Read more

Risk Management

Risk Management

Build your right-sized IT Risk Management Program

Read more

Check out all our services

Discover our practical data security management solutions

Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.

Set up an appointment with our experts

Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.

Register to read more …

Select and Use SDLC Metrics Effectively

  • Buy Link or Shortcode: {j2store}150|cart{/j2store}
  • member rating overall impact: 9.4/10 Overall Impact
  • member rating average dollars saved: $2,991 Average $ Saved
  • member rating average days saved: 32 Average Days Saved
  • Parent Category Name: Development
  • Parent Category Link: /development
  • Your organization wants to implement (or revamp existing) software delivery metrics to monitor performance as well as achieve its goals.
  • You know that metrics can be a powerful tool for managing team behavior.
  • You also know that all metrics are prone to misuse and mismanagement, which can lead to unintended consequences that will harm your organization.
  • You need an approach for selecting and using effective software development lifecycle (SDLC) metrics that will help your organization to achieve its goals while minimizing the risk of unintended consequences.

Our Advice

Critical Insight

  • Metrics are powerful, dangerous, and often mismanaged, particularly when they are tied to reward or punishment. To use SDLC metrics effectively, know the dangers, understand good practices, and then follow Info-Tech‘s TAG (team-oriented, adaptive, and goal-focused) approach to minimize risk and maximize impact.

Impact and Result

  • Begin by understanding the risks of metrics.
  • Then understand good practices associated with metrics use.
  • Lastly, follow Info-Tech’s TAG approach to select and use SDLC metrics effectively.

Select and Use SDLC Metrics Effectively Research & Tools

Start here – read the Executive Brief

Understand both the dangers and good practices related to metrics, along with Info-Tech’s TAG approach to the selection and use of SDLC metrics.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Understand the dangers of metrics

Explore the significant risks associated with metrics selection so that you can avoid them.

  • Select and Use SDLC Metrics Effectively – Phase 1: Understand the Risks of Metrics

2. Know good practices related to metrics

Learn about good practices related to metrics and how to apply them in your organization, then identify your team’s business-aligned goals to be used in SDLC metric selection.

  • Select and Use SDLC Metrics Effectively – Phase 2: Know Good Practices Related to Metrics
  • SDLC Metrics Evaluation and Selection Tool

3. Rank and select effective SDLC metrics for your team

Follow Info-Tech’s TAG approach to selecting effective SDLC metrics for your team, create a communication deck to inform your organization about your selected SDLC metrics, and plan to review and revise these metrics over time.

  • Select and Use SDLC Metrics Effectively – Phase 3: Rank and Select Effective SDLC Metrics for Your Team
  • SDLC Metrics Rollout and Communication Deck
[infographic]

Workshop: Select and Use SDLC Metrics Effectively

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Understand the Dangers of Metrics

The Purpose

Learn that metrics are often misused and mismanaged.

Understand the four risk areas associated with metrics: Productivity loss Gaming behavior Ambivalence Unintended consequences

Productivity loss

Gaming behavior

Ambivalence

Unintended consequences

Key Benefits Achieved

An appreciation of the dangers associated with metrics.

An understanding of the need to select and manage SDLC metrics carefully to avoid the associated risks.

Development of critical thinking skills related to metric selection and use.

Activities

1.1 Examine the dangers associated with metric use.

1.2 Share real-life examples of poor metrics and their impact.

1.3 Practice identifying and mitigating metrics-related risk.

Outputs

Establish understanding and appreciation of metrics-related risks.

Solidify understanding of metrics-related risks and their impact on an organization.

Develop the skills needed to critically analyze a potential metric and reduce associated risk.

2 Understand Good Practices Related to Metrics

The Purpose

Develop an understanding of good practices related to metric selection and use.

Introduce Info-Tech’s TAG approach to metric selection and use.

Identify your team’s business-aligned goals for SDLC metrics.

Key Benefits Achieved

Understanding of good practices for metric selection and use.

Document your team’s prioritized business-aligned goals.

Activities

2.1 Examine good practices and introduce Info-Tech’s TAG approach.

2.2 Identify and prioritize your team’s business-aligned goals.

Outputs

Understanding of Info-Tech’s TAG approach.

Prioritized team goals (aligned to the business) that will inform your SDLC metric selection.

3 Rank and Select Your SDLC Metrics

The Purpose

Apply Info-Tech’s TAG approach to rank and select your team’s SDLC metrics.

Key Benefits Achieved

Identification of potential SDLC metrics for use by your team.

Collaborative scoring/ranking of potential SDLC metrics based on their specific pros and cons.

Finalize list of SDLC metrics that will support goals and minimize risk while maximizing impact.

Activities

3.1 Select your list of potential SDLC metrics.

3.2 Score each potential metric’s pros and cons against objectives using a five-point scale.

3.3 Collaboratively select your team’s first set of SDLC metrics.

Outputs

A list of potential SDLC metrics to be scored.

A ranked list of potential SDLC metrics.

Your team’s first set of goal-aligned SDLC metrics.

4 Create a Communication and Rollout Plan

The Purpose

Develop a rollout plan for your SDLC metrics.

Develop a communication plan.

Key Benefits Achieved

SDLC metrics.

A plan to review and adjust your SDLC metrics periodically in the future.

Communication material to be shared with the organization.

Activities

4.1 Identify rollout dates and responsible individuals for each SDLC metric.

4.2 Identify your next SDLC metric review cycle.

4.3 Create a communication deck.

Outputs

SDLC metrics rollout plan

SDLC metrics review plan

SDLC metrics communication deck

Make Your IT Governance Adaptable

  • Buy Link or Shortcode: {j2store}359|cart{/j2store}
  • member rating overall impact: 8.0/10 Overall Impact
  • member rating average dollars saved: $123,499 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: IT Governance, Risk & Compliance
  • Parent Category Link: /it-governance-risk-and-compliance
  • People don’t understand the value of governance, seeing it as a hindrance to productivity and efficiency.
  • Governance is delegated to people and practices that don’t have the ability or authority to make these decisions.
  • Decisions are made within committees that don’t meet frequently enough to support business velocity.
  • It is difficult to allocate time and resources to build or execute governance effectively.

Our Advice

Critical Insight

  • IT governance applies not just to the IT department but to all uses of information and technology.
  • IT governance works against you if it no longer aligns with or supports your organizational direction, goals, and work practices.
  • Governance doesn’t have to be bureaucratic or control based.
  • Your governance model should be able to adapt to changes in the organization’s strategy and goals, your industry, and your ways of working.
  • Governance can be embedded and automated into your practices.

Impact and Result

  • You will produce more value from IT by developing a governance framework optimized for your current needs and context, with the ability to adapt as your needs shift.
  • You will create the foundation and ability to delegate and empower governance to enable agile delivery.
  • You will identify areas where governance does not require manual oversight and can be embedded into the way you work.

Make Your IT Governance Adaptable Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Make Your IT Governance Adaptable Deck – A document that walks you through how to design and implement governance that fits the context of your organization and can adapt to change.

Our dynamic, flexible, and embedded approach to governance will help drive organizational success. The three-phase methodology will help you identify your governance needs, select and refine your governance model, and embed and automate governance decisions.

  • Make Your IT Governance Adaptable – Phases 1-3

2. Adaptive and Controlled Governance Model Templates and Workbook – Documents that gather context information about your organization to identify the best approach for governance.

Use these templates and workbook to identify the criteria and design factors for your organization and the design triggers to maintain fit. Upon completion this will be your new governance framework model.

  • Controlled Governance Models Template
  • IT Governance Program Overview
  • Governance Workbook

3. Implementation Plan and Workbook – Tools that help you build and finalize your approach to implement your new or revised governance model.

Upon completion you will have a finalized implementation plan and a visual roadmap.

  • Governance Implementation Plan
  • Governance Roadmap Workbook

4. Governance Committee Charter Templates – Base charters that can be adapted for communication.

Customize these templates to create the committee charters or terms of reference for the committees developed in your governance model.

  • IT PMO Committee Charter
  • IT Risk Committee Charter for Controlled Governance
  • IT Steering Committee Charter for Controlled Governance
  • Program Governance Committee Charter
  • Architecture Review Board Charter
  • Data Governance Committee Charter
  • Digital Governance Committee Charter

5. Governance Automation Criteria Checklist and Worksheet – Tools that help you determine which governance decisions can be automated and work through the required logic and rules.

The checklist is a starting point for confirming which activities and decisions should be considered for automation or embedding. Use the worksheet to develop decision logic by defining the steps and information inputs involved in making decisions.

  • Governance Automation Criteria Checklist
  • Governance Automation Worksheet

Infographic

Workshop: Make Your IT Governance Adaptable

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Develop Your Guiding Star

The Purpose

Establish the context for your governance model.

Key Benefits Achieved

Core understanding of the context that will enable us to build an optimal model

Activities

1.1 Confirm mission, vision, and goals.

1.2 Define scope and principles.

1.3 Adjust for culture and finalize context.

Outputs

Governance principles

Governance context and goals

2 Define the Governance Model

The Purpose

To select and adapt a governance model based on your context.

Key Benefits Achieved

A selected and optimized governance model

Activities

2.1 Select and refine governance model.

2.2 Confirm and adjust the structure.

2.3 Review and adapt governance responsibilities and activities.

2.4 Validate governance mandates and membership.

Outputs

IT governance model and adjustment triggers

IT governance structure, responsibilities, membership, and cadence

Governance committee charters

3 Build Governance Process and Policy

The Purpose

Refine your governance practices and associate policies properly.

Key Benefits Achieved

A completed governance model that can be implemented with clear update triggers and review timing

Policy alignment with the right levels of authority

Activities

3.1 Update your governance process.

3.2 Align policies to mandate.

3.3 Adjust and confirm your model.

3.4 Identify and document update triggers and embed into review cycle.

Outputs

IT governance process and information flow

IT governance policies

Finalized governance model

4 Embed and Automate Governance

The Purpose

Identify options to automate and embed governance activities and decisions.

Key Benefits Achieved

Simply more consistent governance activities and automate them to enhance speed and support governance delegation and empowerment

Activities

4.1 Identify decisions and standards that can be automated. Develop decision logic.

4.2 Plan verification and validation approach.

4.3 Build implementation plan.

4.4 Develop communication strategy and messaging.

Outputs

Selected automation options, decision logic, and business rules

Implementation and communication plan

Further reading

Make Your IT Governance Adaptable

Governance isn't optional, so keep it simple and make it flexible.

Table of Contents

4 Analyst Perspective

5 Executive Summary

13 Governance Stages

14 Info-Tech’s IT Governance Thought Model

19 Info-Tech’s Approach

23 Insight Summary

30 Phase 1: Identify Your Governance Needs

54 Phase 2: Select and Refine Your Governance Model

76 Phase 3: Embed and Automate

94 Summary of Accomplishment

95 Additional Support

97 Contributors

98 Bibliography

Make Your IT Governance Adaptable

Governance isn't optional, so keep it simple and make it flexible.

EXECUTIVE BRIEF

Analyst Perspective

Governance will always be part of the fabric of your organization. Make it adaptable so it doesn’t constrain your success.

Photo of Valence Howden, Principal Research Director, Info-Tech Research Group

Far too often, the purpose of information and technology (I&T) governance is misunderstood. Instead of being seen as a way to align the organization’s vision to its investment in information and technology, it has become so synonymous with compliance and control that even mentioning the word “governance” elicits a negative reaction.

Success in modern digital organizations depends on their ability to adjust for velocity and uncertainty, requiring a dynamic and responsive approach to governance – one that is embedded and automated in your organization to enable new ways of working, innovation, and change.

Evolutionary theory describes adaptability as the way an organism adjusts to fit a new environment, or changes to its existing environment, to survive. Applied to organizations, adaptable governance is critical to the ability to survive and succeed.

If your governance doesn’t adjust to enable your changing business environment and customer needs, it will quickly become misaligned with your goals and drive you to failure.

It is critical that people build an approach to governance that is effective and relevant today while building in adaptability to keep it relevant tomorrow.

Valence Howden
Principal Research Director, Info-Tech Research Group

Executive Summary

Your Challenge

  • People don’t understand the value of governance, seeing it as a hindrance to productivity and efficiency.
  • Governance is delegated to people and practices that don’t have the ability or authority to make decisions.
  • Decisions are made within committees that don’t meet frequently enough to support business velocity.
  • It is difficult to allocate time and resources to build or execute governance effectively

Common Obstacles

  • You are unable to clearly communicate how governance adds value to your organization.
  • Your IT governance approach no longer aligns with or supports your organizational direction, goals, and work practices.
  • Governance is seen and performed as a bureaucratic control-based exercise.
  • Governance activities are not transparent.
  • The governance committee gets too deeply involved with project deep dives and daily management, derailing its effectiveness and ability to produce value.

Info-Tech’s Approach

  • Use Info-Tech’s IT governance models to identify a base model similar to the way you are organized. Confirm your current and future placement in governance execution.
  • Adjust the model based on industry needs, your principles, regulatory requirements, and your future direction.
  • Identify where to embed or automate decision making and compliance and what is required to do so effectively.
  • Implement your governance model for success.

Info-Tech Insight

IT governance must be embedded and automated, where possible, to effectively meet the needs and velocity of digital organizations and modern practices and to drive success and value.

What is governance?

IT governance is a critical and embedded practice that ensures that information and technology investments, risks, and resources are aligned in the best interests of the organization and produce business value.

Effective governance ensures that the right technology investments are made at the right time to support and enable your organization’s mission, vision, and goals.

5 KEY OUTCOMES OF GOOD GOVERNANCE

STRATEGIC ALIGNMENT

Technology investments and portfolios are aligned with the organization's strategic objectives.

RISK OPTIMIZATION

Organizational risks are understood and addressed to minimize impact and optimize opportunities.

VALUE DELIVERY

IT investments and initiatives deliver their expected benefits.

RESOURCE OPTIMIZATION

Resources (people, finances, time) are appropriately allocated across the organization to optimal organizational benefit.

PERFORMANCE MEASUREMENT

The performance of technology investments is monitored and used to determine future courses of action and to confirm achievement of success.

‹–EVALUATE–DIRECT–MONITOR–›

Why is this necessary?

  • Governance is not simply a committee or an activity that you perform at a specific point in time; it is a critical and continuously active practice that drives the success of your organization. It is part of your organization’s DNA and is just as unique, with some attributes common to all (IT governance elements), some specific to your family (industry refinements), and some specific to you (individual organization).
  • Your approach to governance needs to change over time in order to remain relevant and continue to enable value and success, but organizations rarely want to change governance once it’s in place.
  • To meet the speed and flow of practices like Lean, DevOps, and Agile, your IT governance needs to be done differently and become embedded into the way your organization works. You must adjust your governance model based on key moments of change – organizational triggers – to maintain the effectiveness of your model.

Info-Tech Insight

Build an optimal model quickly and implement the core elements using an iterative approach to ensure the changes provide the most value.

The Technology Value Trinity

Delivery of Business Value & Strategic Needs

  • DIGITAL & TECHNOLOGY STRATEGY
    The identification of objectives and initiatives necessary to achieve business goals.
  • IT OPERATING MODEL
    The model for how IT is organized to deliver on business needs and strategies.
  • INFORMATION & TECHNOLOGY GOVERNANCE
    The governance to ensure the organization and its customers get maximum value from the use of information and technology.

All three elements of the Technology Value Trinity work in harmony to deliver business value and meet strategic needs. As one changes, the others need to change as well.

  • Digital and IT Strategy tells you what you need to achieve to be successful.
  • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
  • Information & Technology Governance is the confirmation that IT’s goals and strategy align with the business’ strategy. It is the mechanism by which you continuously prioritize work to ensure that what you deliver is in line with the strategy. This oversight involves evaluating, directing, and monitoring the delivery of outcomes to ensure that the use of resources results in achieving the organization’s goals.

Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest rather than on what is in the best interest of the organization.

Where information & technology governance fits within an organization

An infographic illustrating where Governance fits within an organization. The main section is titled 'Enterprise Governance and Strategy' and contains 'Value Outcomes', 'Mission and Vision', 'Goals and Objectives', and 'Guiding Principles'. These all feed into the highlighted 'Information & Technology Governance', which then contributes to 'IT Strategy', which lies outside the main section.

I&T governance hasn’t achieved its purpose

Governance is the means by which IT ensures that information and technology delivery and spend is aligned to business goals and delivers business outcomes. However, most CEOs continue to perceive IT as being poorly aligned to the business’ strategic goals, which indicates that governance is not implemented or executed properly.

For I&T governance to be effective you need a clear understanding of the things that drive your organization and its success. This understanding becomes your guiding star, which is critical for effective governance. It also requires participation by all parts of the organization, not just IT.

Info-Tech CIO/CEO Alignment Diagnostics (N=124)

43% of CEOs believe that business goals are going unsupported by IT.

60% of CEOs believe that improvement is required around IT’s understanding of business goals.

80% of CIOs/CEOs are misaligned on the target role for IT.

30% of business stakeholders are supporters (N=32,536) of their IT departments

Common causes of poor governance

Key causes of poor or misaligned governance

  1. Governance and its value to your organization is not well understood, often being confused or integrated with more granular management activities.
  2. Business executives fail to understand that IT governance is a function of the business and not the IT department.
  3. Poor past experiences have made “governance” a bad word in the organization. People see it as a constraint and barrier that must be circumvented to get work done.
  4. There is misalignment between accountability and authority throughout the organization, and the wrong people are involved in governance practices.
  5. There is an unwillingness to change a governance approach that has served the organization well in the past, leading to challenges when the organization starts to change practices and speed of delivery.
  6. There is a lack of data and data-related capabilities required to support good decision making and the automation of governance decisions.
  7. The goals and strategy of the organization are not known or understood, leaving nothing for IT governance to orient around.

Key symptoms of ineffective governance committees

  1. No actions or decisions are generated. The committee produces no value and makes no decisions after it meets. The lack of value output makes the usefulness of the committee questionable.
  2. Resources are overallocated. There is a lack of clear understanding of capacity and value in work to be done, leading to consistent underestimation of required resources and poor resource allocation.
  3. Decisions are changed outside of committee. Decisions made or initiatives approved by the committee are later changed when the proper decision makers are involved or the right information becomes available.
  4. Governance decisions conflict with organizational direction. This shows an obvious lack of alignment and behavioral disconnect that work against organizational success. It is often due to not accounting for where power really exists within the structure.
  5. Consistently poor outcomes are produced from governance direction. Committee members’ lack of business acumen, relevant data, or understanding of organizational goals results in decisions that fail to drive successful measured outcomes.

Mature your governance by transitioning from ad hoc to automated

Organizations should look to progress in their governance stages. Ad hoc and controlled governance practices tend to be more rigid, making these a poor fit for organizations requiring higher velocity delivery or using more agile and adaptive practices.

The goal as you progress through these stages is to delegate governance and empower teams based on your fit and culture, enabling teams where needed to make optimal decisions in real time, ensuring that they are aligned with the best interests of the organization.

Automate governance for optimal velocity while mitigating risks and driving value.

This puts your organization in the best position to be adaptive, able to react effectively to volatility and uncertainty.

A graph illustrating the transition from Ad Hoc to Automated. The y-axis is 'Process Integration' and x-axis is 'Trust & Empowerment'. 'Ad Hoc: Inconsistent Decision Making' lies close to the origin, ranking low on both axes' values. 'Controlled: Authoritarian, Highly Structured' ranks slightly higher on both axes. 'Agile: Distributed & Empowered' ranks 2nd highest on both axes. 'Automated: High Velocity, Embedded & Flexible' ranks highest on both axes.

Stages of governance

Adaptive
Data-Centric


ˆ


ˆ


ˆ


ˆ


ˆ
Traditional
(People- and Document-Centric)

4

Automated Governance
  • Entrenched into organizational processes and product/service design
  • Empowered and fully delegated to maintain fit and drive organizational success and survival

3

Agile Governance
  • Flexible enough to support different needs in the organization and respond quickly to change
  • Driven by principles and delegated throughout the company

2

Controlled Governance
  • Focused on compliance and hierarchy-based authority
  • Levels of authority defined and often driven by regulatory requirements

1

Ad Hoc Governance
  • Not well defined or understood within the organization
  • Occurs out of necessity but often not done by the right people or bodies

Make Governance Adaptable and Automated to Drive Success and Value

Governance adaptiveness ensures the success of digital organizations and modern practice implementation.

THE PROBLEM

  • The wrong people are making decisions.
  • Organizations don't understand what governance is or why it's done.
  • Governance scope and design is a bad fit, damaging the organization.
  • People think governance is optional.

THE SOLUTION

ESTABLISH YOUR GUIDING PRINCIPLES

Define and establish the guiding principle that drive your organization toward success.

  • Mission & Vision
  • Business Goals & Success Criteria
  • Operating Model & Work Practices
  • Governance Scope
  • Principles
SELECT AND REFINE YOUR MODEL

Use Info-Tech's IT Governance Models to identify a base model similar to the way you are organized. Confirm your current and future placement in governance execution.

IDENTIFY MODEL UPDATE TRIGGERS

Adjust the model based on industry needs, your principles, regulatory requirements, and future direction.

  • Principles
    Select principles that allow the organization to be adaptive while still ensuring the governance continues to stay on course with pursuing its guiding star.
  • Responsibilities
    Decide on the governance responsibilities related to Oversight Level, Strategic Alignment, Value Delivery, Risk Optimization, Resource Optimization, and Performance Management.
  • Structure
    Determine at which structured level governance is appropriate: Enterprise, Strategic, Tactical, or Operational.
  • Processes
    Establish processes that will enable governance to occur such as: Embed the processes required for successful governance.
  • Membership
    Identify the Responsibility & Accountability of those who should be involved in governance processes, policies, guidelines, and responsibilities.
  • Policies
    Confirm any governing policies that need to be adhered to and considered to manage risk.
DETERMINE AUTOMATION OPTIONS AND DECISION RULES

Identify where to embed or automate decision making and compliance and what is required to do so effectively.

STAGES OF GOVERNANCE

    Traditional (People- and document-centric)
  1. AD HOC GOVERNANCE
    Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people or bodies.
  2. CONTROLLED GOVERNANCE
    Governance focused on compliance and hierarchy-based, authority-driven control of decisions. Levels of Authority are defined and often driven by regulatory requirements.
  3. Adaptive (Data Centric)
  4. AGILE GOVERNANCE
    Governance that is flexible to support different needs and quick responses in the organization. Driven by principles and delegated throughout the company.
  5. AUTOMATED GOVERNANCE
    Governance that is entrenched and automated into the organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival.

KEY INSIGHT

Governance must actively adapt to changes in your organization, environment, and practices or it will drive you to failure.

Developing governance principles

Governance principles support the move from controlled to automated governance by providing guardrails that guide your decisions. They provide the ethical boundaries and cultural perspectives that contextualize your decisions and keep you in line with organizational values. Determining principles are global in nature.

CONTROLLED CHANGE ACTIONS AND RATIONALE AUTOMATED
Disentangle governance and management Move from governance focused on evaluating, directing, and monitoring strategic decisions around information and technology toward defining and automating rules and principles for decision making into processes and practices, empowering the organization and driving adaptiveness. Delegate and empower
Govern toward value Move from identifying the organization’s mission, goals, and key drivers toward orienting IT to align with those value outcomes and embedding value outcomes into design and delivery practices. Deliver to defined outcomes
Make risk-informed decisions Move from governance bodies using risk information to manually make informed decisions based on their defined risk tolerance toward having risk information and attestation baked into decision making across all aspects and layers of the IT organization – from design to sustainment. Embed risk decision making into processes and practices
Measure to drive improvement Move from static lagging metrics that validate that the work being done is meeting the organization’s needs and guide future decision making toward automated governance with more transparency driven by data-based decision making and real-time data insights. Trust through real-time reporting
Enforce standards and behavior Move from enforcing standards and behavior and managing exceptions to ensure that there are consistent outcomes and quality toward automating standards and behavioral policies and embedding adherence and changes in behavior into the organization’s natural way of working. Automate standards through automated decision rules, verification, and validation

Find your guiding star

MISSION AND VISION –› GOALS AND OBJECTIVES –› GUIDING PRINCIPLES –›

VALUE

Why your organization exists and what value it aims to provide. The purpose you build a strategy to achieve. What your organization needs be successful at to fulfill its mission. Key propositions and guardrails that define and guide expected organizational behavior and beliefs.

Your mission and vision define your goals and objectives. These are reinforced by your guiding principles, including ethical considerations, your culture, and expected behaviors. They provide the boundaries and guardrails for enabling adaptive governance, ensuring you continue to move in the right direction for organizational success.

To paraphrase Lewis Carroll, “If you don't know where you want to get to, it doesn't much matter which way you go.” Once you know what matters, where value resides, and which considerations are necessary to make decisions, you have consistent directional alignment that allows you to delegate empowered governance throughout the organization, taking you to the places you want to go.

Understand governance versus management

Don’t blur the lines between governance and management; each has a unique role to play. Confusing them results in wasted time and confusion around ownership.

Governance

I&T governance defines WHAT should be done and sets direction through prioritization and decision making, monitoring overall IT performance.

Governance aligns with the mission and vision of the organization to guide IT.

A cycle of processes split into two halves, 'Governance Processes' and 'Management Processes'. Beginning on the Management side, the processes are 'Plan', 'Build', 'Run', 'Monitor', then to the Governance side, 'Evaluate', 'Direct', 'Monitor', and back to the beginning.

Management

Management focuses on HOW to do things to achieve the WHAT. It is responsible for executing on, operating, and monitoring activities as determined by I&T governance.

Management makes decisions for implementation based on governance direction.

Data is critical to automating governance

Documents and subjective/non-transparent decisions do not create sufficient structure to allow for the true automation of governance. Data related to decisions and aggregated risk allow you to define decision logic and rules and algorithmically embed them into your organization.

People- and Document-Centric

Governance drives activities through specific actors (individuals/committees) and unstructured data in processes and documents that are manually executed, assessed, and revised. There are often constraints caused by gaps or lack of adequate and integrated information in support of good decisions.

Data-Centric

Governance actors provide principles, parameters, and decision logic that enable the creation of code, rulesets, and algorithms that leverage organizational data. Attestation is automatic – validated and managed within the process, product, or service.

Info-Tech’s Approach

Define your context and build your model

ESTABLISH YOUR GUIDING PRINCIPLES

Define and establish the guiding principle that drive your organization toward success.

  • Mission & Vision
  • Business Goals & Success Criteria
  • Operating Model & Work Practices
  • Governance Scope
  • Principles
SELECT AND REFINE YOUR MODEL

Use Info-Tech's IT Governance Models to identify a base model similar to the way you are organized. Confirm your current and future placement in governance execution.

MODEL UPDATE TRIGGERS

Adjust the model based on industry needs, your principles, regulatory requirements, and future direction.

  • Principles
    Select principles that allow the organization to be adaptive while still ensuring the governance continues to stay on course with pursuing its guiding star.
  • Responsibilities
    Decide on the governance responsibilities related to Oversight Level, Strategic Alignment, Value Delivery, Risk Optimization, Resource Optimization, and Performance Management.
  • Structure
    Determine at which structured level governance is appropriate: Enterprise, Strategic, Tactical, or Operational.
  • Processes
    Establish processes that will enable governance to occur such as: Embed the processes required for successful governance.
  • Membership
    Identify the Responsibility & Accountability of those who should be involved in governance processes, policies, guidelines, and responsibilities.
  • Policies
    Confirm any governing policies that need to be adhered to and considered to manage risk.
AUTOMATION OPTIONS AND DECISION RULES

Identify where to embed or automate decision making and compliance and what is required to do so effectively.

The Info-Tech Difference

Define your context and build your model

  1. Quickly identify the organizational needs driving governance and your guiding star.
  2. Select and refine a base governance model based on our templates.
  3. Define and document the key changes in your organization that will trigger a need to update or revise your governance.
  4. Determine where you might be able to automate aspects of your governance.
  5. Design your decision rules where appropriate to support automated and adaptive governance.

How to use this research

Where are you in your governance optimization journey?

MY GOVERNANCE IS AD HOC AND WE’RE STARTING FROM SCRATCH I NEED TO BUILD A NEW GOVERNANCE STRUCTURE OUR GOVERNANCE APPROACH IS INEFFECTIVE AND NEEDS IMPROVEMENT I NEED TO LOOK AT OPTIONS FOR AUTOMATING GOVERNANCE PRACTICES
Step 1.1: Define Your Governance Context Step 1.2: Structure Your IT Governance Phase 2: Select and Refine Your Model Phase 3: Embed and Automate

IT governance is about ensuring that the investment decisions made around information and technology drive the optimal organizational value, not about governing the IT department.

In this section we will clarify your organizational context for governance and define your guiding star to orient your governance design and inform your structure.

There is no need to start from scratch! Start with Info-Tech’s best-practice IT governance models and customize them based on your organizational context.

The research in this section will help you to select the right base model to work from and provide guidance on how to refine it.

Governance practices eventually stop being a good fit for a changing organization, and things that worked before become bottlenecks.

Governing roles and committees don’t adjust well, don’t have consistent practices, and lack the right information to make good decisions.

The research in this section will help you improve and realign your governance practices.

Once your governance is controlled and optimized you are ready to investigate opportunities to automate.

This phase of the blueprint will help you determine where it’s feasible to automate and embed governance, understand key governance automation practices, and develop governing business rules to move your journey forward.

Related Research:

If you are looking for details on specific associated practices, please see our related research:

  1. I need to establish data governance.
  2. I need to manage my project portfolio, from intake to confirmation of value.
  3. I need better risk information to support decision making.
  4. I need to ensure I am getting the expected outcomes and benefits from IT spend.
  5. I need to prioritize my product backlog or service portfolio.

Info-Tech’s methodology for building and embedding adaptive governance

1. Identify Your Governance Needs 2. Select and Refine Your Governance Model 3. Embed and Automate
Phase Steps
  1. Confirm Mission, Vision, and Goals
  2. Define Scope and Principles
  3. Adjust for Culture and Finalize Context
  1. Select and Refine Your Governance Model
  2. Identify and Document Your Governance Triggers
  3. Build Your Implementation Plan
  1. Identify Decisions to Embed and Automate
  2. Plan Validation and Verification
  3. Update Implementation Plan
Phase Outcomes
  • Governance context, guiding star, and principles
  • Completed governance model with associated decisions and policies
  • Implementation plan
  • List of automation options
  • Decision logic, rules, and rulesets
  • Validation and verification approach
  • Finalized implementation plan

Insight summary

Value

To remain valuable, I&T governance must actively adapt to changes in your organization, environment, and practices, or it will drive you to failure instead of success.

Focus

I&T governance does not focus on the IT department. Rather, its intent is to ensure your organization makes sound decisions around investment in and use of information and technology.

Maturity

Your governance approach progresses in stages from ad hoc to automated as your organization matures. Your stage depends on your organizational needs and ways of working.

Good governance

Good governance does not equate to control and does not stifle innovation.

Automation

Automating governance must be done in stages, based on your capabilities, level of maturity, and amount of usable data.

Strategy

Establish the least amount of governance required to allow you to achieve your goals.

Guiding star

If you don’t establish a guiding star to align the different stakeholders in your organization, governance practices will create conflict and confusion.

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

Key Deliverable:
Governance Framework Model

The governance framework model provides the design of your new governance model and the organizational context to retain stakeholder alignment and organizational satisfaction with governance.

The model includes the structures, practices, and responsibilities to drive effective governance in your organization.

Sample of the key blueprint deliverable 'Governance Framework Model'.

Governance Implementation Plan

This roadmap lays out the changes required to implement the governance model, the cultural items that need to be addressed, and anticipated timing.

Sample of the blueprint deliverable 'Governance Implementation Plan'.

Governance Committee Charters

Develop a detail governance charter or term of reference for each governing body. Outline the mandate, responsibilities, membership, process, and associated policies for each.

Sample of the blueprint deliverable 'Governance Committee Charters'.

Blueprint benefits

IT Benefits

  • Stronger, traceable alignment of IT decisions and initiatives to business needs.
  • Improved ability for IT to meet the changing demands and velocity of the business.
  • Better support and enablement of innovation – removing constraints and barriers.
  • Optimized governance that supports and enables modern work practices.
  • Increased value generation from IT initiatives and optimal use of IT resources.
  • Designed adaptability to ensure you remain in alignment as your business and IT environments change.

Business Benefits

  • Clear transparent focus of IT initiatives on generating strategic business value.
  • Improved ability to measure the value and contribution of IT to business goals.
  • Alignment and integration of business/IT strategy.
  • Optimized development and use of IT capabilities to meet business needs.
  • Improved integration with corporate/enterprise governance.

Executive Brief Case Study

INDUSTRY Manufacturing
SOURCE Info-Tech analyst experience

Improving the governance approach and delegating decision making to support a change in business operation

Challenge

The large, multi-national organization has locations across the world but has two primary headquarters, in Europe and the United States.

Market shifts drove an organizational shift in strategy, leading to a change in operating models, a product focus, and new work approaches across the organization.

Much of the implementation and execution was done in isolation, and effectiveness was slowed by poor integration and conflicting activities that worked against each other.

The product owner role was not well defined.

Solution

After reviewing the organization’s challenges and governance approach, we redefined and realigned its organizational and regional goals and identified outcomes that needed to be driven into their strategies.

We also reviewed their span of control and integration requirements and properly defined decisions that could be made regionally versus globally, so that decisions could be made to support new work practices.

We defined the product and service owner roles and the decisions each needed to make.

Results

We saw an improvement in the alignment of organizational activities and the right people and bodies making decisions.

Work and practices were aimed at the same key outcomes and alignment between teams toward organizational goal improved.

Within one year, the success rate of the organization’s initiatives increased by 22%, and the percentage of product-related decisions made by product owners increased by 50%.

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

Guided Implementation

Workshop

Consulting

"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks used throughout all four options

Guided Implementation

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is between 5 and 8 calls over the course of 2 to 3 months.

What does a typical GI on this topic look like?

    Phase 1: Identify Your Governance Needs

  • Call #1: Confirm your organization’s mission and vision and review your strategy and goals.
  • Call #2: Identify considerations and governance needs. Develop your guiding star and governing principles.
  • Phase 2: Select and Refine Your Model

  • Call #3: Select your base model and optimize it to meet your governance needs.
  • Call #4: Define your adjustment triggers and develop your implementation plan.
  • Phase 3: Embed and Automate

  • Call #5: Identify decisions and standards you can automate and where to embed them.
  • Call #6: Confirm levels of authority and data requirements. Establish your approach and update the implementation plan.

Workshop Overview

Contact your account representative for more information.
workshops@infotech.com1-888-670-8889

Session 1 Session 2 Session 3 Session 4 Session 5
Activities
Develop Your Guiding Star

1.1 Confirm mission, vision, and goals

1.2 Define scope and principles

1.3 Adjust for culture and finalize context

Define the Governance Model

2.1 Select and refine governance model

2.2 Confirm and adjust the structure

2.3 Review and adapt governance responsibilities and activities

2.4 Validate governance mandates and membership

Build Governance Process and Policy

3.1 Update your governance process

3.2 Align policies to mandate

3.3 Adjust and confirm your governance model

3.4 Identify and document your update triggers

3.5 Embed triggers into review cycle

Embed and Automate Governance

4.1 Identify decisions and standards to automate

4.2 Plan verification and validation approach

4.3 Build implementation plan

4.4 Develop communication strategy and messaging

Next Steps and Wrap-Up

5.1 Complete in-progress outputs from previous four sessions

5.2 Set up review time for workshop outputs and to discuss next steps

Outcomes
  1. Governance context and goals
  2. Governance principles
  1. IT governance model and adjustment triggers
  2. IT governance structure, responsibilities, membership, and cadence
  3. Governance committee charters
  1. IT governance process and information flow
  2. IT governance policies
  3. Finalized governance model
  1. Selected automation options, decision logic, and business rules
  2. Implementation and communication plan
  1. Governance context and principles
  2. Finalized governance model and charters
  3. Finalized implementation plan

Make Your IT Governance Adaptable

Phase 1

Identify your Governance Needs

Phase 1

  • 1.1 Define Your Guiding Star
  • 1.2 Define Scope and Principles
  • 1.3 Adjust for Culture and Finalize Context

Phase 2

  • 2.1 Choose and Adapt Your Model
  • 2.2. Identify and Document Your Governance Triggers
  • 2.3 Build Your Implementation Approach

Phase 3

  • 3.1 Identify Decisions to Embed and Automate
  • 3.2 Plan Validation and Verification
  • 3.3 Update Implementation Plan

This phase will walk you through the following activities:

Identify the organization’s goals, mission, and vision that will guide governance.

Define the scope of your governance model and the principles that will guide how it works.

Account for organizational attitudes, behaviors, and culture related to governance and finalize your context.

This phase involves the following participants:

  • Senior IT leadership
  • Governance leads

Step 1.1

Define Your Guiding Star

Activities
  • 1.1.1 Document and interpret your strategy, mission, and vision
  • 1.1.2 Document and interpret the business and IT goals and outcomes
  • 1.1.3 Identify your operating model and work processes

This step will walk you through the following activities:

Review your business and IT strategy, mission, and vision to ensure understanding of organizational direction.

Identify the business and IT goals that governance needs to align.

Confirm your operating model and any work practices that need to be accounted for in your model.

This step involves the following participants:

  • Senior IT leadership
  • Governance leads

Outcomes of this step

Identified guiding star outcomes to align governance outcomes with

Defined operating model type and work style that impact governance design

Identify Your Governance Needs

Step 1.1 – Define your Guiding Star Step 1.2 – Define Scope and Principles Step 1.3 – Adjust for Culture and Finalize Context

Govern by intent

Find the balance for your designed governance approach

Organic governance occurs during the formation of an organization and shifts with challenges, but it is rarely transparent and understood. It changes your culture in uncontrolled ways. Intentional governance is triggered by changes in organizational needs, working approaches, goals, and structures. It is deliberate and changes your culture to enable success.
Stock photo of a weight scale.

Info-Tech Insight

Your approach to governance needs to be designed, even if your execution of governance is adaptable and delegated.

What is your guiding star?

Your guiding star is a combination of your organization’s mission, vision, and strategy and the goals that have been defined to meet them.

It provides you with a consistent focal point around which I&T-related activities and projects orbit, like planets around a star.

It generates the gravity that governance uses to keep things from straying too far away from the goal of achieving relevant value.

  1. Mission & Vision
  2. Business Goals & Success Criteria
  3. Operating Model & Work Practices
  4. Governance Scope
  5. Principles

1.1.1 Document and interpret your strategy, mission, and vision

30 minutes

Input: Business strategy, IT strategy, Mission and vision statements

Output: Updated Governance Workbook, Documented strategic outcomes and organizational aims that governance needs to achieve

Materials: Whiteboard/flip charts, Governance Workbook

Participants: IT senior leadership

  1. Gather your available business, digital, and IT strategy, mission, and vision information and document everything in your Governance Workbook. It’s ok if you don’t have all of it.
  2. Review and your mission and vision as a group. Discuss and document key points, including:
    • Which activities do you perform as an organization that embody your vision?
    • What key decisions and behaviors are required to ensure that your mission and vision are achievable?
    • What do you require from leadership to enable you to govern effectively?
    • What are the implications of the mission and vision on how the organization needs to work? What are the implications on decisions around opportunities and risks?

Download the Governance Workbook

1.1.2 Document and interpret the business and IT goals and outcomes

60 minutes

Input: Business strategy, Business and IT goals and related initiatives

Output: Required success outcomes for goals, Links between IT and business goals that governance needs to align

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Document the business and IT goals that have been created to achieve the mission and vision.
  2. Discuss if there are any gaps between the goals and the mission and vision. Ask yourself – if we accomplish these goals will we have successfully achieved the mission?
  3. For each goal, define what successful achievement of the goal looks like. Starting with one goal or objective, ask:
    • How would I know I am on the right path and how will I know I have gotten there?
    • How would I know if I am not on the right path and what does a bad result look like?
  4. Document your success criteria.
  5. Brainstorm some examples of decisions that support or constrain the achievement of your goals.
  6. Repeat this exercise for your remaining goals.
  7. As a group, map IT goals to business goals.

What is your operating model and why is it important?

An IT operating model is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions.

The model is critical in the optimization and alignment of the IT organization’s structure in order to deliver the capabilities required to achieve business goals. It is a key determinant of how governance needs to be designed and where it is implemented.

Little visualizations of different operating models: 'Centralized', 'Decentralized', and 'Hybrid'.

1.1.3 Identify your operating model and work practices

60 minutes

Input: Organizational structure, Operating model (if available)

Output: Confirmed operating approach, Defined work practices

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Identify the way your organization functions:
    • How do we currently operate? Are we centralized, decentralized or a hybrid? Are we focused on delivering products and services? Do we provide service ourselves or do we use vendors for delivery?
    • Can we achieve our mission, goals, and strategies, if we continue to operate this way? What would we have to change in how we operate to be successful in the future?
  2. Identify your governance needs. Do we need to be more structured or more flexible to support our future ways of working?
    • If you operate in a more traditional way, consider whether you are implementing or moving toward more modern practices (e.g. Agile, DevOps, enterprise service management). Do you need to make more frequent but lower-risk decisions?
    • Is your organization ready to delegate governance culturally and in terms of business understanding? Is there enough available information to support adaptive decisions and actions?
  3. Document your operating style, expected changes in work style, and cultural readiness. You will need to consider the implications on design.

Step 1.2

Define Scope and Principles

Activities
  • 1.2.1 Determine the proper scope for your governance
  • 1.2.2 Confirm your determining governing principles
  • 1.2.3 Develop your specific governing principles

This step will walk you through the following activities:

Identify what is included and excluded within the scope of your governance.

Develop the determining and specific principles that provide guardrails for governance activities and decisions.

This step involves the following participants:

  • Senior IT leadership
  • Governance leads

Outcomes of this step

Documented governance scope and principles to apply

Identify Your Governance Needs

Step 1.1 – Define your Guiding Star Step 1.2 – Define Scope and Principles Step 1.3 – Adjust for Culture and Finalize Context

Define the context for governance

Based on the goals and principles you defined and the operating model you selected, confirm where oversight will be necessary and at what level. Focus on the necessity to expedite and clear barriers to the achievement of goals and on the ownership of risks and compliance. Some key considerations:

  • Where in the organization will you need to decide on work that needs to be done?
  • What type of work will you need to do?
  • In what areas could there be conflicts in prioritization/resource allocation to address?
  • Who is accountable for risks to the organization and its objectives?
  • Where are your regional or business-unit-specific concerns that require focused local attention?
  • Are we using more agile, rapid delivery methods to produce work?

Understand your governance scope

Your governance scope helps you define the boundaries of what your governance model and practices will cover. This includes key characteristics of your organization that impact what governance needs to address.

Sample Considerations

  • Organizational Span
    • The geographical area the organization operates within. Regional laws and requirements will affect governance delegation and standards/policy development.
  • Level of Regulation
    • Higher levels of regulation create more standards and controls for risk and compliance, impacting how authority can be delegated or automated.
  • Sourcing Model
    • Changing technology sourcing introduces additional vendor governance requirements and may impact compliance and audit.
  • Risk Posture
    • The appetite for risk organizationally, and in pockets, impacts the level of uncertainty you are willing to work within and impact decision-making authority positioning.
  • Size
    • The size of your organization impacts the approach to governance, practice implementation, and delegation of authority.
  • What Is Working Today?
    • Which elements of your current governance approach should be retained, and what are the biggest pain points that need to be addressed?
(Source: COBIT 2019)

1.2.1 Determine the proper scope for your governance

60 minutes

Input: Context information from Activity 1.1, Scoping areas

Output: Defined scope and span of control

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Determine the scope/span of control required for your governance by:
    • Reviewing your key IT capabilities. Identify the ones where the responsibilities and decisions require oversight to ensure they meet the needs of the organization.
    • Identify what works well or poorly in your current governance approach.
    • Discuss and document the level and type of knowledge and business understanding required.
    • Identify and document any regulations, standards, or laws that apply to your organization/industry and how broadly they have to be applied.
    • Identify the organization’s risk appetite, where known, and areas where acceptable thresholds of risk have been defined. Where are key risk and opportunity decisions made? Who owns risk in your organization?
    • Identify and document the perceived role of the IT group in your organization (e.g. support, innovator, partner) and sourcing model (e.g. insource, outsource).
    • Is there sufficient information and data available in your organization to support effective decision making?

How should your governance be structured?

Organizations often have too many governance bodies, creating friction without value. Where that isn’t the case, the bodies are often inefficient, with gaps or overlaps in accountability and authority. Structure your governance to optimize its effectiveness, designing with the intent to have the fewest number of governing bodies to be effective, but no less than is necessary.

Start with your operating model.

  • Understand what’s different about your governance based on whether your organization in centralized, distributed, or a different model (e.g. hybrid, product).
  • Identify and include governance structures that are mandatory due to regulation or industry.
  • Based on your context, identify how many of your governance activities should be performed together.

Determine whether your governance should be controlled or adaptive.

  • Do you have the capability to distribute governance and is your organization empowered enough culturally?
  • Do you have sufficient standards and data to leverage? Do you have the tools and capabilities?
  • Identify governance structures that are required due to regulation or industry.

Info-Tech Insight

Your approach to governance needs to be designed and structured, even if your execution of governance is adaptable and delegated.

Identify and Refine your Principles

Confirm your defining principles based on your selection of controlled or adaptive governance. Create specific principles to clarify boundaries or provide specific guidance for teams within the organization.

Controlled Adaptive
Disentangle governance and management Delegate and empower
Govern toward value Deliver to defined outcomes
Make risk-informed decisions Embed risk into decision making
Measure to drive improvement Trust though real-time reporting
Enforce standards and behavior Automate decision making though established standards

Determining Principle: Delegate and empower.

Specific Principle: Decisions should be made at the lowest reasonable level of the organization with clarity.

Rationale: To govern effectively with the velocity required to address business needs, governance needs to be executed deeper into the organization and organizational goals need to be clearly understood everywhere.

Implication: Decision making needs to be delegated throughout the organization, so information and data requirements need to be identified, decision-making approach and principles need to be shared, and authority needs to be delegated clearly.

1.2.2 Confirm your determining governance principles

30-45 minutes

Input: Governance Framework Model– Governance Principles

Output: Governance workbook - Finalized list of determining principles

Materials: Whiteboard/flip charts, Governance Workbook

Participants: IT senior leadership

  1. Review the IT governance principles in your Governance Workbook.
  2. Within your IT senior leadership team (or IT governance working group) assign one or two principles to teams of two to three participants. Have each team identify what this would mean for your organization. Answering the questions:
    • In what ways do our current governance practices support this?
    • What are some examples of changes that would need to be made to make this a reality?
    • How would applying this principle improve your governance?
  3. Have each team present their results and compile the findings and implications in the Governance Workbook to use for future communication of the change.

Specific governing principles

Specific governing principles are refined principles derived from a determining principle, when additional specificity and detail is necessary. It allows you to define an approach for specific behaviors and activities. Multiple specific principles may underpin the determining one.

A visualization of a staircase with stairs labelled, bottom to top, 'Determining Principle', 'Rationale', 'Implications', 'Specific Principles'.

Specific Principles – Related principles that may be required to ensure the implications of the determining principal are addressed within the organization. They may be specific to individual areas and may be addressed in policies.

Implications – The implications of this principle on the organization, specific to how and where governance is executed and the level of information and authority that would be necessary.

Rationale – The reason(s) driving the determining principle.

Determining Principle – A core overarching principle – a defining aspect of your governance model.

1.2.3 Develop your specific governing principles

30 minutes

Input: Updated determining principles

Output: List of specific principles linked to determining principles

Materials: Whiteboard/flip charts, Governance Workbook

Participants: IT senior leadership

  1. Confirm the determining principles for your governance model based on your previous discussions.
  2. Identify where to apply the principles. This is based on:
    1. Your governance scope (how much is within your span of control)
    2. The amount of data you have available
    3. Your cultural readiness for delegation
  3. Create specific principles to support the determining principles:
    1. Document the rationale driving the determining principles.
    2. Identify the implications.
    3. Create specific principles that will support the success in achieving the goals of each determining principle.
  4. Document all information on the “Governance guiding star” slide in the Governance Workbook.

Download the Governance Workbook

Step 1.3

Adjust for Culture and Finalize Context

Activities
  • 1.3.1 Identify and address the impact of attitude, behavior, and culture
  • 1.3.2 Finalize your context

This step will walk you through the following activities:

Identify your organizational attitude, behavior, and culture related to governance.

Identify positives that can be leveraged and develop means to address negatives.

Finalize the context that your model will leverage and align to.

This step involves the following participants:

  • Senior IT leadership
  • Governance leads

Outcomes of this step

Downloaded tool ready to select the base governance model for your organization

Identify Your Governance Needs

Step 1.1 – Define your Guiding Star Step 1.2 – Define Scope and Principles Step 1.3 – Adjust for Culture and Finalize Context

Understanding attitude, behavior, and culture

A

ttitude

What people think and feel. It can be seen in their demeanor and how they react to change initiatives, colleagues, and users. This manifests in the belief that governance is a constraint that needs to be avoided or ignored – often with unintended consequences.

A stock photo of a lightbulb over a person's head and a blackboard behind them reading 'New Mindset - data-verified= New Results'.">

Any form of organizational change involves adjusting people’s attitudes to create buy-in and commitment.

You need to identify and address attitudes that can lead to negative behaviors and actions or that are counter-productive.

Understanding attitude, behavior, and culture

B

ehavior

What people do. This is influenced by attitude and the culture of the organization. In governance, this manifests as people’s willingness to be governed, who pushes back, and who tries to bypass it.

A stock photo of someone walking up a set of stairs into the distant sunlight.

To implement change within IT, especially at a tactical and strategic level, organizational behavior needs to change.

This is relevant because people gravitate toward stability and will resist change in an active or passive way unless you can sell the need, value, and benefit of changing their behavior and way of working.

Understanding attitude, behavior, and culture

C

ulture

The accepted and understood ways of working in an organization. The values and standards that people find normal and what would be tacitly identified to new resources. In governance terms, this is how decisions are really made and where responsibility really exists rather than what is identified formally.

A stock photo of a compass pointing to 'VALUES'.

The impact of the organizational or corporate “attitude” on employee behavior and attitude is often not fully understood.

Culture is an invisible element, which makes it difficult to identify, but it has a strong impact and must be addressed to successfully embed governance models. In the case of automating governance, cultural readiness for automation is a critical success factor.

1.3.1 Identify and address the impact of attitude, behavior, and culture

45 minutes

Input: Senior leadership knowledge

Output: Updated Governance Workbook

Materials: Governance Workbook

Participants: IT senior leadership

  1. Break into three groups. Each group will discuss and document the positive and negative aspects of one of attitude, behavior, or culture related to governance in your organization.
  2. Each group will present and explain their list to the group.
  3. Add any additional suggestions in each area that are identified by the other groups.
  4. Identify the positive elements of attitude, behavior, and culture that would help with changing or implementing your updated governance model.
  5. Identify any challenges that will need to be addressed for the change to be successful.
  6. As a group, brainstorm some mitigations or solutions to these challenges. Document them in the Governance Workbook to be incorporated into the implementation plan.

Download the Governance Workbook

Attitude, behavior, and culture

Evaluate the organization across the three contexts. The positive items represent opportunities for leveraging these characteristics with the implementation of the governance model, while the negative items must be considered and/or mitigated.

Attitude Behavior Culture
Positive
Negative
Mitigation

1.3.2 Finalize your governance context

30 minutes

Input: Documented governance principles and scope from previous exercises

Output: Finalized governance context in the Governance Workbook

Materials: Whiteboard/flip charts, Governance Workbook

Participants: IT senior leadership

  1. Use the information that has been gathered throughout this section to update and finalize your IT governance context.
  2. Document it in your Governance Workbook.

Download the Governance Workbook

Make Your IT Governance Adaptable

Phase 2

Select and Refine Your Governance Model

Phase 1

  • 1.1 Define Your Guiding Star
  • 1.2 Define Scope and Principles
  • 1.3 Adjust for Culture and Finalize Context

Phase 2

  • 2.1 Choose and Adapt Your Model
  • 2.2. Identify and Document Your Governance Triggers
  • 2.3 Build Your Implementation Approach

Phase 3

  • 3.1 Identify Decisions to Embed and Automate
  • 3.2 Plan Validation and Verification
  • 3.3 Update Implementation Plan

This phase will walk you through the following activities:

Select a base governance model and refine it to suit your organization.

Identify scenarios and changes that will trigger updates to your governance model.

Build your implementation plan.

This phase involves the following participants:

  • Senior IT leadership
  • Governance resources

Step 2.1

Choose and Adapt Your Model

Activities
  • 2.1.1 Choose your base governance model
  • 2.1.2 Confirm and adjust the structure of your model
  • 2.1.3 Define the governance responsibilities
  • 2.1.4 Validate the governance mandates and membership
  • 2.1.5 Update your committee processes
  • 2.1.6 Adjust your associated policies
  • 2.1.7 Adjust and confirm your governance model

This step will walk you through the following activities:

Review and selecting your base governance model.

Adjust the structure, responsibilities, policies, mandate, and membership to best support your organization.

This step involves the following participants:

  • Senior IT leadership
  • Governance leads

Outcomes of this step

Downloaded tool ready to select the base governance model for your organization

Select and Refine Your Governance Model

Step 2.1 – Choose and Adapt Your Model Step 2.2 – Identify and Document Your Governance Triggers Step 2.3 – Build Implementation Approach

Your governance framework has six key components

GOVERNANCE FRAMEWORK

  • GUIDELINES
    The key behavioral factors that ground your governance framework
  • MEMBERSHIP
    Formalization of who has authority and accountability to make specific governance decisions
  • RESPONSIBILITIES
    The definition of which decisions and outcomes your governance structure and each governance body is accountable for
  • STRUCTURE
    Which governance bodies and roles are in place to articulate where decisions are made in the organization
  • PROCESS
    Identification of the how your governance will be executed, how decisions are made, and the inputs, outputs, and connections to related processes
  • POLICY
    Set of principles established to address risk and drive expected and required behavior

4 layers of governance bodies

There are traditionally 4 layers of governance in an enterprise, and organizations have governing bodies or individuals at each level

RESPONSIBILITIES AND TYPICAL MEMBERSHIP
ENTERPRISE Defines organizational goals. Directs or regulates the performance and behavior of the enterprise, ensuring it has the structure and capabilities to achieve its goals.

Membership: Business executives, Board

STRATEGIC Ensures IT initiatives, products, and services are aligned to organizational goals and strategy and provide expected value. Ensure adherence to key principles.

Membership: Business executives, CIO, CDO

TACTICAL Ensures key activities and planning are in place to execute strategic initiatives.

Membership: Authorized division leadership, related IT leadership

OPERATIONAL Ensures effective execution of day-to-day functions and practices to meet their key objectives.

Membership: Service/product owners, process owners, architecture leadership, directors, managers

2.1.1 Choose your base governance model

30 minutes

Input: Governance models templates

Output: Selected governance model

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Download Info-Tech’s base governance models (Controlled Governance Models Template and IT Governance Program Overview) and review them to find a template that most closely matches your context from Phase 1. You can start with a centralized, decentralized, or product/service hybrid IT organization. Remove unneeded models.
  2. If you do not have documented governance today, start with a controlled model as your foundation. Continue working through this phase if you have a documented governance framework you wish to optimize using our best practices or move to Phase 3 if you are looking to automate or embed your governance activities.

Controlled Governance Models Template

Adaptive Governance Models Template

2.1.2 Confirm and adjust the structure of your model

30-45 minutes

Input: Selected base governance model, Governance context/scope

Output: Updated governance bodies and relationships

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Validate your selected governance body structural model.
    • Are there any governing bodies you must maintain that should replace the ones listed? In part or in full?
    • Are there any missing bodies? Look at alternative committees for examples.
    • Document the adjustments.
  2. Are there any governing bodies that are not required?
    • Based on your size and needs, can they be done within one committee?
    • Is the capability or data not in place to perform the work?
    • Document the required changes.

There are five key areas of governance responsibility

A cyclical visualization of the five keys areas of governance responsibility, 'Strategic Alignment', 'Value Delivery', 'Risk Management', 'Resource Management', and 'Performance Measurement'.

STRATEGIC ALIGNMENT
Ensures that technology investments and portfolios are aligned with the organization’s needs.

VALUE DELIVERY
Reviews the outcomes of technology investments and portfolios to ensure benefits realization.

RISK MANAGEMENT
Defines and owns the risk thresholds and register to ensure that decisions made are in line with the posture of the organization.

RESOURCE MANAGEMENT
Ensures that people, financial knowledge, and technology resources are appropriately allocated across the organization.

PERFORMANCE MEASUREMENT
Monitors and directs the performance or technology investments to determine corrective actions and understand successes.

2.1.3 Define the governance responsibilities

Ensure you have the right responsibilities in the right place

45-60 minutes

Input: Selected governance base model, Governance context

Output: Updated responsibilities and activities, Updated activities for selected governance bodies, New or removed governing bodies

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Based on your context and model, review the responsibilities identified for each committee and confirm that they align with the mandate and the stated outcome.
  2. Identify and highlight any responsibilities and activities that would not be involved in informing and enabling the mandate of the committee.
  3. Adjust the wording of confirmed responsibilities and activities to reflect your organizational language.
  4. Review each highlighted “bad fit” activity and move it to a committee whose mandate it would support or remove it if it’s not performed in your organization.
  5. If an additional committee is required, define the mandate and scope, then include any additional responsibilities that might have been a bad fit elsewhere

2.1.4 Validate the governance mandates and membership

30 minutes

Input: Selected governance base model, Updated structure and responsibilities

Output: Adjusted mandates and refined committee membership

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Review the mandate and membership slides in your selected governance model.
  2. Adjust the mandate to ensure that it aligns to and conveys:
    1. The outcome that the committee is meant to generate for the organization.
    2. Its scope/span of control.
  3. Discuss the type of information members would require for the committee to be successful in achieving its mandate.
  4. Document the member knowledge requirement in the mandate slide of the model template.

Determine the right membership for your governance

One of the biggest benefits of governance committees is the perspective provided by people from various parts of the organization, which helps to ensure technology investments are aligned with strategic goals. However, having too many people – or the wrong people – involved prevents the committee from being effective. Avoid this by following these principles.

Three principles for selecting committee membership

  1. Determine membership based on responsibilities and required knowledge.
    Organizations often make the mistake of creating committees and selecting members before defining what they will do. This results in poor governance because members don’t have the knowledge required to make decisions. Define the mandate of the committee to determine which members are the right fit.
  2. Ensure members are accountable and authorized to make the decisions.
    Effective governance requires the members to have the authority and accountability to make decisions. This ensures meetings achieve their outcome and produce value, which improves the committee’s chances of survival.
  3. Select leaders who see the big picture.
    Often committee decisions and responsibilities become tangled in the web of organizational politics. Include people, often C-level, whose attendance is critical and who have the requisite knowledge, mindset, and understanding to put business needs ahead of their own.

2.1.5 Update your committee processes

20 minutes

Input: Selected governance base model, Updated structure and responsibilities

Output: Updated committee processes

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Review the committee details based on the changes you have made in goals, mandate, and responsibilities.
  2. Identify and document changes required to the committee outputs (outcomes) and adjust the consumer of the outputs to match.
  3. Review the high-level process steps required to get to the modified output. Add required activities or remove unnecessary ones. Review the process flow. Does it make sense? Are there unnecessary steps?
  4. Review and update inputs required for the process steps and update the information/data sources.
  5. Adjust the detailed process steps to reflect the work that needs to be done to support each high-level process step that changed.

2.1.6 Adjust your associated policies

20 minutes

Input: Selected governance base model, Updated structure and responsibilities

Output: Adjusted mandates and refined committee membership

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Review the policies associated with the governing bodies in your base model. Identify the policies that apply to your organization, those that are missing, and those that are not necessary.
  2. Confirm the policies that you require.
  3. Make sure the policies and policy purposes (or risks and related behaviors the policy addresses) are matched to the governance committee that has responsibilities in that area. Move policies to the right committee.

2.1.7 Adjust and confirm your governance model

  1. Confirm the adjustment of governance bodies, structure, and input/output linkages.
  2. Confirm revisions to decisions and responsibilities.
  3. Confirm policy and regulation/standards associations.
  4. Select related governance committee charters from the provided set and revise the charters to reflect the elements defined in your updated model.
  5. Finalize your governance model.

Samples of slides related to adjusting and confirming governance models in the Governance Workbook.

Step 2.2

Identify and Document Your Governance Triggers

Activities
  • 2.2.1 Identify and document update triggers
  • 2.2.2 Embed triggers into the review cycle

This step will walk you through the following activities:

Identify scenarios that will create a need to review or change your governance model.

Update your review/update approach to receiving trigger notifications.

This step involves the following participants:

  • Senior IT leadership
  • Governance leads

Outcomes of this step

Downloaded tool ready to select the base governance model for your organization

Select and Refine Your Governance Model

Step 2.1 – Choose and Adapt Your Model Step 2.2 – Identify and Document Your Governance Triggers Step 2.3 – Build Implementation Approach

What are governance triggers

Governance triggers are organizational or environmental changes within or around an organization that are inflection points that start the review and revision of governance models to maintain their fit with the organization. This is the key to adaptive governance design.

A target with five arrows sticking out of the bullseye, 'Operating Model', 'Business Strategy', 'Mandate Change', 'Management Practices', and 'Digital Transformation'.

2.2.1 Identify and document update triggers

30 minutes

Input: Governance Workbook

Output: Updated workbook with defined and documented governance triggers, points of origin, and integration

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Open the Governance Workbook to the “Triggers” slides.
  2. Review the list of governance triggers. Retain the ones that apply to your organization, remove those you feel are unnecessary, and add any change scenarios you feel should be included.
  3. Identify where you would receive notifications of these changes and the related processes or activities that would generate these notifications, if applicable.
  4. Document any points of integration required between governance processes and the source process. Highlight any where the integration is not currently in place.

Sample of the 'Triggers' slide in the Governance Workbook.

2.2.2 Embed triggers into the review cycle

30 minutes

Input: Governance model

Output: Review cycle update

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. Identify which triggers impact the entire governance model and which impact specific committees.
  2. Add an activity for triggered review of the impacted governance model into your governance committee process.

Step 2.3

Build Your Implementation Approach

Activities
  • 2.3.1 Identify and document your implementation plan
  • 2.3.2 Build your roadmap
  • 2.3.3 Build your sunshine diagram

This step will walk you through the following activities:

Transfer changes to the Governance Implementation Plan Template.

Determine the timing for the implementation phases.

This step involves the following participants:

  • Senior IT leadership
  • Governance process owner

Outcomes of this step

Implementation plan for adaptive governance framework model

Select and Refine Your Governance Model
Step 2.1 – Choose and Adapt Your Model Step 2.2 – Identify and Document Your Governance Triggers Step 2.3 – Build Implementation Approach

2.3.1 Identify and document your implementation plan

60 minutes

Input: Governance model, Guiding principles, Update triggers, Cultural factors and mitigations

Output: Implementation roadmap

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. As a group, discuss the changes required to implement the governance model, the cultural items that need to be addressed, and the anticipated timing.
  2. Document the implementation activities and consolidate them into groupings/themes based on similarities or shared outcomes.
  3. Name the grouped themes for clarity and identify key dependencies between activities in each area and across themes.
  4. Identify and document your approach (e.g. continuous, phased) and high-level timeline for implementation.
  5. Document the themes and initiatives in the Governance Implementation Plan.

Download the Governance Implementation Plan

Illustrate the implementation plan using roadmaps

Info-Tech recommends two different methods to roadmap the initiatives in your Governance Implementation Plan.

Gantt Chart
Sample of a Gantt Chart.

This type of roadmap depicts themes, related initiatives, the associated goals, and exact start and end dates for each initiative. This diagram is useful for outlining a larger number of activities and initiatives and has an easily digestible and repeatable format.

Sunshine Diagram
Sample of a Sunshine Diagram.

This type of roadmap depicts themes and their associated initiatives. The start and end dates for the initiatives are approximated based on years or phases. This diagram is useful for highlighting key initiatives on one page.

2.3.2 Build your roadmap

30 minutes

Input: Governance themes and initiatives

Output: roadmap visual

Materials: Governance Roadmap Workbook, Governance Workbook

Participants: CIO, IT senior leadership

  1. Open the Governance Implementation Plan and review themes and initiatives.
  2. Open the Governance Roadmap Workbook.
  3. Discuss whether the implementation roadmap should be developed as a Gantt chart, a sunshine diagram, or both.
    For the Gantt chart:
    • Input the roadmap start year and date.
    • Change the months and year in the Gantt chart to reflect the same roadmap start year.
    • Input and populate the planned start and end dates for the list of high-priority initiatives.

Develop your Gantt chart in the Governance Roadmap Workbook

2.3.3 Build your sunshine diagram

30 minutes

Input: Governance themes and initiatives

Output: Sunshine diagram visual

Materials: Whiteboard/flip charts, Markers, Governance Implementation Plan

Participants: CIO, IT senior leadership

  1. Review your list of themes and initiatives.
  2. Build a model with “rays” radiating out from a central theme or objective.
  3. Using curved arcs, break the grid into timeline periods or phases.
  4. Complete your sunshine diagram in the Governance Implementation Plan.

Customize your sunshine diagram in the Governance Implementation Plan

Make Your IT Governance Adaptable

Phase 3

Embed and Automate

Phase 1

  • 1.1 Define Your Guiding Star
  • 1.2 Define Scope and Principles
  • 1.3 Adjust for Culture and Finalize Context

Phase 2

  • 2.1 Choose and Adapt Your Model
  • 2.2. Identify and Document Your Governance Triggers
  • 2.3 Build Your Implementation Approach

Phase 3

  • 3.1 Identify Decisions to Embed and Automate
  • 3.2 Plan Validation and Verification
  • 3.3 Update Implementation Plan

This phase will walk you through the following activities:

Identify which decisions you are ready to automate.

Identify standards and policies that can be embedded and automated.

Identify integration points.

Confirm data requirements to enable success.

This phase involves the following participants:

  • IT senior leadership
  • Governance process owner
  • Product and service owners
  • Policy owners

Step 3.1

Identify Decisions to Embed and Automate

Activities
  • 3.1.1 Review governance decisions and standards and the required level of authority
  • 3.1.2 Build your decision logic
  • 3.1.3 identify constraints and mitigation approaches
  • 3.1.4 Develop decision rules and principles

This step will walk you through the following activities:

Identify your key decisions.

Develop your decision logic.

Confirm decisions that could be automated.

Identify and address constraints.

Develop decision rules and principles.

This step involves the following participants:

  • IT senior leadership

Outcomes of this step

Developed decision rules, rulesets, and principles that can be leveraged to automate governance

Defined integration points

Embed and Automate

Step 3.1 – Identify Decisions to Embed and Automate Step 3.2 – Plan Validation and Verification Step 3.3 – Update Implementation Plan

What is decision automation?

Decision automation is the codifying of rules that connect the logic of how decisions are made with the data required to make those decisions. This is then embedded and automated into processes and the design of products and services.

  • It is well suited to governance where the same types of decisions are made on a recurring basis, using the same set of data. It requires clean, high-quality data to be effective.
  • Improvements in artificial intelligence (AI) and machine learning (ML) have allowed the creation of scenarios where a hybrid of rules and learning can improve decision outcomes.

Key Considerations

  • Data Availability
  • Legality
  • Contingencies
  • Decision Transparency
  • Data Quality
  • Auditability

How complexity impacts decisions

Decision complexity impacts the type of rule(s) you create and the amount of data required. It also helps define where or if decisions can be automated.

  1. SIMPLE
    Known and repeatable with consistent and familiar outcomes – structured, causal, and easy to standardize and automate.
  2. COMPLICATED
    Less known and outcomes are not consistently repeatable. Expertise can drive standards and guidelines that can be used to automate decisions.
  3. COMPLEX
    Unknown and new, highly uncertain in terms of outcomes, impact, and data. Requires more exploration and data. Difficult to automate but can be built into the design of products and services.
  4. CHAOTIC
    Unstructured and unknown situation. Requires adaptive and immediate action without active data – requires retained human governance
  5. (Based on Dave Snowden’s Cynefin framework)

Governance Automation Criteria Checklist

The Governance Automation Criteria Checklist provides a view of key considerations for determining whether a governing activity or decision is a good candidate for automation.

The criteria identify key qualifiers/disqualifiers to make it easier to identify eligibility.

Sample of the Governance Automation Criteria Checklist.

Download the Governance Automation Criteria Checklist

Governance Automation Worksheet

Sample of the Governance Automation Worksheet.

The Governance Automation Worksheet provides a way to document your governance and systematically identify information about the decisions to help determine if automation is possible.

From there, decision rules, logic, and rulesets can be designed in support of building a structure flow to allow for automation.

Download the Governance Automation Worksheet

3.1.1 Review governance decisions and standards and the required level of authority

30 minutes

Input: Automation Criteria Checklist, Governance Automation Worksheet, Updated governance model

Output: Documented decisions and related authority, Selected options for automation, Updated Governance Automation Worksheet

Materials: Whiteboard/flip charts, Governance Automation Worksheet

Participants: IT senior leadership

  1. Identify the decisions that are made within each committee in your updated governance model and document them in the Governance Automation Worksheet.
  2. Confirm the level of authority required to make each decision.
  3. Review the automation checklist to confirm whether each decision is positioned well for automation.
  4. Select and document the decisions that are the strongest options for automation/embedding and document them in the Governance Automation Worksheet.

What are decision rules?

Decision rules provide specific instructions and constraints that must be considered in making decisions and are critical for automating governance.

They provide the logical path to assess governance inputs to make effective decisions with positive business outputs.

Inputs would include key information such as known risks, your defined prioritization matrix, portfolio value scoring, and compliance controls.

Individual rules can be leveraged in different places.

Some decision rule types are listed here.

  1. Statement Rules
    Natural expression of logical progression, written through logical elements
  2. Decision Tree Rules
    Decision tree with two axes that overlap to generate a decision
  3. Sequential Rules
    A sequence of decisions that move from one step to the next
  4. Expression Rule
    A particular set of rules triggered by a particular rule condition being met
  5. Truth table rules
    Combines many decision factors into one place; produces different outputs

What are decision rulesets

Rulesets are created to make complex decisions. Individual rule types are combined to create rulesets that are applied together to generate effective decisions. One rule will provide contextual information required for additional rules to execute in a Rule-Result-Rule-Result-Rule-Decision flow.

A visualization of two separate rulesets made up of the decision rules on the previous slide. 'Ruleset 1' contains '1) Statement Rules', '2) Decision Tree Rules', and 5) Truth Table Rules'. 'Ruleset 2' contains '3) Sequential Rules' and '4) Expression Rule'.

3.1.2 Build your decision logic

30 minutes

Input: Governance Automation Worksheet

Output: Documented decision logic to support selected decision types and data requirements

Materials: Whiteboard/flip charts

Participants: IT senior leadership

  1. For each selected decision, identify the principles that drive the considerations around the decision.
  2. For each decision, develop the decision logic by defining the steps and information inputs involved in making the decision and documenting the flow from beginning to end.
  3. Determine whether this is one specific decision or a combination of different decisions (in sequence or based on decisions).
  4. Name your decision rule.

Sample of the Governance Automation Worksheet.

3.1.3 Identify constraints and mitigation approaches

60 minutes
  1. Document constraints to automation of decisions related to:
    • Availability of decision automation tools
    • Decision authority change requirements
    • Data constraints
    • Knowledge requirements
    • Process adjustment requirements
    • Product/service design levels
  2. Brainstorm and identify approaches to mitigate constraints and score based on likelihood of success.
  3. Identify mitigation owners and initial timeline expectations.
  4. Document the constraints and mitigations in the Governance Workbook on the constraints and mitigations slide.

Sample of the 'Constraints and mitigations' slide of the 'Governance Workbook'.

3.1.4 Develop decision rules and principles

1.5-2 hours

Input: Governance Automation Worksheet

Output: Defined decision integration points, Confirmed data availability sets, Decision rules, rulesets, and principles with control indicators

Materials: Whiteboard/flip charts, Governance Automation Worksheet

Participants: IT senior leadership

  1. Review the decision logic for those decisions that you have confirmed for automation. Identify the processes where the decision should be executed.
  2. Associate each decision with specific process steps or stages or how it would be included in software/product design.
  3. For each selected decision, identify the availability of data required to support the decision logic and the level of complexity and apply governing principles.
  4. Create the decision rules and identify data gaps.
  5. Define the decision flow and create rulesets as needed.
  6. Confirm automation requirements and define control indicators.

Step 3.2

Plan Validation and Verification

Activities
  • 3.2.1 Define verification approach for embedded and automated governance
  • 3.2.2 Define validation approach for embedded and automated governance

This step will walk you through the following activities:

Define how decision outcomes will be measured.

Determine how the effectiveness of automated governance will be reported.

This step involves the following participants:

  • IT senior leadership

Outcomes of this step

Tested and verified automation of decisions

Embed and Automate

Step 3.1 – Identify Decisions to Embed and Automate Step 3.2 – Plan Validation and Verification Step 3.3 – Update Implementation Plan

Decision rule relationship through to verification

1. Rules

Focus on clear decision logic

Often represented in simple statement types and supported by data:

IF – THEN

IF – AND – THEN

IF – AND NOT – THEN

2. Rulesets

Aggregate rules for more complex decisions

Integrated flows between different required rules:
Rule 1:
(Output 1) – Rule 2
(Output 2) – Rule 6
Rule 6: (Output 1) – Rule 7
3. Rule Attestation

Verify success of automated decisions

Attestation of embedded and automated rules with key control indicators embedded within process and products.

Principles embedded into automated software controls.

3.2.1 Define verification approach for embedded and automated governance

60 minutes

Input: Governance rules and rulesets as defined in the Governance Automation Worksheet, Defined decision outcomes

Output: A defined measurement of effective decision outcomes, Approach to automate and/or report the effectiveness of automated governance

Materials: Whiteboard/flip charts

Participants: IT senior leadership

Verify

  1. Confirm expected outcome of rules.
  2. Select a sampling of new required decisions or recently performed decisions related to areas of automation.
  3. Run the decisions through the decision rules or rule groupings that were developed and compare to parallel decisions made using the traditional approach. (These must be segregated activities.)
  4. Review the outcome of the rules and adjust based on the output. Identify areas of adjustment. Confirm that the automation meets your requirements.

3.2.2 Define validation approach for embedded and automated governance

60 minutes

Input: Governance rules and rulesets as defined in the Governance Automation Worksheet, Defined decision outcomes

Output: Defined assurance and attestation requirements, Key control indicators that can be automated

Materials: Whiteboard/flip charts

Participants: IT senior leadership

Validate

  1. Develop an approach to measure automated decisions. Align success criteria to current governance KPIs and metrics.
  2. If no such metrics exist, define expected outcome. Define key risk indicators based on the expected points of automation.
  3. Establish quality assurance checkpoints within the delivery lifecycles to adjust for variance.
  4. Create triggers back to rule owners to drive changes and improvements to rules and rule groupings.

Step 3.3

Update Implementation Plan

Activities
  • 3.3.1 Finalize the implementation plan

This step will walk you through the following activities:

Review implications and mitigations to make sure all have been considered.

Finalize the implementation plan and roadmap.

This step involves the following participants:

  • Senior IT leadership

Outcomes of this step

Completed Governance implementation plan and roadmap

Embed and Automate

Step 3.1 – Identify Decisions to Embed and Automate Step 3.2 – Plan Validation and Verification Step 3.3 – Update Implementation Plan

3.3.1 Finalize the implementation plan

30 minutes

Input: Governance workbook, Updated governance model, Draft implementation plan and roadmap

Output: Finalized implementation plan and roadmap

Materials: Whiteboard/flip charts, Governance Implementation Plan

Participants: IT senior leadership

  1. Document automation activities within phases in a governance automation theme in the Governance Implementation Plan.
  2. Review timelines in the implementation plan and where automation fits within the roadmap.
  3. Updated the implementation plan and roadmap.

Governance Implementation Plan

Summary of Accomplishment

Problem Solved

Through this project we have:

  • Improved your governance model to ensure a better fit for your organization, while creating adaptivity for the future.
  • Ensured your governance operates as an enabler of success with the proper bodies and levels of authority established.
  • Established triggers to ensure your governance model is actively adjusted to maintain its fit.
  • Developed a plan to embed and automate governance.
  • Created decision rules and principles and identified where to embed them within your practices.

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

Additional Support

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

Photo of Valence Howden.

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

Related Info-Tech Research

Improve IT Governance to Drive Business Results

Avoid bureaucracy and achieve alignment with a minimalist approach. Align with your organizational context.

Establish Data Governance

Establish data trust and accountability with strong governance.

Maximize Business Value From IT Through Benefits Realization

Embed value and alignment confirmation into your governance to ensure you optimize IT value achievement for resource spend.

Build a Better Product Owner

Strengthen the product/service owner role in your organization by focusing on core capabilities and proper alignment.

Research contributors and experts

Photo of Sidney Hodgson, Senior Director, Industry, Info-Tech Research Group. Sidney Hodgson
Senior Director, Industry
Info-Tech Research Group
  • Sidney has over 30 years of experience in IT leadership roles as CIO of three organizations in Canada and the US as well as international consulting experience in the US and Asia.
  • Sid has a breadth of knowledge in IT governance, project management, strategic and operational planning, enterprise architecture, business process re-engineering, IT cost reduction, and IT turnaround management.
Photo of David Tomljenovic, Principal Research Advisor, Industry, Info-Tech Research Group. David Tomljenovic
Principal Research Advisor, Industry
Info-Tech Research Group
  • David brings extensive experience from the Financial Services sector, having worked 25 years on Bay Street. Most recently he was a Corporate Finance and Strategy Advisor for Infiniti Labs (Toronto/Hong Kong), Automotive, and Smart City Accelerator, where he provided financial and mergers & acquisitions advisory services to accelerator participants with a focus on early-stage fundraising activities.

Research contributors and experts

Photo of Cole Cioran, Practice Lead, Applications and Agile Development, Info-Tech Research Group. Cole Cioran
Practice Lead, Applications and Agile Development
Info-Tech Research Group
  • Over the past 25 years, Cole has developed software; designed data, infrastructure, and software solutions; defined systems and enterprise architectures; delivered enterprise-wide programs; and managed software development, infrastructure, and business systems analysis practices.
Photo of Crystal Singh, Research Director, Applications – Data and Information Management, Info-Tech Research Group. Crystal Singh
Research Director, Applications – Data and Information Management
Info-Tech Research Group
  • Crystal brings a diverse and global perspective to her role, drawing from her professional experiences in various industries and locations. Prior to joining Info-Tech, Crystal led the Enterprise Data Services function at Rogers Communications, one of Canada’s leading telecommunications companies.

Research contributors and experts

Photo of Carlene McCubbin, Practice Lead, CIO, Info-Tech Research Group. Carlene McCubbin
Practice Lead, CIO
Info-Tech Research Group
  • Carlene covers key topics in organization and leadership and specializes in governance, organizational design, relationship management, and human capital development. She led the development of Info-Tech’s Organization and Leadership practice.
Photo of Denis Goulet, Senior Workshop Director, Info-Tech Research Group. Denis Goulet
Senior Workshop Director
Info-Tech Research Group
  • Denis is a transformational leader and experienced strategist who focuses on helping clients communicate, relate, and adapt for success. Having developed Governance Model and IT strategies in organizations ranging from small to billion-dollar multi-nationals, he firmly believes in a collaborative value-driven approach to work.

Bibliography

“2020 State of Data Governance and Automation Report.” Erwin.com, 28 Jan. 2020. Web.

“Adaptive IT Governance.” Google search, 15 Nov. 2020.

“Adaptive IT Governance Framework.” CIO Index, 3 Nov. 2011. Accessed 15 Nov. 2020.

“Agile Governance Made Easy.” Agilist, n.d. Accessed 15 Nov. 2020.

“Automating Governance — Our Work.” Humanising Machine Intelligence, n.d. Accessed 15 Nov. 2020.

“Automation – Decisions.” IBM, 2020. Accessed 15 Oct. 2020.

Chang, Charlotte. “Accelerating Agile through effective governance.” Medium, 22 Sept. 2020. Web.

“COBIT 5: Enabling Processes.” ISACA, 2012. Web. Oct. 2016.

COBIT 2019. ISACA, Dec. 2018. Web.

Curtis, Blake. “The Value of IT Governance.” ISACA, 29 June 2020. Accessed 15 Nov. 2020.

De Smet, Aaron. “Three Keys to Faster, Better Decisions.” McKinsey & Company, 1 May 2019. Accessed 15 Nov. 2020.

“Decision Rules and Decision Analysis.” Navex Global, 2020. Web.

“Decisions Automation with Business Rules Management Solution.” Sumerge, 4 Feb. 2020. Accessed 15 Nov. 2020.

“DevGovOps – Key factors for IT governance for enterprises in a DevOps world.” Capgemini, 27 Sept. 2019. Web.

Eisenstein, Lena. “IT Governance Checklist.” BoardEffect, 19 Feb. 2020. Accessed 15 Nov. 2020.

“Establishing Effective IT and Data Governance.” Chartered Professional Accountants Canada, n.d. Accessed 15 Nov. 2020.

Gandzeichuk, Ilya. “Augmented Analytics: From Decision Support To Intelligent Decision-Making.” Forbes, 8 Jan. 2020. Accessed 15 Nov. 2020.

Georgescu, Vlad. “What Is IT Governance? Understanding From First Principles.” Plutora, 18 Oct. 2019. Web.

Goodwin, Bill. “IT Governance in the Era of Shadow IT.” ComputerWeekly, 5 Aug. 2014. Accessed 15 Nov. 2020.

“Governance of IT, OT and IOT.” ISACA Journal, 2019. Web.

Gritsenko, Daria, and Matthew Wood. “Algorithmic Governance: A Modes of Governance Approach.” Regulation & Governance, 10 Nov. 2020. Web.

Hansert, Philipp. “Adaptive IT Governance with Clausmark’s Bee4IT.” Bee360, 25 Oct. 2019. Accessed 15 Nov. 2020.

Havelock, Kylie. “What Does Good Product Governance Look Like?” Medium. 8 Jan. 2020. Web.

Haven, Dolf van der. “Governance of IT with ISO 38500 - A More Detailed View” LinkedIn article, 24 Oct. 2016. Accessed 15 Nov. 2020.

Hong, Sounman, and Sanghyun Lee. “Adaptive Governance and Decentralization: Evidence from Regulation of the Sharing Economy in Multi-Level Governance.” Government Information Quarterly, vol. 35, no. 2, April 2018, pp. 299–305. Web.

ISACA. “Monthly Seminar & Networking Dinner: CIO Dashboard.” Cvent, Feb. 2012. Accessed 15 Nov. 2020.

ISO/IEC 38500, ISO, 2018 and ongoing.

“IT Governance.” Kenway Consulting, n.d. Accessed 15 Nov. 2020.

“IT Governance in the Age of COVID 19.” Union of Arab Banks Webinar, 19-21 Oct. 2020. Accessed 15 Nov. 2020.

Jaffe, Dennis T. “Introducing the Seven Pillars of Governance.” Triple Pundit, 15 Nov. 2011. Accessed 15 Nov. 2020.

Janssen, Marijn, and Haiko van der Voort. “Agile and Adaptive Governance in Crisis Response: Lessons from the COVID-19 Pandemic.” International Journal of Information Management, vol. 55, December 2020. Web.

Jodya, Tiffany. “Automating Enterprise Governance within Delivery Pipelines.” Harness.io, 14 May 2020. Web.

Kumar, Sarvesh. “AI-Based Decision-Making Automation.” Singular Intelligence, 17 June 2019. Web.

“Lean IT Governance.” Disciplined Agile, n.d. Accessed 15 Nov. 2020.

Lerner, Mark. “Government Tech Projects Fail by Default. It Doesn’t Have to Be This Way.” Belfer Center for Science and International Affairs, 21 Oct. 2020. Accessed 15 Nov. 2020.

Levstek, Aleš, Tomaž Hovelja, and Andreja Pucihar. “IT Governance Mechanisms and Contingency Factors: Towards an Adaptive IT Governance Model.” Organizacija, vol. 51, no. 4, Nov. 2018. Web.

Maccani, Giovanni, et al. “An Emerging Typology of IT Governance Structural Mechanisms in Smart Cities.” Government Information Quarterly, vol. 37, no. 4, Oct. 2020. Web.

Magowan, Kirstie. “IT Governance vs IT Management: Mastering the Differences.” BMC Blogs, 18 May 2020. Accessed 15 Nov. 2020.

Mazmanian, Adam. “Is It Time to Rethink IT Governance? ” Washington Technology, 26 Oct. 2020. Accessed 15 Nov. 2020.

Mukherjee, Jayanto. “6 Components of an Automation (DevOps) Governance Model.” Sogeti, n.d. Accessed 15 Nov. 2020.

Ng, Cindy. “The Difference Between Data Governance and IT Governance.” Inside Out Security, updated 17 June 2020. Web.

Pearson, Garry. “Agile or Adaptive Governance Required?” Taking Care of the Present (blog), 30 Oct. 2020. Accessed 15 Nov. 2020.

Peregrine, Michael, et al. “The Long-Term Impact of the Pandemic on Corporate Governance.” Harvard Law School Forum on Corporate Governance, 16 July 2020. Web.

Raymond, Louis, et al. “Determinants and Outcomes of IT Governance in Manufacturing SMEs: A Strategic IT Management Perspective.” International Journal of Accounting Information Systems, vol. 35, December 2019. Web.

Rentrop, Christopher. “Adaptive IT Governance – Foundation of a Successful Digitalization.” Business IT Cooperation Coordination Controlling (blog). May 2, 2018. Web.

Schultz, Lisen, et al. “Adaptive Governance, Ecosystem Management, and Natural Capital.” Proceedings of the National Academy of Sciences, vol. 112, no. 24, 2015, pp. 7369–74. Web.

Selig, Gad J. Implementing IT Governance: A Practical Guide to Global Best Practices in IT Management. Van Haren Publishing, 2008. Accessed 15 Nov. 2020.

Sharma, Chiatan. “Rule Governance for Enterprise-Wide Adoption of Business Rules: Why Does a BRMS Implementation Need a Governance Framework?” Business Rules Journal, vol. 13, no. 4, April 2012. Accessed 15 Nov. 2020.

Smallwood, Robert. “Information Governance, IT Governance, Data Governance – What’s the Difference?” The Data Administration Newsletter, 3 June 2020. Accessed 15 Nov. 2020.

Snowden, Dave. "Cynefin – weaving sense-making into the fabric of our world", Cognitive Edge, 20 October 2020.

“The Place of IT Governance in the Enterprise Governance.” Institut de la Gouvernance des Systemes d’Information, 2005. Accessed 15 Nov. 2020.

Thomas, Mark. “Demystifying IT Governance Roles in a Dynamic Business Environment.” APMG International, 29 Oct. 2020. Webinar. Accessed 15 Nov. 2020.

“The Four Pillars of Governance Best Practice.” The Institute of Directors in New Zealand, 4 Nov. 2019. Web.

Wang, Cancan, Rony Medaglia, and Lei Zheng. “Towards a Typology of Adaptive Governance in the Digital Government Context: The Role of Decision-Making and Accountability.” Government Information Quarterly, vol. 35, no. 2, April 2018, pp. 306–22.

Westland, Jason. “IT Governance: Definitions, Frameworks and Planning.” ProjectManager.com, 17 Dec. 2019. Web.

Wilkin, Carla L., and Jon Riddett. “IT Governance Challenges in a Large Not-for-Profit Healthcare Organization: The Role of Intranets.” Electronic Commerce Research vol. 9, no. 4, 2009, pp. 351-74. Web.

Zalnieriute, Monika, et al. “The Rule of Law and Automation of Government Decision Making.” Modern Law Review, 25 Feb. 2019. Web.

Application Maintenance

  • Buy Link or Shortcode: {j2store}30|cart{/j2store}
  • Related Products: {j2store}30|crosssells{/j2store}
  • member rating overall impact: 10.0/10
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Applications
  • Parent Category Link: /applications

The challenge

  • If you work with application maintenance or operations teams that handle the "run" of your applications, you may find that the sheer volume and variety of requests create large backlogs.
  • Your business and product owners may want scrum or DevOps teams to work on new functionality rather than spend effort on lifecycle management.
  • Increasing complexity and increasing reliance on technology may create unrealistic expectations for your maintenance teams. Business applications must be available around the clock, and new feature roadmaps cannot be side-tracked by maintenance.

Our advice

Insight

  • Improving maintenance focus may mean doing less work but create more value. Your teams need to be realistic about what commitments they take—balance maintenance with business value and risk levels.
  • Treat maintenance the same as any other development practice. Use the same intake and prioritization practices. Uphold the same quality standards.

Impact and results 

  • Justify the necessity of streamlined and regular maintenance. Understand each stakeholder's objectives and concerns, validate them against your staff's current state, processes, and technologies involved.
  • Maintenance and risk go hand in hand. And the business wants to move forward all the time as well. Strengthen your prioritization practice. Use a holistic view of the business and technical impacts, risks, urgencies across the maintenance needs and requests. That allows you to justify their respective positions in the overall development backlog. Identify opportunities to bring some requirements and features together.
  • Build a repeatable process with appropriate governance around it. Ensure that people know their roles and responsibilities and are held accountable.
  • Instill development best-practices into your maintenance processes.

The roadmap

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

Get started.

Read our executive brief to understand everyday struggles regarding application maintenance, the root causes, and our methodology to overcome these. We show you how we can support you.

Understand your maintenance priorities

Identify your stakeholders and understand their drivers.

  • Streamline Application Maintenance – Phase 1: Assess the Current Maintenance Landscape (ppt)
  • Application Maintenance Operating Model Template (doc)
  • Application Maintenance Resource Capacity Assessment (xls)
  • Application Maintenance Maturity Assessment (xls)

Define and employ maintenance governance

Identify the right level of governance appropriate to your company and business context for your application maintenance. That ensures that people uphold standards across maintenance practices.

  • Streamline Application Maintenance – Phase 2: Develop a Maintenance Release Schedule (ppt)

Enhance your prioritization practices

Most companies cannot do everything for all applications and systems. Build your maintenance triage and prioritization rules to safeguard your company, maximize business value generation and IT risks and requirements.

  • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

Streamline your maintenance delivery

Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

  • Streamline Application Maintenance – Phase 4: Streamline Maintenance Delivery (ppt)
  • Application Maintenance Business Case Presentation Document (ppt)

 

 

The First 100 Days as CISO

  • Buy Link or Shortcode: {j2store}248|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: 50 Average Days Saved
  • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • Parent Category Name: Security Strategy & Budgeting
  • Parent Category Link: /security-strategy-and-budgeting
  • Make a good first impression at your new job.
  • Obtain guidance on how you should approach the first 100 days.
  • Assess the current state of the security program and recommend areas of improvement and possible solutions.
  • Develop a high-level security strategy in three months.

Our Advice

Critical Insight

  • Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, however, the approach to the new position will be relatively the same.
  • Eighty percent of your time will be spent listening. The first 100 days of the CISO role is an information gathering exercise that will involve several conversations with different stakeholders and business divisions. Leverage this collaborative time to understand the business, its internal and external operations, and its people. Unequivocally, active listening will build company trust and help you to build an information security vision that reflects that of the business strategy.
  • Start “working” before you actually start the job. This involves finding out as much information about the company before officially being an employee. Investigate the company website and leverage available organizational documents and initial discussions to better understand your employer’s leadership, company culture ,and business model.

Impact and Result

  • Hit the ground running with Info-Tech’s ready-made agenda vetted by CISO professionals to impress your colleagues and superiors.
  • Gather details needed to understand the organization (i.e. people, process, technology) and determine the current state of the security program.
  • Track and assess high-level security gaps using Info-Tech’s diagnostic tools and compare yourself to your industry’s vertical using benchmarking data.
  • Deliver an executive presentation that shows key findings obtained from your security evaluation.

The First 100 Days as CISO Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why the first 100 days of being a CISO is a crucial time to be strategic. Review Info-Tech’s methodology and discover our five-step approach to CISO success.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Prepare

Review previous communications to prepare for your first day.

  • CISO Diary
  • Introduction Sheet

2. Build relationships

Understand how the business operates and develop meaningful relationships with your sphere of influence.

3. Inventory components of the business

Inventory company assets to know what to protect.

4. Assess security posture

Evaluate the security posture of the organization by leveraging Info-Tech’s IT Security diagnostic program.

  • Diagnostic Benchmarks: Security Governance & Management Scorecard
  • Diagnostic Benchmarks: Security Business Satisfaction Report

5. Deliver plan

Communicate your security vision to business stakeholders.

  • The First 100 Days as CISO Executive Presentation Template
  • The First 100 Days as CISO Executive Presentation Example
[infographic]

Map Your Business Architecture to Define Your Strategy

  • Buy Link or Shortcode: {j2store}579|cart{/j2store}
  • member rating overall impact: 9.4/10 Overall Impact
  • member rating average dollars saved: $357,799 Average $ Saved
  • member rating average days saved: 30 Average Days Saved
  • Parent Category Name: Strategy & Operating Model
  • Parent Category Link: /strategy-and-operating-model
  • Organizations need to innovate rapidly to respond to the changing forces in their industry, but their IT initiatives often fail to deliver meaningful outcomes.
  • Planners face challenges in understanding the relationships between the important customer-focused innovations they’re trying to introduce and the resources (capabilities) that make them possible, including applications, human resources, information, and processes. For example, are we risking the success of a new service offering by underpinning it with a legacy or manual solution?

Our Advice

Critical Insight

Successful execution of business strategy requires planning that:

  1. Accurately reflects organizational capabilities.
  2. Is traceable so all levels can understand how decisions are made.
  3. Makes efficient use of organizational resources.

To accomplish this, the business architect must engage stakeholders, model the business, and drive planning with business architecture.

  • Business architecture is often regarded as an IT function when its role and tools should be fixtures within the business planning and innovation practice.
  • Any size of organization – from start-ups to global enterprises -- can benefit from using a common language and modeling rigor to identify the opportunities that will produce the greatest impact and value.
  • You don’t need sophisticated modeling software to build an effective business architecture knowledgebase. In fact, the best format for engaging business stakeholders is intuitive visuals using business language.

Impact and Result

  • Execute more quickly on innovation and transformation initiatives.
  • More effectively target investments in resources and IT according to what goals and requirements are most important.
  • Identify problematic areas (e.g. legacy applications, manual processes) that hinder the business strategy and create inefficiencies in our information technology operation.

Map Your Business Architecture to Define Your Strategy Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Map Your Business Architecture Deck – A step-by-step document that walks you through how to properly engage business and IT in applying a common language and process rigor to build key capabilities required to achieve innovation and growth goals.

Build a structured, repeatable framework for both IT and business stakeholders to appraise the activities that deliver value to consumers; and assess the readiness of their capabilities to enable them.

  • Map Your Business Architecture to Define Your Strategy – Phases 1-3

2. Stakeholder Engagement Strategy Template – A best-of-breed template to help you build a clear, concise, and compelling strategy document for identifying and engaging stakeholders.

This template helps you ensure that your business architecture practice receives the resources, visibility, and support it needs to be successful, by helping you develop a strategy to engage the key stakeholders involved.

  • Stakeholder Engagement Strategy Template

3. Value Stream Map Template – A template to walk through the value streams that are tied to your strategic goals.

Record the complete value stream and decompose it into stages. Add a description of the expected outcome of the value stream and metrics for each stage.

  • Value Stream Map Template

4. Value Stream Capability Mapping Template – A template to define capabilities and align them to selected value streams.

Build a business capability model for the organization and map capabilities to the selected value stream.

  • Value Stream – Capability Mapping Template
[infographic]

Workshop: Map Your Business Architecture to Define Your Strategy

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Discover the Business Context

The Purpose

Identify and consult stakeholders to discover the business goals and value proposition for the customer.

Key Benefits Achieved

Engage stakeholders and SMEs in describing the business and its priorities and culture.

Identify focus for the areas we will analyze and work on.

Activities

1.1 Select key stakeholders

1.2 Plan for engaging stakeholders

1.3 Gather business goals and priorities

Outputs

Stakeholder roles

Engagement plan

Business strategy, value proposition

2 Define Value Streams

The Purpose

Describe the main value-adding activities of the business from the consumer’s point of view, e.g. provide product or service.

Key Benefits Achieved

Shared understanding of why we build resources and do what we do.

Starting point for analyzing resources and investing in innovation.

Activities

2.1 Define or update value streams

2.2 Decompose selected value stream(s) into value stages and identify problematic areas and opportunities

Outputs

Value streams for the enterprise

Value stages breakdown for selected value stream(s)

3 Build Business Capability Map

The Purpose

Describe all the capabilities that make up an organization and enable the important customer-facing activities in the value streams.

Key Benefits Achieved

Basis for understanding what resources the organization has and their ability to support its growth and success.

Activities

3.1 Define and describe all business capabilities (Level 1)

3.2 Decompose and analyze capabilities for a selected priority value stream.

Outputs

Business Capability Map (Level 1)

Business Capabilities Level 2 for selected value stream

4 Develop a Roadmap

The Purpose

Use the Business Capability Map to identify key capabilities (e.g. cost advantage creator), and look more closely at what applications or information or business processes are doing to support or hinder that critical capability.

Key Benefits Achieved

Basis for developing a roadmap of IT initiatives, focused on key business capabilities and business priorities.

Activities

4.1 Identify key capabilities (cost advantage creators, competitive advantage creators)

4.2 Assess capabilities with the perspective of how well applications, business processes, or information support the capability and identify gaps

4.3 Apply analysis tool to rank initiatives

Outputs

Business Capability Map with key capabilities: cost advantage creators and competitive advantage creators

Assessment of applications or business processes or information for key capabilities

Roadmap of IT initiatives

Further reading

Map Your Business Architecture to Define Your Strategy

Plan your organization’s capabilities for best impact and value.

Info-Tech Research Group

Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

35,000 members sharing best practices you can leverage Millions spent developing tools and templates annually Leverage direct access to over 100 analysts as an extension of your team Use our massive database of benchmarks and vendor assessments Get up to speed in a fraction of the time

Analyst perspective

Know your organization’s capabilities to build a digital and customer-driven culture.

Business architecture provides a holistic and unified view of:

  • All the organization’s activities that provide value to their clients (value streams).
  • The resources that make them possible and effective (capabilities, i.e. its employees, software, processes, information).
  • How they inter-relate, i.e. depend on and impact each other to help deliver value.

Without a business architecture it is difficult to see the connections between the business’s activities for the customer and the IT resources supporting them – to demonstrate that what we do in IT is customer-driven.

As a map of your business, the business architecture is an essential input to the digital strategy:

  • Develop a plan to transform the business by investing in the most important capabilities.
  • Ensure project initiatives are aligned with business goals as they evolve.
  • Respond more quickly to customer requirements and to disruptions in the industry by streamlining operations and information sharing across the enterprise.

Crystal Singh, Research Director, Data and Analytics

Crystal Singh
Research Director, Data and Analytics
Info-Tech Research Group

Andrea Malick, Research Director, Data and Analytics

Andrea Malick
Research Director, Data and Analytics
Info-Tech Research Group

Executive summary

Your Challenge Common Obstacles Info-Tech’s Approach

Organizations need to innovate rapidly to respond to ever-changing forces and demands in their industry. But they often fail to deliver meaningful outcomes from their IT initiatives within a reasonable time.

Successful companies are transforming, i.e. adopting fluid strategies that direct their resources to customer-driven initiatives and execute more quickly on those initiatives. In a responsive and digital organization, strategies, capabilities, information, people, and technology are all aligned, so work and investment are consistently allocated to deliver maximum value.

You don’t have a complete reference map of your organization’s capabilities on which to base strategic decisions.

You don’t know how to prioritize and identify the capabilities that are essential for achieving the organization’s customer-driven objectives.

You don’t have a shared enterprise vision, where everyone understands how the organization delivers value and to whom.

Begin important business decisions with a map of your organization – a business reference architecture. Model the business in the form of architectural blueprints.

Engage your stakeholders. Recognize the opportunity for mapping work, and identify and engage the right stakeholders.

Drive business architecture forward to promote real value to the organization. Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and prioritize projects.

Info-Tech Insight
Business architecture is the set of strategic planning techniques that connects organization strategy to execution in a manner that is accurate and traceable and promotes the efficient use of organizational resources.

Blueprint activities summary

Phase Purpose Activity Outcome
1. Business context:
Identify organization goals, industry drivers, and regulatory requirements in consultation with business stakeholders.
Identify forces within and outside the organization to consider when planning the focus and timing of digital growth, through conducting interviews and surveys and reviewing existing strategies. Business value canvas, business strategy on a page, customer journey
2. Customer activities (value stream):
What is the customer doing? What is our reason for being as a company? What products and services are we trying to deliver?
Define or update value streams, e.g. purchase product from supplier, customer order, and deliver product to customer. Value streams enterprise-wide (there may be more than one set of value streams, e.g. a medical school and community clinic)
Prioritize value streams:
Select key value streams for deeper analysis and focus.
Assess value streams. Priority value streams
Value stages:
Break down the selected value stream into its stages.
Define stages for selected value streams. Selected value stream stages
3. Business capability map, level 1 enterprise:
What resources and capabilities at a high level do we have to support the value streams?
Define or update the business capabilities that align with and support the value streams. Business capability map, enterprise-wide capabilities level 1
Business capability map, level 2 for selected area:
List resources and capabilities that we have at a more detailed level.
Define or update business capabilities for selected value stream to level 2. Business capability map, selected value stream, capability level 2
Heatmap Business Capability Map: Flag focus areas in supporting technology, applications, data and information.

Info-Tech’s workshop methodology

Day 1: Discover Business Context Day 2: Define Value Streams Day 3: Build Business Capability Map Day 4: Roadmap Business Architecture
Phase Steps

1.1 Collect corporate goals and strategies

1.2 Identify stakeholders

2.1 Build or update value streams

2.2 Decompose selected value stream into value stages and analyze for opportunities

3.1 Update business capabilities to level 1 for enterprise

3.2 For selected value streams, break down level 1 to level 2

3.3 Use business architecture to heatmap focus areas: technology, information, and processes

3.4 Build roadmap of future business architecture initiatives

Phase Outcomes
  • Organizational context and goals
  • Business strategy on a page, customer journey map, business model canvas
  • Roles and responsibilities
  • Value stream map and definitions
  • Selected value stream(s) decomposed into value stages
  • Enterprise business capabilities map to level 1
  • Business architecture to level 2 for prioritized value stream
  • Heatmap business architecture
  • Business architecture roadmap, select additional initiatives

Key concepts for this blueprint

INDUSTRY VALUE CHAIN DIGITAL TRANSFORMATION BUSINESS ARCHITECTURE
A high-level analysis of how the industry creates value for the consumer as an overall end-to-end process. The adoption of digital technologies to innovate and re-invent existing business, talent ,and operating models to drive growth, business value, and improved customer experience. A holistic, multidimensional business view of capabilities, end-to-end value, and operating model in relation to the business strategy.
INDUSTRY VALUE STREAM STRATEGIC OBJECTIVES CAPABILITY ASSESSMENTS
A set of activities, tasks, and processes undertaken by a business or a business unit across the entire end-to-end business function to realize value. A set of standard objectives that most industry players will feature in their corporate plans. A heat-mapping effort to analyze the maturity and priority of each capability relative to the strategic priorities that they serve.

Info-Tech’s approach

1 Understand the business context and drivers
Deepen your understanding of the organization’s priorities by gathering business strategies and goals. Talking to key stakeholders will allow you to get a holistic view of the business strategy and forces shaping the strategy, e.g. economy, workforce, and compliance.
2 Define value streams; understand the value you provide
Work with senior leadership to understand your customers’ experience with you and the ways your industry provides value to them.
Assess the value streams for areas to explore and focus on.
3 Customize the industry business architecture; develop business capability map
Work with business architects and enterprise architects to customize Info-Tech’s business architecture for your industry as an enterprise-wide map of the organization and its capabilities.
Extend the business capability map to more detail (Level 2) for the value stream stages you select to focus on.

Business architecture is a planning function that connects strategy to execution

Business architecture provides a framework that connects business strategy and IT strategy to project execution through a set of models that provide clarity and actionable insights. How well do you know your business?

Business architecture is:

  • Inter-disciplinary: Business architecture is a core planning activity that supports all important decisions in the organization, for example, organizational resources planning. It’s not just about IT.
  • Foundational: The best way to answer the question, “Where do we start?” or “Where is our investment best directed?”, comes from knowing your organization, what its core functions and capabilities are (i.e. what’s important to us as an organization), and where there is work to do.
  • Connecting: Digital transformation and modernization cannot work with siloes. Connecting siloes means first knowing the organization and its functions and recognizing where the siloes are not communicating.

Business architecture must be branded as a front-end planning function to be appropriately embedded in the organization’s planning process.

Brand business architecture as an early planning pre-requisite on the basis of maintaining clarity of communication and spreading an accurate awareness of how strategic decisions are being made.

As an organization moves from strategy toward execution, it is often unclear as to exactly how decisions pertaining to execution are being made, why priority is given to certain areas, and how the planning function operates.

The business architect’s primary role is to model this process and document it.

In doing so, the business architect creates a unified view as to how strategy connects to execution so it is clearly understood by all levels of the organization.

Business architecture is part of the enterprise architecture framework

Business Architecture
Business strategy map Business model canvas Value streams
Business capability map Business process flows Service portfolio
Data Architecture Application Architecture Infrastructure Architecture
Conceptual data model Application portfolio catalog Technology standards catalog
Logical data model Application capability map Technology landscape
Physical data model Application communication model Environments location model
Data flow diagram Interface catalog Platform decomposition diagram
Data lifecycle diagram Application use-case diagram Network computing / hardware diagram
Security Architecture
Enterprise security model Data security model Application security model

Business architecture is a set of shared and practical views of the enterprise

The key characteristic of the business architecture is that it represents real-world aspects of a business, along with how they interact.

Many different views of an organization are typically developed. Each view is a diagram that illustrates a way of understanding the enterprise by highlighting specific information about it:

  • Business strategy view captures the tactical and strategic goals that drive an organization forward.
  • Business capabilities view describes the primary business functions of an enterprise and the pieces of the organization that perform those functions.
  • Value stream view defines the end-to-end set of activities that deliver value to external and internal stakeholders.
  • Business knowledge view establishes the shared semantics (e.g. customer, order, and supplier) within an organization and relationships between those semantics (e.g. customer name, order date, supplier name) – an information map.
  • Organizational view captures the relationships among roles, capabilities, and business units, the decomposition of those business units into subunits, and the internal or external management of those units.

Business architect connects all the pieces

The business owns the strategy and operating model; the business architect connects all the pieces together.

R Business Architect (Responsible)
A Business Unit Leads (Accountable)
C Subject Matter Experts (Consulted)
– Business Lines, Operations, Data, Technology Systems & Infrastructure Leads
I Business Operators (Informed)
– Process, Data, Technology Systems & Infrastructure

Choose a key business challenge to address with business architecture

 Choose a key business challenge to address with business architecture

Picking the right project is critical to setting the tone for business architecture work in the organization.

Best practices for business architecture success

Consider these best practices to maintain a high level of engagement from key stakeholders throughout the process of establishing or applying business architecture.

Balance short-term cost savings with long-term benefits

Participate in project governance to facilitate compliance

Create a center of excellence to foster dialogue

Identify strategic business objectives

Value streams: Understand how you deliver value today

It is important to understand the different value-generating activities that deliver an outcome for and from your customers.

We do this by looking at value streams, which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

Our approach helps you to strengthen and transform those value streams that generate the most value for your organization.

Understand how you deliver value today

An organization can have more than one set of streams.
For example, an enterprise can provide both retail shopping and financial services, such as credit cards.

Define the organization’s value streams

  • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
  • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
  • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

Example: Value stream descriptions for the retail industry

Value Streams Create or Purchase the Product Manage Inventory Distribute Product Sell Product, Make Product Available to Customers
  • Product is developed before company sells it.
  • Make these products by obtaining raw materials from external suppliers or using their own resources.
  • Retailers purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
  • Retailer success depends on its ability to source products that customers want and are willing to buy.
  • Inventory products are tracked as they arrive in the warehouse, counted, stored, and prepared for delivery.
  • Estimate the value of your inventory using retail inventory management software.
  • Optimizing distribution activities is an important capability for retailers. The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
  • Proper supply chain management can not only reduce costs for retailers but drive revenues by enhancing shopping experiences.
  • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
  • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
  • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

Value streams describe your core business

Value streams describe your core business

Value streams – the activities we do to provide value to customers – require business capabilities.

Value streams are broken down further into value stages, for example, the Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

Think of value streams as the core operations: the reason for your organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services; a business capability that supports it is legal counsel.

Decompose the value stream into stages

The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

Each value stream should have a trigger or starting point and an end result for a client or receiver.

Decompose the value stream into stages

There should be measurable value or benefits at each stage. These are key performance indicators (KPIs). Spot problem areas in the stream.

Value streams usually fall into one of these categories:

  1. Fulfillment of products and services
  2. Manufacturing
  3. Software products
  4. Supporting value streams (procurement of supplies, product planning)

Value streams need capabilities

  • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.
  • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
  • There can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

Value streams need business capabilities

Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the value-add activities in the value stream. Business capabilities lie at the top layer of the business architecture:

  • They are the most stable reference for planning organizations.
  • They make strategy more tangible.
  • If properly defined, they can help overcome organizational silos.

Value streams need business capabilities

Example business capability map – Higher Education

A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

Example business capability map for: Higher Education

Example business capability map for Higher Education

Example business capability map – Local Government

Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

Example business capability map for: Local Government

Example business capability map for Local Government

Value streams need business capabilities

Value streams – the activities we do to provide value to customers – require business capabilities. Value streams are broken down further into value stages.

Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the activities in the value stage to spot opportunities and problems in delivering services and value.

Business processes fulfill capabilities. They are a step-by-step description of who is performing what to achieve a goal. Capabilities consist of networks of processes and the resources – people, technology, materials – to execute them.

Capability = Processes + Software, Infrastructure + People

Prioritize a value stream and identify its supporting capabilities

Prioritize your improvement objectives and business goals and identify a value stream to transform.

Align the business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).

Prioritize a value stream to transform based on the number of priorities aligned to a value stream, and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).

Decompose the selected value stream into value stages.

Align capabilities level 1 and 2 to value stages. One capability may support several value stages in the stream.

Build a business architecture for the prioritized value stream with a map of business capabilities up to level 2.

NOTE: We can’t map all capabilities all at once: business architecture is an ongoing practice; select key mapping initiatives each year based on business goals.

Prioritize a value stream and identify its supporting capabilities

Map business capabilities to Level 2

 Map business capabilities to Level 2

Map capabilities to value stage

Map capabilities to value stage

Business value realization

Business value defines the success criteria of an organization as manifested through organizational goals and outcomes, and it is interpreted from four perspectives:

  • Profit generation: The revenue generated from a business capability with a product that is enabled with modern technologies.
  • Cost reduction: The cost reduction when performing business capabilities with a product that is enabled with modern technologies.
  • Service enablement: The productivity and efficiency gains of internal business operations from products and capabilities enhanced with modern technologies.
  • Customer and market reach: The improved reach and insights of the business in existing or new markets.

Business Value Matrix

Value, goals, and outcomes cannot be achieved without business capabilities

Break down your business goals into strategic and achievable initiatives focused on specific value streams and business capabilities.

Business goals and outcomes

Accelerate the process with an industry business architecture

It’s never a good idea to start with a blank page.

The business capability map available from Info-Tech and with industry standard models can be used as an accelerator. Assemble the relevant stakeholders – business unit leads and product/service owners – and modify the business capability map to suit your organization’s context.

Acceleration path: Customize generic capability maps with the assistance of our industry analysts.

Accelerate the process with an industry business architecture

Identify goals and drivers

Consider organizational goals and industry forces when planning.

Business context Define value streams Build business capability map
1.1 Select key stakeholders
1.2 Collect and understand corporate goals
2.1 Update or define value streams
2.2 Decompose and analyze selected value stream
3.1 Build level 1 capability map
3.2 Build level 2 capability map
3.3 Heatmap capability map
3.4 Roadmap

Use inputs from business goals and strategies to understand priorities.

It is not necessary to have a comprehensive business strategy document to start – with key stakeholders, the business architect should be able to gather a one-page business value canvas or customer journey.

Determine how the organization creates value

Begin the process by identifying and locating the business mission and vision statements.

What is business context?

“The business context encompasses an understanding of the factors impacting the business from various perspectives, including how decisions are made and what the business is ultimately trying to achieve. The business context is used by IT to identify key implications for the execution of its strategic initiatives.”

Source: Businesswire, 2018

Identify the key stakeholders who can help you promote the value of business architecture

First, as the CIO, you must engage executive stakeholders and secure their support.
Focus on key players who have high power and high interest in business architecture.

Engage the stakeholders who are impacted the most and have the power to impede the success of business architecture.

For example, if the CFO – who has the power to block funding – is disengaged, business architecture will be put at risk.

Use Info-Tech’s Stakeholder Power Map Template to help prioritize time spent with stakeholders.

Sample power map

Identify the key stakeholders concerned with the business architecture project

A business architecture project may involve the following stakeholders:

Business architecture project stakeholders

You must identify who the stakeholders are for your business architecture work.

Think about:

  • Who are the decision makers and key influencers?
  • Who will impact the business architecture work? Who will the work impact?
  • Who has vested interest in the success or failure of the practice?
  • Who has the skills and competencies necessary to help us be successful?

Avoid these common mistakes:

  • Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
  • Don’t ignore subject-matter experts on either the business or IT side. You will need to consider both.

1.1 Identify and assemble key stakeholders

1-3 hours

Build an accurate depiction of the business.

  1. It is important to make sure the right stakeholders participate in this exercise. The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.
  2. Consider:
    1. Who are the decision makers and key influencers?
    2. Who will impact the business capability work? Who has a vested interest in the success or failure of the outcome?
    3. Who has the skills and competencies necessary to help you be successful?
  3. Avoid:
    1. Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
    2. Don’t ignore subject matter experts on either the business or IT side. You will need to consider both.
Input Output
  • List of who is accountable for key business areas and decisions
  • Organizational chart
  • List of who has decision-making authority
  • A list of the key stakeholders
Materials Participants
  • Whiteboard/Flip Charts
  • Modeling software (e.g. Visio, ArchiMate)
  • Business capability map industry models
  • CIO
  • Enterprise/Business Architect
  • Business Analysts
  • Business Unit Leads
  • Departmental Executives & Senior Managers

Conduct interviews with the business to gather intelligence for strategy

Talking to key stakeholders will allow you to get a holistic view of the business strategy.

Stakeholder interviews provide holistic view of business strategy

Build a strategy on a page through executive interviews and document reviews

Understanding the business mandate and priorities ensures alignment across the enterprise.

A business strategy must articulate the long-term destination the business is moving into. This illustration shapes all the strategies and activities in every other part of the business, including what IT capabilities and resources are required to support business goals. Ultimately, the benefits of a well-defined business strategy increase as the organization scales and as business units or functions are better equipped to align the strategic planning process in a manner that reflects the complexity of the organization.

Using the Business Strategy on a Page canvas, consider the questions in each bucket to elicit the overall strategic context of the organization and uncover the right information to build your digital strategy. Interview key executives including your CEO, CIO, CMO, COO, CFO, and CRO, and review documents from your board or overall organizational strategy to uncover insights.

Info-Tech Insight
A well-articulated and clear business strategy helps different functional and business units work together and ensures that individual decisions support the overall direction of the business.

Focus on business value and establish a common goal

Business architecture is a strategic planning function and the focus must be on delivering business value.

Examples business objectives:

  • Digitally transform the business, redefining its customer interactions.
  • Identify the root cause for escalating customer complaints and eroding satisfaction.
  • Identify reuse opportunities to increase operational efficiency.
  • Identify capabilities to efficiently leverage suppliers to handle demand fluctuations.

Info-Tech Insight
CIOs are ideally positioned to be the sponsors of business architecture given that their current top priorities are digital transformation, innovation catalyzation, and business alignment.

1.2 Collect and understand business objectives

1-3 hours

Having a clear understanding of the business is crucial to executing on the strategic IT initiatives.

  1. Discover the strategic CIO initiatives your organization will pursue:
  • Schedule interviews.
  • Use the CIO Business Vision diagnostic or Business Context Discovery Tool.
  • Document the business goals.
  • Update and finalize business goals.
  • InputOutput
    • Existing business goals and strategies
    • Existing IT strategies
    • Interview findings
    • Diagnostic results
    • List of business goals
    • Strategy on a page
    • Business model canvas
    • Customer journey
    MaterialsParticipants
    • CIO Business Vision diagnostic
    • Interview questionnaire
    • CIO
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • Departmental Executives & Senior Managers

    CIO Business Vision Diagnostic

    CEO

    Vision

    Where do you want to go?
    What is the problem your organization is addressing?

    Mission/Mandate

    What do you do?
    How do you do?
    Whom do you do it for?

    Value Streams

    Why are you in business? What do you do?
    What products and services do you provide?
    Where has your business seen persistent demand?

    Key Products & Services

    What are your top three to five products and services?

    Key Customer Segments

    Who are you trying to serve or target?
    What are the customer segments that decide your value proposition?

    Value Proposition

    What is the value you deliver to your customers?

    Future Value Proposition

    What is your value proposition in three to five years’ time?

    Digital Experience Aspirations

    How can you create a more effective value stream?
    For example, greater value to customers or better supplier relationships.

    Business Resilience Aspirations

    How can you reduce business risks?
    For example, compliance, operational, security, or reputational.

    Sustainability (or ESG) Aspirations

    How can you deliver ESG and sustainability goals?

    Interview the following executives for each business goal area.

    CEO
    CRO
    COO

    Core Business Goals

    What are the core business goals to meet business objectives?

    Top Priorities & Initiatives

    What are the top initiatives and priorities over the planning horizon?

    Performance Insights/Metrics

    What do we need to achieve?
    How can the success be measured?

    CMO
    COO
    CFO

    Shared Business Goals

    What are the shared (operational) business goals to meet business objectives?

    Top Priorities & Initiatives

    What are the top initiatives and priorities over the planning horizon?

    Performance Insights/Metrics

    What do we need to achieve?
    How can the success be measured?

    CFO
    CIO
    COO
    CHRO

    Enabling Business Goals

    What are the enabling (supporting/enterprise) business goals to meet business objectives?

    Top Priorities & Initiatives

    What are the top initiatives and priorities over the planning horizon?

    Performance Insights/Metrics

    What do we need to achieve?
    How can the success be measured?

    Craft a strategy to increase stakeholder support and participation

    The BA practice’s supporters are potential champions who will help you market the value of BA; engage with them first to create positive momentum. Map out the concerns of each group of stakeholders so you can develop marketing tactics and communications vehicles to address them.

    Example Communication Strategy

    Stakeholder Concerns Tactics to Address Concerns Communication Vehicles Frequency
    Supporters
    (High Priority)
    • Build ability to execute BA techniques
    • Build executive support
    • Build understanding of how they can contribute to the success of the BA practice
    • Communicate the secured executive support
    • Help them apply BA techniques in their projects
    • Show examples of BA work (case studies)
    • Personalized meetings and interviews
    • Department/functional meetings
    • Communities of practice or centers of excellent (education and case studies)
    Bi-Monthly
    Indifferent
    (Medium Priority)
    • Build awareness and/or confidence
    • Feel like BA has nothing to do with them
    • Show quick wins and case studies
    • Centers of excellence (education and case studies
    • Use the support of the champions
    Quarterly
    Resistors
    (Medium Priority)
    • BA will cause delays
    • BA will step in their territory
    • BA’s scope is too broad
    • Lack of understanding
    • Prove the value of BA – case studies and metrics
    • Educate how BA complements their work
    • Educate them on the changes resulting from the BA practice’s work, and involve them in crafting the process
    • Individual meetings and interviews
    • Political jockeying
    • Use the support of the champions
    Tailored to individual groups

    1.3 Craft a strategy to increase stakeholder support and participation

    1-2 hours

    Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

    Think about the following:

    • What are your stakeholders’ concerns?
    • How can you address them?
    • How will you deliver the message?
    • How often will you deliver the message?

    Avoid these common mistakes:

    • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
    Input Output
  • Stakeholder Engagement Map
    • Stakeholder Communications Strategy
    Materials Participants
    • Stakeholder Engagement Strategy Template
    • A computer
    • A whiteboard and markers CIO
    • Business Architect
    • IT Department Leads

    Download the Stakeholder Engagement Strategy Template for this project.

    Engaging the right stakeholders

    CASE STUDY

    Industry
    Financial - Banking

    Source
    Anonymous

    Situation Complication Result

    To achieve success with the business architecture initiative, the bank’s CIO needed to put together a plan to engage the right stakeholders in the process.

    Without the right stakeholders, the initiative would suffer from inadequate information and thus would run the risk of delivering an ineffective solution.

    The bank’s culture was resistant to change and each business unit had its own understanding of the business strategy. This was a big part of the problem that led to decreasing customer satisfaction.

    The CIO needed a unified vision for the business architecture practice involving people, process, and technology that all stakeholders could support.

    Starting with enlisting executive support in the form of a business sponsor, the CIO identified the rest of the key stakeholders, in this case, the business unit heads, who were necessary to engage for the initiative.

    Once identified, the CIO promoted the benefits of business architecture to each of the business unit heads while taking stock of their individual needs.

    1.4 Develop a plan to engage key stakeholders

    1 hour

    Using your stakeholder power map as a starting point, focus on the three most important quadrants: those that contain stakeholders you must keep informed, those to keep satisfied, and the key players.

    Plot the stakeholders from those quadrants on a stakeholder engagement map.

    Think about the following:

    • Who are your resistors? These individuals will actively detract from project’s success if you don’t address their concerns.
    • Who is indifferent? These individuals need to be educated more on the benefits of business architecture to have an opinion either way.
    • Who are your supporters? These individuals will support you and spread your message if you equip them to do so.

    Avoid these common mistakes:

    • Do not jump to addressing resistor concerns first. Instead, equip your supporters with the info they need to help your cause and gain positive momentum before approaching resistors.
    InputOutput
    • Stakeholder Engagement Map
    • Stakeholder Communications Strategy
    MaterialsParticipants
    • Stakeholder Engagement Strategy Template
    • A computer
    • A whiteboard and markers
    • CIO
    • Business Architect
    • IT Department Leads

    Download the Stakeholder Engagement Strategy Template for this project.

    1.5 Craft a strategy to increase stakeholder support and participation

    1-2 hours

    Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

    Think about the following:

    • What are your stakeholders’ concerns?
    • How can you address them?
    • How will you deliver the message?
    • How often will you deliver the message?

    Avoid these common mistakes:

    • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
    InputOutput
    • Stakeholder Engagement Map
    • Stakeholder Communications Strategy
    MaterialsParticipants
    • Stakeholder Engagement Strategy Template
    • A computer
    • A whiteboard and markers
    • CIO
    • Business Architect
    • IT Department Leads

    Download the Stakeholder Engagement Strategy Template for this project.

    Define value streams

    Identify the core activities your organization does to provide value to your customers.

    Business context Define value streams Build business capability map

    1.1 Select key stakeholders
    1.2 Collect and understand corporate goals

    2.1 Update or define value streams
    2.2 Decompose and analyze selected value stream

    3.1 Build Level 1 capability map
    3.2 Build Level 2 capability map
    3.3 Heatmap capability map
    3.4 Roadmap

    This phase will walk you through the following activities:

    • Note: It is recommended that you gather and leverage relevant industry standard business architecture models you may have available to you. Example: Info-Tech Industry Business Architecture, BIZBOK, APQC.
    • Defining or updating the organization’s value streams.
    • Selecting priority value streams for deeper analysis.

    This phase involves the following participants:

    • Business Architect, Enterprise Architect
    • Relevant Business Stakeholder(s): Business Unit Leads, Departmental Executives, Senior Mangers, Business Analysts

    Define the organization’s value streams

    • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the marketplace by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
    • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
    • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

    Connect business goals to value streams

    Example strategy map and value stream

    Identifying value streams

    Value streams connect business goals to organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.

    There are several key questions to ask when endeavoring to identify value streams.

    Key Questions
    • Who are your customers?
    • What are the benefits we deliver to them?
    • How do we deliver those benefits?
    • How does the customer receive the benefits?

    Example: Value stream descriptions for the retail industry

    Value StreamsCreate or Purchase ProductManage InventoryDistribute ProductSell Product
    • Retailers need to purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
    • A retailer’s success depends on its ability to source products that customers want and are willing to buy.
    • In addition, they need to purchase the right amount and assortment of products based on anticipated demand.
    • The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
    • Inventory management includes tracking, ordering, and stocking products, e.g. raw materials, finished products, buffer inventory.
    • Optimizing distribution activities is important for retailers.
    • Proper supply chain management can not only reduce costs for retailers but also drive revenues by enhancing shopping experiences.
    • Distribution includes transportation, packaging and delivery.
    • As business becomes global, it is important to ensure the whole distribution channel is effective.
    • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
    • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
    • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

    Value streams describe your core business

    Value streams – the activities we do to provide value to customers – require business capabilities.

    Value streams are broken down further into value stages, for example, Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

    Think of value streams as the core operations, the reason for our organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services – a business capability that supports it is legal counsel.

    2.1 Define value streams

    1-3 hours

    Unify the organization’s perspective on how it creates value.

    1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
    2. Consider:
      1. How does the organization deliver those benefits?
      2. How does the customer receive the benefits?
      3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
    3. Avoid: Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
    Input Output
    • Business strategy or goals
    • Financial statements
    • Info-Tech’s industry-specific business architecture
    • List of organizational specific value streams
    • Detailed value stream definition(s)
    Materials Participants
    • Whiteboard / Kanban Board
    • Reference Architecture Template – See your Account Representative for details
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Info-Tech Archi Models
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    See your Info-Tech Account Representative for access to the Reference Architecture Template

    Decompose the value stream into stages

    The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

    Each value stream should have a trigger or starting point and an end result for a client or receiver.

    Decompose the value stream into stages

    There should be measurable value or benefits at each stage.
    These are key performance indicators (KPIs).
    Spot problem areas in the stream.

    Value streams usually fall into one of these categories:

    1. Fulfillment of products and services
    2. Manufacturing
    3. Software products
    4. Supporting value streams (procurement of supplies, product planning)

    Value stream and value stages examples

    Customer Acquisitions
    Identify Prospects > Contact Prospects > Verify Interests

    Sell Product
    Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

    Product Delivery
    Confirm Order > Plan Load > Receive Warehouse > Fill Order > Ship Order > Deliver Order > Invoice Customer

    Product Financing
    Initiate Loan Application > Decide on Application > Submit Documents > Review & Satisfy T&C > Finalize Documents > Conduct Funding > Conduct Funding Audits

    Product Release
    Ideate > Design > Build > Release

    Sell Product is a value stream, made up of value stages Identify options, Evaluate options, and so on.

    2.2 Decompose selected value streams

    1-3 hours

    Once we have a good understanding of our value streams, we need to decide which ones to focus on for deeper analysis and modeling, e.g. extend the business architecture to more detailed level 2 capabilities.

    Organization has goals and delivers products or services.

    1. Identify which value propositions are most important, e.g. be more productive or manage money more simply.
    2. Identify the value stream(s) that create the value proposition.
    3. Break the selected value stream into value stages.
    4. Analyze value stages for opportunities.

    Practical Guide to Agile Strategy Execution

    InputOutput
    • Value stream maps and definitions
    • Business goals, business model canvas, customer journey (value proposition) Selected value streams decomposed into value stages
    • Analysis of selected value streams for opportunities
    • Value stream map
    MaterialsParticipants
    • Whiteboard / Kanban Board
    • Reference Architecture Template – See your Account Representative for details
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Build your value stream one layer at a time to ensure clarity and comprehensiveness

    The first step of creating a value stream is defining it.

    • In this step, you create the parameters around the value stream and document them in a list format.
    • This allows you to know where each value stream starts and ends and the unique value it provides.

    The second step is the value stream mapping.

    • The majority of the mapping is done here where you break down your value stream into each of its component stages.
    • Analysis of these stages allows for a deeper understanding of the value stream.
    • The mapping layer connects the value stream to organizational capabilities.

    Define the value streams that are tied to your strategic goals and document them in a list

    Title

    • Create a title for your value stream that indicates the value it achieves.
    • Ensure your title is clear and will be understood the same way across the organization.
    • The common naming convention for value streams is to use nouns, e.g. product purchase.

    Scope

    • Determine the scope of your value stream by defining the trigger to start the value stream and final value delivered to end the value stream.
    • Be precise with your trigger to ensure you do not mistakenly include actions that would not trigger your value stream.
    • A useful tip is creating a decision tree and outlining the path that results in your trigger.

    Objectives

    • Determine the objectives of the value stream by highlighting the outcome it delivers.
    • Identify the desired outcomes of the value stream from the perspective of your organization.

    Example Value Streams List

    Title Scope Objectives
    Sell Product From option identification to payment Revenue Growth

    Create a value stream map

    A Decompose the Value Stream Into Stages B Add the Customer Perspective
    • Determine the different stages that comprise the value stream.
    • Place the stages in the correct order.
    • Outline the likely sentiment and meaningful needs of the customer at each value stage.
    C Add the Expected Outcome D Define the Entry and Exit Criteria
    • Define the desired outcome of each stage from the perspective of the organization.
    • Define both the entry and exit criteria for each stage.
    • Note that the entry criteria of the first stage is what triggers the value stream.
    E Outline the Metrics F Assess the Stages
    • For each stage of the value stream, outline the metrics the organization can use to identify its ability to attain the desired outcome.
    • Assess how well each stage of the value stream is performing against its target metrics and use this as the basis to drill down into how/where improvements can be made.

    Decompose the value stream into its value stages

    The first step in creating a value stream map is breaking it up into its component stages.

    The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream.

    Illustration of decomposing value stream into its value stages

    The Benefit
    Segmenting your value stream into individual stages will give you a better understanding of the steps involved in creating value.

    Connect the stages of the value stream to a specific customer perspective

    Example of a sell product value stream

    The Benefit
    Adding the customer’s perspective will inform you of their priorities at each stage of the value stream.

    Connect the stages of the value stream to a desired outcome

    Example of a sell product value stream

    The Benefit
    Understanding the organization’s desired outcome at each stage of the value stream will help set objectives and establish metrics.

    Define the entry and exit criteria of each stage

    Example of entry and exit criteria for each stage

    The Benefit
    Establishing the entry and exit criteria for each stage will help you understand how the customer experience flows from one end of the stream to the other.

    Outline the key metric(s) for each stage

    Outline the key metrics for each stage

    The Benefit
    Setting metrics for each stage will facilitate the tracking of success and inform the business architecture practitioner of where investments should be made.

    Example value stream map: Sell Product

    Assess the stages of your value stream map to determine which capabilities to examine further

    To determine which specific business capabilities you should seek to assess and potentially refine, you must review performance toward target metrics at each stage of the value stream.

    Stages that are not performing to their targets should be examined further by assessing the capabilities that enable them.

    Value Stage Metric Description Metric Target Current Measure Meets Objective?
    Evaluate Options Number of Product Demonstrations 12,000/month 9,000/month No
    Identify Options Google Searches 100K/month 100K/month Yes
    Identify Options Product Mentions 1M/month 1M/month Yes
    Website Traffic (Hits)
    Average Deal Size
    Number of Deals
    Time to Complete an Order
    Percentage of Invoices Without Error
    Average Time to Acquire Payment in Full

    Determine the business capabilities that support the value stage corresponding with the failing metric

    Sell Product

    Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

    The value stage(s) that doesn’t meet its objective metrics should be examined further.

    • This is done through business capability mapping and assessment.
    • Starting at the highest level (level 0) view of a business, the business architecture practitioner must drill down into the lower level capabilities that support the specific value stage to diagnose/improve an issue.

    Info-Tech Insight
    In the absence of tangible metrics, you will have to make a qualitative judgement about which stage(s) of the value stream warrant further examination for problems and opportunities.

    Build business capability map

    Align supporting capabilities to priority activities.

    Business context Define value streams Build business capability map
    1.1 Select key stakeholders
    1.2 Collect and understand corporate goals
    2.1 Update or define value streams
    2.2 Decompose and analyze selected value stream
    3.1 Build Level 1 capability map
    3.2 Build Level 2 capability map
    3.3 Heatmap capability map
    3.4 Roadmap

    This step will walk you through the following activities:

    • Determine which business capabilities support value streams
    • Accelerate the process with an industry reference architecture
    • Validate the business capability map
    • Establish level 2 capability

    This step involves the following participants:

    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Outcomes of this step

  • A validated level 1 business capability map
  • Level 2 capabilities for selected value stream(s)
  • Heatmapped business capability map
  • Business architecture initiatives roadmap
  • Develop a business capability map – level 1

    • Business architecture consists of a set of techniques to create multiple views of an organization; the primary view is known as a business capability map.
    • A business capability defines what a business does to enable value creation and achieve outcomes, rather than how. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome. Business capabilities should not be defined as organizational units and are typically longer lasting than organizational structures.
    • A business capability mapping process should begin at the highest-level view of an organization, the level 1, which presents the entire business on a page.
    • An effective method of organizing business capabilities is to split them into logical groupings or categories. At the highest level, capabilities are either “core” (customer-facing functions) or “enabling” (supporting functions).
    • As a best practice, Info-Tech recommends dividing business capabilities into the categories illustrated to the right.

    The Business Capability Map is the primary visual representation of the organization’s key abilities or services that are delivered to stakeholders. This model forms the basis of strategic planning discussions.

    Example of a business capability map

    Example business capability map – Higher Education

    A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

    Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

    Example business capability map for: Higher Education

    Example business capability map for higher education

    Example business capability map – Local Government

    A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

    Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

    Example business capability map for: Local Government

    Example business capability map for local government

    Map capabilities to value stage

    Example of a value stage

    Source: Lambert, “Practical Guide to Agile Strategy Execution”

    3.1 Build level 1 business capability map

    1-3 hours

    1. Analyze the value streams to identify and describe the organization’s capabilities that support them. This stage requires a good understanding of the business and will be a critical foundation for the business capability map. Use the reference business architecture’s business capability map for your industry for examples of level 1 and 2 business capabilities and the capability map template to work in.
    2. Avoid:
      1. Don’t repeat capabilities. Capabilities are typically mutually exclusive activities.
      2. Don’t include temporary initiatives. Capabilities should be stable over time. The people, processes, and technologies that support capabilities will change continuously.

    Ensure you engage with the right stakeholders:

    Don’t waste your efforts building an inaccurate depiction of the business: The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.

    It is challenging to develop a common language that everyone will understand and be able to apply. Invest in the time to ensure the right stakeholders are brought into the fold and bring their business area expertise and understanding to the table.

    InputOutput
    • Existing business capability maps
    • Value stream map
    • Info-Tech’s industry-specific business architecture
    • Level 1 business capability map for enterprise
    MaterialsParticipants
    • Whiteboard
    • Reference Architecture Template – See your Account Representative for details
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Archi Models
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Prioritize one value stream and build a business architecture to level 2 capabilities

    Prioritize your innovation objectives and business goals, and identify a value stream to transform.

    Align the innovation goals and business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).
    Prioritize a value stream to transform based on the number of priorities aligned to a value stream and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).
    Working alongside a business or enterprise architect, build a reference architecture for the prioritized value stream up to level 2.

    Example of a value stream to business architecture level 2 capabilities

    Info-Tech Insight
    To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value (EBITDA earnings).

    From level 1 to level 2 business capabilities

    Example moving from level 1 to level 2 business capabilities

    3.2 Build level 2 business capability map

    1-3 hours

    It is only at level 2 and further that we can pinpoint the business capabilities – the exact resources, whether applications or data or processes – that we need to focus on to realize improvements in the organization’s performance and customer experience.

    1. Gather industry reference models and any existing business capability maps.
    2. For the selected value stream, further break down its level 1 business capabilities into level 2 capabilities.
    3. You can often represent the business capabilities on a single page, providing a holistic visual for decision makers.
    4. Use meaningful names for business capabilities so that planners, stakeholders, and subject matter experts can easily search the map.
    InputOutput
    • Existing business capability maps
    • Value stream map
    • Info-Tech’s industry-specific business architecture
    • Level 1 business capability map
    • Level 2 Business Capability Map for selected Value Stream
    MaterialsParticipants
    • Whiteboard
    • Reference Architecture Template – See your Account Representative for details.
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Archi Models
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

    3.3 Heatmap business capability map

    1-3 hours

    Determine the organization’s key capabilities.

    1. Determine cost advantage creators. If your organization has a cost advantage over competitors, the capabilities that enable it should be identified and prioritized. Highlight these capabilities and prioritize the programs that support them.
    2. Determine competitive advantage creators. If your organization does not have a cost advantage over competitors, determine if it can deliver differentiated end-customer experiences. Once you have identified the competitive advantages, understand which capabilities enable them. These capabilities are critical to the success of the organization and should be highly supported.
    3. Define key future state capabilities. In addition to the current and competitive advantage creators, the organization may have the intention to enhance new capabilities. Discuss and select the capabilities that will help drive the attainment of future goals.
    4. Assess how well information, applications, and processes support capabilities.
    InputOutput
    • Business capability map
    • Cost advantage creators
    • Competitive advantage creators
    • IT and business assessments
    • Key business capabilities
    • Business process review
    • Information assessment
    • Application assessment
    • List of IT implications
    MaterialsParticipants
    • Whiteboard
    • Reference Architecture Template – See your Account Representative for details.
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Archi Models
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

    Business capability map: Education

    Illustrative example of a business capability map for education

    Define key capabilities

    Illustrative example of Define key capabilities

    Note: Illustrative Example

    Business process review

    Illustrative example of a business process review

    Note: Illustrative Example

    Information assessment

     Illustrative example of an Information assessment

    Note: Illustrative Example

    Application assessment

     Illustrative example of an Application assessment

    Note: Illustrative Example

    MoSCoW analysis for business capabilities

     Illustrative example of a MoSCoW analysis for business capabilities

    Note: Illustrative Example

    Ranked list of IT implications

    MoSCoW Rank IT Implication Value Stream Impacted Comments/Actions
    M [Implication] [Value Stream]
    M [Implication] [Value Stream]
    M [Implication] [Value Stream]
    S [Implication] [Value Stream]
    S [Implication] [Value Stream]
    S [Implication] [Value Stream]
    C [Implication] [Value Stream]
    C [Implication] [Value Stream]
    C [Implication] [Value Stream]
    W [Implication] [Value Stream]
    W [Implication] [Value Stream]
    W [Implication] [Value Stream]

    3.4 Roadmap business architecture initiatives

    1-3 hours

    Unify the organization’s perspective on how it creates value.

    1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
    2. Consider:
      1. How does the organization deliver those benefits?
      2. How does the customer receive the benefits?
      3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
    3. Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
    InputOutput
    • Existing business capability maps
    • Value stream map
    • Info-Tech’s industry-specific business architecture
    • Level 1 business capability map
    • Heatmapped business capability map
    MaterialsParticipants
    • Whiteboard
    • Reference Architecture Template – See your Account Representative for details.
    • Other industry standard reference architecture models: BIZBOK, APQC, etc.
    • Archi Models
    • Enterprise/Business Architect
    • Business Analysts
    • Business Unit Leads
    • CIO
    • Departmental Executives & Senior Managers

    Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

    Example: Business architecture deliverables

    Enterprise Architecture Domain Architectural View Selection
    Business Architecture Business strategy map Required
    Business Architecture Business model canvas Optional
    Business Architecture Value streams Required
    Business Architecture Business capability map Not Used
    Business Architecture Business process flows
    Business Architecture Service portfolio
    Data Architecture Conceptual data model
    Data Architecture Logical data model
    Data Architecture Physical data model
    Data Architecture Data flow diagram
    Data Architecture Data lineage diagram

    Tools and templates to compile and communicate your business architecture work

    The Industry Business Reference Architecture Template for your industry is a place for you to collect all of the activity outputs and outcomes you’ve completed for use in next-steps.

    Download the Industry Business Reference Architecture Template for your industry

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit Guided Implementation Workshop Consulting
    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks are used throughout all four options

    Research Contributors and Experts

    Name Role Organization
    Ibrahim Abdel-Kader Research Analyst, Data & Analytics Info-Tech Research Group
    Ben Abrishami-Shirazi Technical Counselor, Enterprise Architecture Info-Tech Research Group
    Andrew Bailey Consulting, Manager Info-Tech Research Group
    Dana Dahar Research & Advisory Director, CIO / Digital Business Strategy Info-Tech Research Group
    Larry Fretz VP Info-Tech Research Group
    Shibly Hamidur Enterprise Architect Toronto Transit Commission (TTC)
    Rahul Jaiswal Principal Research Director, Industry Info-Tech Research Group
    John Kemp Executive Counselor, Executive Services Info-Tech Research Group
    Gerald Khoury Senior Executive Advisor Info-Tech Research Group
    Igor Ikonnikov Principal Advisory Director, Data & Analytics Info-Tech Research Group
    Daniel Lambert VP Benchmark Consulting
    Milena Litoiu Principal Research Director, Enterprise Architecture Info-Tech Research Group
    Andy Neill AVP Data & Analytics, Chief Enterprise Architect Info-Tech Research Group
    Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
    Rick Pittman VP, Research Info-Tech Research Group
    Irina Sedenko Research Director, Data & Analytics Info-Tech Research Group

    Bibliography

    Andriole, Steve. “Why No One Understands Enterprise Architecture & Why Technology Abstractions Always Fail.” Forbes, 18 September 2020. Web.

    “APQC Process Classification Framework (PCF) – Retail.” American Productivity & Quality Center, 9 January 2019. Web.

    Brose, Cari. “Who’s on First? Architecture Roles and Responsibilities in SAFe.” Business Architecture Guild, 9 March 2017. Web.

    Burlton, Roger, Jim Ryne, and Daniel St. George. “Value Streams and Business Processes: The Business Architecture Perspective.” Business Architecture Guild, December 2019. Web.

    “Business Architecture: An overview of the business architecture professional.” Capstera, 5 January 2022. Web.

    Business Architecture Guild. “What is Business Architecture?” Business Analyst Mentor, 18 November 2022. Web.

    “Business Architecture Overview.” The Business Architecture Working Group of the Object Management Group (OMG), n.d. Web.

    “Delivering on your strategic vision.” The Business Architecture Guild, n.d. Web.

    Ecker, Grant. “Deploying business architecture.” LinkedIn, 11 November 2021. (Presentation)

    IRIS. “Retail Business Architecture Framework and Examples.” IRIS Business Architect, n.d. Web.

    IRIS. “What Is Business Architecture?” IRIS Business Architect, 8 May 2014. Web.

    IRIS. “Your Enterprise Architecture Practice Maturity 2021 Assessment.” IRIS Business Architect, 17 May 2021. Web.

    Khuen, Whynde. “How Business Architecture Breaks Down and Bridges Silos.” Biz Arch Mastery, January 2020. Web.

    Lambert, Daniel. “Practical Guide to Agile Strategy Execution.” 18 February 2020.

    Lankhorst, Marc, and Bernd Ihnen. “Mapping the BIZBOK Metamodel to the ArchiMate Language.” Bizzdesign, 2 September 2021. Web.

    Ramias, Alan, and Andrew Spanyi, “Demystifying the Relationship Between Processes and Capabilities: A Modest Proposal.” BPTrends, 2 February 2015. Web.

    Newman, Daniel. “NRF 2022: 4 Key Trends From This Year’s Big Show.” Forbes, 20 January 2022. Web.

    Research and Markets. “Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint.” Business Wire, 1 February 2018. Web.

    Sabanoglu, Tugba. “Retail market worldwide - Statistics & Facts.” Statista, 21 April 2022. Web.

    Spacey, John. “Capability vs Process.” Simplicable, 18 November 2016. Web.

    “The Definitive Guide to Business Capabilities.” LeanIX, n.d. Web.

    TOGAF 9. Version 9.1. The Open Group, 2011. Web.

    “What is Business Architecture?” STA Group, 2017. PDF.

    Whittie, Ralph. “The Business Architecture, Value Streams and Value Chains.” BA Institute, n.d. Web.

    Business Intelligence and Reporting

    • Buy Link or Shortcode: {j2store}6|cart{/j2store}
    • Related Products: {j2store}6|crosssells{/j2store}
    • member rating overall impact: 8.9/10
    • member rating average dollars saved: $45,792
    • member rating average days saved: 29
    • Parent Category Name: Data and Business Intelligence
    • Parent Category Link: /improve-your-core-processes/data-and-business-intelligence

    The challenge

    • Your business partners need an environment that facilitates flexible data delivery.
    • Your data and BI strategy must continuously adapt to new business realities and data sources to stay relevant.
    • The pressure to go directly to the solution design is high.  

    Our advice

    Insight

    • A BI initiative is not static. It must be treated as a living platform to adhere to changing business goals and objectives. Only then will it support effective decision-making.
    • Hear the voice of the business; that is the "B" in BI.
    • Boys and their toys... The solution to better intelligence often lies not in the tool but the BI practices.
    • Build a roadmap that starts with quick-wins to establish base support for your initiative.

    Impact and results 

    • Use the business goals and objectives to drive your BI initiatives.
    • Focus first on what you already have in your company's business intelligence landscape before investing in a new tool that will only complicate things.
    • Understand the core of what your users need by leveraging different approaches to pinpointing BI capabilities.
    • Create a roadmap that details the iterative deliveries of your business intelligence initiative. Show both the short and long term.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started

    Our concise executive brief shows why you should create or refresh your business intelligence (BI) strategy. We'll show you our methodology and the ways we can help you in handling this.

    Upon ordering you receive the complete guide with all files zipped.

    Understand your business context and BI landscape

    Understand critical business information and analyze your current business intelligence landscape.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 1: Understand the Business Context and BI Landscape (ppt)
    • BI Strategy and Roadmap Template (doc)
    • BI End-User Satisfaction Survey Framework (ppt)

    Evaluate your current business intelligence practices

    Assess your current maturity level and define the future state.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 2: Evaluate the Current BI Practice (ppt)
    • BI Practice Assessment Tool – Example 1 (xls)
    • BI Practice Assessment Tool – Example 2 (xls)

    Create your BI roadmap

    Create business intelligence focused initiatives for continuous improvement.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 3: Create a BI Roadmap for Continuous Improvement (ppt)
    • BI Initiatives and Roadmap Tool (xls)
    • BI Strategy and Roadmap Executive Presentation Template (ppt)

     

    Build an Application Department Strategy

    • Buy Link or Shortcode: {j2store}180|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $220,866 Average $ Saved
    • member rating average days saved: 34 Average Days Saved
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • Application delivery has modernized. There are increasing expectations on departments to deliver on organizational and product objectives with increasing velocity.
    • Application departments produce many diverse, divergent products, applications, and services with expectations of frequent updates and changes based on rapidly changing landscapes

    Our Advice

    Critical Insight

    • There is no such thing as a universal “applications department.” Unlike other domains of IT, there are no widely accepted frameworks that clearly outline universal best practices of application delivery and management.
    • Different software needs and delivery orientations demand a tailored structure and set of processes, especially when managing a mixed portfolio or multiple delivery methods.

    Impact and Result

    Understand what your department’s purpose is through articulating its strategy in three steps:

    • Determining your application department’s values, principles, and orientation.
    • Laying out the goals, objectives, metrics, and priorities of the department.
    • Building a communication plan to communicate your overall department strategy.

    Build an Application Department Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build an application department strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Take stock of who you are

    Consider and record your department’s values, principles, orientation, and capabilities.

    • Build an Application Department Strategy – Phase 1: Take Stock of Who You Are
    • Application Department Strategy Supporting Workbook

    2. Articulate your strategy

    Define your department’s strategy through your understanding of your department combined with everything that you do and are working to do.

    • Build an Application Department Strategy – Phase 2: Articulate Your Strategy
    • Application Department Strategy Template

    3. Communicate your strategy

    Communicate your department’s strategy to your key stakeholders.

    • Build an Application Department Strategy – Phase 3: Communicate Your Strategy

    Infographic

    Workshop: Build an Application Department Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Take Stock of Who You Are

    The Purpose

    Understand what makes up your application department beyond the applications and services provided.

    Key Benefits Achieved

    Articulating your guiding principles, values, capabilities, and orientation provides a foundation for expressing your department strategy.

    Activities

    1.1 Identify your team’s values and guiding principles.

    1.2 Define your department’s orientation.

    Outputs

    A summary of your department’s values and guiding principles

    A clear view of your department’s orientation and supporting capabilities

    2 Articulate Your Strategy

    The Purpose

    Lay out all the details that make up your application department strategy.

    Key Benefits Achieved

    A completed application department strategy canvas containing everything you need to communicate your strategy.

    Activities

    2.1 Write your application department vision statement.

    2.2 Define your application department goals and metrics.

    2.3 Specify your department capabilities and orientation.

    2.4 Prioritize what is most important to your department.

    Outputs

    Your department vision

    Your department’s goals and metrics that contribute to achieving your department’s vision

    Your department’s capabilities and orientation

    A prioritized roadmap for your department

    3 Communicate Your Strategy

    The Purpose

    Lay out your strategy’s communication plan.

    Key Benefits Achieved

    Your application department strategy presentation ready to be presented to your stakeholders.

    Activities

    3.1 Identify your stakeholders.

    3.2 Develop a communication plan.

    3.3 Wrap-up and next steps

    Outputs

    List of prioritized stakeholders you want to communicate with

    A plan for what to communicate to each stakeholder

    Communication is only the first step – what comes next?

    Proactively Identify and Mitigate Vendor Risk

    • Buy Link or Shortcode: {j2store}227|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • IT priorities are focused on daily tasks, pushing risk management to secondary importance and diverging from a proactive environment.
    • IT leaders are relying on an increasing number of third-party technology vendors and outsourcing key functions to meet the rapid pace of change within IT.
    • Risk levels can fluctuate over the course of the partnership, requiring manual process checks and/or automated solutions.

    Our Advice

    Critical Insight

    • Every IT vendor carries risks that have business implications. These legal, financial, security, and operational risks could inhibit business continuity and IT can’t wait until an issue arises to act.
    • Making intelligent decisions about risks without knowing what their financial impact will be is difficult. Risk impact must be quantified.
    • You don’t know what you don’t know, and what you don’t know, can hurt you. To find hidden risks, you must use a structured risk identification method.

    Impact and Result

    • A thorough risk assessment in the selection phase is your first line of defense. If you follow the principles of vendor risk management, you can mitigate collateral losses following an adverse event.
    • Make a conscious decision whether to accept the risk based on time, priority, and impact. Spend the required time to correctly identify and enact defined vendor management processes that determine spend categories and appropriately evaluate potential and preferred suppliers. Ensure you accurately assess the partnership potential.
    • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s most significant risks before they happen.

    Proactively Identify and Mitigate Vendor Risk Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how to create a vendor risk management program that minimizes your organization’s vulnerability and mitigates adverse scenarios.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Review vendor risk fundamentals and establish governance

    Review IT vendor risk fundamentals and establish a risk governance framework.

    • Proactively Identify and Mitigate Vendor Risk – Phase 1: Review Vendor Risk Fundamentals and Establish Governance
    • Vendor Risk Management Maturity Assessment Tool
    • Vendor Risk Management Program Manual
    • Risk Event Action Plan

    2. Assess vendor risk and define your response strategy

    Categorize, prioritize, and assess your vendor risks. Follow up with creating effective response strategies.

    • Proactively Identify and Mitigate Vendor Risk – Phase 2: Assess Vendor Risk and Define Your Response Strategy
    • Vendor Classification Model Tool
    • Vendor Risk Profile and Assessment Tool
    • Risk Costing Tool
    • Risk Register Tool

    3. Monitor, communicate, and improve IT vendor risk process

    Assign accountability and responsibilities to formalize ongoing risk monitoring. Communicate your findings to management and share the plan moving forward.

    • Proactively Identify and Mitigate Vendor Risk – Phase 3: Monitor, Communicate, and Improve IT Vendor Risk Process
    • Risk Report
    [infographic]

    Workshop: Proactively Identify and Mitigate Vendor Risk

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Prepare for the Workshop

    The Purpose

    To prepare the team for the workshop.

    Key Benefits Achieved

    Avoids delays and interruptions once the workshop is in progress.

    Activities

    1.1 Send workshop agenda to all participants.

    1.2 Prepare list of vendors and review any contracts provided by them.

    1.3 Review current risk management process.

    Outputs

    All necessary participants assembled

    List of vendors and vendor contracts

    Understanding of current risk management process

    2 Review Vendor Risk Fundamentals and Establish Governance

    The Purpose

    Review IT vendor risk fundamentals.

    Assess current maturity and set risk management program goals.

    Engage stakeholders and establish a risk governance framework.

    Key Benefits Achieved

    Understanding of organizational risk culture and the corresponding risk threshold.

    Obstacles to effective IT risk management identified.

    Attainable goals to increase maturity established.

    Understanding of the gap to achieve vendor risk readiness.

    Activities

    2.1 Brainstorm vendor-related risks.

    2.2 Assess current program maturity.

    2.3 Identify obstacles and pain points.

    2.4 Develop risk management goals.

    2.5 Develop key risk indicators (KRIs) and escalation protocols.

    2.6 Gain stakeholders’ perspective.

    Outputs

    Vendor risk management maturity assessment

    Goals for vendor risk management

    Stakeholders’ opinions

    3 Assess Vendor Risk and Define Your Response Strategy

    The Purpose

    Categorize vendors.

    Prioritize assessed risks.

    Key Benefits Achieved

    Risk events prioritized according to risk severity – as defined by the business.

    Activities

    3.1 Categorize vendors.

    3.2 Map vendor infrastructure.

    3.3 Prioritize vendors.

    3.4 Identify risk contributing factors.

    3.5 Assess risk exposure.

    3.6 Calculate expected cost.

    3.7 Identify risk events.

    3.8 Input risks into the Risk Register Tool.

    Outputs

    Vendors classified and prioritized

    Vendor risk exposure

    Expected cost calculation

    4 Assess Vendor Risk and Define Your Response Strategy (continued)

    The Purpose

    Determine risk threshold and contract clause relating to risk prevention.

    Identify and assess risk response actions.

    Key Benefits Achieved

    Thorough analysis has been conducted on the value and effectiveness of risk responses for high-severity risk events.

    Risk response strategies have been identified for all key risks.

    Authoritative risk response recommendations can be made to senior leadership.

    Activities

    4.1 Determine the threshold for (un)acceptable risk.

    4.2 Match elements of the contract to related vendor risks.

    4.3 Identify and assess risk responses.

    Outputs

    Thresholds for (un)acceptable risk

    Risk responses

    5 Monitor, Communicate, and Improve IT Vendor Risk Process

    The Purpose

    Communicate top risks to management.

    Assign accountabilities and responsibilities for risk management process.

    Establish monitoring schedule.

    Key Benefits Achieved

    Risk monitoring responsibilities are established.

    Transparent accountabilities and established ongoing improvement of the vendor risk management program.

    Activities

    5.1 Create a stakeholder map.

    5.2 Complete RACI chart.

    5.3 Establish the reporting schedule.

    5.4 Finalize the vendor risk management program.

    Outputs

    Stakeholder map

    Assigned accountability for risk management

    Established monitoring schedule

    Risk report

    Vendor Risk Management Program Manual

    Identify and Manage Financial Risk Impacts on Your Organization

    • Buy Link or Shortcode: {j2store}218|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • As vendors become more prevalent in organizations, organizations increasingly need to understand and manage the potential financial impacts of vendors’ actions.
    • It is only a matter of time until a vendor mistake impacts your organization. Make sure you are prepared to manage the adverse financial consequences.

    Our Advice

    Critical Insight

    • Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.
    • Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.

    Impact and Result

    • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
    • Prioritize and classify your vendors with quantifiable, standardized rankings.
    • Prioritize focus on your high-risk vendors.
    • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

    Identify and Manage Financial Risk Impacts on Your Organization Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify and Manage Financial Risk Impact on Your Organization Deck – Use the research to better understand the negative financial impacts of vendor actions.

    Use this research to identify and quantify the potential financial impacts of vendors’ poor performance. Use Info-Tech’s approach to look at the financial impact from various perspectives to better prepare for issues that may arise.

    • Identify and Manage Financial Risk Impacts on Your Organization Storyboard

    2. “What If” Financial Risk Impact Tool – Use this tool to help identify and quantify the financial impacts of negative vendor actions.

    By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

    • Financial Risk Impact Tool
    [infographic]

    Further reading

    Identify and Manage Financial Risk Impacts on Your Organization

    Good vendor management practices help organizations understand the costs of negative vendor actions.

    Analyst Perspective

    Vendor actions can have significant financial consequences for your organization.

    Photo of Frank Sewell, Research Director, Vendor Management, Info-Tech Research Group.

    Vendors are becoming more influential and essential to the operation of organizations. Often the sole risk consideration of a business is whether the vendor meets a security standard, but vendors can negatively impact organizations’ budgets in various ways. Fortunately, though inherent risk is always present, organizations can offset the financial impacts of high-risk vendors by employing due diligence in their vendor management practices to help manage the overall risks.

    Frank Sewell
    Research Director, Vendor Management
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    As vendors become more prevalent in organizations, organizations increasingly need to understand and manage the potential financial impacts of vendors’ actions.

    It is only a matter of time until a vendor mistake impacts your organization. Make sure you are prepared to manage the adverse financial consequences.

    Common Obstacles

    Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.

    Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.

    Info-Tech’s Approach

    Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.

    Prioritize and classify your vendors with quantifiable, standardized rankings.

    Prioritize focus on your high-risk vendors.

    Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

    Info-Tech Insight

    Companies without good vendor management risk initiatives will take on more risk than they should. Solid vendor management practices are imperative –organizations must evolve to ensure that vendors deliver services according to performance objectives and that risks are managed accordingly.

    Info-Tech’s multi-blueprint series on vendor risk assessment

    There are many individual components of vendor risk beyond cybersecurity.

    Cube with each multiple colors on each face, similar to a Rubix cube, and individual components of vendor risk branching off of it: 'Financial', 'Reputational', 'Operational', 'Strategic', 'Security', and 'Regulatory & Compliance'.

    This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

    Out of scope:
    This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

    Financial risk impact

    Potential losses to the organization due to financial risks

    In this blueprint, we’ll explore financial risks and their impacts.

    Identifying negative actions is paramount to assessing the overall financial impact on your organization, starting in the due diligence phase of the vendor assessment and continuing throughout the vendor lifecycle.

    Cube with each multiple colors on each face, similar to a Rubix cube, and the vendor risk component 'Financial' highlighted.

    Unbudgeted financial risk impact

    The costs of adverse vendor actions, such as a breach or an outage, are increasing. By knowing these potential costs, leaders can calculate how to avoid them throughout the lifecycle of the relationship.

    Loss of business represents the largest share of the breach

    38%

    Avg. $1.59M
    Global average cost of a vendor breach

    $4.2M

    Percentage of breaches in 2020 caused by business associates

    40.2%

    23.2% YoY
    (year over year)
    (Source: “Cost of a Data Breach Report 2021,” IBM, 2021) (Source: “Vendor Risk Management – A Growing Concern,” Stern Security, 2021)

    Example: Hospital IT System Outage

    Hospitals often rely on vendors to manage their data center environments but rarely understand the downstream financial impacts if that vendor fails to perform.

    For example, a vendor implements a patch out of cycle with no notice to the IT group. Suddenly all IT systems are down. It takes 12 hours for the IT teams to return systems to normal. The downstream impacts are substantial.

    • There is no revenue capture during outage (patient registration, payments).
      • The financial loss is significant, impacting cash on hand and jeopardizing future projects.
    • Clinicians cannot access the electronic health record (EHR) system and shift to downtime paper processes.
      • This can cause potential risks to patient health, such as unknown drug interactions.
      • This could also incur lawsuits, fines, and penalties.
    • Staff must manually add the paper records into the EHR after the incident is corrected.
      • Staff time is lost on creating paper records and overtime is required to reintroduce those records into EMR.
    • Staff time and overtime pay on troubleshooting and solving issues take away from normal operations and could cause delays, having downstream effects on the timing of other projects.

    Insight Summary

    Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.

    Insight 1 Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.

    Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space?

    Insight 2 Financial impacts from other risk types deserve just as much focus as security alone, if not more.

    Examples include penalties and fines, loss of revenue due to operational impacts, vendor replacement costs, hidden costs in poorly understood contracts, and lack of contractual protections.

    Insight 3 There is always an inherent risk in working with a vendor, but organizations should financially quantify how much each risk may impact their budget.

    A significant concern for organizations is quantifying different types of risks. When a risk occurs, the financial losses are often poorly understood, with unbudgeted financial impacts.

    Three stages of vendor financial risk assessment

    Assess risk throughout the complete vendor lifecycle

    1. Pre-Relationship Due Diligence: The initial pre-relationship due diligence stage is a crucial point to establish risk management practices. Vendor management practices ensure that a potential vendor’s risk is categorized correctly by facilitating the process of risk assessment.
    2. Monitor & Manage: Once the relationship is in place, organizations should enact ongoing management efforts to ensure they are both getting their value from the vendor and appropriately addressing any newly identified risks.
    3. Termination: When the termination of the relationship arrives, the organization should validate that adequate protections that were established while forming a contract in the pre-relationship stage remain in place.

    Inherent risks from negative actions are pervasive throughout the entire vendor lifecycle. Collaboratively understanding those risks and working together to put proper management in place enables organizations to get the most value out of the relationship with the least amount of risk.

    Flowchart for 'Assessing Financial Risk Impacts', beginning with 'New Vendor' to 'Sourcing' to the six components of 'Vendor Management'. After a gamut of assessments such as ''What If' Game' one can either 'Accept' to move on to 'Pre-Relationship', 'Monitor & Manage', and eventually to 'Termination', or not accept and circle back to 'Sourcing'.

    Stage 1: Pre-relationship assessment

    Do these as part of your due diligence

    • Review and negotiate contract terms and conditions.
      • Ensure that you have the protections to make you whole in the event of an incident, in the event that another entity purchases the vendor, and throughout the entire lifecycle of your relationship with the vendor.
      • Make sure to negotiate your post-termination protections in the initial agreement.
    • Perform a due-diligence financial assessment.
      • Make sure the vendor is positioned in the market to be able to service your organization.
    • Perform an initial risk assessment.
      • Identify and understand all potential factors that may cause financial impacts to your organization.
      • Include total cost of ownership (TCO) and return of investment (ROI) as potential impact offsets.
    • Review case studies – talk to other customers.
      • Research who else has worked with the vendor to get “the good, the bad, and the ugly” stories to form a clear picture of a potential relationship with the vendor.
    • Use proofs of concept.
      • It is essential to know how the vendor and their solutions will work in the environment before committing resources and to incorporate them into organizational strategic plans.
    • Limit vendors’ ability to increase costs over the years. It is not uncommon for a long-term relationship to become more expensive than a new one over time when the increases are unmanaged.
    • Vendor audits can be costly and a significant distraction to your staff. Make sure to contractually limit them.
    • Many vendors enjoy significant revenue from unclear deliverables and vague expectations that lead to change requests at unknown rates – clarifying expectations and deliverables and demanding negotiated rate sheets before engagement will save budget and strengthen the relationship.

    Visit Info-Tech’s VMO ROI Calculator and Tracker

    The “what if” game

    1-3 hours

    Input: List of identified potential risk scenarios scored by likelihood and financial impact, List of potential management of the scenarios to reduce the risk

    Output: Comprehensive financial risk profile on the specific vendor solution

    Materials: Whiteboard/flip charts, Financial Risk Impact Tool to help drive discussion

    Participants: Vendor Management – Coordinator, IT Operations, Legal/Compliance/Risk Manager, Finance/Procurement

    Vendor management professionals are in an excellent position to collaboratively pull together resources across the organization to determine potential risks. By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

    1. Break into smaller groups (or if too small, continue as a single group).
    2. Use the Financial Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potential risks but manage the overall process to keep the discussion on track.
    3. Collect the outputs and ask the subject matter experts for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

    Download the Financial Risk Impact Tool

    Stage 2.1: Monitor the financial risk

    Ongoing monitoring activities

    Never underestimate the value of keeping the relationship moving forward.

    Examples of items and activities to monitor include;

    Stock photo of a worker being trained on a computer.
    • Fines
    • Data leaks
    • Performance
    • Credit monitoring
    • Viability/solvency
    • Resource capacity
    • Operational impacts
    • Regulatory penalties
    • Increases in premiums
    • Security breaches (infrastructure)

    Info-Tech Insight

    Many organizations do not have the resources to dedicate to annual risk assessments of all vendors.

    Consider timing ongoing risk assessments to align with contract renewal, when you have the most leverage with the vendor.

    Visit Info-Tech’s Risk Register Tool

    Stage 2.2: Manage the financial risk

    During the lifecycle of the vendor relationship

    • Renew risk assessments annually.
    • Focus your efforts on highly ranked risks.
    • Is there a new opportunity to negotiate?
    • Identify and classify individual vendor risk.
    • Are there better existing contracts in place?
    • Review financial health checks at the same time.
    • Monitor and schedule contract renewals and new service/module negotiations.
    • Perform business alignment meetings to reassess the relationship.
    • Ongoing operational meetings should be supplemental, dealing with day-to-day issues.
    • Develop performance metrics and hold vendors accountable to established service levels.
    Stock image of a professional walking an uneven line over the words 'Risk Management'.

    Stage 3: Termination

    An essential and often overlooked part of the vendor lifecycle is the relationship after termination

    • The risk of a vendor keeping your data for “as long as they want” is high.
      • Data retention becomes a “forever risk” in today’s world of cyber issues if you do not appropriately plan.
    • Ensure that you always know where data resides and where people are allowed to access that data.
      • If there is a regulatory need to house data only in specific locations, ensure that it is explicit in agreements.
    • Protect your data through language in initial agreements that covers what needs to happen when the relationship with the vendor terminates.
      • Typically, all the data that the vendor has retained is returned and/or destroyed at your sole discretion.
    Stock image of a sign reading 'Closure'.

    Related Info-Tech Research

    Stock photo of two co-workers laughing. Design and Build an Effective Contract Lifecycle Management Process
    • Achieve measurable savings in contract time processing, financial risk avoidance, and dollar savings
    • Understand how to identify and mitigate risk to save the organization time and money.
    Stock image of reports and file folders. Identify and Reduce Agile Contract Risk
    • Manage Agile contract risk by selecting the appropriate level of protections for an Agile project.
    • Focus on the correct contract clauses to manage Agile risk.
    Stock photo of three co-workers gathered around a computer screen. Jump Start Your Vendor Management Initiative
    • Vendor management must be an IT strategy. Solid vendor management is an imperative – IT organizations must develop capabilities to ensure that services are delivered by vendors according to service level objectives and that risks are mitigated according to the organization's risk tolerance.
    • Gain visibility into your IT vendor community. Understand how much you spend with each vendor and rank their criticality and risk to focus on the vendors you should be concentrating on for innovative solutions.

    Get really good at resilience

    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A

    Why be resilient?

    Well, your clients demand it. And it makes business sense; it is much cheaper to retain a client than to acquire new ones. By all means, always expand your client base; just don't make it a zero-sum game by losing clients because you cannot provide decent service. 

    Although the term has existed since the 17th century, it has only received legal attention since 2020. Now, several years later, the EU and the US require companies to prove their resilience.

    To understand what resilience is, please read our article on resilience

    What does it take to become really good at IT resilience?

    IT resilience is a mindset, a collection of techniques, and people management focused on providing consistent service to clients, all rolled into one discipline. While we discuss IT resilience, it takes more than IT staff or IT processes to become a truly resilient business.

    Here are 10 themes relevant to the (IT) resilient organization:

    Transparent culture

    A transparent company culture empowers its people to act confidently, respond swiftly to challenges, and continuously learn and improve. This builds a strong foundation for resilience, enabling the organization to navigate disruption or adversity much more easily.

    At its core, transparency is about open communication, sharing information, and fostering a culture of honesty and trust. These traits directly influence the various aspects of resilience.

    Client service focus

    A client service focus isn't just about customer satisfaction; it's an integral part of a company's resilience strategy. Service stability and continuous value delivery are the elements that retain existing clients and attract new ones through reputation.  System outages, slowdowns, and errors lead to client frustration and erode confidence. In other words, client service focuses on making sure you are available. Once you have that, then you can look at enhancing and expanding services and products. 

    Resilient systems and processes often also include tools and capabilities for proactive communication with clients. This can include automated notifications during system maintenance or updates, providing transparency and minimizing inconvenience. A proactive approach to communication creates a sense of partnership, and it demonstrates that you value your clients' time and business.

    Adaptability

    Adaptable systems and processes give you the flexibility for rapid incident response and easy workarounds, bringing your service back to the level it is supposed to be at.

    In the bigger picture, when you design your systems for flexibility and modification, you can rapidly adjust to new market conditions, evolving customer demands, and technological advancements. This agility allows you to pivot swiftly, seizing opportunities while mitigating risks.

    In the same vein, adaptable processes, fostered by a culture of continuous improvement and open communication, empower teams to innovate and refine workflows in response to challenges. This constant evolution ensures the company remains competitive and aligned with its ever-changing environment.

    Robust change management

    When you establish standardized procedures for planning, testing, and implementing changes, IT change management ensures that every modification, no matter how seemingly small, is carefully considered and assessed for its impact on the broader IT ecosystem. This structured approach significantly reduces the risk of unexpected side effects, unforeseen conflicts, and costly downtime, protecting the company's operations and its reputation.

    It does not have to be a burdensome bureaucratic process. Modern processes and tools take the sting out of these controls. Many actions within change management can be automated without losing oversight by both the IT custodians and the business process owners.

    Redundancy and fault tolerance

    By having duplicates of essential components or systems in place, you ensure that even if one part fails, another is ready to take over. This helps you minimize the impact of unexpected events like hardware issues, software glitches, or other unforeseen problems. This might mean replicating critical policy data across multiple servers or data centers in different locations.

    Fault tolerance is all about your systems and processes being able to keep working even when facing challenges. By designing your software and systems architecture with fault tolerance in mind, you are sure it can gracefully handle errors and failures, preventing those small problems from causing bigger issues, outages, and unhappy clients.

    Security

    Clients entrust you with valuable information. Demonstrating a commitment to data security through resilient systems builds trust and provides reassurance that their data is safeguarded against breaches and unauthorized access.

    Monitoring and alerting

    Trusting that all working is good. making sure is better.  When you observe your systems and receive timely notifications when something seems off, you'll be able to address issues before they snowball into real problems. 

    In any industry, monitoring helps you keep an eye on crucial performance metrics, resource usage, and system health. You'll get insights into how your systems behave, allowing you to identify bottlenecks or potential points of failure before they cause serious problems. And with a well-tuned alerting system, you'll get those critical notifications when something requires immediate attention. This gives you the chance to respond quickly, minimize downtime, and keep things running smoothly for your customers.

    Monitoring is also all about business metrics. Keep your service chains running smoothly and understand the ebb and flow of when clients access your services. Then update and enhance in line with what you see happening. 

    Incident response processes

    Well-thought-out plans and processes are key. Work with your incident managers, developers, suppliers, business staff and product owners and build an embedded method for reacting to incidents. 

    The key is to limit the time of the service interruption. Not everything needs to be handled immediately, so your plan must be clear on how to react to important vs lower-priority incidents. Making the plan and process well-known in the company helps everybody and keeps the calm.

    Embedded business continuity

    Business continuity planning anticipates and prepares for various scenarios, allowing your company to adapt and maintain essential functions even in the face of unexpected disruptions.

    When you proactively address these non-IT aspects of recovery, you build resilience that goes beyond simply restoring technology. It enables you to maintain customer relationships, meet contractual obligations, and safeguard your reputation, even in the face of significant challenges.

    Business continuity is not about prevention; it is about knowing what to do when bad things happen that may threaten your company in a more existential way or when you face issues like a power outage in your building, a pandemic, major road works rendering your business unreachable and such events.

    Effective disaster recovery  

    Disaster recovery is your lifeline when the worst happens. Whether it's a major cyberattack, a natural disaster, or a catastrophic hardware failure, a solid disaster recovery plan ensures your business doesn't sink. It's your strategy to get those critical systems back online and your data restored as quickly as possible.

    Think of it this way: disaster recovery, just like business continuity, isn't about preventing bad things from happening; it's about being prepared to bounce back when they do. It's like having a spare tire in your car, you hope you never need it, but if you get a flat, you're not stranded. With a well-tested disaster recovery plan, you can minimize downtime, reduce data loss, and keep your operations running even in the face of the unexpected. That translates to happier customers, protected revenue, and a reputation for reliability even amidst chaos.

     

    Resilience is the result of a well-conducted orchestra. Many disciplines come together to help you service your clients in a consistent way.

    The operational lifeline of your company and the reason it exists in the first place is to provide your clients with what they need, when they need it, and be able to command a good price for it. And that will keep your shareholders happy as well.

    Integrate IT Risk Into Enterprise Risk

    • Buy Link or Shortcode: {j2store}195|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,599 Average $ Saved
    • member rating average days saved: 2 Average Days Saved
    • Parent Category Name: IT Governance, Risk & Compliance
    • Parent Category Link: /it-governance-risk-and-compliance
    • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
    • IT is expected to own risks over which they have no authority or oversight.
    • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

    Our Advice

    Critical Insight

    • Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize the organization’s ability to respond to risk.

    Impact and Result

    • Understand gaps in the organization’s current approach to risk management practices.
    • Establish a standardized approach for how IT risks impact the enterprise as a whole.
    • Drive a risk-aware organization toward innovation and consider alternative options for how to move forward.
    • Integrate IT risks into the foundational risk practice.

    Integrate IT Risk Into Enterprise Risk Research & Tools

    Integrated Risk Management Capstone – A framework for how IT risks can be integrated into your organization’s enterprise risk management program to enable strategic risk-informed decisions.

    This is a capstone blueprint highlighting the benefits of an integrated risk management program that uses risk information and data to inform strategic decision making. Throughout this research you will gain insight into the five core elements of integrating risk through assessing, governing, defining the program, defining the process, and implementing.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Integrate IT Risk Into Enterprise Risk Capstone
    • Integrated Risk Maturity Assessment
    • Risk Register Tool

    Infographic

    Further reading

    Integrate IT Risk Into Enterprise Risk

    Don’t fear IT risks, integrate them.

    EXECUTIVE BRIEF

    Analyst Perspective

    Having siloed risks is risky business for any enterprise.

    Photo of Valence Howden, Principal Research Director, CIO Practice.
    Valence Howden
    Principal Research Director, CIO Practice
    Photo of Petar Hristov Research Director, Security, Privacy, Risk & Compliance.
    Petar Hristov
    Research Director, Security, Privacy, Risk & Compliance
    Photo of Ian Mulholland Research Director, Security, Risk & Compliance.
    Ian Mulholland
    Research Director, Security, Risk & Compliance
    Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
    Brittany Lutes
    Senior Research Analyst, CIO Practice
    Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice
    Ibrahim Abdel-Kader
    Research Analyst, CIO Practice

    Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.

    In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.

    When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.

    And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.

    Executive Summary

    Your Challenge

    Most organizations fail to integrate IT risks into enterprise risks:

    • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
    • IT is expected to own risks over which they have no authority or oversight.
    • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

    Common Obstacles

    IT leaders have to overcome these obstacles when it comes to integrating risk:

    • Making business leaders aware of, involved in, and able to respond to all enterprise risks.
    • A lack of data or information being used to support a holistic risk management process.
    • A low level of enterprise risk maturity.
    • A lack of risk management capabilities.

    Info-Tech’s Approach

    By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:

    • Understanding gaps in the organization’s current approach to risk management practices.
    • Establishing a standardized approach for how IT risks impact the enterprise as a whole.
    • Driving a risk-aware organization toward innovation and considering alternative options for how to move forward.
    • Helping integrate IT risks into the foundational risk practice.

    Info-Tech Insight

    Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.

    What is integrated risk management?

    • Integrated risk management is the process of ensuring all forms of risk information, including information and technology, are considered and included in the enterprise’s risk management strategy.
    • It removes the siloed approach to classifying risks related to specific departments or areas of the organization, recognizing that each of those risks is a threat to the overarching enterprise.
    • Aggregating the different threats or uncertainty that might exist within an organization allows for informed decisions to be made that align to strategic goals and continue to drive value back to the business.
    • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

    Enterprise Risk Management (ERM)

    • IT
    • Security
    • Digital
    • Vendor/Third Party
    • Other

    Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.

    IT risk is enterprise risk

    Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

    Your challenge

    Embedding IT risks into the enterprise risk management program is challenging because:

    • Most organizations classify risks based on the departments or areas of the business where the uncertainty is likely to happen.
    • Unnecessary expectations are placed on the IT department to own risks over which they have no authority or oversight.
    • Risks are often only identified when conducting due diligence for a project or ensuring compliance with regulations and standards.

    Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.

    35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)

    12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)

    Common obstacles

    These barriers make integrating IT risks difficult to address for many organizations:

    • IT risks are not seen as enterprise risks.
    • The organization’s culture toward risk is not defined.
    • The organization’s appetite and threshold for risk are not defined.
    • Each area of the organization has a different method of identifying, assessing, and responding to risk events.
    • Access to reliable and informative data to support risk management is difficult to obtain.
    • Leadership does not see the business value of integrating risk into a single management program.
    • The organization’s attitudes and behaviors toward risk contradict the desired and defined risk culture.
    • Skills, training, and resources to support risk management are lacking, let alone those to support integrated risk management.

    Integrating risks has its challenges

    62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)

    20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)

    Integrate Risk and Use It to Your Advantage

    Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

    Risk management is more than checking an audit box or demonstrating project due diligence.

    Risk Drivers
    • Audit & compliance
    • Preserve value & avoid loss
    • Previous risk impact driver
    • Major transformation
    • Strategic opportunities
    Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
    1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
    2. Determine Authority with Governance
    Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
    IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

    Governance and related decision making is optimized with integrated and aligned risk data.

    List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in Enterprise Risk Management.

    ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

    The program plan is meant to consider all the major risk types in a unified approach.

    The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

    Integrated Risk Mapping — Downside Risk Focus

    A diagram titled 'Risk and Controls' beginning with 'Possible Sources' and a list of sources, 'Control Activities' to prevent, the 'RISK EVENT', 'Recovery Activities' to recover, and 'Possible Repercussions' with a list of ramifications.

    Integrated Risk Mapping — Downside and Upside Risk

    Third-Party Risk Example

    Example of a third-party risk mapped onto the diagram on the previous slide, but with potential upsides mapped out as well. The central risk event is 'Vendor exposes private customer data'. Possible Sources of the downside are 'External Attack' with likelihood prevention method 'Define security standard requirements for vendor assessment' and 'Exfiltration of data through fourth-party staff' with likelihood prevention method 'Ensure data is properly classified'. Possible Sources of the upside are 'Application rationalization' with likelihood optimization method 'Reduce number of applications in environment' and 'Review vendor assessment practices' with likelihood optimization method 'Improve vendor onboarding'. Possible Repercussions on the downside are 'Organization unable to operate in jurisdiction' with impact minimization method 'Engage in-house risk mitigation responses' and 'Fines levied against organization' with impact minimization method 'Report incident to any regulators'. Possible Repercussions on the upside are 'Easier vendor integration and management' with impact utilization method 'Improved vendor onboarding practices' and 'Able to bid on contracts with these requirements' with impact utilization method 'Vendors must provide attestations (e.g. SOC or CMMC)'.

    Insight Summary

    Overarching insight

    Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.

    Govern risk strategically

    Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.

    Assess risk maturity

    Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.

    Manage risk

    It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.

    Implement risk management

    Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.

    Tactical insight

    Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.

    Integrated risk benefits

    IT Benefits

    • IT executives have a responsibility but not accountability when it comes to risk. Ensure the right business stakeholders have awareness and ability to make informed risk decisions.
    • Controls and responses to risks that are within the “IT” realm will be funded and provided with sufficient support from the business.
    • The business respects and values the role of IT in supporting the enterprise risk program, elevating its role into business partner.

    Business Benefits

    • Business executives and boards can make informed responses to the various forms of risk, including those often categorized as “IT risks.”
    • The compounding severity of risks can be formally assessed and ideally quantified to provide insight into how risks’ ramifications can change based on scenarios.
    • Risk-informed decisions can be used to optimize the business and drive it toward adopting innovation as a response to risk events.
    • Get your organization insured against cybersecurity threats at the lowest premiums possible.

    Measure the value of integrating risk

    • Reduce Operating Costs

      • Organizations can reduce their risk operating costs by 20 to 30% by adopting enterprise-wide digital risk initiatives (McKinsey & Company).
    • Increase Cybersecurity Threat Preparedness

      • Increase the organization’s preparedness for cybersecurity threats. 79% of organizations that were impacted by email threats in 2020 were not prepared for the hit (Diligent)
    • Increase Risk Management’s Impact to Drive Strategic Value

      • Currently, only 3% of organizations are extensively using risk management to drive their unique competitive advantage, compared to 35% of companies who do not use it at all (AICPA & NC State Poole College of Management).
    • Reduce Lost Productivity for the Enterprise

      • Among small businesses, 76% are still not considering purchasing cyberinsurance in 2021, despite the fact that ransomware attacks alone cost Canadian businesses $5.1 billion in productivity in 2020 (Insurance Bureau of Canada, 2021).

    “31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)

    Make integrated risk management sustainable

    58%

    Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture)

    70%

    Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk)

    54%

    Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte)

    63%

    Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management)

    Successful adoption of integrated risk management is often associated with these key elements.

    Assessment

    Assess your organization’s method of addressing risk management to determine if integrated risk is possible

    Assessing the organization’s risk maturity

    Mature or not, integrated risk management should be a consideration for all organizations

    The first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information.

    In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information.

    A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go.

    Pie chart titled 'Organizational Risk Management Maturity Assessment Results' showing just under half 'Progressing', a third 'Established', a seventh 'Emerging', and a very small portion 'Leading or Aspirational'.

    Integrated Risk Maturity Categories

    Semi-circle with colored points indicating four categories.

    1

    Context & Strategic Direction Understand the organization’s main objectives and how risk can support or enhance those objectives.

    2

    Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

    3

    Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

    4

    Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

    Maturity should inform your approach to risk management

    The outcome of the risk maturity assessment should inform how risk management is approached within the organization.

    A row of waves starting light and small and becoming taller and darker in steps. The levels are 'Non-existent', 'Basic', 'Partially Integrated', 'Mostly Integrated', 'Fully Integrated', and 'Optimized'.

    For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.

    However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.

    Integrated Risk Maturity Assessment

    The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).

    Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

    Integrated Risk Maturity Assessment

    A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization

    Sample of the Integrated Risk Maturity Assessment deliverable.

    Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.

    Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

    Drive Business Value With a Right-Sized Project Gating Process

    • Buy Link or Shortcode: {j2store}445|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $61,999 Average $ Saved
    • member rating average days saved: 21 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • Low sponsor commitment on projects.
    • Poor quality on completed projects.
    • Little to no visibility into the project portfolio.
    • Organization does not operationalize change .
    • Analyzing, fixing, and redeploying is a constant struggle. Even when projects are done well, they fail to deliver the intended outcomes and benefits.

    Our Advice

    Critical Insight

    • Stop applying a one-size-fits-all-projects approach to governance.
    • Engage the sponsor by shifting the accountability to the business so they can get the most out of the project.
    • Do not limit the gating process to project management – expand to portfolio management.

    Impact and Result

    • Increase Project Throughput: Do more projects by ensuring the right projects and right amount of projects are approved and executed.
    • Validate Project Quality: Ensure issues are uncovered and resolved with standard check points in the project.
    • Increase Reporting and Visibility: Easily compare progress of projects across the portfolio and report outcomes to leadership.
    • Reduce Resource Waste: Terminate low-value projects early and assign the right resources to approved projects.
    • Achieve Intended Project Outcomes: Keep the sponsor engaged throughout the gating process to achieve desired outcomes.

    Drive Business Value With a Right-Sized Project Gating Process Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should design a right-sized project gating process, review Info-Tech’s methodology, and understand the four ways we can support you.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Lay the groundwork for tailored project gating

    This phase will walk you through the following activities:

  • Understand the role of gating and why we need it.
  • Determine what projects will follow the gating process and how to classify them.
  • Establish the role of the project sponsor throughout the entire project lifecycle.
    • Drive Business Value With a Right-Sized Project Gating Process – Phase 1: Lay the Groundwork for Tailored Project Gating
    • Project Intake Classification Matrix
    • Project Sponsor Role Description Template

    2. Establish level 1 project gating

    This phase will help you customize Level 1 Project Gates with appropriate roles and responsibilities.

    • Drive Business Value With a Right-Sized Project Gating Process – Phase 2: Establish Level 1 Project Gating
    • Project Gating Strategic Template

    3. Establish level 2 project gating

    This phase will help you customize Level 2 Project Gates with appropriate roles and responsibilities.

    • Drive Business Value With a Right-Sized Project Gating Process – Phase 3: Establish Level 2 Project Gating

    4. Establish level 3 project gating

    This phase will help you customize Level 3 Project Gates with appropriate roles and responsibilities. It will also help you determine next steps and milestones for the adoption of the new process.

    • Drive Business Value With a Right-Sized Project Gating Process – Phase 4: Establish Level 3 Project Gating
    • Project Gating Reference Document
    [infographic]

    Workshop: Drive Business Value With a Right-Sized Project Gating Process

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Lay the Groundwork for Tailored Project Gating

    The Purpose

    Understand the role of gating and why we need it.

    Determine what projects will follow the gating process and how to classify them.

    Establish the role of the project sponsor throughout the entire project lifecycle.

    Key Benefits Achieved

    Get stakeholder buy-in for the process.

    Ensure there is a standard leveling process to determine size, risk, and complexity of requests.

    Engage the project sponsor throughout the portfolio and project processes.

    Activities

    1.1 Project Gating Review

    1.2 Establish appropriate project levels

    1.3 Define the role of the project sponsor

    Outputs

    Project Intake Classification Matrix

    Project Sponsor Role Description Template

    2 Establish Level 1 Project Gating

    The Purpose

    This phase will help you customize Level 1 Project Gates with appropriate roles and responsibilities.

    Key Benefits Achieved

    Create a lightweight project gating process for small projects.

    Activities

    2.1 Review level 1 project gating process

    2.2 Determine what gates should be part of your custom level 1 gating process

    2.3 Establish required artifacts for each gate

    2.4 Define the stakeholder’s roles and responsibilities at each gate

    Outputs

    Documented outputs in the Project Gating Strategic Template

    3 Establish Level 2 Project Gating

    The Purpose

    This phase will help you customize Level 2 Project Gates with appropriate roles and responsibilities.

    Key Benefits Achieved

    Create a heavier project gating process for medium projects.

    Activities

    3.1 Review level 2 project gating process

    3.2 Determine what gates should be part of your custom level 2 gating process

    3.3 Establish required artifacts for each gate

    3.4 Define the stakeholder’s roles and responsibilities at each gate

    Outputs

    4 Establish Level 3 Project Gating

    The Purpose

    This phase will help you customize Level 3 Project Gates with appropriate roles and responsibilities.

    Come up with a roadmap for the adoption of the new project gating process.

    Key Benefits Achieved

    Create a comprehensive project gating process for large projects.

    Activities

    4.1 Review level 3 project gating process

    4.2 Determine what gates should be part of your custom level 3 gating process

    4.3 Establish required artifacts for each gate

    4.4 Define the stakeholder’s roles and responsibilities at each gate

    4.5 Determine next steps and milestones for process adoption

    Outputs

    Documented outputs in the Project Gating Strategic Template

    Documented Project Gating Reference Document for all stakeholders

    Design and Implement a Business-Aligned Security Program

    • Buy Link or Shortcode: {j2store}368|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • You need to build a security program that enables business services and secures the technology that makes them possible.
    • Building an effective, business-aligned security program requires that you coordinate many components, including technologies, processes, organizational structures, information flows, and behaviors.
    • The program must prioritize the right capabilities, and support its implementation with clear accountabilities, roles, and responsibilities.

    Our Advice

    Critical Insight

    • Common security frameworks focus on operational controls rather than business value creation, are difficult to convey to stakeholders, and provide little implementation guidance.
    • A security strategy can provide a snapshot of your program, but it won’t help you modernize or transform it, or align it to meet emerging business requirements.
    • There is no unique, one-size-fits-all security program. Each organization has a distinct character and profile and differs from others in several critical respects.

    Impact and Result

    Tailor your security program according to what makes your organization unique.

    • Analyze critical design factors to determine and refine the scope of your security program and prioritize core program capabilities.
    • Identify program accountabilities, roles, and responsibilities.
    • Build an implementation roadmap to ensure its components work together in a systematic way to meet business requirements.

    Design and Implement a Business-Aligned Security Program Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Design and Implement a Business-Aligned Security Strategy – A step-by-step guide on how to understand what makes your organization unique and design a security program with capabilities that create business value.

    This storyboard will help you lay foundations for your security program that will inform future security program decisions and give your leadership team the information they need to support your success. You will evaluate design factors that make your organization unique, prioritize the security capabilities to suit, and assess the maturity of key security program components including security governance, security strategy, security architecture, service design, and service metrics.

    • Design and Implement a Business-Aligned Security Program Storyboard

    2. Security Program Design Tool – Tailor the security program to what makes your organization unique to ensure business-alignment.

    Use this Excel workbook to evaluate your security program against ten key design factors. The tool will produce a goals cascade that shows the relationship between business and security goals, a prioritized list of security capabilities that align to business requirements, and a list of program accountabilities.

    • Security Program Design Tool

    3. Security Program Design and Implementation Plan – Assess the current state of different security program components, plan next steps, and communicate the outcome to stakeholders.

    This second Excel workbook will help you conduct a gap analysis on key security program components and identify improvement initiatives. You can then use the Security Program Design and Implementation Plan to collect results from the design and implementation tools and draft a communication deck.

    • Security Program Implementation Tool
    • Security Program Design and Implementation Plan

    Infographic

    Workshop: Design and Implement a Business-Aligned Security Program

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Initial Security Program Design

    The Purpose

    Determine the initial design of your security program.

    Key Benefits Achieved

    An initial prioritized list of security capabilities that aligns with enterprise strategy and goals.

    Activities

    1.1 Review Info-Tech diagnostic results.

    1.2 Identify project context.

    1.3 Identify enterprise strategy.

    1.4 Identify enterprise goals.

    1.5 Build a goal cascade.

    1.6 Assess the risk profile.

    1.7 Identify IT-related issues.

    1.8 Evaluate initial program design.

    Outputs

    Stakeholder satisfaction with program

    Situation, challenges, opportunities

    Initial set of prioritized security capabilities

    Initial set of prioritized security capabilities

    Initial set of prioritized security capabilities

    Initial set of prioritized security capabilities

    Initial set of prioritized security capabilities

    Initial set of prioritized security capabilities

    2 Refine Security Program Capabilities

    The Purpose

    Refine the design of your security program.

    Key Benefits Achieved

    A refined, prioritized list of security capabilities that reflects what makes your organization unique.

    Activities

    2.1 Gauge threat landscape.

    2.2 Identify compliance requirements.

    2.3 Categorize the role of IT.

    2.4 Identify the sourcing model.

    2.5 Identify the IT implementation model.

    2.6 Identify the tech adoption strategy.

    2.7 Refine the scope of the program.

    Outputs

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    Refined set of prioritized security capabilities

    3 Security Program Gap Analysis

    The Purpose

    Finalize security program design.

    Key Benefits Achieved

    Key accountabilities to support the security program

    Gap analysis to produce an improvement plan

    Activities

    3.1 Identify program accountabilities.

    3.2 Conduct program gap analysis.

    3.3 Prioritize initiatives.

    Outputs

    Documented program accountabilities.

    Security program gap analysis

    Security program gap analysis

    4 Roadmap and Implementation Plan

    The Purpose

    Create and communicate an improvement roadmap for the security program.

    Key Benefits Achieved

    Security program design and implementation plan to organize and communicate program improvements.

    Activities

    4.1 Build program roadmap

    4.2 Finalize implementation plan

    4.3 Sponsor check-in

    Outputs

    Roadmap of program improvement initiatives

    Roadmap of program improvement initiatives

    Communication deck for program design and implementation

    Further reading

    Design a Business-Aligned Security Program

    Focus on business value first.

    EXECUTIVE BRIEF

    Analyst Perspective

    Business alignment is no accident.

    Michel Hébert

    Security leaders often tout their choice of technical security framework as the first and most important program decision they make. While the right framework can help you take a snapshot of the maturity of your program and produce a quick strategy and roadmap, it won’t help you align, modernize, or transform your program to meet emerging business requirements.

    Common technical security frameworks focus on operational controls rather than business services and value creation. They are difficult to convey to business stakeholders and provide little program management or implementation guidance.

    Focus on business value first, and the security services that enable it. Your organization has its own distinct character and profile. Understand what makes your organization unique, then design and refine the design of your security program to ensure it supports the right capabilities. Next, collaborate with stakeholders to ensure the right accountabilities, roles, and responsibilities are in place to support the implementation of the security program.

    Michel Hébert
    Research Director, Security & Privacy
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Common Obstacles

    Info-Tech’s Approach

    • You need to build a security program that enables business services and secures the technology that makes them possible.
    • Building an effective, business-aligned security program requires that you coordinate many components, including technologies, processes, organizational structures, information flows, and behaviors.
    • The program must prioritize the right capabilities, and support its implementation with clear accountabilities, roles, and responsibilities.
    • Common security frameworks focus on operational controls rather than business value creation, are difficult to convey to stakeholders, and provide little implementation guidance.
    • A security strategy can provide a snapshot of your program, but it won’t help you modernize or transform it, or align it to meet emerging business requirements.
    • There is no unique, one-size-fits-all security program. Each organization has a distinct character and profile and differs from others in several critical respects.

    Tailor your security program according to what makes your organization unique.

    • Analyze critical design factors to determine and refine the design of your security program and prioritize core program capabilities.
    • Identify program accountabilities, roles, and responsibilities.
    • Build an implementation roadmap to ensure its components work together in a systematic way to meet business requirements.

    Info-Tech Insight

    You are a business leader who supports business goals and mitigates risk. Focus first on business value and the security services that enable it, not security controls.

    Your challenge

    The need for a solid and responsive security program has never been greater.

    • You need to build a security program that enables business services and secures the technology that makes them possible.
    • Building an effective, business-aligned security program requires that you coordinate many components, including technologies, processes, organizational structures, information flows, and behaviors.
    • The program must prioritize the right capabilities, and support its implementation with clear accountabilities, roles, and responsibilities.
    • You must communicate effectively with stakeholders to describe the risks the organization faces, their likely impact on organizational goals, and how the security program will mitigate those risks and support the creation of business value.
    • Ransomware is a persistent threat to organizations worldwide across all industries.
    • Cybercriminals deploying ransomware are evolving into a growing and sophisticated criminal ecosystem that will continue to adapt to maximize its profits.

    • Critical infrastructure is increasingly at risk.
    • Malicious agents continue to target critical infrastructure to harm industrial processes and the customers they serve State-sponsored actors are expected to continue to target critical infrastructure to collect information through espionage, pre-position in case of future hostilities, and project state power.

    • Disruptive technologies bring new threats.
    • Malicious actors increasingly deceive or exploit cryptocurrencies, machine learning, and artificial intelligence technologies to support their activities.

    Sources: CCCS (2023), CISA (2023), ENISA (2023)

    Your challenge

    Most security programs are not aligned with the overall business strategy.

    50% Only half of leaders are framing the impact of security threats as a business risk.

    49% Less than half of leaders align security program cost and risk reduction targets with the business.

    57% Most leaders still don’t regularly review security program performance of the business.

    Source: Tenable, 2021

    Common obstacles

    Misalignment is hurting your security program and making you less influential.

    Organizations with misaligned security programs have 48% more security incidents...

    …and the cost of their data breaches are 40% higher than those with aligned programs.

    37% of stakeholders still lack confidence in their security program.

    54% of senior leaders still doubt security gets the goals of the organization.

    Source: Frost & Sullivan, 2019
    Source: Ponemon, 2023

    Common obstacles

    Common security frameworks won’t help you align your program.

    • Common security frameworks focus on operational controls rather than business value creation, are difficult to convey to stakeholders, and provide little implementation guidance.
    • A security strategy based on the right framework can provide a snapshot of your program, but it won’t help you modernize, transform, or align your program to meet emerging business requirements.
    • The lack of guidance leads to a lack of structure in the way security services are designed and managed, which reduces service quality, increases security friction, and reduces business satisfaction.

    There is no unique, one-size-fits-all security program.

    • Each organization has a distinct character and profile and differs from others in several critical respects. The security program for a cloud-first, DevOps environment must emphasize different capabilities and accountabilities than one for an on-premise environment and a traditional implementation model.

    Info-Tech’s approach

    You are a business leader who supports business goals and mitigates risk.

    • Understand what makes your organization unique, then design and refine a security program with capabilities that create business value.
    • Next, collaborate with stakeholders to ensure the right accountabilities, roles, and responsibilities are in place, and build an implementation roadmap to ensure its components work together over time.

    Security needs to evolve as a business strategy.

    • Laying the right foundations for your security program will inform future security program decisions and give your leadership team the information they need to support your success. You can do it in two steps:
      • Evaluate the design factors that make your organization unique and prioritize the security capabilities to suit. Info-Tech’s approach is based on the design process embedded in the latest COBIT framework.
      • Review the key components of your security program, including security governance, security strategy, security architecture, service design, and service metrics.

    If you build it, they will come

    “There's so much focus on better risk management that every leadership team in every organization wants to be part of the solution.

    If you can give them good data about what things they really need to do, they will work to understand it and help you solve the problem.”

    Dan Bowden, CISO, Sentara Healthcare (Tenable)

    Design a Business-Aligned Security Program

    The image contains a screenshot of how to Design a business-aligned security program.


    Choose your own adventure

    This blueprint is ideal for new CISOs and for program modernization initiatives.

    1. New CISO

    “I need to understand the business, prioritize core security capabilities, and identify program accountabilities quickly.”

    2. Program Renewal

    “The business is changing, and the threat landscape is shifting. I am concerned the program is getting stale.”

    Use this blueprint to understand what makes your organization unique:

    1. Prioritize security capabilities.
    2. Identify program accountabilities.
    3. Plan program implementation.

    If you need a deep dive into governance, move on to a security governance and management initiative.

    3. Program Update

    “I am happy with the fundamentals of my security program. I need to assess and improve our security posture.”

    Move on to our guidance on how to Build an Information Security Strategy instead.

    Info-Tech’s methodology for security program design

    Define Scope of
    Security Program

    Refine Scope of
    Security Program

    Finalize Security
    Program Design

    Phase steps

    1.1 Identify enterprise strategy

    1.2 Identify enterprise goals

    1.3 Assess the risk profile

    1.4 Identify IT-related issues

    1.5 Define initial program design

    2.1 Gage threats and compliance

    2.2 Assess IT role and sourcing

    2.3 Assess IT implementation model

    2.4 Assess tech adoption strategy

    2.5 Refine program design

    3.1 Identify program accountabilities

    3.2 Define program target state

    3.3 Build program roadmap

    Phase outcomes

    • Initial security program design
    • Refined security program design
    • Prioritized set of security capabilities
    • Program accountabilities
    • Program gap closure initiatives

    Tools

    Insight Map

    You are a business leader first and a security leader second

    Technical security frameworks are static and focused on operational controls and standards. They belong in your program’s solar system but not at its center. Design your security program with business value and the security services that enable it in mind, not security controls.

    There is no one-size-fits-all security program
    Tailor your security program to your organization’s distinct profile to ensure the program generates value.

    Lay the right foundations to increase engagement
    Map out accountabilities, roles, and responsibilities to ensure the components of your security program work together over time to secure and enable business services.

    If you build it, they will come
    Your executive team wants to be part of the solution. If you give them reliable data for the things they really need to do, they will work to understand and help you solve the problem.

    Blueprint deliverables

    Info-Tech supports project and workshop activities with deliverables to help you accomplish your goals and accelerate your success.

    Security Program Design Tool

    Tailor the security program to what makes your organization unique to ensure alignment.

    The image contains a screenshot of the Security Program Design Tool.

    Security Program Implementation Tool

    Assess the current state of different security program components and plan next steps.



    SecurityProgram Design and Implementation Plan

    Communicate capabilities, accountabilities, and implementation initiatives.

    The image contains a screenshot of the Security Program Design and Implementation Plan.

    Key deliverable

    Security Program Design and Implementation Plan

    The design and implementation plan captures the key insights your work will generate, including:

    • A prioritized set of security capabilities aligned to business requirements.
    • Security program accountabilities.
    • Security program implementation initiatives.

    Blueprint benefits

    IT Benefits

    Business Benefits

    • Laying the right foundations for your security program will:
      • Inform the future security governance, security strategy, security architecture, and service design decisions you need to make.
      • Improve security service design and service quality, reduce security friction, and increase business satisfaction with the security program.
      • Help you give your leadership team the information they need to support your success.
      • Improve the standing of the security program with business leaders.
    • Organizations with a well-aligned security program:
      • Improve security risk management, performance measurement, resource management, and value delivery.
      • Lower rates of security incidents and lower-cost security breaches.
      • Align costs, performance, and risk reduction objectives with business needs.
      • Are more satisfied with their security program.

    Measure the value of using Info-Tech’s approach

    Assess the effectiveness of your security program with a risk-based approach.

    Deliverable

    Challenge

    Security Program Design

    • Prioritized set of security capabilities
    • Program accountabilities
    • Devise and deploy an approach to gather business requirements, identify and prioritize relevant security capabilities, and assign program accountabilities.
    • Cost and Effort : 2 FTEs x 90 days x $130,000/year

    Program Assessment and Implementation Plan

    • Security program assessment
    • Roadmap of gap closure initiatives
    • Devise and deploy an approach to assess the current state of your security program, identify gap closure or improvement initiatives, and build a transformation roadmap.
    • Cost and Effort : 2 FTEs x 90 days x $130,000/year

    Measured Value

    • Using Info-Tech’s best practice methodology will cut the cost and effort in half.
    • Savings: 2 FTEs x 45 days x $130,000/year = $65,000

    Measure the impact of your project

    Use Info-Tech diagnostics before and after the engagement to measure your progress.

    • Info-Tech diagnostics are standardized surveys that produce historical and industry trends against which to benchmark your organization.
    • Run the Security Business Satisfaction and Alignment diagnostic now, and again in twelve months to assess business satisfaction with the security program and measure the impact of your program improvements.
    • Reach out to your account manager or follow the link to deploy the diagnostic and measure your success. Diagnostics are included in your membership.

    Inform this step with Info-Tech diagnostic results

    • Info-Tech diagnostics are standardized surveys that accelerate the process of gathering and analyzing pain point data.
    • Diagnostics also produce historical and industry trends against which to benchmark your organization.
    • Reach out to your account manager or follow the links to deploy some or all these diagnostics to validate your assumptions. Diagnostics are included in your membership.

    Governance & Management Maturity Scorecard
    Understand the maturity of your security program across eight domains.
    Audience: Security Manager

    Security Business Satisfaction and Alignment Report
    Assess the organization’s satisfaction with the security program.
    Audience: Business Leaders

    CIO Business Vision
    Assess the organization’s satisfaction with IT services and identify relevant challenges.
    Audience: Business Leaders

    Executive Brief Case Study

    INDUSTRY: Higher Education

    SOURCE: Interview

    Building a business-aligned security program

    Portland Community College (PCC) is the largest post-secondary institution in Oregon and serves more than 50,000 students each year. The college has a well-established information technology program, which supports its education mission in four main campuses and several smaller centers.

    PCC launched a security program modernization effort to deal with the evolving threat landscape in higher education. The CISO studied the enterprise strategy and goals and reviewed the college’s risk profile and compliance requirements. The exercise helped the organization prioritize security capabilities for the renewal effort and informed the careful assessment of technical controls in the current security program.

    Results

    Laying the right foundations for the security program helped the security function understand how to provide the organization with a clear report of its security posture. The CISO now reports directly to the board of directors and works with stakeholders to align cost, performance, and risk reduction objectives with the needs of the college.

    The security program modernization effort prioritized several critical design factors

    • Enterprise Strategy
    • Enterprise Goals
    • IT Risk Profile
    • IT-Related Issues
    • IT Threat Landscape
    • Compliance Requirements

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3

    Call #1:
    Scope requirements, objectives, and specific challenges.

    Call #2:
    Define business context, assess risk profile, and identify existing security issues.

    Define initial design of security program.

    Call #3:
    Evaluate threat landscape and compliance requirements.

    Call #4:
    Analyze the role of IT, the security sourcing model, technology adoption, and implementation models.

    Refine the design of the security program.

    Call #5:
    Identify program accountabilities.

    Call #6:
    Design program target state and draft security program implementation plan.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 4 to 6 calls over the course of 6 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5

    Initial Security
    Program Design

    Refine Security
    Program Design

    Security Program
    Gap Analysis

    Roadmap and Implementation Plan

    Next Steps and
    Wrap-Up (offsite)

    Activities

    1.1.0 Review Info-Tech diagnostic results

    1.1.1 Identify project context

    1.1.2 Identify enterprise strategy

    1.2.1 Identify enterprise goals

    1.2.2 Build a goals cascade

    1.3 Assess the risk profile

    1.4 Identify IT-related issues

    1.5 Evaluate initial program design

    2.1.1 Gauge threat landscape

    2.1.2 Identify compliance requirements

    2.2.1 Categorize the role of IT

    2.2.2 Identify the sourcing model

    2.3.1 Identify the IT implementation model

    2.4.1 Identify the tech adoption strategy

    2.5.1 Refine the design of the program

    3.1 Identify program accountabilities

    3.2.1 Conduct program gap analysis

    3.2.2 Prioritize initiatives

    3.3.1 Build program roadmap

    3.3.2 Finalize implementation plan

    3.3.3 Sponsor check-in

    4.1 Complete in-progress deliverables from previous four days

    4.2 Set up review time for workshop deliverables and to discuss next steps

    Deliverables

    1. Project context
    2. Stakeholder satisfaction feedback on security program
    3. Initial set of prioritized security capabilities
    1. Refined set of prioritized security capabilities
    1. Documented program accountabilities
    2. Security program gap analysis
    1. Roadmap of initiatives
    2. Communication deck for program design and implementation
    1. Completed security program design
    2. Security program design and implementation plan

    Customize your journey

    The security design blueprint pairs well with security governance and security strategy.

    • The prioritized set of security capabilities you develop during the program design project will inform efforts to develop other parts of your security program, like the security governance and management program and the security strategy.
    • Work with your member services director, executive advisor, or technical counselor to scope the journey you need. They will work with you to align the subject matter experts to support your roadmap and workshops.

    Workshop
    Days 1 and 2

    Workshop
    Days 3 and 4

    Security Program Design Factors

    Security Program Gap Analysis or
    Security Governance and Management

    Drive Digital Transformation With Platform Strategies

    • Buy Link or Shortcode: {j2store}78|cart{/j2store}
    • member rating overall impact: 8.5/10 Overall Impact
    • member rating average dollars saved: $3,750 Average $ Saved
    • member rating average days saved: 4 Average Days Saved
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • Enterprise is grappling with the challenges of existing business models and strategies not leading to desired outcomes.
    • Enterprise is struggling to remain competitive.
    • Enterprise wants to understand how to leverage platform strategies and a digital platform.

    Our Advice

    Critical Insight

    To remain competitive enterprises must renew and refresh their business model strategies and design/develop digital platforms – this requires enterprises to:

    • Understand how digital-native enterprises are using platform business models and associated strategies.
    • Understand their core assets and strengths and how these can be leveraged for transformation.
    • Understand the core characteristics and components of a digital platform so that they can design digital platform(s) for their enterprise.
    • Ask if the client’s digital transformation (DX) strategy is aligned with a digital platform enablement strategy.
    • Ask if the enterprise has paid attention to the structure, culture, principles, and practices of platform teams.

    Impact and Result

    Organizations that implement this project will gain benefits in five ways:

    • Awareness and understanding of various platform strategies.
    • Application of specific platform strategies within the context of the enterprise.
    • Awareness of their existing business mode, core assets, value proposition, and strengths.
    • Alignment between DX themes and platform enablement themes so enterprises can develop roadmaps that gauge successful DX.
    • Design of a digital platform, including characteristics, components, and team characteristics, culture, principles, and practices.

    Drive Digital Transformation With Platform Strategies Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should consider the platform business model and a digital platform to remain competitive.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Set goals for your platform business model

    Understand the platform business model and strategies and then set your platform business model goals.

    • Drive Digital Transformation With Platform Strategies – Phase 1: Set Goals for Your Platform Business Model
    • Business Platform Playbook

    2. Configure digital platform

    Define design goals for your digital platform. Align your DX strategy with digital platform capabilities and understand key components of the digital platform.

    • Drive Digital Transformation With Platform Strategies – Phase 2: Configure Your Digital Platform
    • Digital Platform Playbook
    [infographic]

    Workshop: Drive Digital Transformation With Platform Strategies

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand Platform Business Model and Strategies

    The Purpose

    Understand existing business model, value proposition, and key assets.

    Understand platform business model and strategies.

    Key Benefits Achieved

    Understanding the current assets helps with knowing what can be leveraged in the new business model/transformation.

    Understanding the platform strategies can help the enterprise renew/refresh their business model.

    Activities

    1.1 Document the current business model along with value proposition and key assets (that provide competitive advantage).

    1.2 Transformation narrative.

    1.3 Platform model canvas.

    1.4 Document the platform strategies in the context of the enterprise.

    Outputs

    Documentation of current business model along with value proposition and key assets (that provide competitive advantage).

    Documentation of the selected platform strategies.

    2 Planning for Platform Business Model

    The Purpose

    Understand transformation approaches.

    Understand various layers of platforms.

    Ask fundamental and evolutionary questions about the platform.

    Key Benefits Achieved

    Understanding of the transformational model so that the enterprise can realize the differences.

    Understanding of the organization’s strengths and weaknesses for a DX.

    Extraction of strategic themes to plan and develop a digital platform roadmap.

    Activities

    2.1 Discuss and document decision about DX approach and next steps.

    2.2 Discuss and document high-level strategic themes for platform business model and associated roadmap.

    Outputs

    Documented decision about DX approach and next steps.

    Documented high-level strategic themes for platform business model and associated roadmap.

    3 Digital Platform Strategy

    The Purpose

    Understand the design goals for the digital platform.

    Understand gaps between the platform’s capabilities and the DX strategy.

    Key Benefits Achieved

    Design goals set for the digital platform that are visible to all stakeholders.

    Gap analysis performed between enterprise’s digital strategy and platform capabilities; this helps understand the current situation and thus informs strategies and roadmaps.

    Activities

    3.1 Discuss and document design goals for digital platform.

    3.2 Discuss DX themes and platform capabilities – document the gaps.

    3.3 Discuss gaps and strategies along with timelines.

    Outputs

    Documented design goals for digital platform.

    Documented DX themes and platform capabilities.

    DX themes and platform capabilities map.

    4 Digital Platform Design: Key Components

    The Purpose

    Understanding of key components of a digital platform, including technology and teams.

    Key Benefits Achieved

    Understanding of the key components of a digital platform and designing the platform.

    Understanding of the team structure, culture, and practices needed for successful platform engineering teams.

    Activities

    4.1 Confirmation and discussion on existing UX/UI and API strategies.

    4.2 Understanding of microservices architecture and filling of microservices canvas.

    4.3 Real-time stream processing data pipeline and tool map.

    4.4 High-level architectural view.

    4.5 Discussion on platform engineering teams, including culture, structure, principles, and practices.

    Outputs

    Filled microservices canvas.

    Documented real-time stream processing data pipeline and tool map.

    Documented high-level architectural view.

    The Rapid Application Selection Framework

    • Buy Link or Shortcode: {j2store}608|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $37,512 Average $ Saved
    • member rating average days saved: 22 Average Days Saved
    • Parent Category Name: Selection & Implementation
    • Parent Category Link: /selection-and-implementation
    • Selection takes forever. Traditional software selection drags on for years, sometimes in perpetuity.
    • IT is viewed as a bottleneck and the business has taken control of software selection.
    • “Gut feel” decisions rule the day. Intuition, not hard data, guides selection, leading to poor outcomes.
    • Negotiations are a losing battle. Money is left on the table by inexperienced negotiators.
    • Overall: Poor selection processes lead to wasted time, wasted effort, and applications that continually disappoint.

    Our Advice

    Critical Insight

    • Adopt a formal methodology to accelerate and improve software selection results.
    • Improve business satisfaction by including the right stakeholders and delivering new applications on a truly timely basis.
    • Kill the “sacred cow” requirements that only exist because “it’s how we’ve always done it.”
    • Forget about “RFP” overload and hone in on the features that matter to your organization.
    • Skip the guesswork and validate decisions with real data.
    • Take control of vendor “dog and pony shows” with single-day, high-value, low-effort, rapid-fire investigative interviews.
    • Master vendor negotiations and never leave money on the table.

    Impact and Result

    Improving software selection is a critical project that will deliver huge value.

    • Hit a home run with your business stakeholders: use a data-driven approach to select the right application vendor for their needs – fast.
    • Shatter stakeholder expectations with truly rapid application selections.
    • Boost collaboration and crush the broken telephone with concise and effective stakeholder meetings.
    • Lock in hard savings and do not pay list price by using data-driven tactics.

    The Rapid Application Selection Framework Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. The Rapid Application Selection Framework

    • The Rapid Application Selection Framework Deck

    2. The Guide to Software Selection: A Business Stakeholder Manual

    • The Guide to Software Selection: A Business Stakeholder Manual

    3. The Software Selection Workbook

    • The Software Selection Workbook

    4. The Vendor Evaluation Workbook

    • The Vendor Evaluation Workbook
    [infographic]

    Maintain an Organized Portfolio

    • Buy Link or Shortcode: {j2store}432|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $3,059 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • All too often, the portfolio of programs and projects looks more like a random heap than a strategically organized and balanced collection of investments that will drive the business forward.
    • Portfolio managers know that with the right kind of information and the right level of process maturity they can get better results through the portfolio; however, organizations often assume (falsely) that the required level of maturity is out of reach from their current state and perpetually delay improvements.

    Our Advice

    Critical Insight

    • The information needed to define clear and usable criteria for organizing the portfolio of programs and projects already exists. Portfolio managers only need to identify the sources of that information and institute processes for regularly reviewing that information in order to define those criteria.
    • Once a portfolio manager has a clear idea of the goals and constraints that shape what ought to be included (or removed) from the portfolio and once these have been translated into clear and usable portfolio criteria, basic portfolio management processes can be instituted to ensure that these criteria are used consistently throughout the various stages of the project lifecycle.
    • Portfolio management frameworks and processes do not need to be built from scratch. Well-known frameworks – such as the one outlined in COBIT 5 APO05 – can be instituted in a way that will allow even low-maturity organizations to start organizing their portfolio.
    • Organizations do not need to grow into portfolio management frameworks to get the benefits of an organized portfolio; instead, they can grow within such frameworks.

    Impact and Result

    • An organized portfolio will ensure that the projects and programs included in it are strategically aligned and can actually be executed within the finite constraints of budgetary and human resource capacity.
    • Portfolio managers are better empowered to make decisions about which projects should be included in the portfolio (and when) and are better empowered to make the very tough decisions about which projects should be removed from the portfolio (i.e. cancelled).
    • Building and maturing a portfolio management framework will more fully integrate the PMO into the broader IT management and governance frameworks, making it a more integral part of strategic decisions and a better business partner in the long run.

    Maintain an Organized Portfolio Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should maintain an organized portfolio of programs and projects, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the current state of the portfolio and PPM processes

    Analyze the current mix of programs and projects in your portfolio and assess the maturity of your current PPM processes.

    • Maintain an Organized Portfolio – Phase 1: Assess the Current State of the Portfolio and PPM Processes
    • Project Portfolio Organizer
    • COBIT APO05 (Manage Portfolio) Alignment Workbook

    2. Enhance portfolio organization through improved PPM criteria and processes

    Enhance and optimize your portfolio management processes to ensure portfolio criteria are clearly defined and consistently applied across the project lifecycle when making decisions about which projects to include or remove from the portfolio.

    • Maintain an Organized Portfolio – Phase 2: Enhance Portfolio Organization Through Improved PPM Criteria and Processes
    • Portfolio Management Standard Operating Procedures

    3. Implement improved portfolio management practices

    Implement your portfolio management improvement initiatives to ensure long-term sustainable adoption of new PPM practices.

    • Maintain an Organized Portfolio – Phase 3: Implement Improved Portfolio Management Practices
    • Portfolio Management Improvement Roadmap Tool
    [infographic]

    Workshop: Maintain an Organized Portfolio

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Portfolio Mix and Portfolio Process Current State

    The Purpose

    Analyze the current mix of the portfolio to determine how to better organize it according to organizational goals and constraints.

    Assess which PPM processes need to be enhanced to better organize the portfolio.

    Key Benefits Achieved

    An analysis of the existing portfolio of projects (highlighting areas of concern).

    An analysis of the maturity of current PPM processes and their ability to support the maintenance of an organized portfolio.

    Activities

    1.1 Pre-work: Prepare a complete project list.

    1.2 Define existing portfolio categories, criteria, and targets.

    1.3 Analyze the current portfolio mix.

    1.4 Identify areas of concern with current portfolio mix.

    1.5 Review the six COBIT sub-processes for portfolio management (APO05.01-06).

    1.6 Assess the degree to which these sub-processes have been currently achieved at the organization.

    1.7 Assess the degree to which portfolio-supporting IT governance and management processes exist.

    1.8 Perform a gap analysis.

    Outputs

    Analysis of the current portfolio mix

    Assessment of COBIT alignment and gap analysis.

    2 Define Portfolio Target Mix, Criteria, and Roadmap

    The Purpose

    Define clear and usable portfolio criteria.

    Record/design portfolio management processes that will support the consistent use of portfolio criteria at all stages of the project lifecycle.

    Key Benefits Achieved

    Clearly defined and usable portfolio criteria.

    A portfolio management framework that supports the consistent use of the portfolio criteria across all stages of the project lifecycle.

    Activities

    2.1 Identify determinants of the portfolio mix, criteria, and constraints.

    2.2 Define the target mix, portfolio criteria, and portfolio metrics.

    2.3 Identify sources of funding and resourcing.

    2.4 Review and record the portfolio criteria based upon the goals and constraints.

    2.5 Create a PPM improvement roadmap.

    Outputs

    Portfolio criteria

    Portfolio metrics for intake, monitoring, closure, termination, reprioritization, and benefits tracking

    Portfolio Management Improvement Roadmap

    3 Design Improved Portfolio Sub-Processes

    The Purpose

    Ensure that the portfolio criteria are used to guide decision making at each stage of the project lifecycle when making decisions about which projects to include or remove from the portfolio.

    Key Benefits Achieved

    Processes that support decision making based upon the portfolio criteria.

    Processes that ensure the portfolio remains consistently organized according to the portfolio criteria.

    Activities

    3.1 Ensure that the metrics used for each sub-process are based upon the standard portfolio criteria.

    3.2 Establish the roles, accountabilities, and responsibilities for each sub-process needing improvement.

    3.3 Outline the workflow for each sub-process needing improvement.

    Outputs

    A RACI chart for each sub-process

    A workflow for each sub-process

    4 Change Impact Analysis and Stakeholder Engagement Plan

    The Purpose

    Ensure that the portfolio management improvement initiatives are sustainably adopted in the long term.

    Key Benefits Achieved

    Stakeholder engagement.

    Sustainable long-term adoption of the improved portfolio management practices.

    Activities

    4.1 Conduct a change impact analysis.

    4.2 Create a stakeholder engagement plan.

    Outputs

    Change Impact Analysis

    Stakeholder Engagement Plan

    Completed Portfolio Management SOP

    Key Metrics for Every CIO

    • Buy Link or Shortcode: {j2store}119|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Performance Measurement
    • Parent Category Link: /performance-measurement
    • As a CIO, you are inundated with data and information about how your IT organization is performing based on the various IT metrics that exist.
    • The information we receive from metrics is often just that – information. Rarely is it used as a tool to drive the organization forward.
    • CIO metrics need to consider the goals of key stakeholders in the organization.

    Our Advice

    Critical Insight

    • The top metrics for CIOs don’t have anything to do with IT.
    • CIOs should measure and monitor metrics that have a direct impact on the business.
    • Be intentional with the metric and number of metrics that you monitor on a regular basis.
    • Be transparent with your stakeholders on what and why you are measuring those specific metrics.

    Impact and Result

    • Measure fewer metrics, but measure those that will have a significant impact on how your deliver value to your organization.
    • Focus on the metrics that you can take action against, rather than simply monitor.
    • Ensure your metrics tie to your top priorities as a CIO.

    Key Metrics for Every CIO Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Key Metrics for Every CIO deck – The top metrics every CIO should measure and act on

    Leverage the top metrics for every CIO to help focus your attention and provide insight into actionable steps.

    • Key Metrics for Every CIO Storyboard
    [infographic]

    Further reading

    Key Metrics for Every CIO

    The top six metrics for CIOs – and they have very little to do with IT

    Analyst Perspective

    Measure with intention

    Be the strategic CIO who monitors the right metrics relevant to their priorities – regardless of industry or organization. When CIOs provide a laundry list of metrics they are consistently measuring and monitoring, it demonstrates a few things.

    First, they are probably measuring more metrics than they truly care about or could action. These “standardized” metrics become something measured out of expectation, not intention; therefore, they lose their meaning and value to you as a CIO. Stop spending time on these metrics you will be unable or unwilling to address.

    Secondly, it indicates a lack of trust in the IT leadership team, who can and should be monitoring these commonplace operational measures. An empowered IT leader will understand the responsibility they have to inform the CIO should a metric be derailing from the desired outcome.

    Photo of Brittany Lutes, Senior Research Analyst, Organizational Transformation Practice, Info-Tech Research Group. Brittany Lutes
    Senior Research Analyst
    Organizational Transformation Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    CIOs need to measure a set of specific metrics that:

    • Will support the organization’s vision, their career, and the IT function all in one.
    • Can be used as a tool to make informed decisions and take appropriate actions that will improve the IT function’s ability to deliver value.
    • Consider the influence of critical stakeholders, especially the end customer.
    • Are easily measured at any point in time.
    Common Obstacles

    CIOs often cannot define these metrics because:

    • We confuse the operational metrics IT leaders need to monitor with strategic metrics CIOs need to monitor.
    • Previously monitored metrics did not deliver value.
    • It is hard to decide on a metric that will prove both insightful and easily measurable.
    • We measure metrics without any method or insight on how to take actionable steps forward.
    Info-Tech’s Approach

    For every CIO, there are six areas that should be a focus, no matter your organization or industry. These six priorities will inform the metrics worth measuring:

    • Risk management
    • Delivering on business objectives
    • Customer satisfaction
    • Employee engagement
    • Business leadership relations
    • Managing to a budget

    Info-Tech Insight

    The top metrics for a CIO to measure and monitor have very little to do with IT and everything to do with ensuring the success of the business.

    Your challenge

    CIOs are not using metrics as a personal tool to advance the organization:
    • Metrics should be used as a tool by the CIO to help inform the future actions that will be taken to reach the organization’s strategic vision.
    • As a CIO, you need to have a defined set of metrics that will support your career, the organization, and the IT function you are accountable for.
    • CIO metrics must consider the most important stakeholders across the entire ecosystem of the organization – especially the end customer.
    • The metrics for a CIO are distinctly different from the metrics you use to measure the operational effectiveness of the different IT functions.
    “CIOs are businesspeople first and technology people second.” (Myles Suer, Source: CIO, 2019.)

    Common obstacles

    These barriers make this challenge difficult to address for many CIOs:
    • CIOs often do not measure metrics because they are not aware of what should or needs to be measured.
    • As a result of not wanting to measure the wrong thing, CIOs can often choose to measure nothing at all.
    • Or they get too focused on the operational metrics of their IT organization, leaving the strategic business metrics forgotten.
    • Moreover, narrowing the number of metrics that are being measured down to an actionable number is very difficult.
    • We rely only on physical data sets to help inform the measurements, not considering the qualitative feedback received.
    CIO priorities are business priorities

    46% of CIOs are transforming operations, focused on customer experiences and employee productivity. (Source: Foundry, 2022.)

    Finances (41.3%) and customers (28.1%) remain the top two focuses for CIOs when measuring IT effectiveness. All other focuses combine for the remaining 30.6%. (Source: Journal of Informational Technology Management, 2018.)

    Info-Tech’s approach

    Organizational goals inform CIO metrics

    Diagram with 'CIO Metrics' at the center surrounded by 'Directive Goals', 'Product/Service Goals', 'IT Goals', and 'Operations Goals', each of which are connected to eachother by 'Customers'.

    The Info-Tech difference:
    1. Every CIO has the same set of priorities regardless of their organization or industry given that these metrics are influenced by similar goals of organizations.
    2. CIO metrics are a tool to help inform the actions that will support each core area in reaching their desired goals.
    3. Be mindful of the goals different business units are using to reach the organization’s strategic vision – this includes your own IT goals.
    4. Directly or indirectly, you will always influence the ability to acquire and retain customers for the organization.

    CIO priorities

    MANAGING TO A BUDGET
    Reducing operational costs and increasing strategic IT spend.
    Table centerpiece for CIO Priorities. DELIVERING ON BUSINESS OBJECTIVES
    Aligning IT initiatives to the vision of the organization.
    CUSTOMER SATISFACTION
    Directly and indirectly impacting customer experience.
    EMPLOYEE ENGAGEMENT
    Creating an IT workforce of engaged and purpose-driven people.
    RISK MANAGEMENT
    Actively knowing and mitigating threats to the organization.
    BUSINESS LEADERSHIP RELATONS
    Establishing a network of influential business leaders.

    High-level process flow

    How do we use the CIO metrics?
    Process flow that starts at 'Consider - Identify and analyze CIO priorities', and is followed by 'Select priorities - Identify the top priorities for CIOs (see previous slide)', 'Create a measure - Determine a measure that aligns to each priority', 'Make changes & improvements - Take action to improve the measure and reach the goal you are trying to achieve', 'Demonstrate progress - Use the metrics to demonstrate progress against priorities'. Using priority-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

    Example CIO dashboard

    Example CIO dashboard.
    * Arrow indicates month-over-month trend

    Harness the value of metric data

    Metrics are rarely used accurately as a tool
    • When you have good metrics, you can:
      • Ensure employees are focused on the priorities of the organization
      • Have insight to make better decisions
      • Communicate with the business using language that resonates with each stakeholder
      • Increase the performance of your IT function
      • Continually adapt to meet changing business demands
    • Metrics are tools that quantifiably indicate whether a goal is on track to being achieved (proactive) or if the goal was successfully achieved (retroactive)
    • This is often reflected through two metric types:
      • Leading Metrics: The metric indicates if there are actions that should be taken in the process of achieving a desired outcome.
      • Lagging Metrics: Based on the desired outcome, the metric can indicate where there were successes or failures that supported or prevented the outcome from being achieved.
    • Use the data from the metrics to inform your actions. Do not collect this data if your intent is simply to know the data point. You must be willing to act.
    "The way to make a metric successful is by understanding why you are measuring it." (Jeff Neyland CIO)

    CIOs measure strategic business metrics

    Keep the IT leadership accountable for operational metrics
    • Leveraging the IT leadership team, empower and hold each leader accountable for the operational metrics specific to their functional area
    • As a CIO, focus on the metrics that are going to impact the business. These are often tied to people or stakeholders:
      • The customers who will purchase the product or service
      • The decision makers who will fund IT initiatives
      • The champions of IT value
      • The IT employees who will be driven to succeed
      • The owner of an IT risk event
    • By focusing on these priority areas, you can regularly monitor aspects that will have major business impacts – and be able to address those impacts.
    As a CIO, avoid spending time on operational metrics such as:
    • Time to deliver
    • Time to resolve
    • Project delivery (scope, time, money)
    • Application usage
    • User experiences
    • SLAs
    • Uptime/downtime
    • Resource costs
    • Ticket resolution
    • Number of phishing attempts
    Info-Tech Insight

    While operational metrics are important to your organization, IT leaders should be empowered and responsible for their management.

    SECTION 1

    Actively Managing IT Risks

    Actively manage IT risks

    The impact of IT risks to your organization cannot be ignored any further
    • Few individuals in an organization understand IT risks and can proactively plan for the prevention of those threats, making the CIO the responsible and accountable individual when it comes to IT risks – especially the components that tie into cybersecurity.
    • When the negative impacts of an IT threat event are translated into terms that can be understood and actioned by all in the organization, it increases the likelihood of receiving the sponsorship and funding support necessary.
    • Moreover, risk management can be used as a tool to drive the organization toward its vision state, enabling informed risk decisions.

    Risk management metric:

    Number of critical IT threats that were detected and prevented before impact to the organization.

    Beyond risk prevention
    Organizations that have a clear risk tolerance can use their risk assessments to better inform their decisions.
    Specifically, taking risks that could lead to a high return on investment or other key organizational drivers.

    Protect the organization from more than just cyber threats

    Other risk-related metrics:
    • Percentage of IT risks integrated into the organization’s risk management approach.
    • Number of risk management incidents that were not identified by your organization (and the potential financial impact of those risks).
    • Business satisfaction with IT actions to reduce impact of negative IT risk events.
    • Number of redundant systems removed from the organizations portfolio.
    Action steps to take:
    • Create a risk-aware culture, not just with IT folks. The entire organization needs to understand how IT risks are preventable.
    • Clearly demonstrate the financial and reputational impact of potential IT risks and ensure that this is communicated with decision-makers in the organization.
    • Have a single source of truth to document possible risk events and report prevention tactics to minimize the impact of risks.
    • Use this information to recommend budget changes and help make risk-informed decisions.

    49%

    Investing in Risk

    Heads of IT “cited increasing cybersecurity protections as the top business initiative driving IT investments this year” (Source: Foundry, 2022.)

    SECTION 2

    Delivering on Business Objectives

    Delivering on business objectives

    Deliver on initiatives that bring value to your organization and stop benchmarking
    • CIOs often want to know how they are performing in comparison to their competitors (aka where do you compare in the benchmarking?)
    • While this is a nice to know, it adds zero value in demonstrating that you understand your business, let alone the goals of your business
    • Every organization will have a different set of goals it is striving toward, despite being in the same industry, sector, or market.
    • Measuring your performance against the objectives of the organization prevents CIOs from being more technical than it would do them good.

    Business Objective Alignment Metric:

    Percentage of IT metrics have a direct line of impact to the business goals

    Stop using benchmarks to validate yourself against other organizations. Benchmarking does not provide:
    • Insight into how well that organization performed against their goals.
    • That other organizations goals are likely very different from your own organization's goals.
    • It often aggregates the scores so much; good and bad performers stop being clearly identified.

    Provide a clear line of sight from IT metrics to business goals

    Other business alignment metrics:
    • Number of IT initiatives that have a significant impact on the success of the organization's goals.
    • Number of IT initiatives that exceed the expected value.
    • Positive impact ($) of IT initiatives on driving business innovation.
    Action steps to take:
    • Establish a library or dashboard of all the metrics you are currently measuring as an IT organization, and align each of them to one or more of the business objectives your organization has.
    • Leverage the members of the organization’s executive team to validate they understand how your metric ties to the business objective.
    • Any metric that does not have a clear line of sight should be reconsidered.
    • IT metrics should continue to speak in business terms, not IT terms.

    50%

    CIOs drive the business

    The percentage of CEOs that recognize the CIO as the main driver of the business strategy in the next 2-3 years. (Source: Deloitte, 2020.)

    SECTION 3

    Impact on Customer Satisfaction

    Influencing end-customer satisfaction

    Directly or indirectly, IT influences how satisfied the customer is with their product or service
    • Now more than ever before, IT can positively influence the end-customer’s satisfaction with the product or service they purchase.
    • From operational redundancies to the customer’s interaction with the organization, IT can and should be positively impacting the customer experience.
    • IT leaders who take an interest in the customer demonstrate that they are business-focused individuals and understand the intention of what the organization is seeking to achieve.
    • With the CIO role becoming a strategic one, understanding why a customer would or would not purchase your organization’s product or service stops being a “nice to have.”

    Customer satisfaction metric:

    What is the positive impact ($ or %) of IT initiatives on customer satisfaction?

    Info-Tech Insight

    Be the one to suggest new IT initiatives that will impact the customer experience – stop waiting for other business leaders to make the recommendation.

    Enhance the end-customer experience with I&T

    Other customer satisfaction metrics:
    • Amount of time CIO spends interacting directly with customers.
    • Customer retention rate.
    • Customer attraction rate.
    Action steps to take:
    • Identify the core IT capabilities that support customer experience. Automation? Mobile application? Personal information secured?
    • Suggest an IT-supported or-led initiative that will enhance the customer experience and meet the business goals. Retention? Acquisition? Growth in spend?
    • This is where operational metrics or dashboards can have a real influence on the customer experience. Be mindful of how IT impacts the customer journey.

    41%

    Direct CX interaction

    In 2022, 41% of IT heads were directly interacting with the end customer. (Source: Foundry, 2022.)

    SECTION 4

    Keeping Employees Engaged

    Keeping employees engaged

    This is about more than just an annual engagement survey
    • As a leader, you should always have a finger on the pulse of how engaged your employees are
    • Employee engagement is high when:
      • Employees have a positive disposition to their place of work
      • Employees are committed and willing to contribute to the organization's success
    • Employee engagement comprises three types of drivers: organizational, job, and retention. As CIO, you have a direct impact on all three drivers.
    • Providing employees with a positive work environment where they are empowered to complete activities in line with their desired skillset and tied to a clear purpose can significantly increase employee engagement.

    Employee engagement metric:

    Number of employees who feel empowered to complete purposeful activities related to their job each day

    Engagement leads to increases in:
    • Innovation
    • Productivity
    • Performance
    • Teamwork
    While reducing costs associated with high turnover.

    Employees daily tasks need to have purpose

    Other employee engagement metrics:
    • Tenure of IT employees at the organization.
    • Number of employees who seek out or use a training budget to enhance their knowledge/skills.
    • Degree of autonomy employees feel they have in their work on a daily basis.
    • Number of collaboration tools provided to enable cross-organizational work.
    Action steps to take:
    • If you are not willing to take actionable steps to address engagement, don’t bother asking employees about it.
    • Identify the blockers to empowerment. Common blockers include insufficient team collaboration, bureaucracy, inflexibility, and feeling unsupported and judged.
    • Ensure there is a consistent understanding of what “purposeful” means. Are you talking about “purposeful” to the organization or the individual?
    • Provide more clarity on what the organization’s purpose is and the vision it is driving toward. Just because you understand does not mean the employees do.

    26%

    Act on engagement

    Only 26% of leaders actually think about and act on engagement every single day. (Source: SHRM, 2022.)

    SECTION 5

    Establishing Trusted Business Relationships

    Establishing trusted business partnerships

    Leverage your relationships with other C-suite executives to demonstrate IT’s value
    • Your relationship with other business peers is critical – and, funny enough, it is impacted by the use of good metrics and data.
    • The performance of your IT team will be recognized by other members of the executive leadership team (ELT) and is a direct reflection of you as a leader.
    • A good relationship with the ELT can alleviate issues if concerns about IT staff surface.
      • Of the 85% of IT leaders working on transformational initiatives, only 30% are trying to cultivate an IT/business partnership (Foundry, 2022).
    • Don’t let other members of the organizations ELT overlook you or the value IT has. Build the key relationships that will drive trust and partnerships.

    Business leadership relationship metric:

    Ability to influence business decisions with trusted partners.

    Some key relationships that are worth forming with other C-suite executives right now include:
    • Chief Sustainability Officer
    • Chief Revenue Officer
    • Chief Marketing Officer
    • Chief Data Officer

    Influence business decisions with trusted partners

    Other business relations metrics:
    • The frequency with which peers on the ELT complain about the IT organization to other ELT peers.
    • Percentage of business leaders who trust IT to make the right choices for their accountable areas.
    • Number of projects that are initiated with a desired solution versus problems with no desired solution.
    Action steps to take:
    • From lunch to the boardroom, it is important you make an effort to cultivate relationships with the other members of the ELT.
    • Identify who the most influential members of the ELT are and what their primary goals or objectives are.
    • Follow through on what you promise you will deliver – if you do not know, do not promise it!
    • What will work for one member of the ELT will not work for another – personalize your approach.

    60%

    Enterprise-wide collaboration

    “By 2023, 60% of CIOs will be primarily measured for their ability to co-create new business models and outcomes through extensive enterprise and ecosystem-wide collaboration.” (Source: IDC, 2021.)

    SECTION 6

    Managing to a Budget

    Managing to a budget

    Every CIO needs to be able to spend within budget while increasing their strategic impact
    • From security, to cloud, to innovating the organization's products and services, IT has a lot of initiatives that demand funds and improve the organization.
    • Continuing to demonstrate good use of the budget and driving value for the organization will ensure ongoing recognition in the form of increased money.
    • 29% of CIOs indicated that controlling costs and expense management was a key duty of a functional CIO (Foundry, 2022).
    • Demonstrating the ability to spend within a defined budget is a key way to ensure the business trusts you.
    • Demonstrating an ability to spend within a defined budget and reducing the cost of operational expenses while increasing spend on strategic initiatives ensures the business sees the value in IT.

    Budget management metric:

    Proportion of IT budget that is strategic versus operational.

    Info-Tech Insight

    CIOs need to see their IT function as its own business – budget and spend like a CEO.

    Demonstrate IT’s ability to spend strategically

    Other budget management metrics:
    • Cost required to lead the organization through a digital transformation.
    • Reduction in operational spend due to retiring legacy solutions.
    • Percentage of budget in the run, grow, and transform categories.
    • Amount of money spent keeping the lights on versus investing in new capabilities.

    Action steps to take:

    • Consider opportunities to automate processes and reduce the time/talent required to spend.
    • Identify opportunities and create the time for resources to modernize or even digitize the organization to enable a better delivery of the products or services to the end customer.
    • Review the previous metrics and tie it back to running the business. If customer satisfaction will increase or risk-related threats decrease through an initiative IT is suggesting, you can make the case for increased strategic spend.

    90%

    Direct CX interaction

    Ninety percent of CIOs expect their budget to increase or remain the same in their next fiscal year. (Source: Foundry, 2022.)

    Research contributors and experts

    Photo of Jeff Neyland. Jeff Neyland
    Chief Information Officer – University of Texas at Arlington
    Photo of Brett Trelfa. Brett Trelfa
    SVP and CIO – Arkansas Blue Cross Blue Shield
    Blank photo template. Lynn Fyhrlund
    Chief Information Officer – Milwaukee County Department of Administrative Services

    Info-Tech Research Group

    Vicki Van Alphen Executive Counselor Ibrahim Abdel-Kader Research Analyst
    Mary Van Leer Executive Counselor Graham Price Executive Counselor
    Jack Hakimian Vice President Research Valence Howden Principal Research Director
    Mike Tweedie CIO Practice Lead Tony Denford Organization Transformation Practice Lead

    Related Info-Tech Research

    Sample of the 'IT Metrics Library'. IT Metrics Library
    • Use this tool to review commonly used KPIs for each practice area
    • Identify KPI owners, data sources, baselines, and targets. It also suggests action and research for low-performing KPIs.
    • Use the "Action Plan" tab to keep track of progress on actions that were identified as part of your KPI review.
    Sample of 'Define Service Desk Metrics That Matter'. Define Service Desk Metrics That Matter
    • Consolidate your metrics and assign context and actions to those currently tracked.
    • Establish tension metrics to see and tell the whole story.
    • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.
    Sample of 'CIO Priorities 2022'. CIO Priorities 2022
    • Understand how to respond to trends affecting your organization.
    • Determine your priorities based on current state and relevant internal factors.
    • Assign the right resources to accomplish your vision.
    • Consider what new challenges outside of your control will demand a response.

    Bibliography

    “Developing and Sustaining Employee Engagement.” SHRM, 2022.

    Dopson, Elise. “KPIs Vs. Metrics: What’s the Difference & How Do You Measure Both?” Databox, 23 Jun. 2021.

    Shirer, Michael, and Sarah Murray. “IDC Unveils Worldwide CIO Agenda 2022 Predictions.” IDC, 27 Oct. 2021.

    Suer, Myles. “The Most Important Metrics to Drive IT as a Business.” CIO, 19 Mar. 2019.

    “The new CIO: Business Savvy.” Deloitte Insights. Deloitte, 2020.

    “2022 State of the CIO: Rebalancing Act: CIO’s Operational Pandemic-Era Innovation.” Foundry, 2022.

    “Why Employee Engagement Matters for Leadership at all Levels.” Walden University, 20 Dec. 2019.

    Zhang, Xihui, et al. “How to Measure IT Effectiveness: The CIO’s Perspective.” Journal of Informational Technology Management, 29(4). 2018.

    Build a Cloud Security Strategy

    • Buy Link or Shortcode: {j2store}169|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $38,592 Average $ Saved
    • member rating average days saved: 44 Average Days Saved
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • Leveraging the cloud introduces IT professionals to a new world that they are tasked with securing.
    • With many cloud vendors proposing to share the security responsibility, it can be a challenge for organizations to develop a clear understanding of how they can best secure their data off premises.

    Our Advice

    Critical Insight

    • Cloud security is not fundamentally different from security on premises.
    • While some of the mechanics are different, the underlying principles are the same. Accountability doesn’t disappear.
    • By virtue of its broad network accessibility, the cloud does expose decisions to extreme scrutiny, however.

    Impact and Result

    • The business is adopting a cloud environment and it must be secured, which includes:
      • Ensuring business data cannot be leaked or stolen.
      • Maintaining privacy of data and other information.
      • Securing the network connection points.
    • This blueprint and associated tools are scalable for all types of organizations within various industry sectors.

    Build a Cloud Security Strategy Research & Tools

    Start Here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a cloud security strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Explore security considerations for the cloud

    Explore how the cloud changes the required controls and implementation strategies for a variety of different security domains.

    • Build a Cloud Security Strategy – Phase 1: Explore Security Considerations for the Cloud
    • Cloud Security Information Security Gap Analysis Tool
    • Cloud Security Strategy Template

    2. Prioritize initiatives and construct a roadmap

    Develop your organizational approach to various domains of security in the cloud, considering the cloud’s unique risks and challenges.

    • Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap
    [infographic]

    Workshop: Build a Cloud Security Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your Approach

    The Purpose

    Define your unique approach to improving security in the cloud.

    Key Benefits Achieved

    An understanding of the organization’s requirements for cloud security.

    Activities

    1.1 Define your approach to cloud security.

    1.2 Define your governance requirements.

    1.3 Define your cloud security management requirements.

    Outputs

    Defined cloud security approach

    Defined governance requirements

    2 Respond to Cloud Security Challenges

    The Purpose

    Explore challenges posed by the cloud in various areas of security.

    Key Benefits Achieved

    An understanding of how the organization needs to evolve to combat the unique security challenges of the cloud.

    Activities

    2.1 Explore cloud asset management.

    2.2 Explore cloud network security.

    2.3 Explore cloud application security.

    2.4 Explore log and event management.

    2.5 Explore cloud incident response.

    2.6 Explore cloud eDiscovery and forensics.

    2.7 Explore cloud backup and recovery.

    Outputs

    Understanding of cloud security strategy components (cont.).

    3 Build Cloud Security Roadmap

    The Purpose

    Identify initiatives to mitigate challenges posed by the cloud in various areas of security.

    Key Benefits Achieved

    A roadmap for improving security in the cloud.

    Activities

    3.1 Define tasks and initiatives.

    3.2 Finalize your task list

    3.3 Consolidate gap closure actions into initiatives.

    3.4 Finalize initiative list.

    3.5 Conduct a cost-benefit analysis.

    3.6 Prioritize initiatives and construct a roadmap.

    3.7 Create effort map.

    3.8 Assign initiative execution waves.

    3.9 Finalize prioritization.

    3.10 Incorporate initiatives into a roadmap.

    3.11 Schedule initiatives.

    3.12 Review your results.

    Outputs

    Defined task list.

    Cost-benefit analysis

    Roadmap

    Effort map

    Initiative schedule

    Implement a New IT Organizational Structure

    • Buy Link or Shortcode: {j2store}276|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $30,999 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Organizational Design
    • Parent Category Link: /organizational-design
    • Organizational design implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
    • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

    Our Advice

    Critical Insight

    • Mismanagement will hurt you. The majority of IT organizations do not manage organizational design implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
    • Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. IT leaders have a tendency to focus their efforts on operational changes rather than on people.

    Impact and Result

    Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change.

    Follow Info-Tech’s 5-step process to:

    1. Effect change and sustain productivity through real-time employee engagement monitoring.
    2. Kick off the organizational design implementation with effective communication.
    3. Build an integrated departmental transition strategy.
    4. Train managers to effectively lead through change.
    5. Develop personalized transition plans.

    Implement a New IT Organizational Structure Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how you should implement a new organizational design, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a change communication strategy

    Create strategies to communicate the changes to staff and maintain their level of engagement.

    • Implement a New Organizational Structure – Phase 1: Build a Change Communication Strategy
    • Organizational Design Implementation FAQ
    • Organizational Design Implementation Kick-Off Presentation

    2. Build the organizational transition plan

    Build a holistic list of projects that will enable the implementation of the organizational structure.

    • Implement a New Organizational Structure – Phase 2: Build the Organizational Transition Plan
    • Organizational Design Implementation Project Planning Tool

    3. Lead staff through the reorganization

    Lead a workshop to train managers to lead their staff through the changes and build transition plans for all staff members.

    • Implement a New Organizational Structure – Phase 3: Lead Staff Through the Reorganization
    • Organizational Design Implementation Manager Training Guide
    • Organizational Design Implementation Stakeholder Engagement Plan Template
    • Organizational Design Implementation Transition Plan Template
    [infographic]

    Workshop: Implement a New IT Organizational Structure

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Build Your Change Project Plan

    The Purpose

    Create a holistic change project plan to mitigate the risks of organizational change.

    Key Benefits Achieved

    Building a change project plan that encompasses both the operational changes and minimizes stakeholder and employee resistance to change.

    Activities

    1.1 Review the new organizational structure.

    1.2 Determine the scope of your organizational changes.

    1.3 Review your MLI results.

    1.4 Brainstorm a list of projects to enable the change.

    Outputs

    Project management planning and monitoring tool

    McLean Leadership Index dashboard

    2 Finalize Change Project Plan

    The Purpose

    Finalize the change project plan started on day 1.

    Key Benefits Achieved

    Finalize the tasks that need to be completed as part of the change project.

    Activities

    2.1 Brainstorm the tasks that are contained within the change projects.

    2.2 Determine the resource allocations for the projects.

    2.3 Understand the dependencies of the projects.

    2.4 Create a progress monitoring schedule.

    Outputs

    Completed project management planning and monitoring tool

    3 Enlist Your Implementation Team

    The Purpose

    Enlist key members of your team to drive the implementation of your new organizational design.

    Key Benefits Achieved

    Mitigate the risks of staff resistance to the change and low engagement that can result from major organizational change projects.

    Activities

    3.1 Determine the members that are best suited for the team.

    3.2 Build a RACI to define their roles.

    3.3 Create a change vision.

    3.4 Create your change communication strategy.

    Outputs

    Communication strategy

    4 Train Your Managers to Lead Through Change

    The Purpose

    Train your managers who are more technically focused to handle the people side of the change.

    Key Benefits Achieved

    Leverage your managers to translate how the organizational change will directly impact individuals on their teams.

    Activities

    4.1 Conduct the manager training workshop with managers.

    4.2 Review the stakeholder engagement plans.

    4.3 Review individual transition plan template with managers.

    Outputs

    Conflict style self-assessments

    Stakeholder engagement plans

    Individual transition plan template

    5 Build Your Transition Plans

    The Purpose

    Complete transition plans for individual members of your staff.

    Key Benefits Achieved

    Create individual plans for your staff members to ease the transition into their new roles.

    Activities

    5.1 Bring managers back in to complete transition plans.

    5.2 Revisit the new organizational design as a source of information.

    5.3 Complete aspects of the templates that do not require staff feedback.

    5.4 Discuss strategies for transitioning.

    Outputs

    Individual transition plan template

    Further reading

    Implement a New IT Organizational Structure

    Prioritize quick wins and critical services during IT org changes.

    This blueprint is part 3/3 in Info-Tech’s organizational design program and focuses on implementing a new structure

    Part 1: Design Part 2: Structure Part 3: Implement
    IT Organizational Architecture Organizational Sketch Organizational Structure Organizational Chart Transition Strategy Implement Structure
    1. Define the organizational design objectives.
    2. Develop strategically-aligned capability map.
    3. Create the organizational design framework.
    4. Define the future state work units.
    5. Create future state work unit mandates.
    1. Assign work to work units (accountabilities and responsibilities).
    2. Develop organizational model options (organizational sketches).
    3. Assess options and select go-forward model.
    1. Define roles by work unit.
    2. Create role mandates.
    3. Turn roles into jobs.
    4. Define reporting relationships between jobs.
    5. Define competency requirements.
    1. Determine number of positions per job.
    2. Conduct competency assessment.
    3. Assign staff to jobs.
    1. Form OD implementation team.
    2. Develop change vision.
    3. Build communication presentation.
    4. Identify and plan change projects.
    5. Develop organizational transition plan.
    1. Train managers to lead through change.
    2. Define and implement stakeholder engagement plan.
    3. Develop individual transition plans.
    4. Implement transition plans.
    Risk Management: Create, implement, and monitor risk management plan.
    HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

    Monitor and Sustain Stakeholder Engagement →

    The sections highlighted in green are in scope for this blueprint. Click here for more information on designing or on structuring a new organization.

    Our understanding of the problem

    This Research is Designed For:

    • CIOs

    This Research Will Help You:

    • Effectively implement a new organizational structure.
    • Develop effective communications to minimize turnover and lost productivity during transition.
    • Identify a detailed transition strategy to move to your new structure with minimal interruptions to service quality.
    • Train managers to lead through change and measure ongoing employee engagement.

    This Research Will Also Assist:

    • IT Leaders

    This Research Will Help Them:

    • Effectively lead through the organizational change.
    • Manage difficult conversations with staff and mitigate staff concerns and turnover.
    • Build clear transition plans for their teams.

    Executive summary

    Situation

    • Organizational Design (OD) projects are typically undertaken in order to enable organizational priorities, improve IT performance, or to reduce IT costs. However, due to the highly disruptive nature of the change, only 25% of changes achieve their objectives over the long term. (2013 Towers Watson Change and Communication ROI Survey)

    Complication

    • OD implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
    • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

    Resolution

    • Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change. Follow Info-Tech’s 5-step process to:
      1. Effect change and sustain productivity through real-time employee engagement monitoring.
      2. Kick off the organizational design implementation with effective communication.
      3. Build an integrated departmental transition strategy.
      4. Train managers to effectively lead through change.
      5. Develop personalized transition plans.

    Info-Tech Insight

    1. Mismanagement will hurt you. The majority of IT organizations do not manage OD implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
    2. Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. (Abilla, 2009) IT leaders have a tendency to focus their efforts on operational changes rather than on people. This is a recipe for failure.

    Organizational Design Implementation

    Managing organizational design (OD) changes effectively is critical to maintaining IT service levels and retaining top talent throughout a restructure. Nevertheless, many organizations fail to invest appropriate consideration and resources into effective OD change planning and execution.

    THREE REASONS WHY CIOS NEED TO EFFECTIVELY MANAGE CHANGE:

    1. Failure is the norm; not the exception. According to a study by Towers Watson, only 55% of organizations experience the initial value of a change. Even fewer organizations, a mere 25%, are actually able to sustain change over time to experience the full expected benefits. (2013 Towers Watson Change and Communication ROI Survey)
    2. People are the biggest cause of failure. Organizational design changes are one of the most difficult types of changes to manage as staff are often highly resistant. This leads to decreased productivity and poor results. The most significant people challenge is the loss of momentum through the change process which needs to be actively managed.
    3. Failure costs money. Poor IT OD implementations can result in increased turnover, lost productivity, and decreased satisfaction from the business. Managing the implementation has a clear ROI as the cost of voluntary turnover is estimated to be 150% of an employee’s annual salary. (Inc)

    86% of IT leaders believe organization and leadership processes are critical, yet the majority struggle to be effective

    PERCENTAGE OF IT LEADERS WHO BELIEVE THEIR ORGANIZATION AND LEADERSHIP PROCESSES ARE HIGHLY IMPORTANT AND HIGHLY EFFECTIVE

    A bar graph, with the following organization and leadership processes listed on the Y-axis: Human Resources Management; Leadership, Culture, Values; Organizational Change Management; and Organizational Design. The bar graph shows that over 80% of IT leaders rate these processes as High Importance, but less than 40% rate them as having High Effectiveness.

    GAP BETWEEN IMPORTANCE AND EFFECTIVENESS

    Human Resources Management - 61%

    Leadership, Culture, Values - 48%

    Organizational Change Management - 55%

    Organizational Design - 45%

    Note: Importance and effectiveness were determined by identifying the percentage of individuals who responded with 8-10/10 to the questions…

    • “How important is this process to the organization’s ability to achieve business and IT goals?” and…
    • “How effective is this process at helping the organization to achieve business and IT goals?”

    Source: Info-Tech Research Group, Management and Governance Diagnostic. N=22,800 IT Professionals

    Follow a structured approach to your OD implementation to improve stakeholder satisfaction with IT and minimize risk

    • IT reorganizations are typically undertaken to enable strategic goals, improve efficiency and performance, or because of significant changes to the IT budget. Without a structured approach to manage the organizational change, IT might get the implementation done, but fail to achieve the intended benefits, i.e. the operation succeeds, but the patient has died on the table.
    • When implementing your new organizational design, it’s critical to follow a structured approach to ensure that you can maintain IT service levels and performance and achieve the intended benefits.
    • The impact of organizational structure changes can be emotional and stressful for staff. As such, in order to limit voluntary turnover, and to maintain productivity and performance, IT leaders need to be strategic about how they communicate and respond to resistance to change.

    TOP 3 BENEFITS OF FOLLOWING A STRUCTURED APPROACH TO IMPLEMENTING ORGANIZATIONAL DESIGN

    1. Improved stakeholder satisfaction with IT. A detailed change strategy will allow you to successfully transition staff into new roles with limited service interruptions and with improved stakeholder satisfaction.
    2. Experience minimal voluntary turnover throughout the change. Know how to actively engage and minimize resistance of stakeholders throughout the change.
    3. Execute implementation on time and on budget. Effectively managed implementations are 65–80% more likely to meet initial objectives than those with poor organizational change management. (Boxley Group, LLC)

    Optimize your organizational design implementation results by actively preparing managers to lead through change

    IT leaders have a tendency to make change even more difficult by focusing on operations rather than on people. This is a recipe for failure. People pose the greatest risk to effective implementation and as such, IT managers need to be prepared and trained on how to lead their staff through the change. This includes knowing how to identify and manage resistance, communicating the change, and maintaining positive momentum with staff.

    Staff resistance and momentum are the most challenging part of leading through change (McLean & Company, N=196)

    A bar graph with the following aspects of Change Management listed on the Y-Axis, in increasing order of difficulty: Dealing with Technical Issues; Monitoring metrics to measure progress; Amending policies and processes; Coordinating with stakeholders; Getting buy-in from staff; Maintaining a positive momentum with staff.

    Reasons why change fails: 72% of failures can be directly improved by the manager (shmula)

    A pie chart showing the reasons why change fails: Management behavior not supportive of change = 33%; Employee resistance to change = 39%; Inadequate resources or budget = 14%; and All other obstacles = 14%.

    Leverage organizational change management (OCM) best practices for increased OD implementation success

    Effective change management correlates with project success

    A line graph, with Percent of respondents that met or exceeded project objectives listed on the Y-axis, and Poor, Fair, Good, and Excellent listed on the X-axis. The line represents the overall effectiveness of the change management program, and as the value on the Y-axis increases, so does the value on the X-axis.

    Source: Prosci. From Prosci’s 2012 Best Practices in Change Management benchmarking report.

    95% of projects with excellent change management met or EXCEEDED OBJECTIVES, vs. 15% of those with poor OCM. (Prosci)

    143% ROI on projects with excellent OCM. In other words, for every dollar spent on the project, the company GAINS 43 CENTS. This is in contrast to 35% ROI on projects with poor OCM. (McKinsey)

    Info-Tech’s approach to OD implementation is a practical and tactical adaptation of several successful OCM models

    BUSINESS STRATEGY-ORIENTED OCM MODELS. John Kotter’s 8-Step model, for instance, provides a strong framework for transformational change but doesn’t specifically take into account the unique needs of an IT transformation.

    GENERAL-PURPOSE OCM FRAMEWORKS such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to organizational design implementation-specific initiatives.

    COBIT MANAGEMENT PRACTICE BAI05: MANAGE ORGANIZATIONAL CHANGE ENABLEMENT follows a structured process for implementing enterprise change quickly. This framework can be adapted to OD implementation; however, it is most effective when augmented with the people and management training elements present in other frameworks.

    References and Further Reading

    Tailoring a comprehensive, general-purpose OCM framework to an OD implementation requires familiarity and experience. Info-Tech’s OD implementation model adapts the best practices from a wide range of proven OCM models and distills it into a step-by-step process that can be applied to an organizational design transformation.

    The following OD implementation symptoms can be avoided through structured planning

    IN PREVIOUS ORGANIZATIONAL CHANGES, I’VE EXPERIENCED…

    “Difficultly motivating my staff to change.”

    “Higher than average voluntary turnover during and following the implementation.”

    “An overall sense of staff frustration or decreased employee engagement.”

    “Decreased staff productivity and an inability to meet SLAs.”

    “Increased overtime caused by being asked to do two jobs at once.”

    “Confusion about the reporting structure during the change.”

    “Difficulty keeping up with the rate of change and change fatigue from staff.”

    “Business partner dissatisfaction about the change and complaints about the lack of effort or care put in by IT employees.”

    “Business partners not wanting to adjust to the change and continuing to follow outdated processes.”

    “Decrease in stakeholder satisfaction with IT.”

    “Increased prevalence of shadow IT during or following the change.”

    “Staff members vocally complaining about the IT organization and leadership team.”

    Follow this blueprint to develop and execute on your OD implementation

    IT leaders often lack the experience and time to effectively execute on organizational changes. Info-Tech’s organizational design implementation program will provide you with the needed tools, templates, and deliverables. Use these insights to drive action plans and initiatives for improvement.

    How we can help

    • Measure the ongoing engagement of your employees using Info-Tech’s MLI diagnostic. The diagnostic comes complete with easily customizable reports to track and act on employee engagement throughout the life of the change.
    • Use Info-Tech’s customizable project management tools to identify all of the critical changes, their impact on stakeholders, and mitigate potential implementation risks.
    • Develop an in-depth action plan and transition plans for individual stakeholders to ensure that productivity remains high and that service levels and project expectations are met.
    • Align communication with real-time staff engagement data to keep stakeholders motivated and focused throughout the change.
    • Use Info-Tech’s detailed facilitation guide to train managers on how to effectively communicate the change, manage difficult stakeholders, and help ensure a smooth transition.

    Leverage Info-Tech’s customizable deliverables to execute your organizational design implementation

    A graphic with 3 sections: 1.BUILD A CHANGE COMMUNICATION STRATEGY; 2.BUILD THE ORGANIZATIONAL TRANSITION PLAN; 3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE; 3.2 TRANSITION STAFF TO NEW ROLES. An arrow emerges from point one and directs right, over the rest of the steps. Text above the arrow reads: ONGOING ENGAGEMENT MONITORING AND COMMUNICATION. Dotted arrows emerge from points two and three directing back toward point one. Text below the arrow reads: COMMUNICATION STRATEGY ITERATION.

    CUSTOMIZABLE PROJECT DELIVERABLES

    1. BUILD A CHANGE COMMUNICATION STRATEGY

    • McLean Leadership Index: Real-Time Employee Engagement Dashboard
    • Organizational Design
    • Implementation Kick-Off Presentation
    • Organizational Design Implementation FAQ

    2. BUILD THE ORGANIZATIONAL TRANSITION PLAN

    • Organizational Design Implementation Project Planning Tool

    3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE

    3.2 TRANSITION STAFF TO NEW ROLES

    • Organizational Design Implementation Manager Training Guide
    • Organizational Design Implementation Transition Plan Template

    Leverage Info-Tech’s tools and templates to overcome key engagement program implementation challenges

    KEY SECTION INSIGHTS:

    BUILD A CHANGE COMMUNICATION STRATEGY

    Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring and managing of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy before engagement risks become issues.

    BUILD THE ORGANIZATIONAL TRANSITION PLAN

    Your organizational design implementation is made up of a series of projects and needs to be integrated into your larger project schedule. Too often, organizations attempt to fit the organizational design implementation into their existing schedules which results in poor resource planning, long delays in implementation, and overall poor results.

    LEAD STAFF THROUGH THE REORGANIZATION

    The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Abilla, 2009)

    METRICS:

    1. Voluntary turnover: Conduct an exit interview with all staff members during and after transition. Identify any staff members who cite the change as a reason for departure. For those who do leave, multiply their salary by 1.5% (the cost of a new hire) and track this over time.
    2. Business satisfaction trends: Conduct CIO Business Vision one year prior to the change vs. one year after change kick-off. Prior to the reorganization, set metrics for each category for six months after the reorganization, and one year following.
    3. Saved development costs: Number of hours to develop internal methodology, tools, templates, and process multiplied by the salary of the individual.

    Use this blueprint to save 1–3 months in implementing your new organizational structure

    Time and Effort Using Blueprint Without Blueprint
    Assess Current and Ongoing Engagement 1 person ½ day – 4 weeks 1–2 hours for diagnostic set up (allow extra 4 weeks to launch and review initial results). High Value 4–8 weeks
    Set Up the Departmental Change Workbooks 1–5 people 1 day 4–5 hours (varies based on the scope of the change). Medium Value 1–2 weeks
    Design Transition Strategy 1–2 people 1 day 2–10 hours of implementation team’s time. Medium Value 0–2 weeks
    Train Managers to Lead Through Change 1–5 people 1–2 weeks 1–2 hours to prepare training (allow for 3–4 hours per management team to execute). High Value 3–5 weeks

    These estimates are based on reviews with Info-Tech clients and our experience creating the blueprint.

    Totals:

    Workshop: 1 week

    GI/DIY: 2-6 weeks

    Time and Effort Saved: 8-17 weeks

    CIO uses holistic organizational change management strategies to overcome previous reorganization failures

    CASE STUDY

    Industry: Manufacturing

    Source: Client interview

    Problem

    When the CIO of a large manufacturing company decided to undertake a major reorganization project, he was confronted with the stigma of a previous CIO’s attempt. Senior management at the company were wary of the reorganization since the previous attempt had failed and cost a lot of money. There was major turnover since staff were not happy with their new roles costing $250,000 for new hires. The IT department saw a decline in their satisfaction scores and a 10% increase in help desk tickets. The reorganization also cost the department $400,000 in project rework.

    Solution

    The new CIO used organizational change management strategies in order to thoroughly plan the implementation of the new organizational structure. The changes were communicated to staff in order to improve adoption, every element of the change was mapped out, and the managers were trained to lead their staff through the change.

    Results

    The reorganization was successful and eagerly adopted by the staff. There was no turnover after the new organizational structure was implemented and the engagement levels of the staff remained the same.

    $250,000 - Cost of new hires and salary changes

    10% - Increase in help desk tickets

    $400,000 - Cost of project delays due to the poorly effective implementation of changes

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Implement a New Organizational Structure

    3. Lead Staff Through the Reorganization
    1. Build a Change Communication Strategy 2. Build the Organizational Transition Plan 3.1 Train Managers to Lead Through Change 3.2 Transition Staff to New Roles
    Best-Practice Toolkit

    1.1 Launch the McLean Leadership Index to set a baseline.

    1.2 Establish your implementation team.

    1.3 Build your change communication strategy and change vision.

    2.1 Build a holistic list of change projects.

    2.2 Monitor and track the progress of your change projects.

    3.1.1 Conduct a workshop with managers to prepare them to lead through the change.

    3.1.2 Build stakeholder engagement plans and conduct conflict style self-assessments.

    3.2.1 Build transition plans for each of your staff members.

    3.2.2 Transition your staff to their new roles.

    Guided Implementations
    • Set up your MLI Survey.
    • Determine the members and roles of your implementation team.
    • Review the components of a change communication strategy.
    • Review the change dimensions and how they are used to plan change projects.
    • Review the list of change projects.
    • Review the materials and practice conducting the workshop.
    • Debrief after conducting the workshop.
    • Review the individual transition plan and the process for completing it.
    • Final consultation before transitioning staff to their new roles.
    Onsite Workshop Module 1: Effectively communicate the reorganization to your staff. Module 2: Build the organizational transition plan. Module 3.1: Train your managers to lead through change. Module 3.2: Complete your transition plans

    Phase 1 Results:

    • Plans for effectively communicating with your staff.

    Phase 2 Results:

    • A holistic view of the portfolio of projects required for a successful reorg

    Phase 3.1 Results:

    • A management team that is capable of leading their staff through the reorganization

    Phase 3.2 Results:

    • Completed transition plans for your entire staff.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Build Your Change Project Plan

    1.1 Review the new organizational structure.

    1.2 Determine the scope of your organizational changes.

    1.3 Review your MLI results.

    1.4 Brainstorm a list of projects to enable the change.

    Finalize Change Project Plan

    2.1 Brainstorm the tasks that are contained within the change projects.

    2.2 Determine the resource allocation for the projects.

    2.3 Understand the dependencies of the projects.

    2.4 Create a progress monitoring schedule

    Enlist Your Implementation Team

    3.1 Determine the members that are best suited for the team.

    3.2 Build a RACI to define their roles.

    3.3 Create a change vision.

    3.4 Create your change communication strategy.

    Train Your Managers to Lead Through Change

    4.1 Conduct the manager training workshop with managers.

    4.2 Review the stakeholder engagement plans.

    4.3 Review individual transition plan template with managers

    Build Your Transition Plans

    5.1 Bring managers back in to complete transition plans.

    5.2 Revisit new organizational design as a source for information.

    5.3 Complete aspects of the template that do not require feedback.

    5.4 Discuss strategies for transitioning.

    Deliverables
    1. McLean Leadership Index Dashboard
    2. Organizational Design Implementation Project Planning Tool
    1. Completed Organizational Design Implementation Project Planning Tool
    1. Communication Strategy
    1. Stakeholder Engagement Plans
    2. Conflict Style Self-Assessments
    3. Organizational Design Implementation Transition Plan Template
    1. Organizational Design Implementation Transition Plan Template

    Phase 1

    Build a Change Communication Strategy

    Build a change communication strategy

    Outcomes of this Section:

    • Launch the McLean Leadership Index
    • Define your change team
    • Build your reorganization kick-off presentation and FAQ for staff and business stakeholders

    This section involves the following participants:

    • CIO
    • IT leadership team
    • IT staff

    Key Section Insight:

    Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy in real-time before engagement risks become issues.

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Build a Change Communication Strategy

    Proposed Time to Completion (in weeks): 1-6 weeks

    Step 1.1: Launch Your McLean Leadership Index Survey

    Start with an analyst kick off call:

    • Discuss the benefits and uses of the MLI.
    • Go over the required information (demographics, permissions, etc.).
    • Set up a live demo of the survey.

    Then complete these activities…

    • Launch the survey with your staff.
    • Have a results call with a member of the Info-Tech staff.

    With these tools & templates:

    McLean Leadership Index

    Step 1.2: Establish Your Implementation Team

    Review findings with analyst:

    • Review what members of your department should participate.
    • Build a RACI to determine the roles of your team members.

    Then complete these activities…

    • Hold a kick-off meeting with your new implementation team.
    • Build the RACI for your new team members and their roles.

    Step 1.3: Build Your Change Communication Strategy

    Finalize phase deliverable:

    • Customize your reorganization kick-off presentation.
    • Create your change vision. Review the communication strategy.

    Then complete these activities…

    • Hold your kick-off presentation with staff members.
    • Launch the reorganization communications.

    With these tools & templates:

    • Organizational Design Implementation Kick-Off Presentation
    • Organizational Design Implementation FAQ

    Set the stage for the organizational design implementation by effectively introducing and communicating the change to staff

    Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people and communication aspects around the change are amongst the toughest work there is, and require a comfort and competency with uncertainty, ambiguity, and conflict.

    Design Engagement Transition
    Communication

    Communication and engagement are the chains linking your design to transition. If the organizational design initiative is going to be successful it is critical that you manage this effectively. The earlier you begin planning the better. The more open and honest you are about the change the easier it will be to maintain engagement levels, business satisfaction, and overall IT productivity.

    Kick-Off Presentation Inputs

    • LAUNCH THE MCLEAN LEADERSHIP INDEX
    • IDENTIFY YOUR CHANGE TEAM
    • DETERMINE CHANGE TEAM RESPONSIBILITIES
    • DEVELOP THE CHANGE VISION
    • DEFINE KEY MESSAGES AND GOALS
    • IDENTIFY MAJOR CHANGES
    • IDENTIFY KEY MILESTONES
    • BUILD AND MAINTAIN A CHANGE FAQ

    Use the MLI engagement dashboard to measure your current state and the impact of the change in real-time

    The McLean Leadership Index diagnostic is a low-effort, high-impact program that provides real-time metrics on staff engagement levels. Use these insights to understand your employees’ engagement levels throughout the organizational design implementation to measure the impact of the change and to manage turnover and productivity levels throughout the implementation.

    WHY CARE ABOUT ENGAGEMENT DURING THE CHANGE? ENGAGED EMPLOYEES REPORT:

    39% Higher intention to stay at the organization.

    29% Higher performance and increased likelihood to work harder and longer hours. (Source: McLean and Company N=1,308 IT Employees)

    Why the McLean Leadership Index?

    Based on the Net Promoter Score (NPS), the McLean Leadership Index is one question asked monthly to assess engagement at various points in time.

    Individuals responding to the MLI question with a 9 or 10 are your Promoters and are most positive and passionate. Those who answer 7 or 8 are Passives while those who answer 0 to 6 are Detractors.

    Track your engagement distribution using our online dashboard to view MLI data at any time and view results based on teams, locations, manager, tenure, age, and gender. Assess the reactions to events and changes in real-time, analyze trends over time, and course-correct.

    Dashboard reports: Know your staff’s overall engagement and top priorities

    McLean Leadership Index

    OVERALL ENGAGEMENT RESULTS

    You get:

    • A clear breakdown of your detractors, passives, and promotors.
    • To view results by team, location, and individual manager.
    • To dig deeper into results by reviewing results by age, gender, and tenure at the organization to effectively identify areas where engagement is weak.

    TIME SERIES TRENDS

    You get:

    • View of changes in engagement levels for each team, location, and manager.
    • Breakdown of trends weekly, monthly, quarterly, and yearly.
    • To encourage leaders to monitor results to analyze root causes for changes and generate improvement initiatives.

    QUALITATIVE COMMENTS

    You get:

    • To view qualitative comments provided by staff on what is impacting their engagement.
    • To reply directly to comments without impacting the anonymity of the individuals making the comments.
    • To leverage trends in the comments to make changes to communication approaches.

    Launch the McLean Leadership Index in under three weeks

    Info-Tech’s dedicated team of program managers will facilitate this diagnostic program remotely, providing you with a convenient, low-effort, high-impact experience.

    We will guide you through the process with your goals in mind to deliver deep insight into your successes and areas to improve.

    What You Need To Do:

    1. Contact Info-Tech to launch the program and test the functionality in a live demo.
    2. Identify demographics and set access permissions.
    3. Complete manager training with assistance from Info-Tech Advisors.
    4. Participate in a results call with an Info-Tech Advisor to review results and develop an action plan.

    Info-Tech’s Program Manager Will:

    1. Collect necessary inputs and generate your custom dashboard.
    2. Launch, maintain, and support the online system in the field.
    3. Send out a survey to 25% of the staff each week.
    4. Provide ongoing support over the phone, and the needed tools and templates to communicate and train staff as well as take action on results.

    Explore your initial results in a one-hour call with an Executive Advisor to fully understand the results and draw insights from the data so you can start your action plan.

    Start Your Diagnostic Now

    We'll help you get set up as soon as you're ready.

    Start Now

    Communication has a direct impact on employee engagement; measure communication quality using your MLI results

    A line graph titled: The impact of manager communication on employee engagement. The X-axis is labeled from Strongly Disagree to Strongly Agree, and the Y-axis is labeled: Percent of Engaged Respondents. There are 3 colour-coded lines: dark blue indicates My manager provides me with high-quality feedback; light blue indicates I clearly understand what is expected of me on the job; and green indicates My manager keeps me well informed about decisions that affect me. The line turns upward as it moves to the right of the graph.

    (McLean & Company, 2015 N=17,921)

    A clear relationship exists between how effective a manager’s communication is perceived to be and an employee’s level of engagement. If engagement drops, circle back with employees to understand the root causes.

    Establish an effective implementation team to drive the organizational change

    The implementation team is responsible for developing and disseminating information around the change, developing the transition strategy, and for the ongoing management of the changes.

    The members of the implementation team should include:

    • CIO
    • Current IT leadership team
    • Project manager
    • Business relationship managers
    • Human resources advisor

    Don’t be naïve – building and executing the implementation plan will require a significant time commitment from team members. Too often, organizations attempt to “fit it in” to their existing schedules resulting in poor planning, long delays, and overall poor results. Schedule this work like you would a project.

    TOP 3 TIPS FOR DEFINING YOUR IMPLEMENTATION TEAM

    1. Select a Project Manager. Info-Tech strongly recommends having one individual accountable for key project management activities. They will be responsible for keeping the project on time and maintaining a holistic view of the implementation.
    2. Communication with Business Partners is Critical. If you have Business Relationship Managers (BRMs), involve them in the communication planning or assign someone to play this role. You need your business partners to be informed and bought in to the implementation to maintain satisfaction.
    3. Enlist Your “Volunteer Army.” (Kotter’s 8 Principles) If you have an open culture, Info-Tech encourages you to have an extended implementation team made up of volunteers interested in supporting the change. Their role will be to support the core group, assist in planning, and communicate progress with peers.

    Determine the roles of your implementation team members

    1.1 30 Minutes

    Input

    • Implementation team members

    Output

    • RACI for key transition elements

    Materials

    • RACI chart and pen

    Participants

    • Core implementation committee
    1. Each member should be actively engaged in all elements of the organizational design implementation. However, it’s important to have one individual who is accountable for key activities and ensures they are done effectively and measured.
    2. Review the chart below and as a group, brainstorm any additional key change components.
    3. For each component listed below, identify who is Accountable, Responsible, Consulted, and Informed for each (suggested responsibility below).
    CIO IT Leaders PM BRM HR
    Communication Plan A R R R C
    Employee Engagement A R R R C

    Departmental Transition Plan

    R A R I R
    Organizational Transition Plan R R A I C
    Manager Training A R R I C

    Individual Transition Plans

    R A R I I
    Technology and Logistical Changes R R A I I
    Hiring A R I I R
    Learning and Development R A R R R
    Union Negotiations R I I I A
    Process Development R R A R I

    Fast-track your communication planning with Info-Tech’s Organizational Design Implementation Kick-Off Presentation

    Organizational Design Implementation Kick-Off Presentation

    Communicate what’s important to your staff in a simple, digestible way. The communication message should reflect what is important to your stakeholders and what they want to know at the time.

    • Why is this change happening?
    • What are the goals of the reorganization?
    • What specifically is changing?
    • How will this impact me?
    • When is this changing?
    • How and where can I get more information?

    It’s important that the tone of the meeting suits the circumstances.

    • If the reorganization is going to involve lay-offs: The meeting should maintain a positive feel, but your key messages should stress the services that will be available to staff, when and how people will be communicated with about the change, and who staff can go to with concerns.
    • If the reorganization is to enable growth: Focus on celebrating where the organization is going, previous successes, and stress that the staff are critical in enabling team success.

    Modify the Organizational Design ImplementationKick-Off Presentation with your key messages and goals

    1.2 1 hour

    Input

    • New organizational structure

    Output

    • Organizational design goal statements

    Materials

    • Whiteboard & marker
    • ODI Kick-off Presentation

    Participants

    • OD implementation team
    1. Within your change implementation team, hold a meeting to identify and document the change goals and key messages.
    2. As a group, discuss what the key drivers were for the organizational redesign by asking yourselves what problem you were trying to solve.
    3. Select 3–5 key problem statements and document them on a whiteboard.
    4. For each problem statement, identify how the new organizational design will allow you to solve those problems.
    5. Document these in your Organizational Design Implementation Kick-Off Presentation.

    Modify the presentation with your unique change vision to serve as the center piece of your communication strategy

    1.3 1 hour

    Input

    • Goal statements

    Output

    • Change vision statement

    Materials

    • Sticky notes
    • Pens
    • Voting dots

    Participants

    • Change team
    1. Hold a meeting with the change implementation team to define your change vision. The change vision should provide a picture of what the organization will look like after the organizational design is implemented. It should represent the aspirational goal, and be something that staff can all rally behind.
    2. Hand out sticky notes and ask each member to write down on one note what they believe is the #1 desired outcome from the organizational change and one thing that they are hoping to avoid (you may wish to use your goal statements to drive this).
    3. As a group, review each of the sticky notes and group similar statements in categories. Provide each individual with 3 voting dots and ask them to select their three favorite statements.
    4. Select your winning statements in teams of 2–3. Review each statement and as a team work to strengthen the language to ensure that the statement provides a call to action, that it is short and to the point, and motivational.
    5. Present the statements back to the group and select the best option through a consensus vote.
    6. Document the change vision in your Organizational Design Implementation Kick-Off Presentation.

    Customize the presentation identifying key changes that will be occurring

    1.4 2 hours

    Input

    • Old and new organizational sketch

    Output

    • Identified key changes that are occurring

    Materials

    • Whiteboard
    • Sticky notes & Pens
    • Camera

    Participants

    • OD implementation team
    1. On a whiteboard, draw a high-level picture of your previous organizational sketch and your new organizational sketch.
    2. Using sticky notes, ask individuals to highlight key high-level challenges that exist in the current model (consider people, process, and technology).
    3. Consider each sticky note, and highlight and document how and where your new sketch will overcome those challenges and the key differences between the old structure and the new.
    4. Take a photo of the two sketches and comments, and document these in your Organizational Design Implementation Kick-Off Presentation.

    Modify the presentation by identifying and documenting key milestones

    1.5 1 hour

    Input

    • OD implementation team calendars

    Output

    • OD implementation team timeline

    Materials

    • OD Implementation Kick-Off Presentation

    Participants

    • OD implementation team
    1. Review the timeline in the Organizational Design Implementation Kick-Off Presentation. As a group, discuss the key milestones identified in the presentation:
      • Kick-off presentation
      • Departmental transition strategy built
      • Organizational transition strategy built
      • Manager training
      • One-on-one meetings with staff to discuss changes to roles
      • Individual transition strategy development begins
    2. Review the timeline, and keeping your other commitments in mind, estimate when each of these tasks will be completed and update the timeline.

    Build an OD implementation FAQ to proactively address key questions and concerns about the change

    Organizational Design Implementation FAQ

    Leverage this template as a starting place for building an organizational design implementation FAQ.

    This template is prepopulated with example questions and answers which are likely to arise.

    Info-Tech encourages you to use the list of questions as a basis for your FAQ and to add additional questions based on the changes occurring at your organization.

    It may also be a good idea to store the FAQ on a company intranet portal so that staff has access at all times and to provide users with a unique email address to forward questions to when they have them.

    Build your unique organizational design implementation FAQ to keep staff informed throughout the change

    1.6 1 hour + ongoing

    Input

    • OD implementation team calendars

    Output

    • OD implementation team timeline

    Materials

    • OD Implementation Kick-Off Presentation

    Participants

    • OD implementation team
    1. Download a copy of the Organizational Design Implementation FAQ and as a group, review each of the key questions.
    2. Delete any questions that are not relevant and add any additional questions you either believe you will receive or which you have already been asked.
    3. Divide the questions among team members and have each member provide a response to these questions.
    4. The CIO and the project manager should review the responses for accuracy and ensure they are ready to be shared with staff.
    5. Publish the responses on an IT intranet site and make the location known to your IT staff.

    Dispelling rumors by using a large implementation team

    CASE STUDY

    Industry: Manufacturing

    Source: CIO

    Challenge

    When rumors of the impending reorganization reached staff, there was a lot of confusion and some of the more vocal detractors in the department enforced these rumors.

    Staff were worried about changes to their jobs, demotions, and worst of all, losing their jobs. There was no communication from senior management to dispel the gossip and the line managers were also in the dark so they weren’t able to offer support.

    Staff did not feel comfortable reaching out to senior management about the rumors and they didn’t know who the change manager was.

    Solution

    The CIO and change manager put together a large implementation team that included many of the managers in the department. This allowed the managers to handle the gossip through informal conversations with their staff.

    The change manager also built a communication strategy to communicate the stages of the reorganization and used FAQs to address the more common questions.

    Results

    The reorganization was adopted very quickly since there was little confusion surrounding the changes with all staff members. Many of the personnel risks were mitigated by the communication strategy because it dispelled rumors and took some of the power away from the vocal detractors in the department.

    An engagement survey was conducted 3 months after the reorganization and the results showed that the engagement of staff had not changed after the reorganization.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1a: Launch the MLI Dashboard (Pre-Work)

    Prior to the workshop, Info-Tech’s advisors will work with you to launch the MLI diagnostic to understand the overall engagement levels of your organization.

    1b: Review Your MLI Results

    The analysts will facilitate several exercises to help you and your team identify your current engagement levels, and the variance across demographics and over time.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    1.1: Define Your Change Team Responsibilities

    Review the key responsibilities of the organizational design implementation team and define the RACI for each individual member.

    1.3: Define Your Change Vision and Goals

    Identify the change vision statement which will serve as the center piece for your change communications as well as the key message you want to deliver to your staff about the change. These messages should be clear, emotionally impactful, and inspirational.

    1.4: Identify Key Changes Which Will Impact Staff

    Collectively brainstorm all of the key changes that are happening as a result of the change, and prioritize the list based on the impact they will have on staff. Document the top 10 biggest changes – and the opportunities the change creates or problems it solves.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    1.5: Define the High-Level Change Timeline

    Identify and document the key milestones within the change as a group, and determine key dates and change owners for each of the key items. Determine the best way to discuss these timelines with staff, and whether there are any which you feel will have higher levels of resistance.

    1.5: Build the FAQ and Prepare for Objection Handling

    As a group, brainstorm the key questions you believe you will receive about the change and develop a common FAQ to provide to staff members. The advisor will assist you in preparing to manage objections to limit resistance.

    Phase 2

    Build The Organizational Transition Plan

    Build the organizational transition plan

    Outcomes of this section:

    • A holistic list of projects that will enable the implementation of the organizational structure.
    • A schedule to monitor the progress of your change projects.

    This section involves the following participants:

    • CIO
    • Reorganization Implementation Team

    Key Section Insight:

    Be careful to understand the impacts of the change on all groups and departments. For best results, you will need representation from all departments to limit conflict and ensure a smooth transition. For large IT organizations, you will need to have a plan for each department/work unit and create a larger integration project.

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Build the Organizational Transition Plan

    Proposed Time to Completion (in weeks): 2-4 weeks

    Step 2.1: Review the Change Dimensions and How They Are Used to Plan Change Projects

    Start with an analyst kick off call:

    • Review the purpose of the kick-off meeting.
    • Review the change project dimensions.
    • Review the Organizational Design Implementation Project Planning Tool.

    Then complete these activities…

    • Conduct your kick-off meeting.
    • Brainstorm a list of reorganization projects and their related tasks.

    With these tools & templates:

    • Organizational Design Implementation Project Planning Tool

    Step 2.2: Review the List of Change Projects

    Review findings with analyst:

    • Revisit the list of projects and tasks developed in the brainstorming session.
    • Assess the list and determine resourcing and dependencies for the projects.
    • Review the monitoring process.

    Then complete these activities…

    • Complete the Organizational Design Implementation Project Planning Tool.
    • Map out your project dependencies and resourcing.
    • Develop a schedule for monitoring projects.

    With these tools & templates:

    • Organizational Design Implementation Project Planning Tool

    Use Info-Tech’s Organizational Design Implementation Project Planning Tool to plan and track your reorganization

    • Use Info-Tech’s Organizational Design Implementation Project Planning Tool to document and track all of the changes that are occurring during your reorganization.
    • Automatically build Gantt charts for all of the projects that are being undertaken, track problems in the issue log, and monitor the progress of projects in the reporting tab.
    • Each department/work group will maintain its own version of this tool throughout the reorganization effort and the project manager will maintain a master copy with all of the projects listed.
    • The chart comes pre-populated with example data gathered through the research and interview process to help generate ideas for your own reorganization.
    • Review the instructions at the top of each work sheet for entering and modifying the data within each chart.

    Have a short kick-off meeting to introduce the project planning process to your implementation team

    2.1 30 minutes

    Output

    • Departmental ownership of planning tool

    Materials

    • OD Implementation Project Planning Tool

    Participants

    • Change Project Manager
    • Implementation Team
    • Senior Management (optional)
    1. The purpose of this kick-off meeting is to assign ownership of the project planning process to members of the implementation team and to begin thinking about the portfolio of projects required to successfully complete the reorganization.
    2. Use the email template included on this slide to invite your team members to the meeting.
    3. The topics that need to be covered in the meeting are:
      • Introducing the materials/templates that will be used throughout the process.
      • Assigning ownership of the Organizational Design Implementation Project Planning Tool to members of your team.
        • Ownership will be at the departmental level where each department or working group will manage their own change projects.
      • Prepare your implementation team for the next meeting where they will be brainstorming the list of projects that will need to be completed throughout the reorganization.
    4. Distribute/email the tools and templates to the team so that they may familiarize themselves with the materials before the next meeting.

    Hello [participant],

    We will be holding our kickoff meeting for our reorganization on [date]. We will be discussing the reorganization process at a high level with special attention being payed to the tools and templates that we will be using throughout the process. By the end of the meeting, we will have assigned ownership of the Project Planning Tool to department representatives and we will have scheduled the next meeting where we’ll brainstorm our list of projects for the reorganization.

    Consider Info-Tech’s four organizational change dimensions when identifying change projects

    CHANGE DIMENSIONS

    • TECHNOLOGY AND LOGISTICS
    • COMMUNICATION
    • STAFFING
    • PROCESS

    Technology and Logistics

    • These are all the projects that will impact the technology used and physical logistics of your workspace.
    • These include new devices, access/permissions, new desks, etc.

    Communication

    • All of the required changes after the reorganization to ongoing communications within IT and to the rest of the organization.
    • Also includes communication projects that are occurring during the reorganization.

    Staffing

    • These projects address the changes to your staff’s roles.
    • Includes role changes, job description building, consulting with HR, etc.

    Process

    • Projects that address changes to IT processes that will occur after the reorganization.

    Use these trigger questions to help identify all aspects of your coming changes

    STAFFING

    • Do you need to hire short or long-term staff to fill vacancies?
    • How long does it typically take to hire a new employee?
    • Will there be staff who are new to management positions?
    • Is HR on board with the reorganization?
    • Have they been consulted?
    • Have transition plans been built for all staff members who are transitioning roles/duties?
    • Will gaps in the structure need to be addressed with new hires?

    COMMUNICATION

    • When will the change be communicated to various members of the staff?
    • Will there be disruption to services during the reorganization?
    • Who, outside of IT, needs to know about the reorganization?
    • Do external communications need to be adjusted because of the reorganization? Moving/centralizing service desk, BRMs, etc.?
    • Are there plans/is there a desire to change the way IT communicates with the rest of the organization?
    • Will the reorganization affect the culture of the department? Is the new structure compatible with the current culture?

    Use these trigger questions to help identify all aspects of your coming changes (continued)

    TECHNOLOGY AND LOGISTICS

    • Will employees require new devices in their new roles?
    • Will employees be required to move their workspace?
    • What changes to the workspace are required to facilitate the new organization?
    • Does new furniture have to be purchased to accommodate new spaces/staff?
    • Is the workspace adequate/up to date technologically (telephone network, Wi-Fi coverage, etc.)?
    • Will employees require new permissions/access for their changing roles?
    • Will permissions/access need to be removed?
    • What is your budget for the reorganization?
    • If a large geographical move is occurring, have problems regarding geography, language barriers, and cultural sensitivities been addressed?

    PROCESS

    • What processes need to be developed?
    • What training for processes is required?
    • Is the daily functioning of the IT department predicted to change?
    • Are new processes being implemented during the reorganization?
    • How will the project portfolio be affected by the reorganization?
    • Is new documentation required to accompany new/changing processes?

    Brainstorm the change projects to be carried out during the reorganization for your team/department

    2.2 3 hours

    Input

    • Constructive group discussion

    Output

    • Thorough list of all reorganization projects

    Materials

    • Whiteboard, sticky notes
    • OD Implementation Project Planning Tool

    Participants

    • Implementation Team
    • CIO
    • Senior Management
    1. Before the meeting, distribute the list of trigger questions presented on the two previous slides to prepare your implementation team for the brainstorming session.
    2. Begin the meeting by dividing up your implementation team into the departments/work groups that they represent (and have ownership of the tool over).
    3. Distribute a different color of sticky notes to each team and have them write out each project they can think of for each of the change planning dimensions (Staffing, Communication, Process and Technology/Logistics) using the trigger questions.
    4. After one hour, ask the groups to place the projects that they brainstormed onto the whiteboard divided into the four change dimensions.
    5. Discuss the complete list of projects on the board.
      • Remove projects that are listed more than once since some projects will be universal to some/all departments.
      • Adjust the wording of projects for the sake of clarity.
      • Identify projects that are specific to certain departments.
    6. Document the list of high-level projects on tab 2 “Project Lists” within the OD Implementation Project Planning Tool after the activity is complete.

    Prioritize projects to assist with project planning modeling

    Prioritization is the process of ranking each project based on its importance to implementation success. Hold a meeting for the implementation team and extended team to prioritize the project list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation teams will use these priority levels to ensure efforts are targeted towards the proper projects. A simple way to do this for your implementation is to use the MoSCoW Model of Prioritization to effectively order requirements.

    The MoSCoW Model of Prioritization

    MUST HAVE - Projects must be implemented for the organizational design to be considered successful.

    SHOULD HAVE - Projects are high priority that should be included in the implementation if possible.

    COULD HAVE - Projects are desirable but not necessary and could be included if resources are available.

    WON'T HAVE - Projects won’t be in the next release, but will be considered for the future releases.

    The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

    Keep the following criteria in mind as you determine your priorities

    Effective Prioritization Criteria

    Criteria Description
    Regulatory & Legal Compliance These requirements will be considered mandatory.
    Policy or Contract Compliance Unless an internal policy or contract can be altered or an exception can be made, these projects will be considered mandatory.
    Business Value Significance Give a higher priority to high-value projects.
    Business Risk Any project with the potential to jeopardize the entire project should be given a high priority and implemented early.
    Implementation Complexity Give a higher priority to quick wins.
    Alignment with Strategy Give a higher priority to requirements that enable the corporate strategy and IT strategy.
    Urgency Prioritize projects based on time sensitivity.
    Dependencies A project on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.
    Funding Availability Do we have the funding required to make this change?

    Prioritize the change projects within your team/department to be executed during the reorganization

    2.3 3 hours

    Input

    • Organizational Design Implementation Project Planning Tool

    Output

    • Prioritized list of projects

    Materials

    • Whiteboard, sticky notes
    • OD Implementation Project Planning Tool

    Participants

    • Implementation Team
    • Extended Implementation Team
    1. Divide the group into their department teams. Draw 4 columns on a whiteboard, including the following:
      • Must have
      • Should have
      • Could have
      • Won’t have
    2. As a group, review each project and collaboratively identify which projects fall within each category. You should have a strong balance between each of the categories.
    3. Beginning with the “must have” projects, determine if each has any dependencies. If any of the projects are dependent on another, add the dependency project to the “must have” category. Group and circle the dependent projects.
    4. Continue the same exercise with the “should have” and “could have” options.
    5. Record the results on tab “2. Project List” of the Organizational Design Implementation Project Planning Tool using the drop down option.

    Determine resource availability for completing your change projects

    2.4 2 hours

    Input

    • Constructive group discussion

    Output

    • Thorough list of all reorganization projects

    Materials

    • Whiteboard, sticky notes
    • OD Implementation Project Planning Tool

    Participants

    • Implementation Team
    • CIO
    • Senior Management
    1. Divide the group into their department teams to plan the execution of the high-level list of projects developed in activity 2.2.
    2. Review the list of high-level projects and starting with the “must do” projects, consider each in turn and brainstorm all of the tasks required to complete these projects. Write down each task on a sticky note and place it under the high-level project.
    3. On the same sticky note as the task, estimate how much time would be required to complete each task. Be realistic about time frames since these projects will be on top of all of the regular day-to-day work.
    4. Along with the time frame, document the resources that will be required and who will be responsible for the tasks. If you have a documented Project Portfolio, use this to determine resourcing.
    5. After mapping out the tasks, bring the group back together to present their list of projects, tasks, and required resources.
      • Go through the project task lists to make sure that nothing is missed.
      • Review the timelines to make sure they are feasible.
      • Review the resources to ensure that they are available and realistic based on constraints (time, current workload, etc.).
      • Repeat the process for the Should do and Could do projects.
    1. Document the tasks and resources in tab “3. Task Monitoring” in the OD Implementation Project Planning Tool after the activity is complete.

    Map out the change project dependencies at the departmental level

    2.5 2 hours

    Input

    • Constructive group discussion

    Output

    • Thorough list of all reorganization projects

    Materials

    • Whiteboard, sticky notes
    • OD Implementation Project Planning Tool

    Participants

    • Implementation Team
    • CIO
    • Senior Management
    1. Divide the group into their department teams to map the dependencies of their tasks created in activity 2.3.
    2. Take the project task sticky notes created in the previous activity and lay them out along a timeline from start to finish.
    3. Determine the dependencies of the tasks internal to the department. Map out the types of dependencies.
      • Finish to Start: Preceding task must be completed before the next can start.
      • Start to Start: Preceding task must start before the next task can start.
      • Finish to Finish: Predecessor must finish before successor can finish.
      • Start to Finish: Predecessor must start before successor can finish.
    4. Bring the group back together and review each group’s timeline and dependencies to make sure that nothing has been missed.
    5. As a group, determine whether there are dependencies that span the departmental lists of projects.
    6. Document all of the dependencies within the department and between departmental lists of projects and tasks in the OD Implementation Project Planning Tool.

    Amalgamate all of the departmental change planning tools into a master copy

    2.6 3 hours

    Input

    • Department-specific copies of the OD Implementation Project Planning Tool

    Output

    • Universal list of all of the change projects

    Materials

    • Whiteboard and sticky notes

    Participants

    • Implementation Project Manager
    • Members of the implementation team for support (optional)
    1. Before starting the activity, gather all of the OD Implementation Project Planning Tools completed at the departmental level.
    2. Review each completed tool and write all of the individual projects with their timelines on sticky notes and place them on the whiteboard.
    3. Build timelines using the documented dependencies for each department. Verify that the resources (time, people, physical) are adequate and feasible.
    4. Combine all of the departmental project planning tools into one master tool to be used to monitor the overall status of the reorganization. Separate the projects based on the departments they are specific to.
    5. Finalize the timeline based on resource approval and using the dependencies mapped out in the previous exercise.
    6. Approve the planning tools and store them in a shared drive so they can be accessed by the implementation team members.

    Create a progress monitoring schedule

    2.7 1 hour weekly

    Input

    • OD Implementation Project Planning Tools (departmental & organizational)

    Output

    • Actions to be taken before the next pulse meeting

    Participants

    • Implementation Project Manager
    • Members of the implementation team for support
    • Senior Management
    1. Hold weekly pulse meetings to keep track of project progress.
    2. The agenda of each meeting should include:
      • Resolutions to problems/complications raised at the previous week’s meeting.
      • Updates on each department’s progress.
      • Raising any issues/complications that have appeared that week.
      • A discussion of potential solutions to the issues/complications.
      • Validating the work that will be completed before the next meeting.
      • Raising any general questions or concerns that have been voiced by staff about the reorganization.
    3. Upload notes from the meeting about resolutions and changes to the schedules to the shared drive containing the tools.
    4. Increase the frequency of the meetings towards the end of the project if necessary.

    Building a holistic change plan enables adoption of the new organizational structure

    CASE STUDY

    Industry: Manufacturing

    Source: CIO

    Challenge

    The CIO was worried about the impending reorganization due to problems that they had run into during the last reorganization they had conducted. The change management projects were not planned well and they led to a lot of uncertainty before and after the implementation.

    No one on the staff was ready for the reorganization. Change projects were completed four months after implementation since many of them had not been predicted and cataloged. This caused major disruptions to their user services leading to drops in user satisfaction.

    Solution

    Using their large and diverse implementation team, they spent a great deal of time during the early stages of planning devoted to brainstorming and documenting all of the potential change projects.

    Through regular meetings, the implementation team was able to iteratively adjust the portfolio of change projects to fit changing needs.

    Results

    Despite having to undergo a major reorganization that involved centralizing their service desk in a different state, there were no disruptions to their user services.

    Since all of the change projects were documented and completed, they were able to move their service desk staff over a weekend to a workspace that was already set up. There were no changes to the user satisfaction scores over the period of their reorganization.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.2 Brainstorm Your List of Change Projects

    Review your reorganization plans and facilitate a brainstorming session to identify a complete list of all of the projects needed to implement your new organizational design.

    2.5 Map Out the Dependencies and Resources for Your Change Projects

    Examine your complete list of change projects and determine the dependencies between all of your change projects. Align your project portfolio and resource levels to the projects in order to resource them adequately.

    Phase 3

    Lead Staff Through the Reorganization

    Train managers to lead through change

    Outcomes of this Section:

    • Completed the workshop: Lead Staff Through Organizational Change
    • Managers possess stakeholder engagement plans for each employee
    • Managers are prepared to fulfil their roles in implementing the organizational change

    This section involves the following participants:

    • CIO
    • IT leadership team
    • IT staff

    Key Section Insight:

    The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Source: Abilla, 2009)

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Train Managers to Lead Through Change

    Proposed Time to Completion (in weeks): 1-2 weeks

    Step 3.1: Train Your Managers to Lead Through the Change

    Start with an analyst kick off call:

    • Go over the manager training workshop section of this deck.
    • Review the deliverables generated from the workshop (stakeholder engagement plan and conflict style self-assessment).

    Then complete these activities…

    • Conduct the workshop with your managers.

    With these tools & templates:

    • Organizational Design Implementation Manager Training Guide
    • Organizational Design Implementation Stakeholder Engagement Plan Template

    Step 3.2: Debrief After the Workshop

    Review findings with analyst:

    • Discuss the outcomes of the manager training.
    • Mention any feedback.
    • High-level overview of the workshop deliverables.

    Then complete these activities…

    • Encourage participants to review and revise their stakeholder engagement plans.
    • Review the Organizational Design Implementation Transition Plan Template and next steps.

    Get managers involved to address the majority of obstacles to successful change

    Managers all well-positioned to translate how the organizational change will directly impact individuals on their teams.

    Reasons Why Change Fails

    EMPLOYEE RESISTANCE TO CHANGE - 39%

    MANAGEMENT BEHAVIOR NOT SUPPORTIVE OF CHANGE - 33%

    INADEQUATE RESOURCE OR BUDGET - 14%

    OTHER OBSTACLES - 14%

    72% of change management issues can be directly improved by management.

    (Source: shmula)

    Why are managers crucial to organizational change?

    • Managers are extremely well-connected.
      • They have extensive horizontal and vertical networks spanning the organization.
      • Managers understand the informal networks of the organization.
    • Managers are valuable communicators.
      • Managers have established strong relationships with employees.
      • Managers influence the way staff perceive messaging.

    Conduct a workshop with managers to help them lead their teams through change

    Organizational Design Implementation Manager Training Guide

    Give managers the tools and skills to support their employees and carry out difficult conversations.

    Understand the role of management in communicating the change

    Understand reactions to change

    Resolve conflict

    Respond to FAQs

    Monitor and measure employee engagement

    Prepare managers to effectively execute their role in the organizational change by running a 2-hour training workshop.

    Complete the activities on the following slides to:

    • Plan and prepare for the workshop.
    • Execute the group exercises.
    • Help managers develop stakeholder engagement plans for each of their employees.
    • Initiate the McLean Leadership Index™ survey to measure employee engagement.

    Plan and prepare for the workshop

    3.1 Plan and prepare for the workshop.

    Output

    • Workshop participants
    • Completed workshop prep

    Materials

    • Organizational Design Implementation Manager Training Guide

    Instructions

    1. Create a list of all managers that will be responsible for leading their teams through the change.
    2. Select a date for the workshop.
      • The training session will run approximately 2 hours and should be scheduled within a week of when the implementation plan is communicated organization-wide.
    3. Review the material outlined in the presentation and prepare the Organizational Design Implementation Manager Training Guide for the workshop:
      • Copy and print the “Pre-workshop Facilitator Instructions” and “Facilitator Notes” located in the notes section below each slide.
      • Revise frequently asked questions (FAQs) and responses.
      • Delete instruction slides.

    Invite managers to the workshop

    Workshop Invitation Email Template

    Make necessary modifications to the Workshop Invitation Email Template and send invitations to managers.

    Hi ________,

    As you are aware, we are starting to roll out some of the initiatives associated with our organizational change mandate. A key component of our implementation plan is to ensure that managers are well-prepared to lead their teams through the transition.

    To help you proactively address the questions and concerns of your staff, and to ensure that the changes are implemented effectively, we will be conducting a workshop for managers on .

    While the change team is tasked with most of the duties around planning, implementing, and communicating the change organization-wide, you and other managers are responsible for ensuring that your employees understand how the change will impact them specifically. The workshop will prepare you for your role in implementing the organizational changes in the coming weeks, and help you refine the skills and techniques necessary to engage in challenging conversations, resolve conflicts, and reduce uncertainty.

    Please confirm your attendance for the workshop. We look forward to your participation.

    Kind regards,

    Change team

    Prepare managers for the change by helping them build useful deliverables

    ODI Stakeholder Engagement Plan Template & Conflict Style Self-Assessment

    Help managers create useful deliverables that continue to provide value after the workshop is completed.

    Workshop Deliverables

    Organizational Design Implementation Stakeholder Engagement Plan Template

    • Document the areas of change resistance, detachment, uncertainty, and support for each employee.
    • Document strategies to overcome resistance, increase engagement, reduce uncertainty, and leverage their support.
    • Create action items to execute after the workshop.

    Conflict Style Self-Assessment

    • Determine how you approach conflicts.
    • Analyze the strengths and weaknesses of this approach.
    • Identify ways to adopt different conflict styles depending on the situation.

    Book a follow-up meeting with managers and determine which strategies to Start, Stop, or Continue

    3.2 1 hour

    Output

    • Stakeholder engagement templates

    Materials

    • Sticky notes
    • Pen and paper

    Participants

    • Implementation Team
    • Managers
    1. Schedule a follow-up meeting 2–3 weeks after the workshop.
    2. Facilitate an open conversation on approaches and strategies that have been used or could be used to:
      • Overcome resistance
      • Increase engagement
      • Reduce uncertainty
      • Leverage support
    3. During the discussion, document ideas on the whiteboard.
    4. Have participants vote on whether the approaches and strategies should be started, stopped, or continued.
      • Start: actions that the team would like to begin.
      • Stop: actions that the team would like to stop.
      • Continue: actions that work for the team and should proceed.
    5. Encourage participants to review and revise their stakeholder engagement plans.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1 The Change Maze

    Break the ice with an activity that illustrates the discomfort of unexpected change, and the value of timely and instructive communication.

    3.2 Perform a Change Management Retrospective

    Leverage the collective experience of the group. Share challenges and successes from previous organizational changes and apply those lessons to the current transition.

    3.3 Create a Stakeholder Engagement Plan

    Have managers identify areas of resistance, detachment, uncertainty, and support for each employee and share strategies for overcoming resistance and leveraging support to craft an action plan for each of their employees.

    3.4 Conduct a Conflict Style Self-Assessment

    Give participants an opportunity to better understand how they approach conflicts. Administer the Conflict Style Self-Assessment to identify conflict styles and jumpstart a conversation about how to effectively resolve conflicts.

    Transition your staff to their new roles

    Outcomes of this Section:

    • Identified key responsibilities to transition
    • Identified key relationships to be built
    • Built staff individual transition plans and timing

    This section involves the following participants:

    • All IT staff members

    Key Section Insight

    In order to ensure a smooth transition, you need to identify the transition scheduled for each employee. Knowing when they will retire and assume responsibilities and aligning this with the organizational transition will be crucial.

    Phase 3b outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3b: Transition Staff to New Roles

    Proposed Time to Completion (in weeks): 2-4

    Step 4.1: Build Your Transition Plans

    Start with an analyst kick off call:

    • Review the Organizational Design Implementation Transition Plan Template and its contents.
    • Return to the new org structure and project planning tool for information to fill in the template.

    Then complete these activities…

    • Present the template to your managers.
    • Have them fill in the template with their staff.
    • Approve the completed templates.

    With these tools & templates:

    • Organizational Design Implementation Project Planning Tool
    • Organizational Design Implementation Transition Plan Template

    Step 4.2: Finalize Your Transition Plans

    Review findings with analyst:

    • Discuss strategies for timing the transition of your employees.
    • Determine the readiness of your departments for transitioning.

    Then complete these activities…

    • Build a transition readiness timeline of your departments.
    • Move your employees to their new roles.

    With these tools & templates:

    • Organizational Design Implementation Project Planning Tool
    • Organizational Design Implementation Transition Plan Template

    Use Info-Tech’s transition plan template to map out all of the changes your employees will face during reorganization

    Organizational Design Implementation Transition Plan Template

    • Use Info-Tech’s Organizational Design Implementation Transition Plan Template to document (in consultation with your employees) all of the changes individual staff members need to go through in order to transition into their new roles.
    • It provides a holistic view of all of the changes aligned to the change planning dimensions, including:
      • Current and new job responsibilities
      • Outstanding projects
      • Documenting where the employee may be moving
      • Technology changes
      • Required training
      • New relationships that need to be made
      • Risk mitigation
    • The template is designed to be completed by managers for their direct reports.

    Customize the transition plan template for all affected staff members

    4.1 30 minutes per employee

    Output

    • Completed transition plans

    Materials

    • Individual transition plan templates (for each employee)

    Participants

    • Implementation Team
    • Managers
    1. Implementation team members should hold one-on-one meetings with the managers from the departments they represent to go through the transition plan template.
    2. Some elements of the transition plan can be completed at the initial meeting with knowledge from the implementation team and documentation from the new organizational structure:
      • Employee information (except for the planned transition date)
      • New job responsibilities
      • Logistics and technology changes
      • Relationships (recommendations can be made about beneficial relationships to form if the employee is transitioning to a new role)
    3. After the meeting, managers can continue filling in information based on their own knowledge of their employees:
      • Current job responsibilities
      • Outstanding projects
      • Training (identify gaps in the employee’s knowledge if their role is changing)
      • Risks (potential concerns or problems for the employee during the reorganization)

    Verify and complete the individual transition plans by holding one-on-one meetings with the staff

    4.2 30 minutes per employee

    Output

    • Completed transition plans

    Materials

    • Individual transition plan templates (for each employee)

    Participants

    • Managers
    • Staff (Managers’ Direct Reports)
    1. After the managers complete everything they can in the transition plan templates, they should schedule one-on-one meetings with their staff to review the completed document to ensure the information is correct.
    2. Begin the meeting by verifying the elements that require the most information from the employee:
      • Current job responsibilities
      • Outstanding projects
      • Risks (ask about any problems or concerns they may have about the reorganization)
    3. Discuss the following elements of the transition plan to get feedback:
      • Training (ask if there is any training they feel they may need to be successful at the organization)
      • Relationships (determine if there are any relationships that the employee would like to develop that you may have missed)
    4. Since this may be the first opportunity that the staff member has had to discuss their new role (if they are moving to one), review their new job title and new job responsibilities with them. If employees are prepared for their new role, they may feel more accountable for quickly adopting the reorganization.
    5. Document any questions that they may have so that they can be answered in future communications from the implementation team.
    6. After completing the template, managers will sign off on the document in the approval section.

    Validate plans with organizational change project manager and build the transition timeline

    4.3 3 hours

    Input

    • Individual transition plans
    • Organizational Design Implementation Project Planning Tool

    Output

    • Timeline outlining departmental transition readiness

    Materials

    • Whiteboard

    Participants

    • Implementation Project Manager
    • Implementation Team
    • Managers
    1. After receiving all of the completed individual transition plan templates from managers, members of the implementation team need to approve the contents of the templates (for the departments that they represent).
    2. Review the logistics and technology requirements for transition in each of the templates and align them with the completion dates of the related projects in the Project Planning Tool. These dates will serve as the earliest possible time to transition the employee. Use the latest date from the list to serve as the date that the whole department will be ready to transition.
    3. Hand the approved transition plan templates and the dates at which the departments will be ready for transitioning to the Implementation Project Manager.
    4. The Project Manager needs to verify the contents of the transition plans and approve them.
    5. On a calendar or whiteboard, list the dates that each department will be ready for transitioning.
    6. Review the master copy of the Project Planning Tool. Determine if the outstanding projects limit your ability to transition the departments (when they are ready to transition). Change the ready dates of the departments to align with the completion dates of those projects.
    7. Use these dates to determine the timeline for when you would like to transition your employees to their new roles.

    Overcoming inexperience by training managers to lead through change

    CASE STUDY

    Industry: Manufacturing

    Source: CIO

    Challenge

    The IT department had not undergone a major reorganization in several years. When they last reorganized, they experienced high turnover and decreased business satisfaction with IT.

    Many of the managers were new to their roles and only one of them had been around for the earlier reorganization. They lacked experience in leading their staff through major organizational changes.

    One of the major problems they faced was addressing the concerns, fears, and resistance of their staff properly.

    Solution

    The implementation team ran a workshop for all of the managers in the department to train them on the change and how to communicate the impending changes to their staff. The workshop included information on resistance and conflict resolution.

    The workshop was conducted early on in the planning phases of the reorganization so that any rumors or gossip could be addressed properly and quickly.

    Results

    The reorganization was well accepted by the staff due to the positive reinforcement from their managers. Rumors and gossip about the reorganization were under control and the staff adopted the new organizational structure quickly.

    Engagement levels of the staff were maintained and actually improved by 5% immediately after the reorganization.

    Voluntary turnover was minimal throughout the change as opposed to the previous reorganization where they lost 10% of their staff. There was an estimated cost savings of $250,000–$300,000.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.2.1 Build Your Staff Transition Plan

    Review the contends of the staff transition plan, and using the organizational change map as a guide, build the transition schedule for one employee.

    3.2.1 Review the Transition Plan With the Transition Team

    Review and validate the results for your transition team schedule with other team members. As a group, discuss what makes this exercise difficult and any ideas for how to simplify the exercise.

    Works cited

    American Productivity and Quality Center. “Motivation Strategies.” Potentials Magazine. Dec. 2004. Web. November 2014.

    Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine. 5 June 2013. Web. 30 Oct 2013.

    Bridges, William. Managing Transitions, 3rd Ed. Philadelphia: Da Capo Press, 2009.

    Buckley, Phil. Change with Confidence – Answers to the 50 Biggest Questions that Keep Change Leaders up at Night. Canada: Jossey-Bass, 2013.

    “Change and project management.” Change First. 2014. Web. December 2009. <http://www.changefirst.com/uploads/documents/Change_and_project_management.pdf>.

    Cheese, Peter, et al. “Creating an Agile Organization.” Accenture. Oct. 2009. Web. Nov. 2013.

    Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

    Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business. 18 Dec. 2012. Web. 28 Oct. 2013. <http://www.huffingtonpost.com/samuel-culbert/performance-reviews_b_2325104.html>.

    Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine. 17 Apr. 2012. Web. Nov. 2013.

    Works cited cont.

    “Establish A Change Management Structure.” Human Technology. Web. December 2014.

    Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates. 17 June 2013. Web. Oct. 2013. <http://ryanestis.com/adobe-interview/>.

    Ford, Edward L. “Leveraging Recognition: Noncash incentives to Improve Performance.” Workspan Magazine. Nov 2006. Web. Accessed May 12, 2014.

    Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal. 12 Oct. 2006. Web. 12 Jan 2012.

    Gartside, David, et al. “Trends Reshaping the Future of HR.” Accenture. 2013. Web. 5 Nov. 2013.

    Grenville-Cleave, Bridget. “Change and Negative Emotions.” Positive Psychology News Daily. 2009.

    Heath, Chip, and Dan Heath. Switch: How to Change Things When Change Is Hard. Portland: Broadway Books. 2010.

    HR Commitment AB. Communicating organizational change. 2008.

    Keller, Scott, and Carolyn Aiken. “The Inconvenient Truth about Change Management.” McKinsey & Company, 2009. <http://www.mckinsey.com/en.aspx>.

    Works cited cont.

    Kotter, John. “LeadingChange: Why Transformation Efforts Fail.” Harvard Business Review. March-April 1995. <http://hbr.org>.

    Kubler-Ross, Elisabeth and David Kessler. On Grief and Grieving: Finding the Meaning of Grief Through the Five Stages of Loss. New York: Scribner. 2007.

    Lowlings, Caroline. “The Dangers of Changing without Change Management.” The Project Manager Magazine. December 2012. Web. December 2014. <http://changestory.co.za/the-dangers-of-changing-without-change-management/>.

    “Managing Change.” Innovative Edge, Inc. 2011. Web. January 2015. <http://www.getcoherent.com/managing.html>.

    Muchinsky, Paul M. Psychology Applied to Work. Florence: Thomson Wadsworth, 2006.

    Nelson, Kate and Stacy Aaron. The Change Management Pocket Guide, First Ed., USA: Change Guides LLC, 2005.

    Nguyen Huy, Quy. “In Praise of Middle Managers.” Harvard Business Review. 2001. Web. December 2014. <https://hbr.org/2001/09/in-praise-of-middle-managers/ar/1>

    “Only One-Quarter of Employers Are Sustaining Gains From Change Management Initiatives, Towers Watson Survey Finds.” Towers Watson. August 2013. Web. January 2015. <http://www.towerswatson.com/en/Press/2013/08/Only-One-Quarter-of-Employers-Are-Sustaining-Gains-From-Change-Management>.

    Shmula. “Why Transformation Efforts Fail.” Shmula.com. September 28, 2009. <http://www.shmula.com/why-transformation-efforts-fail/1510/>

    Create a Post-Implementation Plan for Microsoft 365

    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: End-User Computing Applications
    • Parent Category Link: /end-user-computing-applications

    M365 projects are fraught with obstacles. Common mistakes organizations make include:

    • Not having a post-migration plan in place.
    • Treating user training as an afterthought.
    • Inadequate communication to end users.

    Our Advice

    Critical Insight

    There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and manage information governance from the backup, retention, and security aspects of data management.

    Impact and Result

    Migrating to M365 is a disruptive move for most organizations. It poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time.

    Create a Post-Implementation Plan for Microsoft 365 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create a Post-Implementation Plan for Microsoft 365 Storyboard – A deck that guides you through the important considerations that will help you avoid common pitfalls and make the most of your investment.

    There are three primary goals when deploying Microsoft 365: productivity, security and compliance, and collaborative functionality. On top of these you need to meet the business KPIs and IT’s drive for adoption and usage. This research will guide you through the important considerations that are often overlooked as this powerful suite of tools is rolled out to the organization.

    [infographic]

    Further reading

    Create a Post-Implementation Plan for Microsoft 365

    You’ve deployed M365. Now what? Look at your business goals and match your M365 KPIs to meet those objectives.

    Analyst perspective

    You’ve deployed M365. Now what?

    John Donovan

    There are three primary objectives when deploying Microsoft 365: from a business perspective, the expectations are based on productivity; from an IT perspective, the expectations are based on IT efficiencies, security, and compliance; and from an organizational perspective, they are based on a digital employee experience and collaborative functionality.

    Of course, all these expectations are based on one primary objective, and that is user adoption of Teams, OneDrive, and SharePoint Online. A mass adoption, along with a high usage rate and a change in the way users work, is required for your investment in M365 to be considered successful.

    So, adoption is your first step, and that can be tracked and analyzed through analytics in M365 or other tools. But what else needs to be considered once you have released M365 on your organization? What about backup? What about security? What about sharing data outside your business? What about self-service? What about ongoing training? M365 is a powerful suite of tools, and taking advantage of all that it entails should be IT’s primary goal. How to accomplish that, efficiently and securely, is up to you!

    John Donovan
    Principal Research Director, I&O
    Info-Tech Research Group

    Insight summary

    Collaboration, efficiencies, and cost savings need to be earned

    Migrating to M365 is a disruptive move for most organizations. Additionally, it poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time. However, organizations need to manage their licensing and storage costs and build this new way of working through post-deployment planning. By reducing their hardware and software footprint they can ensure they have earned these savings and efficiencies.

    Understand any shortcomings in M365 or pay the price

    Failing to understand any shortcomings M365 poses for your organization can ruin your chances at a successful implementation. Commonly overlooked expenses include backup and archiving, especially for regulated organizations; spending on risk mitigation through third-party tools for security; and paying a premium to Microsoft to use its Azure offerings with Microsoft Sentinel, Microsoft Defender, or any security add-on that comes at a price above your E5 license, which is expensive in itself.

    Spend time with users to understand how they will use M365

    Understanding business processes is key to anticipating how your end users will adopt M365. By spending time with the staff and understanding their day-to-day activities and interactions, you can build better training scenarios to suit their needs and help them understand how the apps in M365 can help them do their job. On top of this you need to meet the business KPIs and IT’s drive for adoption and usage. Encourage early adopters to become trainers and champions. Success will soon follow.

    Executive summary

    Your Challenge

    Common Obstacles

    Info-Tech’s Approach

    M365 is a full suite of tools for collaboration, communication, and productivity, but organizations find the platform is not used to its full advantage and fail to get full value from their license subscription.

    Many users are unsure which tool to use when: Do you use Teams or Viva Engage, MS Project or Planner? When do you use SharePoint versus OneDrive?

    From an IT perspective, finding time to help users at the outset is difficult – it’s quite the task to set up governance, security, and backup. Yet training staff must be a priority if the implementation is to succeed.

    M365 projects are fraught with obstacles. Common mistakes organizations make include:

    • No post-migration plan in place.
    • User training is an afterthought.
    • Lack of communication to end users.
    • No C-suite promotion and sponsorship.
    • Absence of a vision and KPIs to meet that vision.

    To define your post-migration tasks and projects:

    • List all projects in a spreadsheet and rank them according to difficulty and impact.
    • Look for quick wins with easy tasks that have high impact and low difficulty.
    • Build a timeline to execute your plans and communicate clearly how these plans will impact the business and meet that vision.

    Failure to take meaningful action will not bode well for your M365 journey.

    Info-Tech Insight

    There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and to manage information governance from backup, retention, and security aspects of data management.

    Business priorities

    What priorities is IT focusing on with M365 adoption?

    What IT teams are saying

    • In a 2019 SoftwareONE survey, the biggest reason IT decision makers gave for adopting M365 was to achieve a “more collaborative working style.”
    • Organizations must plan and execute a strategy for mass adoption and training to ensure processes match business goals.
    • Cost savings can only be achieved through rightsizing license subscriptions, retiring legacy apps, and building efficiencies within the IT organization.
    • With increased mobility comes with increased cybersecurity risk. Make sure you take care of your security before prioritizing mobility. Multifactor authentication (MFA), conditional access (CA), and additional identity management will maintain a safe work-from-anywhere environment.

    Top IT reasons for adopting M365

    61% More collaborative working style

    54% Cost savings

    51% Improved cybersecurity

    49% Greater mobility

    Source: SoftwareONE, 2019; N=200 IT decision makers across multiple industries and organization sizes

    Define & organize post-implementation projects

    Key areas to success

    • Using Microsoft’s M365 adoption guide, we can prioritize and focus on solutions that will bring about better use of the M365 suite.
    • Most of your planning and prioritizing should be done before implementation. Many organizations, however, adopted M365 – and especially Teams, SharePoint Online, and OneDrive – in an ad hoc manner in response to the pandemic measures that forced users to work from home.
    • Use a Power BI Pro license to set up dashboards for M365 usage analytics. Install GitHub from AppSource and use the templates that will give you good insight and the ability to create business reports to show adoption and usage rates on the platform.
    • Reimagine your working behavior. Remember, you want to bring about a more collective and open framework for work. Take advantage of a champion SME to show the way. Every organization is different, so make sure your training is aligned to your business processes.
    The image contains a screenshot of the M365 post-implementation tasks.

    Process steps

    Define Vision

    Build Team

    Plan Projects

    Execute

    Define your vision and what your priorities are for M365. Understand how to reach your vision.

    Ensure you have an executive sponsor, develop champions, and build a team of SMEs.

    List all projects in a to-be scenario. Rank and prioritize projects to understand impact and difficulty.

    Build your roadmap, create timelines, and ensure you have enough resources and time to execute and deliver to the business.

    Info-Tech’s approach

    Use the out-of-the-box tools and take advantage of your subscription.

    The image contains a screenshot of the various tools and services Microsoft provides.

    Info-Tech Insight

    A clear understanding of the business purpose and processes, along with insight into the organizational culture, will help you align the right apps with the right tasks. This approach will bring about better adoption and collaboration and cancel out the shadow IT products we see in every business silo.

    Leverage built-in usage analytics

    Adoption of services in M365

    To give organizations insight into the adoption of services in M365, Microsoft provides built-in usage analytics in Power BI, with templates for visualization and custom reports. There are third-party tools out there, but why pay more? However, the template app is not free; you do need a Power BI Pro license.

    Usage Analytics pulls data from ActiveDirectory, including location, department, and organization, giving you deeper insight into how users are behaving. It can collect up to 12 months of data to analyze.

    Reports that can be created include Adoption, Usage, Communication, Collaboration (how OneDrive and SharePoint are being used), Storage (cloud storage for mailboxes, OneDrive, and SharePoint), and Mobility (which clients and devices are used to connect to Teams, email, Yammer, etc.).

    Source: Microsoft 365 usage analytics

    Understand admin roles

    Prevent intentional or unintentional internal breaches

    Admin Roles

    Best Practices

    • Global admin: Assign this role only to users who need the most access to management features and data across your tenant. Only global admins can modify an admin role.
    • Exchange admin: Assign this role to users who need to view and manage user mailboxes, M365 groups, and Exchange Online and handle Microsoft support requests.
    • Groups admin: These users can create, edit, delete, and restore M365 groups as well as create expiration and naming policies.
    • Helpdesk admin: These users can resets passwords, force user sign-out, manage Microsoft support requests, and monitor service health.
    • Teams/SharePoint Online admin: Assign these roles for users who manage the Teams and SharePoint Admin Center.
    • User admin: These users can assign licenses, add users and groups, manage user properties, and create and manage user views.

    Only assign two to four global admins, depending on the size of the organization. Too many admins increases security risk. In larger organizations, segment admin roles using role-based access control.

    Because admins have access to sensitive data, you’ll want to assign the least permissive role so they can access only the tools and data they need to do their job.

    Enable MFA for all admins except one break-glass account that is stored in the cloud and not synced. Ensure a complex password, stored securely, and use only in the event of an MFA outage.

    Due to the large number of admin roles available and the challenges that brings with it, Microsoft has a built-in tool to compare roles in the admin portal. This can help you determine which role should be used for specific tasks.

    Secure your M365 tenant

    A checklist to ensure basic security coverage post M365

    • Multifactor Authentication: MFA is part of your M365 tenant, so using it should be a practical identity security. If you want additional conditional access (CA), you will require an Azure AD (AAD) Premium P1+ license. This will ensure adequate identity security protecting the business.
    • Password Protection: Use the AAD portal to set this up under Security > Authentication Methods. Microsoft provides a list of over 2,000 known bad passwords and variants to block.
    • Legacy Authentication: Disable legacy protocols; check to see if your legacy apps/workflows/scripts use them in the AAD portal. Once identified, update them and turn the protocols off. Use CA policies.
    • Self-Service Password Reset: Enable self-service to lower the helpdesk load for password resets. Users will have to initially register and set security questions. Hybrid AD businesses must write back to AD from AAD once changes are made.
    • Security Defaults: For small businesses, turn on default settings. To enable additional security settings, such as break- glass accounts, go into Manage Security Defaults in your AAD properties.
    • Conditional Access (CA) Policies: Use CA policies if strong identity security and zero trust are required. To create policies in AAD go to Security > Conditional Access > New Policies.

    Identity Checklist

    • Enable MFA for Admins
    • Enable MFA for Users
    • Disable App Passwords
    • Configure Trusted IPs
    • Disable Text/Phone MFA
    • Remember MFA on Trusted Devices for 90 Days
    • Train Staff in Using MFA Correctly
    • Integrate Apps Into Azure AD

    Training guidelines

    Identify business scenarios and training adoption KPIs

    • Customize your training to meet your organizational goals, align with your business culture, and define how users will work inside the world of M365.
    • Create scenario templates that align to your current day-to-day operations in each department. These can be created by individual business unit champions.
    • Make sure you have covered must-have capabilities and services within M365 that need to be rolled out post-pilot.
    • Phase in large transitions rather than multiple small ones to ensure collaboration between departments meets business scenarios.
    • Ensure your success metrics are being measured and continue to communicate and train after deployment using tools available in M365. See Microsoft’s adoption guidelines and template for training.

    Determine your training needs and align with your business processes. Choose training modalities that will give users the best chance of success. Consider one or many training methods, such as:

    • Online training
    • In-person classroom
    • Business scenario use cases
    • Mentoring
    • Department champion/Early adopter
    • Weekly bulletin fun facts

    Don’t forget backup!

    Providing 99% uptime and availability is not enough

    Why is M365 backup so important?

    Accidental Data Deletion.

    If a user is deleted, that deletion gets replicated across the network. Backup can save you here by restoring that user.

    Internal and External Security Threats.

    Malicious internal deletion of data and external threats including viruses, ransomware, and malware can severely damage a business and its reputation. A clean backup can easily restore the business’ uninfected data.

    Legal and Compliance Requirements.

    While e-discovery and legal hold are available to retain sensitive data, a third-party backup solution can easily search and restore all data to meet regulatory requirements – without depending on someone to ensure a policy was set.

    Retention Policy Gaps.

    Retention policies are not a substitute for backup. While they can be used to retain or delete content, they are difficult to keep track of and manage. Backups offer greater latitude in retention and better security for that data.

    Retire your legacy apps to gain adoption

    Identify like for like and retire your legacy apps

    Legacy

    Microsoft 365

    SharePoint 2016/19

    SharePoint Online

    Microsoft Exchange Server

    Microsoft Exchange in Azure

    Skype for Business Server

    Teams

    Trello

    Planner 2022

    System Center Configuration Manager (SCCM)

    Endpoint Manager, Intune, Autopilot

    File servers

    OneDrive

    Access

    Power Apps

    To meet the objectives of cost reduction and rationalization, look at synergies that M365 brings to the table. Determine what you are currently using to meet collaboration, storage, and security needs and plan to use the equivalent in your Microsoft entitlement.

    Managing M365’s hidden costs

    Licenses and storage limits TCO

    • Email security. Ninety-one percent of all cyberattacks come from phishing on email. Microsoft Defender for M365 is a bolt-on, so it is an additional cost.
    • Backup. This will bring additional cost to M365. Plan to spend more to ensure data is backed up and stored.
    • Email archiving. Archiving is different than backup. See our research on the subject. Archiving is needed for compliance purposes. Email archiving solutions are available through third-party software, which is an added cost.
    • Email end-to-end encryption. This is a requirement for all organizations that are serious about security. The enterprise products from Microsoft come at an additional cost.
    • Cybersecurity training. IT needs to ramp up on training, another expense.
    • Microsoft 365 Power Platform Licencing. From low-code and no-code developer tools (Power Apps), workflow tools (Power Automate), and business intelligence (Power BI) – while the E5 license gives you Power BI Pro, there are limitations and costs. Power BI Pro has limitations for data volume, data refresh, and query response time, so your premium license comes at a considerably marked up cost.

    M365 is not standalone

    • While Microsoft 365 is a platform that is ”just good enough,” it is actually not good enough in today’s cyberthreat environment. Microsoft provides add-ons with Defender for 365, Purview, and Sentinel, which pose additional costs, just like a third-party solution would. See the Threat Intelligence & Incident Response research in our Security practice.
    • The lack of data archiving, backup, and encryption means additional costs that may not have been budgeted for at the outset. Microsoft provides 30-60-90-day recovery, but anything else is additional cost. For more information see Understand the Difference between Backups and Archiving.

    Compliance and regulations

    Security and compliance features out of the box

    There are plenty of preconfigured security features contained in M365, but what’s available to you depends on your license. For example, Microsoft Defender, which has many preset policies, is built-in for E5 licenses, but if you have E3 licenses Defender is an add-on.

    Three elements in security policies are profiles, policies, and policy settings.

    • Preset Profiles come in the shape of:
      • Standard – baseline protection for most users
      • Strict – aggressive protection for profiles that may be high-value targets
      • Built-in Protection – turned on by default; it is not recommended to make exceptions based on users, groups, or domains
    • Preset Security Policies
      • Exchange Online Protection Policies – anti-spam, -malware, and -phishing policies
      • Microsoft Defender Policies – safe links and safe attachments policies
    • Policy Settings
      • User impersonation protection for internal and external domains
      • Select priorities from strict, standard, custom, and built-in

    Info-Tech Insight

    Check your license entitlement before you start purchasing add-ons or third-party solutions. Security and compliance are not optional in today’s cybersecurity risk world. With many organizations offering hybrid and remote work arrangements and bring-your-own-device (BYOD) policies, it is necessary to protect your data at the tenant level. Defender for Microsoft 365 is a tool that can protect both your exchange and collaboration environments.

    More information: Microsoft 365 Defender

    Use Intune and Autopilot

    Meet the needs of your hybrid workforce

    • Using the tools available in M365 can help you develop your hybrid or remote work strategy.
    • This strategy will help you maintain security controls for mobile and BYOD.
    • Migrating to Intune and Autopilot will give rise to the opportunity to migrate off SCCM and further reduce your on-premises infrastructure.

    NOTE: You must have Azure AD Premium and Windows 10 V1703 or later as well as Intune or other MDM service to use Autopilot. There is a monthly usage fee based on volume of data transmitted. These fees can add up over time.

    For more details visit the following Microsoft Learn pages:

    Intune /Autopilot Overview

    The image contains a screenshot of the Intune/Autopilot Overview.

    Info-Tech’s research on zero-touch provisioning goes into more detail on Intune and Autopilot:
    Simplify Remote Deployment With Zero-Touch Provisioning

    M365 long-term strategies

    Manage your costs in an inflationary world

    • Recent inflation globally, whether caused by supply chain woes or political uncertainty, will impact IT and cloud services along with everything else. Be prepared to pay more for your existing services and budget accordingly.
    • Your long-term strategies must include ongoing cost management, data management, security risks, and license and storage costs.
    • Continually investigate efficiencies, overlaps, and new tools in M365 that can get the job done for the business. Use as many of the applications as you can to ensure you are getting the best bang for your buck.
    • Watch for upgrades in the M365 suite of tools. As Microsoft continues to improve and deliver on most business applications well after their first release, you may find that something that was previously inefficient could work in your environment today and replace a tool you currently use.

    Ongoing Activities You Need to Maintain

    • Be aware of increased license costs and higher storage costs.
    • Keep an eye on Teams sprawl.
    • Understand your total cost of ownership.
    • Continue to look at legacy apps and get rid of your infrastructure debt.

    Activity

    Build your own M365 post-migration plan

    1. Using slide 6 as your guideline, create your own project list using impact and difficulty as your weighting factors.
    2. Do this exercise as a whiteboard sticky note exercise to agree on impact and difficulty as a team.
    3. Identify easy wins that have high impact.
    4. Place the projects into a project plan with time lines.
    5. Agree on start and completion dates.
    6. Ensure you have the right resources to execute.

    The image contains a screenshot of the activity described in the above text.

    Related Info-Tech Research

    Govern Office 365

    • Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals.

    Drive Ongoing Adoption With an M365 Center of Excellence

    • Accelerate business processes change and get more value from your subscription by building and sharing, thanks to an effective center of excellence.

    Simplify Remote Deployment With Zero-Touch Provisioning

    • Adopt zero-touch provisioning to provide better services to your end users.
    • Save time and resources during device deployment while providing a high-quality experience to remote end users.

    Bibliography

    “5 Reasons Why Microsoft Office 365 Backup Is Important.” Apps 4Rent, Dec 2021, Accessed Oct 2022 .
    Chandrasekhar, Aishwarya. “Office 365 Migration Best Practices & Challenges 2022.” Saketa, 31 Mar 2022. Accessed Oct. 2022.
    Chronlund, Daniel. “The Fundamental Checklist – Secure your Microsoft 365 Tenant”. Daniel Chronlund Cloud Tech Blog,1 Feb 2019. Accessed 1 Oct 2022.
    Davies, Joe. “The Microsoft 365 Enterprise Deployment Guide.” Tech Community, Microsoft, 19 Sept 2018. Accessed 2 Oct 2022.
    Dillaway, Kevin. “I Upgraded to Microsoft 365 E5, Now What?!.” SpyGlassMTG, 10 Jan 2022. Accessed 4 Oct. 2022.
    Hartsel, Joe. “How to Make Your Office 365 Implementation Project a Success.” Centric, 20 Dec 2021. Accessed 2 Oct. 2022.
    Jha, Mohit. “The Ultimate Microsoft Office 365 Migration Checklist for Pre & Post Migration.” Office365 Tips.Org, 24 June 2022. Accessed Sept. 2022.
    Lang, John. “Why organizations don't realize the full value of Microsoft 365.“Business IT, 29 Nov 202I. Accessed 10 Oct 2022.
    Mason, Quinn. “How to increase Office 365 / Microsoft 365 user adoption.” Sharegate, 19 Sept 2019. Accessed 3 Oct 2022.
    McDermott, Matt. “6-Point Office 365 Post-Migration Checklist.” Spanning , 12 July 2019 . Accessed 4 Oct 2022.
    “Microsoft 365 usage analytics.” Microsoft 365, Microsoft, 25 Oct 2022. Web.
    Sharma, Megha. “Office 365 Pre & Post Migration Checklist.’” Kernel Data Recovery, 26 July 2022. Accessed 30 Sept. 2022.
    Sivertsen, Per. “How to avoid a failed M365 implementation? Infotechtion, 19 Dec 2021. Accessed 2 Oct. 2022.
    St. Hilaire, Dan. “Most Common Mistakes with Office 365 Deployment (and How to Avoid Them).“ KnowledgeWave, 4Mar 2019. Accessed Oct. 2022.
    “Under the Hood of Microsoft 365 and Office 365 Adoption.” SoftwareONE, 2019. Web.

    Enhance PPM Dashboards and Reports

    • Buy Link or Shortcode: {j2store}438|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $18,849 Average $ Saved
    • member rating average days saved: 66 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • Your organization has introduced project portfolio management (PPM) processes that require new levels of visibility into the project portfolio that were not required before.
    • Key PPM decision makers are requesting new or improved dashboards and reports to help support making difficult decisions.
    • Often PPM dashboards and reports provide too much information and are difficult to navigate, resulting in information overload and end-user disengagement.
    • PPM dashboards and reports are laborious to maintain; ineffective dashboards end up wasting scarce resources, delay decisions, and negatively impact the perceived value of the PMO.

    Our Advice

    Critical Insight

    • Well-designed dashboards and reports help actively engage stakeholders in effective management of the project portfolio by communicating information and providing support to key PPM decision makers. This tends to improve PPM performance, making resource investments into reporting worthwhile.
    • Observations and insights gleaned from behavioral studies and cognitive sciences (largely ignored in PPM literature) can help PMOs design dashboards and reports that avoid information overload and that provide targeted decision support to key PPM decision makers.

    Impact and Result

    • Enhance your PPM dashboards and reports by carrying out a carefully designed enhancement project. Start by clarifying the purpose of PPM dashboards and reports. Establish a focused understanding of PPM decision-support needs, and design dashboards and reports to address these in a targeted way.
    • Conduct a thorough review of all existing dashboards and reports, evaluating the need, effort, usage, and satisfaction of each report to eliminate any unnecessary or ineffective dashboards and design improved dashboards and reports that will address these gaps.
    • Design effective and targeted dashboards and reports to improve the engagement of senior leaders in PPM and help improve PPM performance.

    Enhance PPM Dashboards and Reports Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should enhance your PPM reports and dashboards, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish a PPM dashboard and reporting enhancement project plan

    Identify gaps, establish a list of dashboards and reports to enhance, and set out a roadmap for your dashboard and reporting enhancement project.

    • Enhance PPM Dashboards and Reports – Phase 1: Establish a PPM Dashboard and Reporting Enhancement Project Plan
    • PPM Decision Support Review Workbook
    • PPM Dashboard and Reporting Audit Workbook
    • PPM Dashboard and Reporting Audit Worksheets – Exisiting
    • PPM Dashboard and Reporting Audit Worksheets – Proposed
    • PPM Metrics Menu
    • PPM Dashboard and Report Enhancement Project Charter Template

    2. Design and build enhanced PPM dashboards and reporting

    Gain an understanding of how to design effective dashboards and reports.

    • Enhance PPM Dashboards and Reports – Phase 2: Design and Build New or Improved PPM Dashboards and Reporting
    • PPM Dashboard and Report Requirements Workbook
    • PPM Executive Dashboard Template
    • PPM Dashboard and Report Visuals Template
    • PPM Capacity Dashboard Operating Manual

    3. Implement and maintain effective PPM dashboards and reporting

    Officially close and evaluate the PPM dashboard and reporting enhancement project and transition to an ongoing and sustainable PPM dashboard and reporting program.

    • Enhance PPM Dashboards and Reports – Phase 3: Implement and Maintain Effective PPM Dashboards and Reporting
    • PPM Dashboard and Reporting Program Manual
    [infographic]

    Workshop: Enhance PPM Dashboards and Reports

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish a PPM Dashboard and Reporting Enhancement

    The Purpose

    PPM dashboards and reports will only be effective and valuable if they are designed to meet your organization’s specific needs and priorities.

    Conduct a decision-support review and a thorough dashboard and report audit to identify the gaps your project will address.

    Take advantage of the planning stage to secure sponsor and stakeholder buy-in.

    Key Benefits Achieved

    Current-state assessment of satisfaction with PPM decision-making support.

    Current-state assessment of all existing dashboards and reports: effort, usage, and satisfaction.

    A shortlist of dashboards and reports to improve that is informed by actual needs and priorities.

    A shortlist of dashboards and reports to create that is informed by actual needs and priorities.

    The foundation for a purposeful and focused PPM dashboard and reporting program that is sustainable in the long term.

    Activities

    1.1 Engage in PPM decision-making review.

    1.2 Perform a PPM dashboard and reporting audit and gap analysis.

    1.3 Identify dashboards and/or reports needed.

    1.4 Plan the PPM dashboard and reporting project.

    Outputs

    PPM Decision-Making Review

    PPM Dashboard and Reporting Audit

    Prioritized list of dashboards and reports to be improved and created

    Roadmap for the PPM dashboard and reporting project

    2 Design New or Improved PPM Dashboards and Reporting

    The Purpose

    Once the purpose of each PPM dashboard and report has been identified (based on needs and priorities) it is important to establish what exactly will be required to produce the desired outputs.

    Gathering stakeholder and technical requirements will ensure that the proposed and finalized designs are realistic and sustainable in the long term.

    Key Benefits Achieved

    Dashboard and report designs that are informed by a thorough analysis of stakeholder and technical requirements.

    Dashboard and report designs that are realistically sustainable in the long term.

    Activities

    2.1 Review the best practices and science behind effective dashboards and reporting.

    2.2 Gather stakeholder requirements.

    2.3 Gather technical requirements.

    2.4 Build wireframe options for each dashboard or report.

    2.5 Review options: requirements, feasibility, and usability.

    2.6 Finalize initial designs.

    2.7 Design and record the input, production, and consumption workflows and processes.

    Outputs

    List of stakeholder requirements for dashboards and reports

    Wireframe design options

    Record of the assessment of each wireframe design: requirements, feasibility, and usability

    A set of finalized initial designs for dashboards and reports.

    Process workflows for each initial design

    3 Plan to Roll Out Enhanced PPM Dashboards and Reports

    The Purpose

    Ensure that enhanced dashboards and reports are actually adopted in the long term by carefully planning their roll-out to inputters, producers, and consumers.

    Plan to train all stakeholders, including report consumers, to ensure that the reports generate the decision support and PPM value they were designed to.

    Key Benefits Achieved

    An informed, focused, and scheduled plan for rolling out dashboards and reports and for training the various stakeholders involved.

    Activities

    3.1 Plan for external resourcing (if necessary): vendors, consultants, contractors, etc.

    3.2 Conduct impact analysis: risks and opportunities.

    3.3 Create an implementation and training plan.

    3.4 Determine PPM dashboard and reporting project success metrics.

    Outputs

    External resourcing plan

    Impact analysis and risk mitigation plan

    Record of the PPM dashboard and reporting project success metrics

    Create and Manage Enterprise Data Models

    • Buy Link or Shortcode: {j2store}340|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $7,263 Average $ Saved
    • member rating average days saved: 16 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Business executives don’t understand the value of Conceptual and Logical Data Models and how they define their data assets.
    • Data, like mercury, is difficult to manage and contain.
    • IT needs to justify the time and cost of developing and maintaining Data Models.
    • Data as an asset is only perceived from a physical point of view, and the metadata that provides context and definition is often ignored.

    Our Advice

    Critical Insight

    • Data Models tell the story of the organization and its data in pictures to be used by a business as a tool to evolve the business capabilities and processes.
    • Data Architecture and Data Modeling have different purposes and should be represented as two distinct processes within the software development lifecycle (SDLC).
    • The Conceptual Model provides a quick win for both business and IT because it can convey abstract business concepts and thereby compartmentalize the problem space.

    Impact and Result

    • A Conceptual Model can be used to define the semantics and relationships for your analytical layer.
      • It provides a visual representation of your data in the semantics of business.
      • It acts as the anchor point for all data lineages.
      • It can be used by business users and IT for data warehouse and analytical planning.
      • It provides the taxonomies for data access profiles.
      • It acts as the basis for your Enterprise Logical and Message Models.

    Create and Manage Enterprise Data Models Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create enterprise data models, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Setting the stage

    Prepare your environment for data architecture.

    • Enterprise Data Models

    2. Revisit your SDLC

    Revisit your SDLC to embed data architecture.

    • Enterprise Architecture Tool Selection

    3. Develop a Conceptual Model

    Create and maintain your Conceptual Data Model via an iterative process.

    4. Data Modeling Playbook

    View the main deliverable with sample models.

    • Data Modeling Playbook
    [infographic]

    Workshop: Create and Manage Enterprise Data Models

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish the Data Architecture Practice

    The Purpose

    Understand the context and goals of data architecture in your organization.

    Key Benefits Achieved

    A foundation for your data architecture practice.

    Activities

    1.1 Review the business context.

    1.2 Obtain business commitment and expectations for data architecture.

    1.3 Define data architecture as a discipline, its role, and the deliverables.

    1.4 Revisit your SDLC to embed data architecture.

    1.5 Modeling tool acquisition if required.

    Outputs

    Data Architecture vision and mission and governance.

    Revised SDLC to include data architecture.

    Staffing strategy.

    Data Architecture engagement protocol.

    Installed modeling tool.

    2 Business Architecture and Domain Modeling

    The Purpose

    Identify the concepts and domains that will inform your data models.

    Key Benefits Achieved

    Defined concepts for your data models.

    Activities

    2.1 Revisit business architecture output.

    2.2 Business domain selection.

    2.3 Identify business concepts.

    2.4 Organize and group of business concepts.

    2.5 Build the Business Data Glossary.

    Outputs

    List of defined and documented entities for the selected.

    Practice in the use of capability and business process models to identify key data concepts.

    Practice the domain modeling process of grouping and defining your bounded contexts.

    3 Harvesting Reference Models

    The Purpose

    Harvest reference models for your data architecture.

    Key Benefits Achieved

    Reference models selected.

    Activities

    3.1 Reference model selection.

    3.2 Exploring and searching the reference model.

    3.3 Harvesting strategies and maintaining linkage.

    3.4 Extending the conceptual and logical models.

    Outputs

    Established and practiced steps to extend the conceptual or logical model from the reference model while maintaining lineage.

    4 Harvesting Existing Data Artifacts

    The Purpose

    Gather more information to create your data models.

    Key Benefits Achieved

    Remaining steps and materials to build your data models.

    Activities

    4.1 Use your data inventory to select source models.

    4.2 Match semantics.

    4.3 Maintain lineage between BDG and existing sources.

    4.4 Select and harvest attributes.

    4.5 Define modeling standards.

    Outputs

    List of different methods to reverse engineer existing models.

    Practiced steps to extend the logical model from existing models.

    Report examples.

    5 Next Steps and Wrap-Up (offsite)

    The Purpose

    Wrap up the workshop and set your data models up for future success.

    Key Benefits Achieved

    Understanding of functions and processes that will use the data models.

    Activities

    5.1 Institutionalize data architecture practices, standards, and procedures.

    5.2 Exploit and extend the use of the Conceptual model in the organization.

    Outputs

    Data governance policies, standards, and procedures for data architecture.

    List of business function and processes that will utilize the Conceptual model.

    2021 IT Talent Trend Report

    • Buy Link or Shortcode: {j2store}516|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $9,919 Average $ Saved
    • member rating average days saved: 2 Average Days Saved
    • Parent Category Name: Lead
    • Parent Category Link: /lead
    • In March 2020, many organizations were forced to switch to a virtual working world. IT enabled organizations to be successful while working from home. Ultimately, this shift changed the way that we all work, and in turn, the way IT leaders manage talent.
    • Many organizations are considering long-term remote work (Kelly, 2020).
    • Change is starting but is lagging.

    Our Advice

    Critical Insight

    • Increase focus on employee experience to navigate new challenges.
    • A good employee experience is what is best for the IT department.

    Impact and Result

    • The data shows IT is changing in the area of talent management.
    • IT has a large role in enabling organizations to work from home, especially from a technological and logistics perspective. There is evidence to show that they are now expanding their role to better support employees when working from home.
    • Survey respondents identified efforts already underway for IT to improve employee experience and subsequently, IT effectiveness.

    2021 IT Talent Trend Report Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should focus on the employee experience and get an overview of what successful IT leaders are doing differently heading into 2021 – the five new talent management trends.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. DEI: A top talent objective

    The focus on diversity, equity, and inclusion (DEI) initiatives spans the entire organization beyond just HR. Learn which DEI efforts are underway with IT.

    • 2021 IT Talent Trend Report – Trend 1: DEI: A Top Talent Objective

    2. Remote work is here to stay

    Forced work-from-home demonstrated to organizations that employees can be productive while working away from the physical office. Learn more about how remote work is changing work.

    • 2021 IT Talent Trend Report – Trend 2: Remote Work Is Here to Stay

    3. A greater emphasis on wellbeing

    When the pandemic hit, organizations were significantly concerned about how employees were doing. Learn more about wellbeing.

    • 2021 IT Talent Trend Report – Trend 3: A Greater Emphasis on Wellbeing

    4. A shift in skills priorities

    Upskilling and finding sought after skills were challenging before the pandemic. How has it changed since? Learn more about skills priorities.

    • 2021 IT Talent Trend Report – Trend 4: A Shift in Skills Priorities

    5. Uncertainty unlocks performance

    The pandemic and remote work has affected performance. Learn about how uncertainty has impacted performance management.

    • 2021 IT Talent Trend Report – Trend 5: Uncertainty Unlocks Performance
    [infographic]

    Build a Vendor Security Assessment Service

    • Buy Link or Shortcode: {j2store}318|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $17,501 Average $ Saved
    • member rating average days saved: 17 Average Days Saved
    • Parent Category Name: Threat Intelligence & Incident Response
    • Parent Category Link: /threat-intelligence-incident-response
    • Vendor security risk management is a growing concern for many organizations. Whether suppliers or business partners, we often trust them with our most sensitive data and processes.
    • More and more regulations require vendor security risk management, and regulator expectations in this area are growing.
    • However, traditional approaches to vendor security assessments are seen by business partners and vendors as too onerous and are unsustainable for information security departments.

    Our Advice

    Critical Insight

    • An efficient and effective assessment process can only be achieved when all stakeholders are participating.
    • Security assessments are time-consuming for both you and your vendors. Maximize the returns on your effort with a risk-based approach.
    • Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic re-assessments.

    Impact and Result

    • Develop an end-to-end security risk management process that includes assessments, risk treatment through contracts and monitoring, and periodic re-assessments.
    • Base your vendor assessments on the actual risks to your organization to ensure that your vendors are committed to the process and you have the internal resources to fully evaluate assessment results.
    • Understand your stakeholder needs and goals to foster support for vendor security risk management efforts.

    Build a Vendor Security Assessment Service Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a vendor security assessment service, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define governance and process

    Determine your business requirements and build your process to meet them.

    • Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process
    • Vendor Security Policy Template
    • Vendor Security Process Template
    • Vendor Security Process Diagram (Visio)
    • Vendor Security Process Diagram (PDF)

    2. Develop assessment methodology

    Develop the specific procedures and tools required to assess vendor risk.

    • Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology
    • Service Risk Assessment Questionnaire
    • Vendor Security Questionnaire
    • Vendor Security Assessment Inventory

    3. Deploy and monitor process

    Implement the process and develop metrics to measure effectiveness.

    • Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process
    • Vendor Security Requirements Template
    [infographic]

    Workshop: Build a Vendor Security Assessment Service

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Governance and Process

    The Purpose

    Understand business and compliance requirements.

    Identify roles and responsibilities.

    Define the process.

    Key Benefits Achieved

    Understanding of key goals for process outcomes.

    Documented service that leverages existing processes.

    Activities

    1.1 Review current processes and pain points.

    1.2 Identify key stakeholders.

    1.3 Define policy.

    1.4 Develop process.

    Outputs

    RACI Matrix

    Vendor Security Policy

    Defined process

    2 Define Methodology

    The Purpose

    Determine methodology for assessing procurement risk.

    Develop procedures for performing vendor security assessments.

    Key Benefits Achieved

    Standardized, repeatable methodologies for supply chain security risk assessment.

    Activities

    2.1 Identify organizational security risk tolerance.

    2.2 Develop risk treatment action plans.

    2.3 Define schedule for re-assessments.

    2.4 Develop methodology for assessing service risk.

    Outputs

    Security risk tolerance statement

    Risk treatment matrix

    Service Risk Questionnaire

    3 Continue Methodology

    The Purpose

    Develop procedures for performing vendor security assessments.

    Establish vendor inventory.

    Key Benefits Achieved

    Standardized, repeatable methodologies for supply chain security risk assessment.

    Activities

    3.1 Develop vendor security questionnaire.

    3.2 Define procedures for vendor security assessments.

    3.3 Customize the vendor security inventory.

    Outputs

    Vendor security questionnaire

    Vendor security inventory

    4 Deploy Process

    The Purpose

    Define risk treatment actions.

    Deploy the process.

    Monitor the process.

    Key Benefits Achieved

    Understanding of how to treat different risks according to the risk tolerance.

    Defined implementation strategy.

    Activities

    4.1 Define risk treatment action plans.

    4.2 Develop implementation strategy.

    4.3 Identify process metrics.

    Outputs

    Vendor security requirements

    Understanding of required implementation plans

    Metrics inventory

    Build a Security Metrics Program to Drive Maturity

    • Buy Link or Shortcode: {j2store}266|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $22,947 Average $ Saved
    • member rating average days saved: 8 Average Days Saved
    • Parent Category Name: Security Processes & Operations
    • Parent Category Link: /security-processes-and-operations
    • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.
    • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
    • Because metrics can become very technical and precise,it's easy to think that they're inherently complicated (not true).

    Our Advice

    Critical Insight

    • The best metrics are tied to goals.
    • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Impact and Result

    • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new more specific goals, and with them come more-specific metrics.
    • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
    • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training course).

    Build a Security Metrics Program to Drive Maturity Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a security metrics program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Link security metrics to goals to boost maturity

    Develop goals and KPIs to measure your progress.

    • Build a Security Metrics Program to Drive Maturity – Phase 1: Link Security Metrics to Goals to Boost Maturity
    • Security Metrics Determination and Tracking Tool
    • KPI Development Worksheets

    2. Adapt your reporting strategy for various metric types

    Learn how to present different types of metrics.

    • Build a Security Metrics Program to Drive Maturity – Phase 2: Adapt Your Reporting Strategy for Various Metric Types
    • Security Metrics KPX Dashboard
    • Board-Level Security Metrics Presentation Template
    [infographic]

    Workshop: Build a Security Metrics Program to Drive Maturity

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Current State, Initiatives, and Goals

    The Purpose

    Create a prioritized list of goals to improve the security program’s current state.

    Key Benefits Achieved

    Insight into the current program and the direct it needs to head in.

    Activities

    1.1 Discuss current state and existing approach to metrics.

    1.2 Review contract metrics already in place (or available).

    1.3 Determine security areas that should be measured.

    1.4 Determine what stakeholders are involved.

    1.5 Review current initiatives to address those risks (security strategy, if in place).

    1.6 Begin developing SMART goals for your initiative roadmap.

    Outputs

    Gap analysis results

    SMART goals

    2 KPI Development

    The Purpose

    Develop unique KPIs to measure progress against your security goals.

    Key Benefits Achieved

    Learn how to develop KPIs

    Prioritized list of security goals

    Activities

    2.1 Continue SMART goal development.

    2.2 Sort goals into types.

    2.3 Rephrase goals as KPIs and list associated metric(s).

    2.4 Continue KPI development.

    Outputs

    KPI Evolution Worksheet

    3 Metrics Prioritization

    The Purpose

    Determine which metrics will be included in the initial program launch.

    Key Benefits Achieved

    A set of realistic and manageable goals-based metrics.

    Activities

    3.1 Lay out prioritization criteria.

    3.2 Determine priority metrics (implementation).

    3.3 Determine priority metrics (improvement & organizational trend).

    Outputs

    Prioritized metrics

    Tool for tracking and presentation

    4 Metrics Reporting

    The Purpose

    Strategize presentation based around metric type to indicate organization’s risk posture.

    Key Benefits Achieved

    Develop versatile reporting techniques

    Activities

    4.1 Review metric types and discuss reporting strategies for each.

    4.2 Develop a story about risk.

    4.3 Discuss the use of KPXs and how to scale for less mature programs.

    Outputs

    Key Performance Index Tool and presentation materials

    Further reading

    Build a Security Metrics Program to Drive Maturity

    Good metrics come from good goals.

    ANALYST PERSPECTIVE

    Metrics are a maturity driver.

    "Metrics programs tend to fall into two groups: non-existent and unhelpful.

    The reason so many security professionals struggle to develop a meaningful metrics program is because they are unsure of what to measure or why.

    The truth is, for metrics to be useful, they need to be tied to something you care about – a state you are trying to achieve. In other words, some kind of goal. Used this way, metrics act as the scoreboard, letting you know if you’re making progress towards your goals, and thus, boosting your overall maturity."

    Logan Rohde, Research Analyst, Security Practice Info-Tech Research Group

    Executive summary

    Situation

    • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.

    Complication

    • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
    • Because metrics can become very technical and precise, it's easy to think they're inherently complicated (not true).

    Resolution

    • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new, more specific goals, and with them comes more specific metrics.
    • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
    • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training).

    Info-Tech Insight

    1. Metrics lead to maturity, not vice versa
      • Tracking metrics helps you assess progress and regress in your security program. This helps you quantify the maturity gains you’ve made and continue to make informed strategic decisions.
    2. The best metrics are tied to goals
      • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Our understanding of the problem

    This Research is Designed For:

    • CISO

    This Research Will Help You:

    • Understand the value of metrics.
    • Right-size a metrics program based on your organization’s maturity and risk profile.
    • Tie metrics to goals to create meaningful KPIs.
    • Develop strategies to effectively communicate the right metrics to stakeholders.

    This Research Will Also Assist:

    • CIO
    • Security Manager
    • Business Professionals

    This Research Will Help Them:

    • Become informed on the metrics that matter to them.
    • Understand that investment in security is an investment in the business.
    • Feel confident in the progress of the organization’s security strategy.

    Info-Tech’s framework integrates several best practices to create a best-of-breed security framework

    Information Security Framework

    Governance

    • Context and Leadership
      • Information Security Charter
      • Information Security Organizational Structure
      • Culture and Awareness
    • Evaluation and Direction
      • Security Risk Management
      • Security Policies
      • Security Strategy and Communication
    • Compliance, Audit, and Review
      • Security Compliance Management
      • External Security Audit
      • Internal Security Audit
      • Management Review of Security

    Management

    • Prevention
      • Identity Security
        • Identity and Access Management
      • Data Security
        • Hardware Asset Management
        • Data Security & Privacy
      • Infrastructure Security
        • Network Security
        • Endpoint Security
        • Malicious Code
        • Application Security
        • Vulnerability Management
        • Cryptography Management
        • Physical Security
        • Cloud Security
      • HR Security
        • HR Security
      • Change and Support
        • Configuration and Change Management
        • Vendor Management
    • Detection
      • Security Threat Detection
      • Log and Event Management
    • Response and Recovery
      • Security Incident Management
      • Information Security in BCM
      • Security eDiscovery and Forensics
      • Backup and Recovery
    • Measurement
      • Metrics Program
      • Continuous Improvement

    Metrics help to improve security-business alignment

    While business leaders are now taking a greater interest in cybersecurity, alignment between the two groups still has room for improvement.

    Key statistics show that just...

    5% of public companies feel very confident that they are properly secured against a cyberattack.

    41% of boards take on cybersecurity directly rather than allocating it to another body (e.g. audit committee).

    19% of private companies do not discuss cybersecurity with the board.

    (ISACA, 2018)

    Info-Tech Insight

    Metrics help to level the playing field

    Poor alignment between security and the business often stems from difficulties with explaining how security objectives support business goals, which is ultimately a communication problem.

    However, metrics help to facilitate these conversations, as long as the metrics are expressed in practical, relatable terms.

    Security metrics benefit the business

    Executives get just as much out of management metrics as the people running them.

    1. Metrics assuage executives’ fears
      • Metrics help executives (and security leaders) feel more at ease with where the company is security-wise. Metrics help identify areas for improvement and gaps in the organization’s security posture that can be filled. A good metrics program will help identify deficiencies in most areas, even outside the security program, helping to identify what work needs to be done to reduce risk and increase the security posture of the organization.
    2. Metrics answer executives’ questions
      • Numbers either help ease confusion or signify other areas for improvement. Offering quantifiable evidence, in a language that the business can understand, offers better understanding and insight into the information security program. Metrics also help educate on types of threats, staff needed for security, and budget needs to decrease risk based on management’s threat tolerance. Metrics help make an organization more transparent, prepared, and knowledgeable.
    3. Metrics help to continually prove security’s worth
      • Traditionally, the security team has had to fight for a seat at the executive table, with little to no way to communicate with the business. However, the new trend is that the security team is now being invited before they have even asked to join. This trend allows the security team to better communicate on the organization’s security posture, describe threats and vulnerabilities, present a “plan of action,” and get a pulse on the organization’s risk tolerance.

    Common myths make security metrics seem challenging

    Security professionals have the perception that metrics programs are difficult to create. However, this attitude usually stems from one of the following myths. In reality, security metrics are much simpler than they seem at first, and they usually help resolve existing challenges rather than create new ones.

    Myth Truth
    1 There are certain metrics that are important to all organizations, based on maturity, industry, etc. Metrics are indications of change; for a metric to be useful it needs to be tied to a goal, which helps you understand the change you're seeing as either a positive or a negative. Industry and maturity have little bearing here.
    2 Metrics are only worthwhile once a certain maturity level is reached Metrics are a tool to help an organization along the maturity scale. Metrics help organizations measure progress of their goals by helping them see which tactics are and are not working.
    3 Security metrics should focus on specific, technical details (e.g. of systems) Metrics are usually a means of demonstrating, objectively, the state of a security program. That is, they are a means of communicating something. For this reason, it is better that metrics be phrased in easily digestible, non-technical terms (even if they are informed by technical security statistics).

    Tie your metrics to goals to make them worthwhile

    SMART metrics are really SMART goals.

    Specific

    Measurable

    Achievable

    Realistic

    Timebound

    Achievable: What is an achievable metric?

    When we say that a metric is “achievable,” we imply that it is tied to a goal of some kind – the thing we want to achieve.

    How do we set a goal?

    1. Determine what outcome you are trying to achieve.
      • This can be small or large (e.g. I want to determine what existing systems can provide metrics, or I want a 90% pass rate on our monthly phishing tests).
    2. Decide what indicates that you’ve achieved your goal.
      • At what point would you be satisfied with the progress made on the initiative(s) you’re working on? What conditions would indicate victory for you and allow you to move on to another goal?
    3. Develop a key performance indicator (KPI) to measure progress towards that goal.
      • Now that you’ve defined what you’re trying to achieve, find a way to indicate progress in relative or relational terms (e.g. percentage change from last quarter, percentage of implementation completed, ratio of programs in place to those still needing implementation).

    Info-Tech’s security metrics methodology is repeatable and iterative to help boost maturity

    Security Metric Lifecycle

    Start:

    Review current state and decide on priorities.

    Set a SMART goal for improvement.

    Develop an appropriate KPI.

    Use KPI to monitor program improvement.

    Present metrics to the board.

    Revise metrics if necessary.

    Metrics go hand in hand with your security strategy

    A security strategy is ultimately a large goal-setting exercise. You begin by determining your current maturity and how mature you need to be across all areas of information security, i.e. completing a gap analysis.

    As such, linking your metrics program to your security strategy is a great way to get your metrics program up and running – but it’s not the only way.

    Check out the following Info-Tech resource to get started today:

    Build an Information Security Strategy

    The value of security metrics goes beyond simply increasing security

    This blueprint applies to you whether you need to develop a metrics program from scratch or optimize and update your current strategy.

    Value of engaging in security metrics:

    • Increased visibility into your operations.
    • Improved accountability.
    • Better communication with executives as a result of having hard evidence of security performance.
    • Improved security posture through better understanding of what is working and what isn’t within the security program.

    Value of Info-Tech’s security metrics blueprint:

    • Doesn’t overwhelm you and allows you to focus on determining the metrics you need to worry about now without pressuring you to do it all at once.
    • Helps you develop a growth plan as your organization and metrics program mature, so you continue to optimize.
    • Creates effective communication. Prepares you to present the metrics that truly matter to executives rather than confusing them with unnecessary data. Pay attention to metric accuracy and reproducibility. No management wants inconsistent reporting.

    Impact

    Short term: Streamline your program. Based on your organization’s specific requirements and risk profile, figure out which metrics are best for now while also planning for future metrics as your organization matures.

    Long term: Once the program is in place, improvements will come with increased visibility into operations. Investments in security will be encouraged when more evidence is available to executives, contributing to overall improved security posture. Potential opportunities for eventual cost savings also exist as there is more informed security spending and fewer incidents.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked-off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Link Security Metrics to Goals to Boost Maturity – Project Overview

    1. Link Security Metrics to Goals to Boost Maturity 2. Adapt Your Reporting Strategy for Various Metric Types
    Best-Practice Toolkit

    1.1 Review current state and set your goals

    1.2 Develop KPIs and prioritize your goals

    1.3 Implement and monitor the KPI to track goal progress

    2.1 Review best practices for presenting metrics

    2.2 Strategize your presentation based on metric type

    2.3 Tailor presentation to your audience

    2.4 Use your metrics to create a story about risk

    2.5 Revise your metrics

    Guided Implementations
    • Call 1: Setting Goals
    • Call 2: KPI Development
    • Call 1: Best Practices and Reporting Strategy
    • Call 2: Build a Dashboard and Presentation Deck
    Onsite Workshop Module 1: Current State, Initiatives, Goals, and KPIs Module 2: Metrics Reporting

    Phase 1 Outcome:

    • KPI development and populated metrics tracking tool.

    Phase 2 Outcome:

    • Reporting strategy with dashboard and presentation deck.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Current State, Initiatives, and Goals

    • Discuss current state and existing approach to metrics.
    • Review contract metrics already in place (or available).
    • Determine security areas that should be measured.
    • Determine which stakeholders are involved.
    • Review current initiatives to address those risks (security strategy, if in place).
    • Begin developing SMART goals for your initiative roadmap.

    KPI Development

    • Continue SMART goal development.
    • Sort goals into types.
    • Rephrase goals as KPIs and list associated metric(s).
    • Continue KPI development.

    Metrics Prioritization

    • Lay out prioritization criteria.
    • Determine priority metrics (implementation).
    • Determine priority metrics (improvement & organizational trend).

    Metrics Reporting

    • Review metric types and discuss reporting strategies for each.
    • Develop a story about risk.
    • Discuss the use of KPXs and how to scale for less mature programs.

    Offsite Finalization

    • Review and finalization of documents drafted during workshop.
    Deliverables
    1. Gap analysis results
    1. Completed KPI development templates
    1. Prioritized metrics and tool for tracking and presentation.
    1. Key Performance Index tool and presentation materials.
    1. Finalization of completed deliverables

    Phase 1

    Link Security Metrics to Goals to Boost Maturity


    Phase 1

    1.1 Review current state and set your goals

    1.2 Develop KPIs and prioritize your goals

    1.3 Implement and monitor KPIs

    This phase will walk you through the following activities:

    • Current state assessment
    • Setting SMART goals
    • KPI development
    • Goals prioritization
    • KPI implementation

    This phase involves the following participants:

    • Security Team

    Outcomes of this phase

    • Goals-based KPIs
    • Security Metrics Determination and Tracking Tool

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Link Security Metrics to Goals to Boost Maturity

    Proposed Time to Completion: 2-4 weeks

    Step 1.1: Setting Goals

    Start with an analyst kick-off call:

    • Determine current and target maturity for various security programs.
    • Develop SMART Goals.

    Then complete these activities…

    • CMMI Assessment

    Step 1.2 – 1.3: KPI Development

    Review findings with analyst:

    • Prioritize goals
    • Develop KPIs to track progress on goals
    • Track associated metrics

    Then complete these activities…

    • KPI Development

    With these tools & templates:

    • KPI Development Worksheet
    • Security Metrics Determination and Tracking Tool

    Phase 1 Results & Insights:

    • Basic Metrics program

    1.1 Review current state and set your goals

    120 minutes

    Let’s put the security program under the microscope.

    Before program improvement can take place, it is necessary to look at where things are at presently (in terms of maturity) and where we need to get them to.

    In other words, we need to perform a security program gap analysis.

    Info-Tech Best Practice

    The most thorough way of performing this gap analysis is by completing Info-Tech’s Build an Information Security Strategy blueprint, as it will provide you with a prioritized list of initiatives to boost your security program maturity.

    Completing an abbreviated gap analysis...

    • Security Areas
    • Network Security
    • Endpoint Security
    • Vulnerability Management
    • Identity Access Management
    • Incident Management
    • Training & Awareness
    • Compliance, Audit, & Review
    • Risk Management
    • Business Alignment & Governance
    • Data Security
    1. Using the CMMI scale on the next slide, assess your maturity level across the security areas to the left, giving your program a score from 1-5. Record your assessment on a whiteboard.
    2. Zone in on your areas of greatest concern and choose 3 to 5 areas to prioritize for improvement.
    3. Set a SMART goal for improvement, using the criteria on goals slides.

    Use the CMMI scale to contextualize your current maturity

    Use the Capability Maturity Model Integration (CMMI) scale below to help you understand your current level of maturity across the various areas of your security program.

    1. Initial
      • Incident can be managed. Outcomes are unpredictable due to lack of a standard operating procedure.
    2. Repeatable
      • Process in place, but not formally implemented or consistently applied. Outcomes improve but still lack predictability.
    3. Defined
      • Process is formalized and consistently applied. Outcomes become more predictable, due to consistent handling procedure.
    4. Managed
      • Process shows signs of maturity and can be tracked via metrics. Moving towards a predictive approach to incident management.
    5. Optimizing
      • Process reaches a fully reliable level, though improvements still possible. Regularity allows for process to be automated.

    (Adapted from the “CMMI Institute Maturity Model”)

    Base your goals around the five types of metrics

    Choose goals that make sense – even if they seem simple.

    The most effective metrics programs are personalized to reflect the goals of the security team and the business they work for. Using goals-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

    Info-Tech Best Practice

    Before setting a SMART goal, take a moment to consider your maturity for each security area, and which metric type you need to collect first, before moving to more ambitious goals.

    Security Areas

    • Network Security
    • Endpoint Security
    • Vulnerability Management
    • Identity Access Management
    • Incident Management
    • Training & Awareness
    • Compliance, Audit & Review
    • Risk Management
    • Business Alignment & Governance
    • Data Security
    Metric Type Description
    Initial Probe Determines what can be known (i.e. what sources for metrics exist?).
    Baseline Testing Establishes organization’s normal state based on current metrics.
    Implementation Focuses on setting up a series of related processes to increase organizational security (i.e. roll out MFA).
    Improvement Sets a target to be met and then maintained based on organizational risk tolerance.
    Organizational Trends Culls together several metrics to track (sometimes predict) how various trends affect the organization’s overall security. Usually focuses on large-scale issues (e.g. likelihood of a data breach).

    Set SMART goals for your security program

    Specific

    Measurable

    Achievable

    Realistic

    Timebound

    Now that you have determined which security areas you’d like to improve, decide on a goal that meets the SMART criteria.

    Examples of possible goals for various maturity levels:

    1. Perform initial probe to determine number of systems capable of providing metrics by the end of the week.
    2. Take baseline measurements each month for three months to determine organization’s baseline state.
    3. Implement a vulnerability management program to improve baseline state by the end of the quarter.
    4. Improve deployment of critical patches by applying 90% of them within the set window by the end of the year.
    5. Demonstrate how vulnerability management affects broad organizational trends at quarterly report to senior leadership.

    Compare the bolded text in these examples with the metric types on the previous slide

    Record and assess your goals in the Security Metrics Determination and Tracking Tool

    1.1 Security Metrics Determination and Tracking Tool

    Use tab “2. Identify Security Goals” to document and assess your goals.

    To increase visibility into the cost, effort, and value of any given goal, assess them using the following criteria:

    • Initial Cost
    • Ongoing Cost
    • Initial Staffing
    • Ongoing Staffing
    • Alignment w/Business
    • Benefit

    Use the calculated Cost/Effort Rating, Benefit Rating, and Difference Score later in this project to help with goal prioritization.

    Info-Tech Best Practice

    If you have already completed a security strategy with Info-Tech resources, this work may likely have already been done. Consult your Information Security Program Gap Analysis Tool from the Build an Information Security Strategy research.

    1.2 Develop KPIs and prioritize your goals

    There are two paths to success.

    At this time, it is necessary to evaluate the priorities of your security program.

    Option 1: Progress to KPI Development

    • If you would like practice developing KPIs for multiple goals to get used to the process, move to KPI development and then assess which goals you can pursue now based on resources available, saving the rest for later.

    Option 2: Progress to Prioritization of Goals

    • If you are already comfortable with KPI development and do not wish to create extras for later use, then prioritize your goals first and then develop KPIs for them.

    Phase 1 Schematic

    • Gap Analysis
    • Set SMART Goals (You are here.)
      • Develop KPIs
    • Prioritize Goals
    • Implement KPI & Monitor
    • Phase 2

    Develop a key performance indicator (KPI)

    Find out if you’re meeting your goals.

    Terms like “key performance indicator” may make this development practice seem more complicated than it really is. A KPI is just a single metric used to measure success towards a goal. In relational terms (i.e. as a percentage, ratio, etc.) to give it context (e.g. % of improvement over last quarter).

    KPI development is about answering the question: what would indicate that I have achieved my goal?

    To develop a KPI follow these steps:

    1. Review the case study on the following slides to get a sense of how KPIs can start simple and general and get more specific and complex over time.
    2. Using the example to the right, sort your SMART goals from step 1.1 into the various metric types, then determine what success would look like for you. What outcome are you trying to achieve? How will you know when you’ve achieved it?
    3. Fill out the KPI Development Worksheets to create sample KPIs for each of the SMART goals you have created. Ensure that you complete the accompanying KPI Checklist.

    KPIs differ from goal to goal, but their forms follow certain trends

    Metric Type KPI Form
    Initial Probe Progress of probe (e.g. % of systems checked to see if they can supply metrics).
    Baseline Testing What current data shows (e.g. % of systems needing attention).
    Implementation Progress of the implementation (e.g. % of complete vulnerability management program implementation).
    Improvement The threshold or target to be achieved and maintained (e.g. % of incidents responded to within target window).
    Organizational Trends The interplay of several KPIs and how they affect the organization’s risk posture (e.g. assessing the likelihood for a data breach).

    Explore the five metric types

    1. Initial Probe

    Focused on determining how many sources for metrics exist.

    • Question: What am I capable of knowing?
    • Goal: To determine what level of insight we have into our security processes.
    • Possible KPI: % of systems for which metrics are available.
    • Decision: Do we have sufficient resources available to collect metrics?

    2. Baseline Testing

    Focused on gaining initial insights about the state of your security program (what are the measurements?).

    • Question: Does this data suggest areas for improvement?
    • Goal: To create a roadmap for improvement.
    • Possible KPI: % of systems that provide useful metrics to measure improvement.
    • Decision: Is it necessary to acquire tools to increase, enhance, or streamline the metrics-gathering process?

    Info-Tech Insight

    Don't lose hope if you lack resources to move beyond these initial steps. Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

    Explore the five metric types (cont’d)

    3. Program Implementation

    Focused on developing a basic program to establish basic maturity (e.g. implement an awareness and training program).

    • Question: What needs to be implemented to establish basic maturity?
    • Goal: To begin closing the gap between current and desired maturity.
    • Possible KPI: % of implementation completed.
    • Decision: Have we achieved a formalized and repeatable process?

    4. Improvement

    Focused on attaining operational targets to lower organizational risk.

    • Question: What other related activities could help to support this goal (e.g. regular training sessions)?
    • Goal: To have metrics operate above or below a certain threshold (e.g. lower phishing-test click rate to an average of 10% across the organization)
    • Possible KPI: Phishing click rate %
    • Decision: What other metrics should be tracked to provide insight into KPI fluctuations?

    Info-Tech Insight

    Don't overthink your KPI. In many cases it will simply be your goal rephrased to express a percentage or ratio. In others, like the example above, it makes sense for them to be identical.

    5. Organizational Impact

    Focused on studying several related KPIs (Key Performance Index, or KPX) in an attempt to predict risks.

    • Question: What risks does the organization need to address?
    • Goal: To provide high-level summaries of several metrics that suggest emerging or declining risks.
    • Possible KPI: Likelihood of a given risk (based on the trends of the KPX).
    • Decision: Accept the risk, transfer the risk, mitigate the risk?

    Case study: Healthcare example

    Let’s take a look at KPI development in action.

    Meet Maria, the new CISO at a large hospital that desperately needs security program improvements. Maria’s first move was to learn the true state of the organization’s security. She quickly learned that there was no metrics program in place and that her staff were unaware what, if any, sources were available to pull security metrics from.

    After completing her initial probe into available metrics and then investigating the baseline readings, she determined that her areas of greatest concern were around vulnerability and access management. But she also decided it was time to get a security training and awareness program up and running to help mitigate risks in other areas she can’t deal with right away.

    See examples of Maria’s KPI development on the next four slides...

    Info-Tech Insight

    There is very little variation in the kinds of goals people have around initial probes and baseline testing. Metrics in these areas are virtually always about determining what data sources are available to you and what that data actually shows. The real decisions start in determining what you want to do based on the measures you’re seeing.

    Metric development example: Vulnerability Management

    See examples of Maria’s KPI development on the next four slides...

    Implementation

    Goal: Implement vulnerability management program

    KPI: % increase of insight into existing vulnerabilities

    Associated Metric: # of vulnerability detection methods

    Improvement

    Goal: Improve deployment time for patches

    KPI: % of critical patches fully deployed within target window

    • Associated Metric 1: # of critical vulnerabilities not patched
    • Associated Metric 2: # of patches delayed due to lack of staff
    • Associated Metric X

    Metric development example: Identity Access Management

    Implementation

    Goal: Implement MFA for privileged accounts

    KPI: % of privileged accounts with MFA applied

    Associated Metric: # of privileged accounts

    Improvement

    Goal: Remove all unnecessary privileged accounts

    KPI: % of accounts with unnecessary privileges

    • Associated Metric 1: # of privileged accounts
    • Associated Metric 2: # of necessary privileged accounts
    • Associated Metric X

    Metric development example: Training and Awareness

    Implementation

    Goal: Implement training and awareness program

    KPI: % of organization trained

    Associated Metric: # of departments trained

    Improvement

    Goal: Improve time to report phishing

    KPI: % of phishing cases reported within target window

    • Associated Metric 1: # of phishing tests
    • Associated Metric 2: # of training sessions
    • Associated Metric X

    Metric development example: Key Performance Index

    Organizational Trends

    Goal: Predict Data Breach Likelihood

    • KPX 1: Insider Threat Potential
      • % of phishing cases reported within target window
        • Associated Metrics:
          • # of phishing tests
          • # of training sessions
      • % of critical patches fully deployed within target window
        • Associated Metrics:
          • # of critical vulnerabilities not patched
          • # of patches delayed due to lack of staff
      • % of accounts with unnecessary privileges
        • Associated Metrics:
          • # of privileged accounts
          • # of necessary privileged accounts
    • KPX 2: Data Leakage Issues
      • % of incidents related to unsecured databases
        • Associated Metrics:
          • # of unsecured databases
          • # of business-critical databases
      • % of misclassified data
        • Associated Metrics:
          • # of misclassified data reports
          • # of DLP false positives
      • % of incidents involving data-handling procedure violations.
        • Associated Metrics:
          • # of data processes with SOP
          • # of data processes without SOP
    • KPX 3: Endpoint Vulnerability Issues
      • % of unpatched critical systems
        • Associated Metrics:
          • # of unpatched systems
          • # of missed patches
      • % of incidents related to IoT
        • Associated Metrics:
          • # of IoT devices
          • # of IoT unsecure devices
      • % of incidents related to BYOD
        • Associated Metrics:
          • # of end users doing BYOD
          • # of BYOD incidents

    Develop Goals-Based KPIs

    1.2 120 minutes

    Materials

    • Info-Tech KPI Development Worksheets

    Participants

    • Security Team

    Output

    • List of KPIs for immediate and future use (can be used to populate Info-Tech’s KPI Development Tool).

    It’s your turn.

    Follow the example of the CISO in the previous slides and try developing KPIs for the SMART goals set in step 1.1.

    • To begin, decide if you are starting with implementation or improvement metrics.
    • Enter your goal in the space provided on the left-hand side and work towards the right, assigning a KPI to track progress towards your goal.
    • Use the associated metrics boxes to record what raw data will inform or influence your KPI.
      • Associated metrics are connected to the KPI box with a segmented line. This is because these associated metrics are not absolutely necessary to track progress towards your goal.
      • However, if a KPI starts trending in the wrong direction, these associated metrics would be used to determine where the problem has occurred.
    • If desired, bundle together several related KPIs to create a key performance index (KPX), which is used to forecast the likelihood of certain risks that would have a major business impact (e.g. potential for insider threat, or risk for a data breach).

    Record KPIs and assign them to goals in the Security Metrics Determination and Tracking Tool

    1.2 Security Metrics Determination and Tracking Tool

    Document KPI metadata in the tool and optionally assign them to a goal.

    Tab “3. Identify Goal KPIs” allows you to record each KPI and its accompanying metadata:

    • Source
    • Owner
    • Audience
    • KPI Target
    • Effort to Collect
    • Frequency of Collection
    • Comments

    Optionally, each KPI can be mapped to goals defined on tab “2. Identify Security Goals.”

    Info-Tech Best Practice

    Ensure your metadata is comprehensive, complete, and realistic. A different employee should be able to use only the information outlined in the metadata to continue collecting measurements for the program.

    Complete Info-Tech’s KPI Development Worksheets

    1.2 KPI Development Worksheet

    Use these worksheets to model the maturation of your metrics program.

    Follow the examples contained in this slide deck and practice creating KPIs for:

    • Implementation metrics
    • Improvement metrics
    • Organizational trends metrics

    As well as drafting associated metrics to inform the KPIs you create.

    Info-Tech Best Practice

    Keep your metrics program manageable. This exercise may produce more goals, metrics, and KPIs than you deal with all at once. But that doesn’t mean you can’t save some for future use.

    Build an effort map to prioritize your SMART goals

    1.2 120 minutes

    Materials

    • Whiteboard
    • Sticky notes
    • Laptop

    Participants

    • Security team
    • Other stakeholders

    Output

    • Prioritized list of SMART goals

    An effort map visualizes a cost and benefit analysis. It is a quadrant output that visually shows how your SMART goals were assessed. Use the calculated Cost/Effort Rating and Benefit Rating values from tab “2. Identify Security Goals” of the Security Metrics Determination and Tracking Tool to aid this exercise.

    Steps:

    1. Establish the axes and colors for your effort map:
      1. X-axis (horizontal) - Security benefit
      2. Y-axis (vertical) - Overall cost/effort
      3. Sticky color - Business alignment
    2. Create sticky notes for each SMART goal and place them onto the effort map based on your determined axes.
      • Goal # Example Security Goal - Benefit (1-12) - Cost (1-12)

    The image shows a matric with four quadrants. The X-axis is labelled Low Benefit on the left side and High benefit on the right side. The Y-axis is labelled Low cost at the top and High cost at the bottom. The top left quadrant is labelled Could Dos, the top right quadrant is labelled Must Dos, the lower left quadrant is labelled May Not Dos, and the lower right quadrant is Should Dos. On the right, there are three post-it style notes, the blue one labelled High Alignment, the yellow labelled Medium Alignment, and the pink labelled Low Alignment.

    1.3 Implement and monitor the KPI to track goal progress

    Let’s put your KPI into action!

    Now that you’ve developed KPIs to monitor progress on your goals, it’s time to use them to drive security program maturation by following these steps:

    1. Review the KPI Development Worksheets (completed in step 1.2) for your prioritized list of goals. Be sure that you are able to track all of the associated metrics you have identified.
    2. Track the KPI and associated metrics using Info-Tech’s KPI Development Tool (see following slide).
    3. Update the data as necessary according to your SMART criteria of your goal.

    A Word on Key Risk Indicators...

    The term key risk indicator (KRI) gets used in a few different ways. However, in most cases, KRIs are closely associated with KPIs.

    1. KPIs and KRIs are the same thing
      • A KPI, at its core, is really a measure of risk. Sometimes it is more effective to emphasize that risk rather than performance (i.e. the data shows you’re not meeting your goal).
    2. KRI is KPI going the wrong way
      • After achieving the desired threshold for an improvement goal, our new goal is usually to maintain such a state. When this balance is upset, it indicates that settled risk has once again become active.
    3. KRI as a predictor of emerging risks
      • When organizations reach a highly mature state, they often start assessing how events external to the organization can affect the optimal performance of the organization. They monitor such events or trends and try to predict when the organization is likely to face additional risks.

    Track KPIs in the Security Metrics Determination and Tracking Tool

    1.3 Security Metrics Determination and Tracking Tool

    Once a metric has been measured, you have the option of entering that data into tab “4. Track Metrics” of the Tool.

    Tracking metric data in Info-Tech's tool provides the following data visualizations:

    • Sparklines at the end of each row (on tab “4. Track Metrics”) for a quick sense of metric performance.
    • A metrics dashboard (on tab “5. Graphs”) with three graph options in two color variations for each metric tracked in the tool, and an overall metric program health gauge.

    Info-Tech Best Practice

    Be diligent about measuring and tracking your metrics. Record any potential measurement biases or comments on measurement values to ensure you have a comprehensive record for future use. In the tool, this can be done by adding a comment to a cell with a metric measurement.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

    Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

    In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

    Logan Rohde

    Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Ian Mulholland

    Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Call 1-888-670-8889 for more information.

    Phase 2

    Adapt Your Reporting Strategy for Various Metric Types


    Phase 2

    2.1 Review best practices for presenting metrics

    2.2 Strategize your presentation based on metric type

    2.3 Tailor your presentation to your audience

    2.4 Use your metrics to create a story about risk

    2.5 Revise Metrics

    This phase will walk you through the following activities:

    • Develop reporting strategy
    • Use metrics to create a story about risk
    • Metrics revision

    This phase involves the following participants:

    • Security Team

    Outcomes of this phase

    • Metrics Dashboard
    • Metrics Presentation Deck

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Adapt Your Reporting Strategy for Various Metric Types

    Proposed Time to Completion: 2-4 weeks

    Step 2.1 – 2.3: Best Practices and Reporting Strategy

    Start with an analyst kick-off call:

    • Do’s and Don’ts of reporting metrics.
    • Strategize presentation based on metric type.

    Then complete these activities…

    • Strategy development for 3-5 metrics

    Step 2.4 – 2.5: Build a Dashboard and Presentation Deck

    Review findings with analyst:

    • Review strategies for reporting.
    • Compile a Key Performance Index.
    • Revise metrics.

    Then complete these activities…

    • Dashboard creation
    • Presentation development

    With these tools & templates:

    • Security Metrics Determination and Tracking Tool Template
    • Security Metrics KPX Dashboard Tool

    Phase 2 Results & Insights:

    • Completed reporting strategy with presentable dashboard

    2.1 Review best practices for presenting metrics

    Avoid technical details (i.e. raw data) by focusing on the KPI.

    • KPIs add context to understand the behavior and associated risks.

    Put things in terms of risk; it's the language you both understand.

    • This usually means explaining what will happen if not addressed and what you recommend.
    • There are always three options:
      • Address it completely
      • Address it partially
      • Do not address it (i.e. accept the risk)

    Explain why you’re monitoring metrics in terms of the goals you’re hoping to achieve.

    • This sets you up well to explain what you've been doing and why it's important for you to meet your goals.

    Choose between KPI or KRI as the presentation format.

    • Base your decision on whether you are trying to emphasize current success or risk.

    Match presentation with the audience.

    • Board presentations will be short; middle-management ones may be a bit longer.
    • Maximize your results by focusing on the minimum possible information to make sure you sufficiently get your point across.
    • With the board, plan on showing no more than three slides.

    Read between the lines.

    • It can be difficult to get time with the board, so you may find yourself in a trial and error position, so pay attention to cues or suggestions that indicate the board is interested in something.
    • If you can, make an ally to get the inside scoop on what the board cares about.

    Read the news if you’re stuck for content.

    • Board members are likely to have awareness (and interest) in large-scale risks like data breaches and ransomware.

    Present your metrics as a story.

    • Summarize how the security program looks to you and why the metrics lead you to see it this way.

    2.2 Strategize your presentation based on metric type (1 of 5)

    Metric Type: Initial Probe

    Scenario: Implementing your first metrics program.

    • All metrics programs start with determining what measurements you are capable of taking.

    Decisions: Do you have sufficient insight into the program? (i.e. do you need to acquire additional tools to collect metrics?)

    Strategy: If there are no barriers to this (e.g. budget), then focus your presentation on the fact that you are addressing the risk of not knowing what your organization's baseline state is and what potential issues exist but are unknown. This is likely the first phase of an improvement plan, so sketching the overall plan is a good idea too.

    • If budget is an issue, explain the risks associated with not knowing and what you would need to make it happen.

    Possible KPIs:

    • % of project complete.
    • % of systems that provide worthwhile metrics.

    Strategize your presentation based on metric type (2 of 5)

    Metric Type: Baseline Testing

    Scenario: You've taken the metrics to determine what your organization’s normal state is and you're now looking towards addressing your gaps or problem areas.

    Decisions: What needs to be prioritized first and why? Are additional resources required to make this happen?

    Strategy: Explain your impression of the organization's normal state and what you plan to do about it. In other words, what goals are you prioritizing and why? Be sure to note any challenges that may occur along the way (e.g. staffing).

    • If the board doesn't like to open their pocketbook, your best play is to explain what stands to happen (or is happening) if risks are not addressed.

    Possible KPIs:

    • % of goals complete.
    • % of metrics indicating urgent attention needed.

    Strategize your presentation based on metric type (3 of 5)

    Metric Type: Implementation

    Scenario: You are now implementing solutions to address your security priorities.

    Decisions: What, to you, would establish the basis of a program?

    Strategy: Focus on what you're doing to implement a certain security need, why, and what still needs to be done when you’re finished.

    • Example: To establish a training and awareness program, a good first step is to actually hold training sessions with each department. A single lecture is simple but something to build from. A good next step would be to hold regular training sessions or implement monthly phishing tests.

    Possible KPIs:

    • % of implementation complete (e.g. % of departments trained).

    Strategize your presentation based on metric type (4 of 5)

    Metric Type: Improvement

    Scenario: Now that a basic program has been established, you are looking to develop its maturity to boost overall performance (i.e. setting a new development goal).

    Decisions: What is a reasonable target, given the organization's risk tolerance and current state?

    Strategy: Explain that you're now working to tighten up the security program. Note that although things are improving, risk will always remain, so we need to keep it within a threshold that’s proportionate with our risk tolerance.

    • Example: Lower phishing-test click rate to 10% or less. Phishing will always be a risk, and just one slip up can have a huge effect on business (i.e. lost money).

    Possible KPIs:

    • % of staff passing the phishing test.
    • % of employees reporting phishing attempts within time window.

    Strategize your presentation based on metric type (5 of 5)

    Metric Type: Organizational Trends

    Scenario: You've reached a mature state and now how several KPIs being tracked. You begin to look at several KPIs together (i.e. a KPX) to assess the organization's exposure for certain broad risk trends.

    Decisions: Which KPIs can be used together to look at broader risks?

    Strategy: Focus on the overall likelihood of a certain risk and why you've chosen to assess it with your chosen KPIs. Spend some time discussing what factors affect the movement of these KPIs, demonstrating how smaller behaviors create a ripple effect that affects the organization’s exposure to large-scale risks.

    Possible KPX: Insider Threat Risk

    • % of phishing test failures.
    • % of critical patches missed.
    • % of accounts with unnecessary privileges.

    Change your strategy to address security challenges

    Even challenges can elicit useful metrics.

    Not every security program is capable of progressing smoothly through the various metric types. In some cases, it is impossible to move towards goals and metrics for implementation, improvement, or organizational trends because the security program lacks resources.

    Info-Tech Insight

    When your business is suffering from a lack of resources, acquiring these resources automatically becomes the goal that your metrics should be addressing. To do this, focus on what risks are being created because something is missing.

    When your security program is lacking a critical resource, such as staff or technology, your metrics should focus on what security processes are suffering due to this lack. In other words, what critical activities are not getting done?

    KPI Examples:

    • % of critical patches not deployed due to lack of staff.
    • % of budget shortfall to acquire vulnerability scanner.
    • % of systems with unknown risk due to lack of vulnerability scanner.

    2.3 Tailor presentation to your audience

    Metrics come in three forms...

    1. Raw Data

    • Taken from logs or reports, provides values but not context.
    • Useful for those with technical understanding of the organization’s security program.

    2. Management-Level

    • Raw data that has been contextualized and indicates performance of something (i.e. a KPI).
    • Useful for those with familiarity with the overall state of the security program but do not have a hands-on role.

    3. Board-Level

    • KPI with additional context indicating overall effect on the organization.
    • Useful for those removed from the security program but who need to understand the relationship between security, business goals, and cyber risk.

    For a metric to be useful it must...

    1. Be understood by the audience it’s being presented to.
      • Using the criteria on the left, choose which metric form is most appropriate.
    2. Indicate whether or not a certain target or goal is being met.
      • Don’t expect metrics to speak for themselves; explain what the indications and implications are.
    3. Drive some kind of behavioral or strategic change if that target or goal is not being met.
      • Metrics should either affirm that things are where you want them to be or compel you to take action to make an improvement. If not, it is not a worthwhile metric.

    As a general rule, security metrics should become decreasingly technical and increasingly behavior-based as they are presented up the organizational hierarchy.

    "The higher you travel up the corporate chain, the more challenging it becomes to create meaningful security metrics. Security metrics are intimately tied to their underlying technologies, but the last thing the CEO cares about is technical details." – Ben Rothke, Senior Information Security Specialist, Tapad.

    Plan for reporting success

    The future of your security program may depend on this presentation; make it count.

    Reporting metrics is not just another presentation. Rather, it is an opportunity to demonstrate and explain the value of security.

    It is also a chance to correct any misconceptions about what security does or how it works.

    Use the tips on the right to help make your presentation as relatable as possible.

    Info-Tech Insight

    There is a difference between data manipulation and strategic presentation: the goal is not to bend the truth, but to present it in a way that allows you to show the board what they need to see and to explain it in terms familiar to them.

    General Tips for a Successful Presentation

    Avoid jargon; speak in practical terms

    • The board won’t receive your message if they can’t understand you.
    • Explain things as simply as you can; they only need to know enough to make decisions about addressing cyber risk.

    Address compliance

    • Boards are often interested in compliance, so be prepared to talk about it, but clarify that it doesn't equal security.
    • Instead, use compliance as a bridge to discussing areas of the security program that need attention.

    Have solid answers

    • Try to avoid answering questions with the answer, “It depends.”
      • Depends on what?
      • Why?
      • What do you recommend?
    • The board is relying on you for guidance, so be prepared to clarify what the board is asking (you may have to read between the lines to do this).
    • Also address the pain points of board members and have answers to their questions about how to resolve them.

    2.4 Use your metrics to create a story about risk

    Become the narrator of your organization’s security program.

    Security is about managing risk. This is also its primary value to the organization. As such, risk should be the theme of the story you tell.

    "Build a cohesive story that people can understand . . . Raw metrics are valuable from an operations standpoint, but at the executive level, it's about a cohesive story that helps executives understand the value of the security program and keeps the company moving forward. "– Adam Ely, CSO and Co-Founder, Bluebox Security, qtd. by Tenable, 2016

    How to Develop Your Own Story...

    1. Review your security program goals and the metrics you’re using to track progress towards them. Then, decide which metrics best tell this story (i.e. what you’re doing and why).
      • Less is more when presenting metrics, so be realistic about how much your audience can digest in one sitting.
      • Three metrics is usually a safe number; choose the ones that are most representative of your goals.
    2. Explain why you chose the goals you did (i.e. what risks were you addressing?). Then, make an honest assessment of how the security program is doing as far as meeting those goals:
      • What’s going well?
      • What still needs improvement?
      • What about your metrics suggests this?
    3. Address how risks have changed and explain your new recommended course of action.
      • What risks were present when you started?
      • What risks remain despite your progress?
      • How do these risks affect the business operation and what can security do to help?

    Story arc for security metrics

    The following model encapsulates the basic trajectory of all story development.

    Use this model to help you put together your story about risk.

    Introduction: Overall assessment of security program.

    Initial Incident: Determination of the problems and associated risks.

    Rising Action: Creation of goals and metrics to measure progress.

    Climax: Major development indicated by metrics.

    Falling Action: New insights gained about organization’s risks.

    Resolution: Recommendations based on observations.

    Info-Tech Best Practice

    Follow this model to ensure that your metrics presentation follows a coherent storyline that explains how you assessed the problem, why you chose to address it the way you did, what you learned in doing so, and finally what should be done next to boost the security program’s maturity.

    Use a nesting-doll approach when presenting metrics

    Move from high-level to low-level to support your claims

    1. Avoid the temptation to emphasize technical details when presenting metrics. The importance of a metric should be clear from just its name.
    2. This does not mean that technical details should be disregarded entirely. Your digestible, high-level metrics should be a snapshot of what’s taking place on the security ground floor.
    3. With this in mind, we should think of our metrics like a nesting doll, with each metrics level being supported by the one beneath it.

    ...How do you know that?

    Board-Level KPI

    Mgmt.-Level KPI

    Raw Data

    Think of your lower-level metrics as evidence to back up the story you are telling.

    When you’re asked how you arrived at a given conclusion, you know it’s time to go down a level and to explain those results.

    Think of this like showing your work.

    Info-Tech Insight

    This approach is built into the KPX reporting format, but can be used for all metric types by drawing from your associated metrics and goals already achieved.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics Determination and Tracking Tool

    Choose the dashboard tool that makes the most sense for you.

    Info-Tech provides two options for metric dashboards to meet the varying needs of our members.

    If you’re just starting out, you’ll likely be inclined towards the dashboard within the Security Metrics Determination and Tracking Tool (seen here).

    The image shows a screenshot of the Security Metrics Determination and Tracking Tool.

    But if you’ve already got several KPIs to report on, you may prefer the Security Metrics KPX Dashboard Tool, featured on the following slides.

    Info-Tech Best Practice

    Not all graphs will be needed in all cases. When presenting, consider taking screenshots of the most relevant data and displaying them in Info-Tech’s Board-Level Security Metrics Presentation Template.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of the Definitions section of the Security Metrics KPX Dashboard

    1. Start by customizing the definitions on tab 1 to match your organization’s understanding of high, medium, and low risk across the three impact areas (functional, informational, and recoverability).
    2. Next, enter up to 5 business goals that your security program supports.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of tab 2 of the Security Metrics KPX Dashboard.

    1. On tab 2, enter the large-scale risk you are tracking
    2. Proceed by naming each of your KPXs after three broad risks that – to you – contribute to the large-scale risk.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image is the same screenshot from the previous section, of tab 2 of the Security Metrics KPX Dashboard.

    1. Then, add up to five KPIs aimed at managing more granular risks that contribute to the broad risk.
    2. Assess the frequency and impact associated with these more granular risks to determine how likely it is to contribute to the broad risk the KPX is tracking.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image is the same screenshot of tab 2 of the Security Metrics KPX Dashboard.

    1. Repeat as necessary for the other KPXs on tab 2.
    2. Repeat steps 3-7 for up to two more large-scale risks and associated KPXs on tabs 3 and 4.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a chart titled Business Alignment, with sample Business Goals and KPXs filled in.

    1. If desired, complete the Business Alignment evaluation (located to the right of KPX 2 on tabs 2-4) to demonstrate how well security is supporting business goals.

    "An important key to remember is to be consistent and stick to one framework once you've chosen it. As you meet with the same audiences repeatedly, having the same framework for reference will ensure that your communications become smoother over time." – Caroline Wong, Chief Strategy Officer, Cobalt.io

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of the dashboard on tab 5 of the Security Metrics KPX Dashboard.

    1. Use the dashboard on tab 5 to help you present your security metrics to senior leadership.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows the same screenshot of Tab 2 of the Security Metrics KPX Dashboard that was shown in previous sections.

    Best Practice:

    This tool helps you convert your KPIs into the language of risk by assessing frequency and severity, which helps to make the risk relatable for senior leadership. However, it is still useful to track fluctuations in terms of percentage. To do this, track changes in the frequency, severity, and trend scores from quarter to quarter.

    Customize Info-Tech’s Security Metrics Presentation Template

    2.4 Board-Level Security Metrics Presentation Template

    Use the Board-Level Security Metrics Presentation Template deck to help structure and deliver your metrics presentation to the board.

    To make the dashboard slide, simply copy and paste the charts from the dashboard tool and arrange the images as needed.

    Adapt the status report and business alignment slides to reflect the story about risk that you are telling.

    2.5 Revise your metrics

    What's next?

    Now that you’ve made it through your metrics presentation, it’s important to reassess your goals with feedback from your audience in mind. Use the following workflow.

    The image shows a flowchart titled Metrics-Revision Workflow. The flowchart begins with the question Have you completed your goal? and then works through multiple potential answers.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

    Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

    In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

    Logan Rohde

    Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Ian Mulholland

    Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Call 1-888-670-8889 for more information.

    Insight breakdown

    Metrics lead to maturity, not vice versa.

    • Tracking metrics helps you assess progress and regress in your security program, which helps you quantify the maturity gains you’ve made.

    Don't lose hope if you lack resources to move beyond baseline testing.

    • Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

    The best metrics are tied to goals.

    • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Summary of accomplishment

    Knowledge Gained

    • Current maturity assessment of security areas
    • Setting SMART goals
    • Metric types
    • KPI development
    • Goals prioritization
    • Reporting and revision strategies

    Processes Optimized

    • Metrics development
    • Metrics collection
    • Metrics reporting

    Deliverables Completed

    • KPI Development Worksheet
    • Security Metrics Determination and Tracking Tool
    • Security Metrics KPX Dashboard Tool
    • Board-Level Security Metrics Presentation Template

    Research contributors and experts

    Mike Creaney, Senior Security Engineer at Federal Home Loan Bank of Chicago

    Peter Chestna, Director, Enterprise Head of Application Security at BMO Financial Group

    Zane Lackey, Co-Founder / Chief Security Officer at Signal Sciences

    Ben Rothke, Senior Information Security Specialist at Tapad

    Caroline Wong, Chief Strategy Officer at Cobalt.io

    2 anonymous contributors

    Related Info-Tech research

    Build an Information Security Strategy

    Tailor best practices to effectively manage information security.

    Implement a Security Governance and Management Program

    Align security and business objectives to get the greatest benefit from both.

    Bibliography

    Capability Maturity Model Integration (CMMI). ISACA. Carnegie Mellon University.

    Ely, Adam. “Choose Security Metrics That Tell a Story.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

    https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

    ISACA. “Board Director Concerns about Cyber and Technology Risk.” CSX. 11 Sep. 2018. Web.

    Rothke, Ben. “CEOs Require Security Metrics with a High-Level Focus.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

    https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

    Wong, Caroline. Security Metrics: A Beginner’s Guide. McGraw Hill: New York, 2012.

    Modernize Data Architecture for Measurable Business Results

    • Buy Link or Shortcode: {j2store}387|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Data architecture projects have often failed in the past, causing businesses today to view the launch of a new project as a costly initiative with unclear business value.
    • New technologies in big data and analytics are requiring organizations to modernize their data architecture, but most organizations have failed to spend the time and effort refining the appropriate data models and blueprints that enable them to do so.
    • As the benefits for data architecture are often diffused across an organization’s information management practice, it can be difficult for the business to understand the value and necessity of data architecture.

    Our Advice

    Critical Insight

    • At the heart of tomorrow’s insights-driven enterprises is a modern data environment anchored in fit-for-purpose data architectures.
    • The role of traditional data architecture is transcending beyond organizational boundaries and its focus is shifting from “keeping the lights on” (i.e. operational data and BI) to providing game-changing insights gleaned from untapped big data.

    Impact and Result

    • Perform a diagnostic assessment of your present day architecture and identify the capabilities of your future “to be” environment to position your organization to capitalize on new opportunities in the data space.
    • Use Info-Tech’s program diagnostic assessment and guidance for developing a strategic roadmap to support your team in building a fit-for purpose data architecture practice.
    • Create a data delivery architecture that harmonizes traditional and modern architectural opportunities.

    Modernize Data Architecture for Measurable Business Results Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should modernize your data architecture, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop a data architecture vision

    Plan your data architecture project and align it with the business and its strategic vision.

    • Modernize Data Architecture for Measurable Business Results – Phase 1: Develop a Data Architecture Vision
    • Modernize Data Architecture Project Charter
    • Data Architecture Strategic Planning Workbook

    2. Assess data architecture capabilities

    Evaluate the current and target capabilities of your data architecture, using the accompanying diagnostic assessment to identify performance gaps and build a fit-for-purpose practice.

    • Modernize Data Architecture for Measurable Business Results – Phase 2: Assess Data Architecture Capabilities
    • Data Architecture Assessment and Roadmap Tool
    • Initiative Definition Tool

    3. Develop a data architecture roadmap

    Translate your planned initiatives into a sequenced roadmap.

    • Modernize Data Architecture for Measurable Business Results – Phase 3: Develop a Data Architecture Roadmap
    • Modernize Data Architecture Roadmap Presentation Template
    [infographic]

    Workshop: Modernize Data Architecture for Measurable Business Results

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Develop a Data Architecture (DA) Vision

    The Purpose

    Discuss key business drivers and strategies.

    Identify data strategies.

    Develop a data architecture vision.

    Assess data architecture practice capabilities. 

    Key Benefits Achieved

    A data architecture vision aligned with the business.

    A completed assessment of the organization’s current data architecture practice capabilities.

    Identification of "to be" data architecture practice capabilities.

    Identification of key gaps. 

    Activities

    1.1 Explain approach and value proposition

    1.2 Discuss business vision and key drivers

    1.3 Discover business pain points and needs

    1.4 Determine data strategies

    1.5 Assess DA practice capabilities

    Outputs

    Data strategies

    Data architecture vision

    Current and target capabilities for the modernized DA practice

    2 Assess DA Core Capabilities (Part 1)

    The Purpose

    Assess the enterprise data model (EDM).

    Assess current and target data warehouse, BI/analytics, and big data architectures.

    Key Benefits Achieved

    A completed assessment of the organization’s current EDM, data warehouse, BI and analytics, and big data architectures.

    Identification of "to be" capabilities for the organization’s EDM, data warehouse, BI and analytics, and big data architectures.

    Identification of key gaps.

    Activities

    2.1 Present an overarching DA capability model

    2.2 Assess current and target EDM capabilities

    2.3 Assess current/target data warehouse, BI/analytics, and big data architectures

    2.4 Identify gaps and high level strategies

    Outputs

    Target capabilities for EDM

    Target capabilities for data warehouse architecture, BI architecture, and big data architecture

    3 Assess DA Core Capabilities (Part 2)

    The Purpose

    Assess EDM.

    Assess current/target MDM, metadata, data integration, and content architectures.

    Assess dynamic data models.

    Key Benefits Achieved

    A completed assessment of the organization’s current MDM, metadata, data integration, and content architectures.

    Identification of “to be” capabilities for the organization’s MDM, metadata, data integration, and content architectures.

    Identification of key gaps.

    Activities

    3.1 Present an overarching DA capability model

    3.2 Assess current and target MDM, metadata, data integration, and content architectures

    3.3 Assess data lineage and data delivery model

    3.4 Identify gaps and high level strategies

    Outputs

    Target capabilities for MDM architecture, metadata architecture, data integration architecture, and document & content architecture

    Target capabilities for data lineage/delivery

    4 Analyze Gaps and Formulate Strategies

    The Purpose

    Map performance gaps and document key initiatives from the diagnostic assessment.

    Identify additional gaps and action items.

    Formulate strategies and initiatives to address priority gaps. 

    Key Benefits Achieved

    Prioritized gap analysis.

    Improvement initiatives and related strategies.

    Activities

    4.1 Map performance gaps to business vision, pain points, and needs

    4.2 Identify additional gaps

    4.3 Consolidate/rationalize/prioritize gaps

    4.4 Formulate strategies and actions to address gaps

    Outputs

    Prioritized gaps

    Data architecture modernization strategies

    5 Develop a Data Architecture Roadmap

    The Purpose

    Plot initiatives and strategies on a strategic roadmap.

    Key Benefits Achieved

    A roadmap with prioritized and sequenced initiatives.

    Milestone plan.

    Executive report. 

    Activities

    5.1 Transform strategies into a plan of action

    5.2 Plot actions on a prioritized roadmap

    5.3 Identify and discuss next milestone plan

    5.4 Compile an executive report

    Outputs

    Data architecture modernization roadmap

    Data architecture assessment and roadmap report (from analyst team)

    Don't try this at home

    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A

    Brilliant little and very amusing way to deal with a scammer.

    But do not copy this method as it will actually reveal quite a bit and confirm that your email is valid and active.

    Click to watch Joe Lycett

     

    Customer Value Contribution

    I'm proud to announce our new Customer Value Contribution Calculator©, or CVCC© in short.

    It enhances and possibly replaces the BIA (Business Impact Analysis) process with a much simpler way.

    More info to follow shortly.

    Develop a Cloud Testing Strategy for Today's Apps

    • Buy Link or Shortcode: {j2store}470|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Cloud Strategy
    • Parent Category Link: /cloud-strategy
    • The growth of the Cloud and the evolution of business operations have shown that traditional testing strategies do not work well with modern applications.
    • Organizations require a new framework around testing cloud applications that account for on-demand scalability and self-provisioning.
    • Expectations of application consumers are continually increasing with speed-to-market and quality being the norm.

    Our Advice

    Critical Insight

    • Cloud technology does not change the traditional testing processes that many organizations have accepted and adopted. It does, however, enhance traditional practices with increased replication capacity, execution speed, and compatibility through its virtual infrastructure and automated processes. Consider these factors when developing the cloud testing strategy.
    • Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
    • Implement cloud testing solutions in a well-defined rollout process to ensure business objectives are realized and cloud testing initiatives are optimized.
    • Cloud testing is green and dynamic. Realize the limitations of cloud testing and play on its strengths.

    Impact and Result

    • Engaging in a formal and standardized cloud testing strategy and consistently meeting business needs throughout the organization maintains business buy-in.
    • The Cloud compounds the benefits from virtualization and automation because of the Cloud’s scalability, speed, and off-premise and virtual infrastructure and data storage attributes.
    • Cloud testing presents a new testing avenue. Realize that only certain tests are optimized in the Cloud, i.e., load, stress, and functional testing.

    Develop a Cloud Testing Strategy for Today's Apps Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop a cloud testing strategy.

    Obtain organizational buy-ins and build a standardized and formal cloud testing strategy.

    • Storyboard: Develop a Cloud Testing Strategy for Today's Apps
    • None

    2. Assess the organization's readiness for cloud testing.

    Assess your people, process, and technology for cloud testing readiness and realize areas for improvement.

    • Cloud Testing Readiness Assessment Tool

    3. Plan and manage the resources allocated to each project task.

    Organize and monitor cloud project planning tasks throughout the project's duration.

    • Cloud Testing Project Planning and Monitoring Tool
    [infographic]

    Drive Successful Sourcing Outcomes With a Robust RFP Process

    • Buy Link or Shortcode: {j2store}216|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $25,860 Average $ Saved
    • member rating average days saved: 14 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • Most IT organizations do not have standard RFP templates and tools.
    • Many RFPs lack sufficient requirements.
    • Most RFP team members are not adequately trained on RFP best practices.
    • Most IT departments underestimate the amount of time that is required to perform an effective RFP.

    Our Advice

    Critical Insight

    • Vendors generally do not like RFPs
      Vendors view RFPs as time consuming and costly to respond to and believe that the decision is already made.
    • Dont ignore the benefits of an RFI
      An RFI is too often overlooked as a tool for collecting information from vendors about their product offerings and services.
    • Leverage a pre-proposal conference to maintain an equal and level playing field
      Pre-proposal conference is a convenient and effective way to respond to vendors’ questions ensuring all vendors have the same information to provide a quality response.

    Impact and Result

    • A bad or incomplete RFP results in confusing and incomplete vendor RFP responses which consume time and resources.
    • Incomplete or misunderstood requirements add cost to your project due to the change orders required to complete the project.

    Drive Successful Sourcing Outcomes With a Robust RFP Process Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Storyboard – Leverage your vendor sourcing process to get better results

    Discover a proven process for your RFPs. Review Info-Tech’s process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP. Our 7-phase process prevents a bad RFP from taking your time, money, and resources.

    • Drive Successful Sourcing Outcomes With a Robust RFP Process Storyboard

    2. Define your RFP Requirements Tool – A convenient tool to gather your requirements and align them to your negotiation strategy.

    Use this tool to assist you and your team in documenting the requirements for your RFP. Use the results of this tool to populate the requirements section of your RFP.

    • RFP Requirements Worksheet

    3. RFP Development Suite of Tools – Use Info-Tech’s RFP, pricing, and vendor response tools and templates to increase your efficiency in your RFP process.

    Configure this time-saving suite of tools to your organizational culture, needs, and most importantly the desired outcome of your RFP initiative. This suite contains four unique RFP templates. Evaluate which template is appropriate for your RFP. Also included in this suite are a response evaluation guidebook and several evaluation scoring tools along with a template to report the RFP results to stakeholders.

    • RFP Calendar and Key Date Tool
    • Vendor Pricing Tool
    • Lean RFP Template
    • Short-Form RFP Template
    • Long-Form RFP Template
    • Excel Form RFP Tool
    • RFP Evaluation Guidebook
    • RFP Evaluation Tool
    • Vendor TCO Tool
    • Consolidated Vendor RFP Response Evaluation Summary
    • Vendor Recommendation Presentation

    Infographic

    Workshop: Drive Successful Sourcing Outcomes With a Robust RFP Process

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Foundation for Creating Requirements

    The Purpose

    Problem Identification

    Key Benefits Achieved

    Current process mapped and requirements template configured

    Activities

    1.1 Overview and level-setting

    1.2 Identify needs and drivers

    1.3 Define and prioritize requirements

    1.4 Gain business authorization and ensure internal alignment

    Outputs

    Map Your Process With Gap Identification

    Requirements Template

    Map Your Process With Gap Identification

    Requirements Template

    Map Your Process With Gap Identification

    Requirements Template

    Map Your Process With Gap Identification

    Requirements Template

    2 Creating a Sourcing Process

    The Purpose

    Define Success Target

    Key Benefits Achieved

    Baseline RFP and evaluation templates

    Activities

    2.1 Create and issue RFP

    2.2 Evaluate responses/proposals and negotiate the agreement

    2.3 Purchase goods and services

    Outputs

    RFP Calendar Tool

    RFP Evaluation Guidebook

    RFP Respondent Evaluation Tool

    3 Configure Templates

    The Purpose

    Configure Templates

    Key Benefits Achieved

    Configured Templates

    Activities

    3.1 Assess and measure

    3.2 Review templates

    Outputs

    Long-Form RFP Template

    Short-Form RFP Template

    Excel-Based RFP Template

    Further reading

    Drive Successful Sourcing Outcomes With a Robust RFP Process

    Leverage your vendor sourcing process to get better results.

    EXECUTIVE BRIEF

    Drive Successful Sourcing Outcomes with a Robust RFP Process

    Lack of RFP Process Causes...
    • Stress
    • Confusion
    • Frustration
    • Directionless
    • Exhaustion
    • Uncertainty
    • Disappointment
    Solution: RFP Process
    Steps in an RFP Process, 'Identify Need', 'Define Business Requirements', 'Gain Business Authorization', 'Perform RFI/RFP', 'Negotiate Agreement', 'Purchase Good and Services', and 'Assess and Measure Performance'.
    • Best value solutions
    • Right-sized solutions
    • Competitive Negotiations
    • Better requirements that feed negotiations
    • Internal alignment on requirements and solutions
    • Vendor Management Governance Plan
    Requirements
    • Risk
    • Legal
    • Support
    • Security
    • Technical
    • Commercial
    • Operational
    • Vendor Management Governance
    Templates, Tools, Governance
    • RFP Template
    • Your Contracts
    • RFP Procedures
    • Pricing Template
    • Evaluation Guide
    • Evaluation Matrix
    Vendor Management
    • Scorecards
    • Classification
    • Business Review Meetings
    • Key Performance Indicators
    • Contract Management
    • Satisfaction Survey

    Analyst Perspective

    Consequences of a bad RFP

    Photo of Steven Jeffery, Principal Research Director, Vendor Management, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group

    “A bad request for proposal (RFP) is the gift that keeps on taking – your time, your resources, your energy, and your ability to accomplish your goal. A bad RFP is ineffective and incomplete, it creates more questions than it answers, and, perhaps most importantly, it does not meet your organization’s expectations.”

    Steven Jeffery
    Principal Research Director, Vendor Management
    Co-Author: The Art of Creating a Quality RFP
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Most IT organizations are absent of standard RFP templates, tools, and processes.
    • Many RFPs lack sufficient requirements from across the business (Legal, Finance, Security, Risk, Procurement, VMO).
    • Most RFP team members are not adequately trained on RFP best practices.
    • Most IT departments underestimate the amount of time required to perform an effective RFP.
    • An ad hoc sourcing process is a common recipe for vendor performance failure.

    Common Obstacles

    • Lack of time
    • Lack of resources
    • Right team members not engaged
    • Poorly defined requirements
    • Too difficult to change supplier
    • Lack of a process
    • Lack of adequate tools/processes
    • Lack of a vendor communications plan that includes all business stakeholders.
    • Lack of consensus as to what the ideal result should look like.

    Info-Tech’s Approach

    • Establish a repeatable, consistent RFP process that maintains negotiation leverage and includes all key components.
    • Create reusable templates to expedite the RFP evaluation and selection process.
    • Maximize the competition by creating an equal and level playing field that encourages all the vendors to respond to your RFP.
    • Create a process that is clear and understandable for both the business unit and the vendor to follow.
    • Include Vendor Management concepts in the process.

    Info-Tech Insight

    A well planned and executed sourcing strategy that focuses on solid requirements, evaluation criteria, and vendor management will improve vendor performance.

    Executive Summary

    Your Challenge

    Your challenge is to determine the best sourcing tool to obtain vendor information on capabilities, solution(s), pricing and contracting: RFI, RFP, eRFX.

    Depending on your organization’s knowledge of the market, your available funding, and where you are in the sourcing process, there are several approaches to getting the information you need.

    An additional challenge is to answer the question “What is the purpose of our RFX?”

    If you do not have in-depth knowledge of the market, available solutions, and viable vendors, you may want to perform an RFI to provide available market information to guide your RFP strategy.

    If you have defined requirements, approved funding, and enough time, you can issue a detailed, concise RFP.

    If you have “the basics” about the solution to be acquired and are on a tight timeframe, an “enhanced RFI” may fit your needs.

    This blueprint will provide you with the tools and processes and insights to affect the best possible outcome.

    Executive Summary

    Common Obstacles

    • Lack of process/tools
    • Lack of input from stakeholders
    • Stakeholders circumventing the process to vendors
    • Vendors circumventing the process to key stakeholders
    • Lack of clear, concise, and thoroughly articulated requirements
    • Waiting until the vendor is selected to start contract negotiations
    • Waiting until the RFP responses are back to consider vendor management requirements
    • Lack of clear communication strategy to the vendor community that the team adheres to

    Many organizations underestimate the time commitment for an RFP

    70 Days is the average duration of an IT RFP.

    The average number of evaluators is 5-6

    4 Is the average number of vendor submissions, each requiring an average of two to three hours to review. (Source: Bonfire, 2019. Note: The 2019 Bonfire report on the “State of the RFP” is the most recent published.)

    “IT RFPs take the longest from posting to award and have the most evaluators. This may be because IT is regarded as a complex subject requiring complex evaluation. Certainly, of all categories, IT offers the most alternative solutions. The technology is also changing rapidly, as are the requirements of IT users – the half-life of an IT requirement is less than six months (half the requirements specified now will be invalid six months from now). And when the RFP process takes up two of those months, vendors may be unable to meet changed requirements when the time to implement arrives. This is why IT RFPs should specify the problem to be resolved rather than the solution to be provided. If the problem resolution is the goal, vendors are free to implement the latest technologies to meet that need.” (Bonfire, “2019 State of the RFP”)

    Why Vendors Don’t Like RFPs

    Vendors’ win rate

    44%

    Vendors only win an average of 44% of the RFPs they respond to (Loopio, 2022).
    High cost to respond

    3-5%

    Vendors budget 3-5% of the anticipated contract value to respond (LinkedIn, 2017, Note: LinkedIn source is the latest information available).
    Time spent writing response

    23.8 hours

    Vendors spend on average 23.8 hours to write or respond to your RFP (Marketingprofs, 2021).

    Negative effects on your organization from a lack of RFP process

    Visualization titled 'Lack of RFP Process Causes' with the following seven items listed.

    Stress, because roles and responsibilities aren’t clearly defined and communication is haphazard, resulting in strained relationships.

    Confusion, because you don’t know what the expected or desired results are.

    Directionless, because you don’t know where the team is going.

    Uncertainty, with many questions of your own and many more from other team members.

    Frustration, because of all the questions the vendors ask as a result of unclear or incomplete requirements.

    Exhaustion, because reviewing RFP responses of insufficient quality is tedious.

    Disappointment in the results your company realizes.

    (Source: The Art of Creating a Quality RFP)

    Info-Tech’s approach

    Develop an inclusive and thorough approach to the RFP Process

    Steps in an RFP Process, 'Identify Need', 'Define Business Requirements', 'Gain Business Authorization', 'Perform RFI/RFP', 'Negotiate Agreement', 'Purchase Good and Services', and 'Assess and Measure Performance'.

    The Info-Tech difference:

    1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – by developing a standard process. With a process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
    2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
    3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
    4. Based on the predetermined requirements, either an RFI or an RFP is issued to vendors with a predetermined due date.

    Insight Summary

    Overarching insight

    Without a well defined, consistent RFP process, with input from all key stakeholders, the organization will not achieve the best possible results from its sourcing efforts.

    Phase 1 insight

    Vendors are choosing to not respond to RFPs due to their length and lack of complete requirements.

    Phase 2 insight

    Be clear and concise in stating your requirements and include, in addition to IT requirements, procurement, security, legal, and risk requirements.

    Phase 3 insight

    Consider adding vendor management requirements to manage the ongoing relationship post contract.

    Tactical insight

    Consider the RFP Evaluation Process as you draft the RFP, including weighting the RFP components. Don’t underestimate the level of effort required to effectively evaluate responses – write the RFP with this in mind.

    Tactical insight

    Provide strict, prescriptive instructions detailing how the vendor should submit their responses. Controlling vendor responses will increase your team’s efficiency in evaluations while providing ease of reference responses across multiple vendors.

    Key deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Key deliverables:

    Info-Tech provides you with the tools you need to go to market in the most efficient manner possible, with guidance on how to achieve your goals.

    Sample of

    Long-Form RFP Template
    For when you have complete requirements and time to develop a thorough RFP.
    Sample of the Long-Form RFP Template deliverable. Short-Form RFP Template
    When the requirements are not as extensive, time is short, and you are familiar with the market.
    Sample of the Short-Form RFP Template deliverable.
    Lean RFP Template
    When you have limited time and some knowledge of the market and wish to include only a few vendors.
    Sample of the Lean RFP Template deliverable. Excel-Form RFP Template
    When there are many requirements, many options, multiple vendors, and a broad evaluation team.
    Sample of the Excel-Form RFP Template deliverable.

    Blueprint benefits

    IT Benefits
    • Side-by-side comparison of vendor capabilities
    • Pricing alternatives
    • No surprises
    • Competitive solutions to deliver the best results
    Mutual IT and Business Benefits
    • Reduced time to implement
    • Improved alignment between IT /Business
    • Improved vendor performance
    • Improved vendor relations
    Business Benefits
    • Budget alignment, reduced cost
    • Best value
    • Risk mitigation
    • Legal and risk protections

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is seven to twelve calls over the course of four to six months.

    What does a typical GI on this topic look like?

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    Phase 5

    Phase 6

    Phase 7

    Call #1: Identify the need Call #3: Gain business authorization Call #5: Negotiate agreement strategy Call #7: Assess and measure performance
    Call #2: Define business requirements Call #4: Review and perform the RFX or RFP Call #6: Purchase goods and services

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com1-888-670-8889

    Day 1 Day 2 Day 3
    Activities
    Answer “What problem do we need to solve?”

    1.1 Overview and level-setting

    1.2 Identify needs and drivers

    1.3 Define and prioritize requirements

    1.4 Gain business authorization and ensure internal alignment

    Define what success looks like?

    2.1 Create and issue RFP

    2.2 Evaluate responses/ proposals and negotiate the agreement.

    2.3 Purchase goods and services

    Configure Templates

    3.1 Assess and measure

    3.2 Review tools

    Deliverables
    1. Map your process with gap identification
    2. RFP Requirements Worksheet
    1. RFP Calendar and Key Date Tool
    2. RFP Evaluation Guidebook
    3. RFP Evaluation Tool
    1. Long-form RFP Template
    2. Short-form RFP Template
    3. Excel-based RFP Tool
    4. Lean RFP Template

    Phase 1

    Identify Need

    Steps

    1.1 Establish the need to either purchase goods/services (RFP) or acquire additional information from the market (RFI).

    Steps in an RFP Process with the first step, 'Identify Need', highlighted.

    This phase involves the following participants:

    • Business stakeholders
    • IT
    • Sourcing/Procurement
    • Finance

    Identify the need based on business requirements, changing technology, increasing vendor costs, expiring contracts, and changing regulatory requirements.

    Outcomes of this phase

    Agreement on the need to go to market to make a purchase (RFP) or to acquire additional information (RFI) along with a high-level agreement on requirements, rough schedule (is there time to do a full blown RFP or are you time constrained, which may result in an eRFP) and the RFP team is identified.

    Identify Need
    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Identify the Need for Your RFP

    • An RFP is issued to the market when you are certain that you intend to purchase a product/service and have identified an adequate vendor base from which to choose as a result of:

      • IT Strategy
      • Changes in technology
      • Marketplace assessment
      • Contract expiration/renewal
      • Changes in regulatory requirements
      • Changes in the business’ requirements
    • An RFI is issued to the market when you are uncertain as to available technologies or supplier capabilities and need budgetary costs for planning purposes.
    • Be sure to choose the right RFx tool for your situation!
    Stock photo of a pen circling the word 'needs' on a printed document.

    Phase 2

    Define Your RFP Requirements

    Steps

    2.1 Define and classify the technical, business, financial, legal, and support and security requirements for your business.

    Steps in an RFP Process with the second step, 'Define Business Requirements', highlighted.

    This phase involves the following participants:

    • IT
    • Legal
    • Finance
    • Risk management
    • Sourcing/Procurement
    • Business stakeholders

    Outcomes of this phase

    A detailed list of required business, technical, legal and procurement requirements classified as to absolute need(s), bargaining and concession need(s), and “nice to haves.”

    Define Business Requirements

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Define RFP Requirements

    Key things to consider when defining requirements

    • Must be inclusive of the needs of all stakeholders: business, technical, financial, and legal
    • Strive for clarity and completeness in each area of consideration.
    • Begin defining your “absolute,” “bargaining,” “concession,” and ‘”dropped/out of scope” requirements to streamline the evaluation process.
    • Keep the requirements identified as “absolute” to a minimum, because vendors that do not meet absolute requirements will be removed from consideration.
    • Do you have a standard contract that can be included or do you want to review the vendor’s contract?
    • Don’t forget Data Security!
    • Begin defining your vendor selection criteria.
    • What do you want the end result to look like?
    • How will you manage the selected vendor after the contract? Include key VM requirements.
    • Defining requirements can’t be rushed or you’ll find yourself answering many questions, which may create confusion.
    • Collect all your current spend and budget considerations regarding the needed product(s) and service(s).

    “Concentrate on the needs of the organization and not the wants of the individuals when creating requirements to avoid scope creep.” (Donna Glidden, ITRG Research Director)

    Leverage the “ABCD” approach found in our Prepare for Negotiations More Effectively blueprint:
    https://tymansgrpup.com/research/ss/prepare-for-negotiations-more-effectively

    2.1 Prioritize your requirements

    1 hr to several days

    Input: List of all requirements from IT and IT Security, Business, Sourcing/Procurement, Risk Management, and Legal

    Output: Prioritized list of RFP requirements approved by the stakeholder team

    Materials: The RFP Requirements Worksheet

    Participants: All stakeholders impacted by the RFP: IT, IT Security, the Business, Sourcing/ Procurement, Risk Management, Legal

    1. Use this tool to assist you and your team in documenting the requirements for your RFP. Leverage it to collect and categorize your requirements in preparation for negotiations. Use the results of this tool to populate the requirements section of your RFP.
    2. As a group, review each of the requirements and determine their priority as they will ultimately relate to the negotiations.
      • Prioritizing your requirements will set up your negotiation strategy and streamline the process.
      • By establishing the priority of each requirement upfront, you will save time and effort in the selection process.
    3. Review RFP requirements with stakeholders for approval.

    Download the RFP Requirements Worksheet

    Phase 3

    Gain Business Authorization

    Steps

    3.1 Obtain business authorization from the business, technology, finance and Sourcing/Procurement

    Steps in an RFP Process with the third step, 'Gain Business Authorization', highlighted.

    This phase involves the following participants:

    • Business stakeholders
    • Technology and finance (depending upon the business)
    • Sourcing/Procurement

    Outcomes of this phase

    Approval by all key stakeholders to proceed with the issuing of the RFP and to make a purchase as a result.

    Gain Business Authorization

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Gain Business Authorization

    Gain authorization for your RFP from all relevant stakeholders
    • Alignment of stakeholders
    • Agreement on final requirements
    • Financial authorization
    • Commitment of resources
    • Agreement on what constitutes vendor qualification
    • Finalization of selection criteria and their prioritization

    Obtaining cross-function alignment will clear the way for contract, SOW, and budget approvals and not waste any of your and your vendor’s resources in performing an RFP that your organization is not ready to implement or invest financial and human resources in.

    Stock photo of the word 'AUTHORIZED' stamped onto a white background with a much smaller stamp laying beside it.

    Phase 4

    Create and Issue

    Steps

    4.1 Build your RFP

    4.2 Decide RFI or not

    4.3 Create your RFP

    4.4 Receive & answer questions

    4.5 Perform Pre-Proposal Conference

    4.6 Evaluate responses

    Steps in an RFP Process with the fourth step, 'Perform RFI/RFP', highlighted.

    This phase involves the following participants:

    • The RFP owner
    • IT
    • Business SMEs/stakeholders

    Outcomes of this phase

    RFP package is issued to vendors and includes the date of the Pre-Proposal Conference, which should be held shortly after RFP release and includes all parties.

    SME’s/stakeholders participate in providing answers to RFP contact for response to vendors.

    Create and Issue Your RFP/RFI

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    Build your RFP with evaluation in mind

    Easing evaluation frustrations

    At the beginning of your RFP creation process consider how your requirements will impact the vendor’s response. Concentrate on the instructions you provide the vendors and how you wish to receive their responses. View the RFP through the lens of the vendors and envision how they are going to respond to the proposal.

    Limiting the number of requirements included in the RFP will increase the evaluation team’s speed when reviewing vendors’ responses. This is accomplished by not asking questions for common features and functionality that all vendors provide. Don’t ask multiple questions within a question. Avoid “lifting” vendor-specific language to copy into the RFP as this will signal to vendors who their competition might be and may deter their participation. Concentrate your requirement questions to those areas that are unique to your solution to reduce the amount of time required to evaluate the vendors’ response.

    Things to Consider When Creating Your RFP:

    • Consistency is the foundation for ease of evaluation.
    • Provide templates, such as an Excel worksheet, for the vendor’s pricing submissions and for its responses to close-ended questions.
    • Give detailed instructions on how the vendor should organize their response.
    • Limit the number of open-ended questions requiring a long narrative response to must-have requirements.
    • Organize your requirements and objectives in a numerical outline and have the vendor respond in the same manner, such as the following:
      • 1
      • 1.1
      • 1.1.1

    Increase your response quality

    Inconsistent formatting of vendor responses prevents an apples-to-apples evaluation between vendor responses. Evaluation teams are frequently challenged and are unable to evaluate vendors’ responses equally against each other for the following reasons:

    Challenges
    • Vendor responses are submitted with different and confusing nomenclature
    • Inconsistent format in response
    • Disparate order of sections in the vendors responses
    • Different style of outlining their responses, e.g. 1.1 vs. I.(i)
    • Pricing proposal included throughout their response
    • Responses are comingled with marketing messages
    • Vendor answers to requirements or objectives are not consolidated in a uniform manner
    • Disparate descriptions for response subsections
    Prevention
    • Provide specific instructions as to how the vendor is to organize their response:
      • How to format and outline the response
      • No marketing material
      • No pricing in the body of the response
    • Provide templates for pricing, technical, operational, and legal aspects.

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    Perform Request for Information

    Don’t underestimate the importance of the RFI

    As the name implies, a request for information (RFI) is a tool for collecting information from vendors about the companies, their products, and their services. We find RFIs useful when faced with a lot of vendors that we don’t know much about, when we want to benchmark the marketplace for products and services, including budgetary information, and when we have identified more potential vendors than we care to commit a full RFP to.

    RFIs are simpler and less time-consuming than RFPs to prepare and evaluate, so it can make a lot of sense to start with an RFI. Eliminating unqualified vendors from further consideration will save your team from weeding through RFP responses that do not meet your objectives. For their part, your vendors will appreciate your efforts to determine up-front which of them are the best bets before asking them to spend resources and money producing a costly proposal.

    While many organizations rarely use RFIs, they can be an effective tool in the vendor manager’s toolbox when used at the right time in the right way. RFIs can be deployed in competitive targeted negotiations.

    A Lean RFP is a two-stage strategy that speeds up the typical RFP process. The first stage is like an RFI on steroids, and the second stage is targeted competitive negotiation.

    Don’t rely solely on the internet to qualify vendors; use an RFI to acquire additional information before finalizing an RFP.

    4.2.1 In a hurry? Consider a Lean RFP instead of an RFP

    Several days
    1. Create an RFI with all of the normal and customary components. Next, add a few additional RFP-like requirements (e.g. operational, technical, and legal requirements). Make sure you include a request for budgetary pricing and provide any significant features and functionality requirements so that the vendors have enough information to propose solutions. In addition, allow the vendors to ask questions through your single point of coordination and share answers with all of the vendors. Finally, notify the vendors that you will not be doing an RFP.
    2. Review the vendors’ proposals and evaluate their proposals against your requirements along with their notional or budgetary pricing.
    3. Have the evaluators utilize the Lean RFP Template to record their scores accordingly.
    4. After collecting the scores from the evaluators, consolidate the scores together to discuss which vendors – we recommend two or three – you want to present demos.
    5. Based on the vendors’ demos, the team selects at least two vendors to negotiate contract and pricing terms with intent of selecting the best-value vendor.
    6. The Lean RFP shortens the typical RFP process, maintains leverage for your organization, and works great with low- to medium-spend items (however your organization defines them). You’ll get clarification on vendors’ competencies and capabilities, obtain a fair market price, and meet your internal clients’ aggressive timelines while still taking steps to protect your organization.

    Download the Lean RFP Template

    Download the RFP Evaluation Tool

    4.2.1 In a hurry? Consider a Lean RFP instead of an RFP continued

    Input

    • List of technical, operational, business, and legal requirements
    • Budgetary pricing ask

    Output

    • A Lean RFP document that includes the primary components of an RFP
    • Lean RFP vendors response evaluation

    Materials

    • Lean RFP Template
    • RFP Evaluation Tool
    • Contracting requirements
    • Pricing

    Participants

    • IT
    • Business
    • Finance
    • Sourcing/Procurement

    Case Study

    A Lean RFP saves time
    INDUSTRY: Pharmaceutical
    SOURCE: Guided Implementation
    Challenge
    • The vendor manager (VM) was experiencing pressure to shorten the expected five-month duration to perform an RFP for software that planned, coordinated, and submitted regulatory documents to the US Food and Drug Administration.
    • The VM team was not completely familiar with the qualified vendors and their solutions.
    • The organization wanted to capitalize on this opportunity to enhance its current processes with the intent of improving efficiencies in documentation submissions.
    Solution
    • Leveraging the Lean RFP process, the team reduced the 200+ RFP questionnaire into a more manageable list of 34 significant questions to evaluate vendor responses.
    • The team issued the Lean RFP and requested the vendors’ responses in three weeks instead of the five weeks planned for the RFP process.
    • The team modified the scoring process to utilize a simple weighted-scoring methodology, using a scale of 1-5.
    Results
    • The Lean RFP scaled back the complexity of a large RFP.
    • The customer received three vendor responses ranging from 19 to 43 pages and 60-80% shorter than expected if the RFP had been used. This allowed the team to reduce the evaluation period by three weeks.
    • The duration of the RFx process was reduced by more than two months – from five months to just under three months.

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    4.3.1 RFP Calendar

    1 hour

    Input: List duration in days of key activities, RFP Calendar and Key Date Tool, For all vendor-inclusive meetings, include the dates on your RFP calendar and reference them in the RFP

    Output: A timeline to complete the RFP that has the support of each stakeholder involved in the process and that allows for a complete and thorough vendor response.

    Materials: RFP Calendar and Key Date Tool

    Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

    1. As a group, identify the key activities to be accomplished and the amount of time estimated to complete each task:
      1. Identify who is ultimately accountable for the completion of each task
      2. Determine the length of time required to complete each task
    2. Use the RFP Calendar and Key Date Tool to build the calendar specific to your needs.
    3. Include vendor-related dates in the RFP, i.e., Pre-Proposal Conference, deadline for RFP questions as well as response.

    Download the RFP Calendar and Key Date Tool

    Draft your RFP

    Create and issue your RFP, which should contain at least the following:
    • The ability for the vendors to ask clarifying questions (in writing, sent to the predetermined RFP contact)
    • Pre-Proposal/Pre-Bid Conference schedule where vendors can receive the same answer to all clarifying written questions
    • A calendar of events (block the time on stakeholder calendars – see template).
    • Instructions to potential vendors on how they should construct and return their response to enable effective and timely evaluation of each offer.
    • Requirements; for example: Functional, Operational, Technical, and Legal.
    • Specification drawings as if applicable.
    • Consider adding vendor management requirements – how do you want to manage the relationship after the deal is done?
    • A pricing template for vendors to complete that facilitates comparison across multiple vendors.
    • Contract terms required by your legal team (or your standard contract for vendors to redline as part of their response and rated/ranked accordingly).
    • Create your RFP with the evaluation process and team in mind to ensure efficiency and timeliness in the process. Be clear, concise, and complete in the document.
    • Consistency and completeness is the foundation for ease of evaluation.
    • Give vendors detailed instruction on how to structure and organize their response.
    • Limit the number of open-ended questions requiring a long narrative response.
    • Be sure to leverage Info-Tech’s proven and field-tested Short-Form, Long-Form, and Lean RFP Templates provided in this blueprint.

    Create a template for the vendors’ response

    Dictating to the vendors the format of their response will increase your evaluation efficiency
    Narrative Response:

    Create either a Word or Excel document that provides the vendor with an easy vehicle for their response. This template should include the question identifier that ties the response back to the requirement in the RFP. Instruct vendors to include the question number on any ancillary materials they wish to include.

    Pricing Response:

    Create a separate Excel template that the vendors must use to provide their financial offer. This template should include pricing for hardware, software, training, implementation, and professional services, as well as placeholders for any additional fees.

    Always be flexible in accepting alternative proposals after the vendor has responded with the information you requested in the format you require.

    Stock image of a paper checklist in front of a laptop computer's screen.

    4.3.2 Vendor Pricing Tool

    1 hour

    Input: Identify pricing components for hardware, software, training, consulting/services, support, and additional licenses (if needed)

    Output: Vendor Pricing Tool

    Materials: RFP Requirements Worksheet, Pricing template

    Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

    1. Using a good pricing template will prevent vendors from providing pricing offers that create a strategic advantage designed to prevent you from performing an apples-to-apples comparison.
    2. Provide specific instructions as to how the vendor is to organize their pricing response, which should be submitted separate from the RFP response.
    3. Configure and tailor pricing templates that are specific to the product and/or services.
    4. Upon receipt of all the vendor’s responses, simply cut and paste their total response to your base template for an easy side-by-side pricing comparison.
    5. Do not allow vendors to submit financial proposals outside of your template.

    Download the Vendor Pricing Tool

    Three RFP Templates

    Choose the right template for the right sourcing initiative

    • Short-Form
    • Use the Short-Form RFP Template for simple, non-complex solutions that are medium to low dollar amounts that do not require numerous requirements.

    • Long-Form
    • We recommend the Long-Form RFP Template for highly technical and complex solutions that are high dollar and have long implementation duration.

    • Excel-Form
    • Leverage the Excel-Form RFP Tool for requirements that are more specific in nature to evaluate a vendor’s capability for their solution. This template is designed to be complete and inclusive of the RFP process, e.g., requirements, vendor response, and vendor response evaluation scoring.

    Like tools in a carpenters’ tool box or truck, there is no right or wrong template for any job. Take into account your organization culture, resources available, time frame, policies, and procedures to pick the right tool for the job. (Steve Jeffery, Principal Research Director, Vendor Management, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group)

    4.3.3 Short-Form RFP Template

    1-2 hours

    Input: List of technical, legal, business, and data security requirements

    Output: Full set of requirements, prioritized, that all participants agree to

    Materials: Short-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

    Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

    • This is a less complex RFP that has relatively basic requirements and perhaps a small window in which the vendors can respond. As with the long-form RFP, exhibits are placed at the end of the RFP, an arrangement that saves both your team and the vendors time. Of course, the short-form RFP contains less-specific instructions, guidelines, and rules for vendors’ proposal submissions.
    • We find that short-form RFPs are a good choice when you need to use something more than a request for quote (RFQ) but less than an RFP running 20 or more pages. It’s ideal, for example, when you want to send an RFP to only one vendor or to acquire items such as office supplies, contingent labor, or commodity items that don’t require significant vendor risk assessment.

    Download the Short-Form RFP Template

    4.3.4 Long-Form RFP Template

    1-3 hours

    Input: List of technical, legal, business, and data security requirements

    Output: Full set of requirements, prioritized, that all stakeholders agree to

    Materials: Long-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

    Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

    • A long-form or major RFP is an excellent tool for more complex and complicated requirements. This template is for a baseline RFP.
    • It starts with best-in-class RFP terms and conditions that are essential to maintaining your control throughout the RFP process. The specific requirements for the business, functional, technical, legal, and pricing areas should be included in the exhibits at the end of the template. That makes it easier to tailor the RFP for each deal, since you and your team can quickly identify specific areas that need modification. Grouping the exhibits together also makes it convenient for both your team to review and the vendors to respond.
    • You can use this sample RFP as the basis for your template RFP, taking it all as is or picking and choosing the sections that best meet the mission and objectives of the RFP and your organization.

    Download the Long-Form RFP Template

    4.3.5 Excel-Form RFP Tool

    Several weeks

    Input: List of technical, legal, business, and data security requirements

    Output: Full set of requirements, prioritized, that all stakeholders agree to

    Materials: Excel-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

    Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

    • The Excel-Form RFP Tool is used as an alternative to the other RFP toolsets if you have multiple requirements and have multiple vendors to choose from.
    • Requirements are written as a “statement” and the vendor can select from five answers as to their ability to meet the requirements, with the ability to provide additional context and materials to augment their answers, as needed.
    • Requirements are listed separately in each tab, for example, Business, Legal, Technical, Security, Support, Professional Services, etc.

    Download the Excel-Form RFP Template

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    Answer Vendor Questions

    Maintaining your equal and level playing field among vendors

    • Provide an adequate amount of time from the RFP issue date to the deadline for vendor questions. There may be multiple vendor staff/departments that need to read the RFP and then discuss their response approach and gather any clarifying questions, so we generally recommend three to five business days.
    • There should be one point of contact for all Q&A, which should be submitted in writing via email only. Be sure to plan for enough time to get the answers back from the RFP stakeholders.
    • After the deadline, collect all Q&A and begin the process of consolidating into one document.
    Large silver question mark.
    • Be sure to anonymize both vendor questions and your responses, so as not to reveal who asked or answered the question.
    • Send the document to all RFP respondents via your sourcing tool or BCC in an email to the point of contact, with read receipt requested. That way, you can track who has received and opened the correspondence.
    • Provide the answers a few days prior to the Pre-Proposal Conference to allow all respondents time to review the document and prepare any additional questions.
    • Begin the preparation for the Pre-Proposal Conference.

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    Conduct Pre-Proposal Conference

    Maintain an equal and level playing field

    • Consolidate all Q&A to be presented to all vendors during the Pre-Proposal Conference.
    • If the Pre-Proposal Conference is conducted via conference call, be sure to record the session and advise all participants at the beginning of the call.
    • Be sure to have key stakeholders present on the call to answer questions.
    • Read each question and answer, after which ask if there are any follow up questions. Be sure to capture them and then add them to the Q&A document.
    • Remind respondents that no further questions will be entertained during the remainder of the RFP response period.
    • Send the updated and completed document to all vendors (even if circumstances prevented their attending the Pre-Proposal Conference). Use the same process as when you sent out the initial answers: via email, blind copy the respondents and request read/receipt.

    “Using a Pre-Proposal Conference allows you to reinforce that there is a level playing field for all of the vendors…that each vendor has an equal chance to earn your business. This encourages and maximizes competition, and when that happens, the customer wins.” (Phil Bode, Principal Research Director, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group)

    Pre-Proposal Conference Agenda

    Modify this agenda for your specific organization’s culture
    1. Opening Remarks & Welcome – RFP Manager
      1. Agenda review
      2. Purpose of the Pre-Proposal Conference
    2. Review Agenda
      1. Introduction of your (customer) attendees
    3. Participating Vendor Introduction (company name)
    4. Executive or Sr. Leadership Comments (limit to five minutes)
      1. Importance of the RFP
      2. High-level business objective or definition of success
    5. Review Key Dates in the RFP

    (Source: The Art of Creating a Quality RFP, Jeffery et al., 2019)
    1. Review of any Technical Drawings or Information
      1. Key technical requirements and constraints
      2. Key infrastructure requirements and constraints
    2. Review of any complex RFP Issues
      1. Project scope/out of scope
    3. Question &Answer
      1. Vendors’ questions in alphabetical order
    4. Review of Any Specific Instructions for the Respondents
    5. Conclusion/Closing
      1. Review how to submit additional questions
      2. Remind vendors of the single point of contact

    Allow your executive or leadership sponsor to leave the Pre-Proposal Conference after they provide their comments to allow them to continue their day while demonstrating to the vendors the importance of the project.

    Six Steps to Perform RFI/RFP

    Step 1

    • Build your RFP with evaluation in mind.

    Step 2

    • RFI or no RFI
    • Consider a Lean RFP

    Step 3

    • Create your RFP
    • Establish your RFP dates
    • Decide on RFP template
      • Short
      • Long
      • Excel
    • Create a template for vendors’ response
    • Create your Pricing Template

    Step 4

    • Receive RFP questions from vendors
    • Review and prepare answers to questions for the Pre-Proposal Conference

    Step 5

    • Conduct a Pre-Proposal Conference

    Step 6

    • Receive vendors’ proposals
    • Review for compliance and completion
    • Team evaluates vendors’ proposals.
    • Prepare TCO
    • Draft executive recommendation report

    Evaluate Responses

    Other important information

    • Consider separating the pricing component from the RFP responses before sending them to reviewers to maintain objectivity until after you have received all ratings on the proposals themselves.
    • Each reviewer should set aside focused time to carefully read each vendor’s response
    • Read the entire vendor proposal – they spent a lot time and money responding to your request, so please read everything.
    • Remind reviewers that they should route any questions to the vendor through the RFP manager.
    • Using the predetermined ranking system for each section, rate each section of the response, capturing any notes, questions, or concerns as you proceed through the document(s).
    Stock photo of a 'Rating' meter with values 'Very Bad to 'Excellent'.

    Use a proven evaluation method

    Two proven methods to reviewing vendors’ proposals are by response and by objective

    The first, by response, is when the evaluator reviews each vendor’s response in its entirety.

    The second, reviewing by objective, is when the evaluator reviews each vendor’s response to a single objective before moving on to the next.

    By Response

    Two-way arrow with '+ Pros' in green on the left and 'Cons -' in red on the right.

    By Objective

    Two-way arrow with '+ Pros' in green on the left and 'Cons -' in red on the right.

    • Each response is thoroughly read all the way through.
    • Response inconsistencies are easily noticed.
    • Evaluators obtain a good feel for the vendor's response.
    • Evaluators will lose interest as they move from one response to another.
    • Evaluation will be biased if the beginning of response is subpar, influencing the rest of the evaluation.
    • Deficiencies of the perceived favorite vendor are overlooked.
    • Evaluators concentrate on how each objective is addressed.
    • Evaluators better understand the responses, resulting in identifying the best response for the objective.
    • Evaluators are less susceptible to supplier bias.
    • Electronic format of the response hampers response review per objective.
    • If a hard copy is necessary, converting electronic responses to hard copy is costly and cumbersome.
    • Discipline is required to score each vendor's response as they go.

    Maintain evaluation objectivity by reducing response evaluation biases

    Evaluation teams can be naturally biased during their review of the vendors’ responses.

    You cannot eliminate bias completely – the best you can do is manage it by identifying these biases with the team and mitigating their influence in the evaluation process.

    Vendor

    The evaluator only trusts a certain vendor and is uncomfortable with any other vendor.
    • Evaluate the responses blind of vendor names, if possible.
    Centerpiece for this table, titled 'BIAS' and surrounding by iconized representations of the four types listed.

    Account Representatives

    Relationships extend beyond business, and an evaluator doesn't want to jeopardize them.
    • Craft RFP objectives that are vendor neutral.

    Technical

    A vendor is the only technical solution the evaluator is looking for, and they will not consider anything else.
    • Conduct fair and open solution demonstrations.

    Price

    As humans, we can justify anything at a good price.
    • Evaluate proposals without awareness of price.

    Additional insights when evaluating RFPs

    When your evaluation team includes a member of the C-suite or senior leadership, ensure you give them extra time to sufficiently review the vendor's responses. When your questions require a definitive “Yes”/“True” or “No”/“False” responses, we recommend giving the maximum score for “Yes”/“True” and the minimum score for “No”/“False”.
    Increase your efficiency and speed of evaluation by evaluating the mandatory requirements first. If a vendor's response doesn't meet the minimum requirements, save time by not reviewing the remainder of the response. Group your RFP questions with a high-level qualifying question, then the supporting detailed requirements. The evaluation team can save time by not evaluating a response that does not meet a high-level qualifying requirement.

    Establish your evaluation scoring scale

    Define your ranking scale to ensure consistency in ratings

    Within each section of your RFP are objectives, each of which should be given its own score. Our recommended approach is to award on a scale of 0 to 5. With such a scale, you need to define every level. Below are the recommended definitions for a 0 to 5 scoring scale.

    Score Criteria for Rating
    5 Outstanding – Complete understanding of current and future needs; solution addresses current and future needs
    4 Competent – Complete understanding and adequate solution
    3 Average – Average understanding and adequate solution
    2 Questionable – Average understanding; proposal questionable
    1 Poor – Minimal understanding
    0 Not acceptable – Lacks understanding
    Stock photo of judges holding up their ratings.

    Weigh the sections of your RFP on how important or critical they are to the RFP

    Obtain Alignment on Weighting the Scores of Each Section
    • There are many ways to score responses, ranging from extremely simple to highly complicated. The most important thing is that everyone responsible for completing scorecards is in total agreement about how the scoring system should work. Otherwise, the scorecards will lose their value, since different weighting and scoring templates were used to arrive at their scores.
    • You can start by weighting the scores by section, with all sections adding up to 100%.
    Example RFP Section Weights
    Pie chart of example RFP section weights, 'Operational, 20%', 'Service-Level Agreements, 20%', 'Financial, 20%', 'Legal/Contractual, 15%', 'Technical, 10%' 'Functional, 15%'.
    (Source: The Art of Creating a Quality RFP, Jeffery et al., 2019)

    Protect your negotiation leverage with these best practices

    Protect your organization's reputation within the vendor community with a fair and balanced process.
    • Unless you regularly have the evaluators on your evaluation team, always assume that the team members are not familiar nor experienced with your process and procedures.
    • Do not underestimate the amount of preparations required to ensure that your evaluation team has everything they need to evaluate vendors’ responses without bias.
    • Be very specific about the expectations and time commitment required for the evaluation team to evaluate the responses.
    • Explain to the team members the importance of evaluating responses without conflicts of interest, including the fact that information contained within the responses and all discussions within the team are considered company owned and confidential.
    • Include examples of the evaluation and scoring processes to help the evaluators understand what they should be doing.
    • Finally – don’t forget to the thank the evaluation team and their managers for their time and commitment in contributing to this essential decision.
    Stock photo of a cork board with 'best practice' spelled out by tacked bits of paper, each with a letter in a different font.

    Evaluation teams must balance commercial vs. technical requirements

    Do not alter the evaluation weights after responses are submitted.
    • Evaluation teams are always challenged by weighing the importance of price, budget, and value against the technical requirements of “must-haves” and super cool “nice-to-haves.”
    • Encouraging the evaluation team not to inadvertently convert the nice-to-haves to must-haves will prevent scope creep and budget pressure. The evaluation team must concentrate on the vendors’ responses that drive the best value when balancing both commercial and technical requirements.
    Two blocks labelled 'Commercial Requirements' and 'Technical Requirements' balancing on either end of a flat sheet, which is balancing on a silver ball.

    4.6.1 Evaluation Guidebook

    1 hour

    Input: RFP responses, Weighted Scoring Matrix, Vendor Response Scorecard

    Output: One or two finalists for which negotiations will proceed

    Materials: RFP Evaluation Guidebook

    Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

    1. Info-Tech provides an excellent resource for your evaluation team to better understand the process of evaluating vendor response. The guidebook is designed to be configured to the specifics of your RFP, with guidance and instructions to the team.
    2. Use this guidebook to provide instruction to the evaluation team as to how best to score and rate the RFP responses.
    3. Specific definitions are provided for applying the numerical scores to the RFP objectives will ensure consistency among the appropriate numerical score.

    Download the RFP Evaluation Guidebook

    4.6.2 RFP Vendor Proposal Scoring Tool

    1-4 hours

    Input: Each vendor’s RFP response, A copy of the RFP (less pricing), A list of the weighted criteria incorporated into a vendor response scorecard

    Output: A consolidated ranked and weighted comparison of the vendor responses with pricing

    Materials: Vendor responses, RFP Evaluation Tool

    Participants: Sourcing/Procurement, Vendor management

    1. Using the RFP outline as a base, develop a scorecard to evaluate and rate each section of the vendor response, based on the criteria predetermined by the team.
    2. Provide each stakeholder with the scorecard when you provide the vendor responses for them to review and provide the team with adequate time to review each response thoroughly and completely.
    3. Do not, at this stage, provide the pricing. Allow stakeholders to review the responses based on the technical, business, operational criteria without prejudice as to pricing.
    4. Evaluators should always be reminded that they are evaluating each vendor’s response against the objectives and requirements of the RFP. The evaluators should not be evaluating each vendor’s response against one another.
    5. While the team is reviewing and scoring responses, review and consolidate the vendor pricing submissions into one document for a side-by-side comparison.

    Download the RFP Evaluation Tool

    4.6.3 Total Cost of Owners (TCO)

    1-2 hours

    Input: Consolidated vendor pricing responses, Consolidated vendor RFP responses, Current spend within your organization for the product/service, if available, Budget

    Output: A completed TCO model summarizing the financial results of the RFP showing the anticipated costs over the term of the agreement, taking into consideration the impact of renewals.

    Materials: Vendor TCO Tool, Vendor pricing responses

    Participants: IT, Finance, Business stakeholders, Sourcing/Procurement

    • Use Info-Tech’s Vendor TCO Tool to normalize each vendor’s pricing proposal and account for the lifetime cost of the product.
    • Fill in pricing information (the total of all annual costs) from each vendor's returned Pricing Proposal.
    • The tool will summarize the net present value of the TCO for each vendor proposal.
    • The tool will also provide the rank of each pricing proposal.

    Download the Vendor TCO Tool

    Conduct an evaluation team results meeting

    Follow the checklist below to ensure an effective evaluation results meeting

    • Schedule the evaluation team’s review meeting well in advance to ensure there are no scheduling conflicts.
    • Collect the evaluation team’s scores in advance.
    • Collate scores and provide an initial ranking.
    • Do not reveal the pricing evaluation results until after initial discussions and review of the scoring results.
    • Examine both high and low scores to understand why the team members scored the response as they did.
    • Allow the team to discuss, debate, and arrive at consensus on the ranking.
    • After consensus, reveal the pricing to examine if or how it changes the ranking.
    • Align the team on the next steps with the applicable vendors.

    4.6.4 Consolidated RFP Response Scoring

    1-2 hours

    Input: Vendor Response Scorecard from each stakeholder, Consolidated RFP responses and pricing, Any follow up questions or items requiring further vendor clarification.

    Output: An RFP Response Evaluation Summary that identifies the finalists based on pre-determined criteria.

    Materials: RFP Evaluation Tool from each stakeholder, Consolidated RFP responses and pricing.

    Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

    1. Collect from the evaluation team all scorecards and any associated questions requiring further clarification from the vendor(s). Consolidate the scorecards into one for presentation to the team and key decision makers.
    2. Present the final scores to the team, with the pricing evaluation, to determine, based on your needs, two or three finalists that will move forward to the next steps of negotiations.
    3. Discuss any scores that are have large gaps, e.g., a requirement with a score of one from one evaluator and the same requirement with a score five from different evaluator.
    4. Arrive at a consensus of your top one or two potential vendors.
    5. Determine any required follow-up actions with the vendors and include them in the Evaluation Summary.

    Download the Consolidated Vender RFP Response Evaluation Summary

    4.6.5 Vendor Recommendation Presentation

    1-3 hours
    1. Use the Vendor Recommendation Presentation to present your finalist and obtain final approval to negotiate and execute any agreements.
    2. The Vendor Recommendation Presentation provides leadership with:
      1. An overview of the RFP, its primary goals, and key requirements
      2. A summary of the vendors invited to participate and why
      3. A summary of each component of the RFP
      4. A side-by-side comparison of key vendor responses to each of the key/primary requirements, with ranking/weighting results
      5. A summary of the vendor’s responses to key legal terms
      6. A consolidated summary of the vendors’ pricing, augmented by the TCO calculations for the finalist(s).
      7. The RFP team’s vendor recommendations based on its findings
      8. A summary of next steps with dates
      9. Request approval to proceed to next steps of negotiations with the primary and secondary vendor

    Download the Vendor Recommendation Presentation

    4.6.5 Vendor Recommendation Presentation

    Input

    • Consolidated RFP responses, with a focus on key RFP goals
    • Consolidated pricing responses
    • TCO Model completed, approved by Finance, stakeholders

    Output

    • Presentation deck summarizing the key findings of the RFP results, cost estimates and TCO and the recommendation for approval to move to contract negotiations with the finalists

    Materials

    • Consolidated RFP responses, including legal requirements
    • Consolidated pricing
    • TCO Model
    • Evaluators scoring results

    Participants

    • IT
    • Finance
    • Business stakeholders
    • Legal
    • Sourcing/Procurement

    Caution: Configure templates and tools to align with RFP objectives

    Templates and tools are invaluable assets to any RFP process

    • Leveraging templates and tools saves time and provides consistency to your vendors.
    • Maintain a common repository of your templates and tools with different versions and variations. Include a few sentences with instructions on how to use the template and tools for team members who might not be familiar with them.

    Templates/Tools

    RFP templates and tools are found in a variety of places, such as previous projects, your favorite search engine, or by asking a colleague.

    Sourcing

    Regardless of the source of these documents, you must take great care and consideration to sanitize any reference to another vendor, company, or name of the deal.

    Review

    Then you must carefully examine the components of the deal before creating your final documents.

    Popular RFP templates include:

    • RFP documents
    • Pricing templates
    • Evaluation and scoring templates
    • RFP requirements
    • Info-Tech research

    Phase 5

    Negotiate Agreement(s)

    Steps

    5.1 Perform negotiation process

    Steps in an RFP Process with the fifth step, 'Negotiate Agreement', highlighted.

    This phase involves the following participants:

    • Procurement
    • Vendor management
    • Legal
    • IT stakeholders
    • Finance

    Outcomes of this phase

    A negotiated agreement or agreements that are a result of competitive negotiations.

    Negotiate Agreement(s)

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Negotiate Agreement

    You should evaluate your RFP responses first to see if they are complete and the vendor followed your instructions.


    Then you should:

    • Plan negotiation(s) with one or more vendors based on your questions and opportunities identified during evaluation.
    • Select finalist(s).
    • Apply selection criteria.
    • Resolve vendors’ exceptions.

    Info-Tech Insight

    Be certain to include any commitments made in the RFP, presentations, and proposals in the agreement – dovetails to underperforming vendor.

    Centerpiece of the table, titled 'Negotiation Process'.

    Leverage Info-Tech's negotiation process research for additional information

    Negotiate before you select your vendor:
    • Negotiating with two or more vendors will maintain your competitive leverage while decreasing the time it takes to negotiate the deal.
    • Perform legal reviews as necessary.
    • Use sound competitive negotiations principles.

    Info-Tech Insight

    Providing contract terms in an RFP can dramatically reduce time for this step by understanding the vendor’s initial contractual position for negotiation.

    Phase 6

    Purchase Goods and Services

    Steps

    6.1 Purchase Goods & Services

    Steps in an RFP Process with the sixth step, 'Purchase Goods and Services', highlighted.

    This phase involves the following participants:

    • Procurement
    • Vendor management
    • IT stakeholders

    Outcomes of this phase

    A purchase order that completes the RFP process.

    The beginning of the vendor management process.

    Purchase Goods and Services

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Purchase Goods and Services

    Prepare to purchase goods and services

    Prepare to purchase goods and services by completing all items on your organization’s onboarding checklist.
    • Have the vendor complete applicable tax forms.
    • Set up the vendor in accounts payable for electronic payment (ACH) set-up.
    Then transact day-to-day business:
    • Provide purchasing forecasts.
    • Complete applicable purchase requisition and purchase orders. Be sure to reference the agreement in the PO.
    Stock image of a computer monitor with a full grocery cart shown on the screen.

    Info-Tech Insight

    As a customer, honoring your contractual obligations and commitments will ensure that your organization is not only well respected but considered a customer of choice.

    Phase 7

    Assess and Measure Performance

    Steps

    7.1 Assess and measure performance against the agreement

    Steps in an RFP Process with the seventh step, 'Assess and Measure Performance', highlighted.

    This phase involves the following participants:

    • Vendor management
    • Business stakeholders
    • Senior leadership (as needed)
    • IT stakeholders
    • Vendor representatives & senior management

    Outcomes of this phase

    A list of what went well during the period – it’s important to recognize successes

    A list of areas needing improvement that includes:

    • A timeline for each item to be completed
    • The team member(s) responsible

    Purchase Goods and Services

    Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

    Assess and Measure Performance

    Measure to manage: the job doesn’t end when the contract is signed.

    • Classify vendor
    • Assess vendor performance
    • Manage improvement
    • Conduct periodic vendor performance reviews or quarterly business reviews
    • Ensure contract compliance for both the vendor and your organization
    • Build knowledgebase for future
    • Re-evaluate and improve appropriately your RFP processes

    Info-Tech Insight

    To be an objective vendor manager, you should also assess and measure your company’s performance along with the vendor’s performance.

    Summary of Accomplishment

    Problem Solved

    Upon completion of this blueprint, guided implementation, or workshop, your team should have a comprehensive, well-defined end-to-end approach to performing a quality sourcing event. Leverage Info-Tech’s industry-proven tools and templates to provide your organization with an effective approach to maintain your negotiation leverage, improve the ease with which you evaluate vendor proposals, and reduce your risk while obtaining the best market value for your goods and services.

    Additionally, your team will have a foundation to execute your vendor management principles. These principles will assist your organization in ensuring you receive the perceived value from the vendor as a result of your competitive negotiations.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    Final Thoughts: RFP Do’s and Don’ts

    DO

    • Leverage your team’s knowledge
    • Document and explain your RFP process to stakeholders and vendors
    • Include contract terms in your RFP
    • Consider vendor management requirements up front
    • Plan to measure and manage performance after contract award leveraging RFP objectives
    • Seek feedback from the RFP team for process improvements

    DON'T

    • Reveal your budget
    • Do an RFP in a vacuum
    • Send an RFP to a vendor your team is not willing to award the business to
    • Hold separate conversations with candidate vendors during your RFP process
    • Skimp on the requirements definition to speed the process
    • Tell the vendor they are selected before negotiating

    Bibliography

    “2022 RFP Response Trends & Benchmarks.” Loopio, 2022. Web.

    Corrigan, Tony. “How Much Does it Cost to Respond to an RFP?” LinkedIn, March 2017. Accessed 10 Dec. 2019

    “Death by RFP:7 Reasons Not to Respond.” Inc. Magazine, 2013. Web.

    Jeffery, Steven, George Bordon, and Phil Bode. The Art of Creating a Quality RFP, 3rd ed. Info-Tech Research Group, 2019.

    “RFP Benchmarks: How Much Time and Staff Firms Devote to Proposals.” MarketingProfs, 2020. Web.

    “State of the RFP 2019.” Bonfire, 2019. Web.

    “What Vendors Want (in RFPs).” Vendorful, 2020. Web.

    Related Info-Tech Research

    Stock photo of two people looking at a tablet. Prepare for Negotiations More Effectively
    • Negotiations are about allocating risk and money – how much risk is a party willing to accept at what price point?
    • Using a cross-functional/cross-insight team structure for negotiation preparation yields better results.
    • Soft skills aren’t enough and theatrical negotiation tactics aren’t effective.
    Stock photo of two people in suits shaking hands. Understand Common IT Contract Provisions to Negotiate More Effectively
    • Focus on the terms and conditions, not just the price. Too often, organizations focus on the price contained within their contracts, neglecting to address core terms and conditions that can end up costing multiples of the initial price.
    • Lawyers can’t ensure you get the best business deal. Lawyers tend to look at general terms and conditions for legal risk and may not understand IT-specific components and business needs.
    Stock photo of three people gathered around a computer. Jump Start Your Vendor Management Initiative
    • Vendor management must be an IT strategy. Solid vendor management is an imperative – IT organizations must develop capabilities to ensure that services are delivered by vendors according to service-level objectives and that risks are mitigated according to the organization's risk tolerance.
    • Visibility into your IT vendor community. Understand how much you spend with each vendor and rank their criticality and risk to focus on the vendors you should be concentrating on for innovative solutions.

    Develop a Project Portfolio Management Strategy

    • Buy Link or Shortcode: {j2store}331|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $111,064 Average $ Saved
    • member rating average days saved: 33 Average Days Saved
    • Parent Category Name: Project Management Office
    • Parent Category Link: /project-management-office
    • As an IT leader, you oversee a project environment in which the organizational demand for new products, services, and enhancements far outweighs IT’s resource capacity to adequately deliver on everything.
    • As a result, project throughput suffers. IT starts a lot of projects, but has constant difficulties delivering the bulk of them on time, on budget, in scope, and of high quality. What’s more, many of the projects that consume IT’s time are of questionable value to the business.
    • You need a project portfolio management (PPM) strategy to help bring order to IT’s project activity. With the right PPM strategy, you can ensure that you’re driving the throughput of the best projects and maximizing stakeholder satisfaction with IT.

    Our Advice

    Critical Insight

    • IT leaders commonly conflate PPM and project management, falsely believing that they already have a PPM strategy via their project management playbook. While the tactical focus of project management can help ensure that individual projects are effectively planned, executed, and closed, it is no supplement for the insight into “the big picture” that a PPM strategy can provide.
    • Many organizations falter at PPM by mistaking a set of processes for a strategy. While processes are no doubt important, without an end in mind – such as that provided by a deliberate strategy – they inevitably devolve into inertia or confusion.
    • Executive layer buy-in is a critical prerequisite for the success of a PPM strategy. Without it, any efforts to reconcile supply and demand, and improve the strategic value of IT’s project activity, could be quashed by irresponsible, non-compliant stakeholders.

    Impact and Result

    • Manage the portfolio as more than just the sum of its parts. Create a coherent strategy to maximize the sum of values that projects deliver as a whole – as a project portfolio, rather than a collection of individual projects.
    • Get to value early. Info-Tech’s methodology tackles one of PPM’s most pressing challenges upfront by helping you to articulate a strategy and get executive buy-in for it before you define your process goals. When senior management understands why a PPM strategy is necessary and of value to them, the path to implementation is much more stable.
    • Create PPM processes you can sustain. Translate your PPM strategy into specific, tangible near-term and long-term goals, which are realized through a suite of project portfolio management processes tailored to your organization and its culture.

    Develop a Project Portfolio Management Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a project portfolio management strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Develop a Project Portfolio Management Strategy – Executive Brief
    • Develop a Project Portfolio Management Strategy – Phases 1-3

    1. Get executive buy-in for your PPM strategy

    Choose the right PPM strategy for your organization and get executive buy-in before you start to set PPM process goals.

    • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy
    • PPM High-Level Supply-Demand Calculator
    • PPM Strategic Plan Template
    • PPM Strategy-Process Goals Translation Matrix Template

    2. Align PPM processes to your strategic goals

    Use the advice and tools in this phase to align the PPM processes that make up the infrastructure around projects with your new PPM strategy.

    • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals
    • PPM Strategy Development Tool

    3. Complete your PPM strategic plan

    Refine your PPM strategic plan with inputs from the previous phases by adding a cost-benefit analysis and PPM tool recommendation.

    • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan
    • Project Portfolio Analyst / PMO Analyst
    [infographic]

    Workshop: Develop a Project Portfolio Management Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Get Executive Buy-In for Your PPM Strategy

    The Purpose

    Choose the right PPM strategy for your organization and ensure executive buy-in.

    Set process goals to address PPM strategic expectations and steer the PPM strategic plan.

    Key Benefits Achieved

    A right-sized PPM strategy complete with executive buy-in for it.

    A prioritized list of PPM process goals.

    Activities

    1.1 Assess leadership mandate.

    1.2 Determine potential resource capacity.

    1.3 Create a project inventory.

    1.4 Prepare to communicate your PPM strategy to key stakeholders.

    1.5 Translate each strategic goal into process goals.

    1.6 Set metrics and preliminary targets for PPM process goals.

    Outputs

    Choice of PPM strategy and the leadership mandate

    Analysis of current project capacity

    Analysis of current project demand

    PPM Strategic Plan – Executive Brief

    PPM strategy-aligned process goals

    Metrics and long-term targets for PPM process goals

    2 Align PPM Processes to Your Strategic Goals

    The Purpose

    Examine your current-state PPM processes and create a high-level description of the target-state process for each of the five PPM processes within Info-Tech’s PPM framework.

    Build a sound business case for implementing the new PPM strategy by documenting roles and responsibilities for key PPM activities as well as the time costs associated with them.

    Key Benefits Achieved

    Near-term and long-term goals as well as an organizationally specific wireframe for your PPM processes.

    Time cost assumptions for your proposed processes to ensure sustainability.

    Activities

    2.1 Develop and refine the project intake, prioritization, and approval process.

    2.2 Develop and refine the resource management process.

    2.3 Develop and refine the portfolio reporting process.

    2.4 Develop and refine the project closure process

    2.5 Develop and refine the benefits realization process.

    Outputs

    Process capability level

    Current-state PPM process description

    Retrospective examination of the current-state PPM process

    Action items to achieve the target states

    Time cost of the process at current and target states

    3 Complete Your PPM Strategic Plan

    The Purpose

    Perform a PPM tool analysis in order to determine the right tool to support your processes.

    Estimate the total cost-in-use of managing the project portfolio, as well as the estimated benefits of an optimized PPM strategy.

    Key Benefits Achieved

    A right-sized tool selection to help support your PPM strategy.

    A PPM strategy cost-benefit analysis.

    Activities

    3.1 Right-size the PPM tools for your processes.

    3.2 Conduct a cost-benefit analysis of implementing the new PPM strategy.

    3.3 Define roles and responsibilities for the new processes.

    3.4 Refine and consolidate the near-term action items into a cohesive plan.

    Outputs

    Recommendation for a PPM tool

    Cost-benefit analysis

    Roles and responsibilities matrix for each PPM process

    An implementation timeline for your PPM strategy

    Further reading

    Develop a Project Portfolio Management Strategy

    Drive IT project throughput by throttling resource capacity.

    Analyst Perspective

    “Tactics without strategy is the noise before defeat.” – Sun Tzŭ

    "Organizations typically come to project portfolio management (PPM) with at least one of two misconceptions: (1) that PPM is synonymous with project management and (2) that a collection of PPM processes constitutes a PPM strategy.

    Both foundations are faulty: project management and PPM are separate disciplines with distinct goals and processes, and a set of processes do not comprise a strategy – they should flow from a strategy, not precede one. When built upon these foundations, the benefits of PPM go unrealized, as the means (i.e. project and portfolio processes) commonly eclipse the ends of a PPM strategy – e.g. a portfolio better aligned with business goals, improved project throughput, increased stakeholder satisfaction, and so on.

    Start with the end in mind: articulate a PPM strategy that is truly project portfolio in nature, i.e. focused on the whole portfolio and not just the individual parts. Then, let your PPM strategy guide your process goals and help to drive successful outcomes, project after project." (Barry Cousins, Senior Director of Research, PMO Practice, Info-Tech Research Group)

    Our understanding of the problem

    This Research Is Designed For:

    • CIOs who want to maximize IT’s fulfillment of both business strategic goals and operational needs.
    • CIOs who want to better manage the business and project sponsors’ expectations and satisfaction.
    • CIOs, PMO directors, and portfolio managers who want a strategy to set the best projects for the highest chance of success.

    This Research Will Help You:

    • Get C-level buy-in on a strategy for managing the project portfolio and clarify their expectations on how it should be managed.
    • Draft strategy-aligned, high-level project portfolio management process description.
    • Put together a strategic plan for improving PPM processes to reclaim wasted project capacity and increase business satisfaction of IT.

    This Research Will Also Assist:

    • Steering committee and C-suite management who want to maximize IT’s value to business.
    • Project sponsors who seek clarity and fairness on pushing their projects through a myriad of priorities and objectives.
    • CIOs, PMO directors, and portfolio managers who want to enable data-driven decisions from the portfolio owners.

    This Research Will Help Them:

    • Optimize IT’s added value to the business through project delivery.
    • Provide clarity on how IT’s project portfolio should be managed and the expectations for its management.
    • Improve project portfolio visibility by making trustworthy project portfolio data available, with which to steer the portfolio.

    Executive Summary

    Situation

    • As CIO, there are too many projects and not enough resource capacity to deliver projects on time, on budget, and in scope with high quality.
    • Prioritizing projects against one another is difficult in the face of conflicting priorities and agenda; therefore, projects with dubious value/benefits consume resource capacity.

    Complication

    • Not all IT projects carry a direct value to business; IT is accountable for keeping the lights on and it consumes a significant amount of resources.
    • Business and project sponsors approve projects without considering the scarcity of resource capacity and are frustrated when the projects fail to deliver or linger in the backlog.

    Resolution

    • Create a coherent strategy to maximize the total value that projects deliver as a whole portfolio, rather than a collection of individual projects.
    • Ensure that the steering committee or senior executive layer buys into the strategy by helping them understand why the said strategy is necessary, and more importantly, why the strategy is valuable to them.
    • Translate the strategic expectations to specific, tangible goals, which are realized through a suite of project portfolio management processes tailored to your organization and its culture.
    • Putting into place people, processes, and tools that are sustainable and manageable, plus a communication strategy to maintain the stakeholder buy-in.

    Info-Tech Insight

    1. Time is money; therefore, the portfolio manager is an accountant of time. It is the portfolio manager’s responsibility to provide the project portfolio owners with reliable data and close the loop on portfolio decisions.
    2. Business satisfaction is driven by delivering projects that align to and maximize business value. Use Info-Tech’s method for developing a PPM strategy and synchronize its definition of “best projects” with yours.

    Projects that deliver on strategic goals of the business is the #1 driver of business satisfaction for IT

    Info-Tech’s CIO Business Vision Survey (N=21,367) has identified a direct correlation between IT project success and overall business satisfaction with IT.

    Comparative rankings of IT services in two columns 'Reported Importance' and 'Actual Importance' with arrows showing where each service moved to in the 'Actual Importance' ranking. The highlighted move is 'Projects' from number 10 in 'Reported' to number 1 in 'Actual'. 'Reported' rankings from 1 to 12 are 'Network Infrastructure', 'Service Desk', 'Business Applications', 'Data Quality', Devices', 'Analytical Capability', 'Client-Facing Technology', 'Work Orders', 'Innovation Leadership', 'Projects', 'IT Policies', and 'Requirements Gathering'. 'Actual' rankings from 1 to 12 are 'Projects', 'Work Orders', 'Innovation Leadership', 'Business Applications', 'Requirements Gathering', 'Service Desk', 'Client-Facing Technology', 'Network Infrastructure', 'Analytical Capability', 'Data Quality', 'IT Policies', and 'Devices'.

    Reported Importance: Initially, when CIOs were asked to rank the importance of IT services, respondents ranked “projects” low on the list – 10 out of a possible 12.

    Actual Importance: Despite this low “reported importance,” of those organizations that were “satisfied” to “fully satisfied” with IT, the service that had the strongest correlation to high business satisfaction was “projects,” i.e. IT’s ability to help plan, support, and execute projects and initiatives that help the business achieve its strategic goals.

    On average, executives perceive IT as being poorly aligned with business strategy

    Info-Tech’s CIO Business Vision Survey data highlights the importance of IT projects in supporting the business achieve its strategic goals. However, Info-Tech’s CEO-CIO Alignment Survey (N=124) data indicates that CEOs perceive IT to be poorly aligned to business’ strategic goals:

    • 43% of CEOs believe that business goals are going unsupported by IT.
    • 60% of CEOs believe that improvement is required around IT’s understanding of business goals.
    • 80% of CIOs/CEOs are misaligned on the target role for IT.
    • 30% of business stakeholders* are supporters of their IT departments.
    • (Source: Info-Tech CIO/CEO Alignment Diagnostics, * N=32,536)

    Efforts to deliver on projects are largely hampered by causes of project failure outside a project manager’s control

    The most recent data from the Project Management Institute (PMI) shows that more projects are meeting their original goals and business intent and less projects are being deemed failures. However, at the same time, more projects are experiencing scope creep. Scope creeps result in schedule and cost overrun, which result in dissatisfied project sponsors, stakeholders, and project workers.

    Graph of data from Project Management Institute comparing projects from 2015 to 2017 that 'Met original goals/business intent', 'Experienced scope creep', and were 'Deemed failures'. Projects from the first two categories went up in 2017, while projects that were deemed failures went down.

    Meanwhile, the primary causes of project failures remain largely unchanged. Interestingly, most of these primary causes can be traced to sources outside of a project manager’s control, either entirely or in part. As a result, project management tactics and processes are limited in adequately addressing them.

    Relative rank

    Primary cause of project failure

    2015

    2016

    2017

    Trend

    Change in organization's priorities 1st 1st 1st Stable
    Inaccurate requirements gathering 2nd 3rd 2nd Stable
    Change in project objectives 3rd 2nd 3rd Stable
    Inadequate vision/goal for project 6th 5th 4th Rising
    Inadequate/poor communication 5th 7th 5th Stable
    Poor change management 11th 9th 6th Rising
    (Source: Project Management Institute, Pulse of the Profession, 2015-2017)

    Project portfolio management (PPM) can improve business alignment of projects and reduce chance of project failure

    PPM is about “doing the right things.”

    The PMI describes PPM as:

    Interrelated organizational processes by which an organization evaluates, selects, prioritizes, and allocates its limited internal resources to best accomplish organizational strategies consistent with its vision, mission, and values. (PMI, Standard for Portfolio Management, 3rd ed.)

    Selecting and prioritizing projects with the strongest alignment to business strategy goals and ensuring that resources are properly allocated to deliver them, enable IT to:

    1. Improve business satisfaction and their perception of IT’s alignment with the business.
    2. Better engage the business and the project customers.
    3. Minimize the risk of project failure due to changing organizational/ project vision, goals, and objectives.

    "In today’s competitive business environment, a portfolio management process improves the linkage between corporate strategy and the selection of the ‘right’ projects for investment. It also provides focus, helping to ensure the most efficient and effective use of available resources." (Lou Pack, PMP, Senior VP, ICF International (PMI, 2015))

    PPM is a common area of shortcomings for IT, with much room for improvement

    Info-Tech’s IT Management & Governance Survey (N=879) shows that PPM tends to be regarded as neither an effective nor an important process amongst IT organizations.

    Two deviation from median charts highlighting Portfolio Management's ranking compared to other IT processes in 'Effectiveness scores' and 'Importance scores'. PPM ranks 37th out of 45 in Effectiveness and 33rd out of 45 in Importance.

    55% ... of IT organizations believe that their PPM processes are neither effective nor important.

    21% ... of IT organizations reported having no one responsible or accountable for PPM.

    62% ... of projects in organizations effective in PPM met/exceeded the expected ROI (PMI, 2015).

    In addition to PPM’s benefits, improving PPM processes presents an opportunity for getting ahead of the curve in the industry.

    Info-Tech’s methodology for developing a PPM strategy delivers extraordinary value, fast

    Our methodology is designed to tackle your hardest challenge first to deliver the highest-value part of the deliverable. For developing a PPM strategy, the biggest challenge is to get the buy-in of the executive layer.

    "Without senior management participation, PPM doesn’t work, and the organization is likely to end up with, or return to, a squeaky-wheel-gets-the-grease mindset for all those involved." (Mark Price Perry, Business Driven Project Portfolio Management)

    In the first step of the blueprint, you will be guided through the following steps:

    1. Choose the right PPM strategy: driven by the executives, supported by management.
    2. Objectively assess your current project portfolio with minimal effort to build a case for the PPM strategy.
    3. Engage the executive layer to get the critical prerequisite of a PPM strategy: their buy-in.

    A PPM strategic plan is the end deliverable of this blueprint. In the first step, download the pre-filled template with content that represents the most common case. Then, throughout the blueprint, customize with your data.

    Use this blueprint to develop, or refine, a PPM strategy that works for your organization

    Get buy-in for PPM strategy from decision makers.

    Buy-in from the owners of project portfolio (Steering Committee, C-suite management, etc.) is a critical prerequisite for any PPM strategy. This blueprint will give you the tools and templates to help you make your case and win the buy-in of portfolio owners.

    Connect strategic expectations to PPM process goals.

    This blueprint offers a methodology to translate the broad aim of PPM to practical, tactical goals of the five core PPM processes, as well as how to measure the results. Our methodology is supported with industry-leading frameworks, best practices, and our insider research.

    Develop your PPM processes.

    This blueprint takes you through a series of steps to translate the process goals into a high-level process description, as well as a business case and a roadmap for implementing the new PPM processes.

    Refine your PPM processes.

    Our methodology is also equally as applicable for making your existing PPM processes better, and help you draft a roadmap for improvement with well-defined goals, roles, and responsibilities.

    Info-Tech’s PPM model consists of five core processes

    There are five core processes in Info-Tech’s thought model for PPM.

    Info-Tech's Process Model detailing the steps and their importance in project portfolio management. Step 3: 'Status and Progress Reporting' sits above the others as a process of importance throughout the model. In the 'Intake' phase of the model are Step 1: 'Intake, Approval, and Prioritization' and Step 2: 'Resource Management'. In the 'Execution' phase is 'Project Management', the main highlighted section, and a part of Step 3, the overarching 'Status and Progress Reporting'. In the 'Closure' phase of the model are Step 4: 'Project Closure' and Step 5: 'Benefits Tracking'.

    These processes create an infrastructure around projects, which aims to enable:

    1. Initiation of the “best” projects with the right resources and project information.
    2. Timely and trustworthy reporting to facilitate the flow of information for better decision making.
    3. Proper closure of projects, releasing resources, and managing benefits realization.

    PPM has many moving pieces. To ensure that all of these processes work in harmony, you need a PPM strategy.

    De-couple project management from PPM to break down complexity and create flexibility

    Tailor project management (PM) processes to fit your projects.

    Info-Tech’s PPM thought model enables you to manage your project portfolio independent of your PM methodology or capability. Projects interact with PPM via:

    • A project charter that authorizes the use of resources and defines project benefits.
    • Status reports that feed up-to-date, trustworthy data to your project portfolio.
    • Acceptance of deliverables that enable proper project closure and benefits reporting.

    Info-Tech’s PPM strategy is applicable whether you use Agile, waterfall, or anything in between for PM.

    The process model from the previous page but with project management processes overlaid. The 'Intake' phase is covered by 'Project Charter'. The 'Execution' phase, or 'Project Management' is covered by 'Status report'. The 'Closure' phase is covered by 'Deliverable Acceptance'.

    Learn about project management approach for small projects in Info-Tech’s Tailor PM Processes to Fit Your Projects blueprint.

    Sample of the Info-Tech blueprint 'Tailor PM Processes to Fit Your Projects'.

    Info-Tech’s approach to PPM is informed by industry best practices and rooted in practical insider research

    Info-Tech uses PMI and ISACA frameworks for areas of this research.

    Logo for 'Project Management Institute (PMI)'.' Logo for 'COBIT 5 an ISACA Framework'.
    PMI’s Standard for Portfolio Management, 3rd ed. is the leading industry framework, proving project portfolio management best practices and process guidelines. COBIT 5 is the leading framework for the governance and management of enterprise IT.

    In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

    Logo for 'Info-Tech Research Group'.

    33,000+ Our peer network of over 33,000 happy clients proves the effectiveness of our research.

    1000+ Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

    Re-position IT as the “facilitator of business projects” for PPM success

    CASE STUDY

    Industry: Construction
    Source: Info-Tech Client

    Chaos in the project portfolio

    At first, there were no less than 14 teams of developers, each with their own methodologies and processes. Changes to projects were not managed. Only 35% of the projects were completed on time.

    Business drives, IT facilitates

    Anyone had the right to ask for something; however, converting ideas to a formal project demand required senior leadership within a business division getting on board with the idea.

    The CIO and senior leadership decided that projects, previously assigned to IT, were to be owned and driven by the business, as the projects are undertaken to serve its needs and rarely IT’s own. The rest of the organization understood that the business, not IT, was accountable for prioritizing project work: IT was re-positioned as a facilitator of business projects. While it was a long process, the result speaks for itself: 75% of projects were now being completed on time.

    Balancing the target mix of the project portfolio

    What about maintaining and feeding the IT infrastructure? The CIO reserved 40% of IT project capacity for “keeping the lights on,” and 20% for reactive, unplanned activities, with an aim to lower this percentage. With the rest of the time, IT facilitated business projects

    Three key drivers of project priority

    1. Does the project meet the overall company goals and objectives?
      “If they don't, we must ask why we are bothering with it.”
    2. Does the project address a regulatory or compliance need?
      “Half of our business is heavily regulated. We must focus on it.”
    3. Are there significant savings to be had?
      “Not soft; hard savings. Can we demonstrate that, after implementing this, can we see good hard results? And, can we measure it?”

    "Projects are dumped on IT, and the business abdicates responsibility. Flip that over, and say ‘that's your project’ and ‘how can we help you?’"

    Use these icons to help direct you as you navigate this research

    Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

    A small monochrome icon of a wrench and screwdriver creating an X.

    This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

    A small monochrome icon depicting a person in front of a blank slide.

    This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Develop a PPM strategy – project overview

    1. Get executive buy-in for your PPM strategy

    2. Align PPM processes to your strategic goals

    3. Complete your PPM strategic plan

    Supporting Tool icon

    Best-Practice Toolkit

    1.1 Choose the right PPM strategy for your organization

    1.2 Translate PPM strategy expectations to specific process goals

    2.1 Develop and refine project intake, prioritization, and resource management processes

    2.2 Develop and refine portfolio reporting, project closure, and benefits realization processes

    3.1 Select a right-sized PPM solution for supporting your new processes

    3.2 Finalize customizing your PPM Strategic Plan Template

    Guided Implementations

    • Scoping call: discuss current state of PPM and review strategy options.
    • How to wireframe realistic process goals, rooted in your PPM strategic expectations, that will be sustained by the organization.
    • Examine your current-state PPM process and create a high-level description of the target-state process for each of the five PPM processes (1-2 calls per each process).
    • Assess your PPM tool requirements to help support your processes.
    • Determine the costs and potential benefits of your PPM practice.
    Associated Activity icon

    Onsite Workshop

    Module 1:
    Set strategic expectations and realistic goals for the PPM strategy
    Module 2:
    Develop and refine strategy-aligned PPM processes
    Module 3:
    Compose your PPM strategic plan
    Phase 1 Outcome:
    • Analysis of the current state of PPM
    • Strategy-aligned goals and metrics for PPM processes
    Phase 2 Outcome:
    • PPM capability levels
    • High-level descriptions of near- and long-term target state
    Phase 3 Outcome:
    • PPM tool recommendations
    • Cost-benefit analysis
    • Customized PPM strategic plan

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1

    Workshop Day 2

    Workshop Day 3

    Workshop Day 4

    Workshop Day 5

    Get leadership buy-in for PPM strategy Set PPM process goals and metrics with strategic expectations Develop and Refine PPM processes Develop and Refine PPM processes Complete the PPM strategic plan

    Activities

    • 1.1 Assess leadership mandate.
    • 1.2 Determine potential resource capacity.
    • 1.3 Create a project inventory.
    • 1.4 Communicate your PPM strategy to key stakeholders.
    • 2.1 Translate each strategic goal into process goals.
    • 2.2 Set metrics and preliminary targets for PPM process goals.
    • 3.1 Develop and refine the project intake, prioritization, and approval process.
    • 3.2 Develop and refine the resource management process.
    • 4.1 Develop and refine the portfolio reporting process.
    • 4.2 Develop and refine the project closure process.
    • 4.3 Develop and refine the benefits realization process.
    • 5.1 Right-size the PPM tools for your processes.
    • 5.2 Conduct a cost-benefit analysis of implementing the new PPM strategy.
    • 5.3 Define roles and responsibilities for the new processes.

    Deliverables

    1. Choice of PPM strategy and the leadership mandate
    2. Analysis of current project capacity
    3. Analysis of current project demand
    4. PPM Strategic Plan – Executive Brief
    1. PPM strategy-aligned process goals
    2. Metrics and long-term targets for PPM process goals
      For each of the five PPM processes:
    1. Process capability level
    2. Current-state PPM process description
    3. Retrospective examination of the current-state PPM process
    4. Action items to achieve the target states
    5. Time cost of the process at current and target states
    1. Recommendation for a PPM tool
    2. Cost-benefit analysis
    3. Roles and responsibilities matrix for each PPM process

    Develop a Project Portfolio Management Strategy

    PHASE 1

    Get Executive Buy-In for Your PPM Strategy

    Phase 1 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Get executive buy-in for your PPM strategy

    Proposed Time to Completion: 2 weeks
    Step 1.1: Choose the right PPM strategy Step 1.2: Translate strategic expectations to process goals
    Start with an analyst kick-off call:
    • Scoping call to discuss the current state of PPM and review strategy options.
    Work with an analyst to:
    • Discuss how to wireframe realistic process goals, rooted in your PPM strategic expectations, that will be sustained by the organization.
    Then complete these activities…
    • Execute a leadership mandate survey.
    • Perform a high-level supply/demand analysis.
    • Prepare an executive presentation to get strategy buy-in.
    Then complete these activities…
    • Develop realistic process goals based in your PPM strategic expectations.
    • Set metrics and preliminary targets for your high-priority PPM process goals.
    With these tools & templates:
    • PPM High-Level Supply/Demand Calculator
    • PPM Strategic Plan Template
    With these tools & templates:
    • PPM Strategy-Process Translation Matrix

    Phase 1 Results & Insights

    • Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are onboard before proceeding to implement your PPM strategy.

    Prepare to get to value early with step 1.1 of this blueprint

    The first step of this blueprint will help you define your PPM strategy and get executive buy-in for it using section one of Info-Tech’s PPM Strategic Plan Template.

    Where traditional models of consulting can take considerable amounts of time before delivering value to clients, Info-Tech’s methodology for developing a PPM strategy gets you to value fast.

    In the first step of this blueprint, you will define your PPM strategy and prepare an executive presentation to get buy-in for the strategy. The presentation can be prepared in just a few hours.

    • The activities in step 1.1 of this blueprint will help you customize the slides in section 1 of Info-Tech’s PPM Strategic Plan Template.
    • Section one of the Template will then serve as your presentation document.

    Once you have received buy-in for your PPM strategy, the remainder of this blueprint will help you customize section 2 of the Template.

    • Section 2 of the Template will communicate:
      • Your processes and process goals.
      • Your near-term and long-term action items for implementing the strategy.
      • Your PPM tool requirements.
      • The costs and benefits of your PPM strategy.

    Download Info-Tech’s PPM Strategic Plan Template.

    Sample of Info-Tech's 'PPM Strategic Plan Template.'

    Step 1.1: Choose the right PPM strategy for your organization

    PHASE 1

    PHASE 2

    PHASE 3

    1.1 1.2 2.1 2.2 3.1 3.2
    Choose the right PPM strategy Translate strategy into process goals Define intake & resource mgmt. processes Define reporting, closure, & benefits mgmt. processes Select a right-sized PPM solution Finalize your PPM strategic plan

    This step will walk you through the following activities:

    • Perform a leadership mandate survey.
    • Choose your PPM strategy.
    • Calculate your resource capacity for projects.
    • Determine overall organizational demand for projects.
    • Prepare an executive presentation of the PPM strategy.

    This step involves the following participants:

    • CIO
    • PMO Director/Portfolio Manager
    • Project Managers
    • IT Managers

    Outcomes of this step

    • A PPM strategy
    • A resource supply/project demand analysis
    • An executive brief presentation
    • Executive buy-in for the PPM strategy

    “Too many projects, not enough resources” is the reality of most IT environments

    In today’s organizations, the desires of business units for new products and enhancements, and the appetites of senior leadership to approve more and more projects for those products and services, far outstrips IT’s ability to realistically deliver on everything.

    The vast majority of IT departments lack the resourcing to meet project demand – especially given the fact that day-to-day operational demands frequently trump project work.

    As a result, project throughput suffers – and with it, IT's reputation within the organization.

    A visualization of 'Project Demand' versus 'Resource supply' utilizing courtroom scales with numerous project titles weighing down the 'Project Demand' side and silhouettes of three little people raised aloft on the 'Resource supply' side.

    In these environments, a PPM strategy is required.

    A PPM strategy should enable executive decision makers to make sense of the excess of demand and give IT the ability to prioritize those projects that are of the most strategic value to the business.

    With the right PPM strategy, IT can improve project outcomes across its portfolio and drive business value – all while improving the workloads of IT project staff.

    Info-Tech has two PPM strategy options that you can start to deploy today

    This step will help you choose the most suitable option, depending on your project pain points and current level of executive engagement in actively steering the portfolio.

    Option A:
    Top-Down, Executive Driven Strategy

    Option B:
    Bottom-Up, Project Manager Driven Strategy

    Goals of this approach:
    • This approach is intended to assist decision makers in their job: choosing the right projects, committing to timelines for those projects, and monitoring/directing their progress.
    Goals of this approach:
    • This approach is primarily intended to ensure that projects are well managed in a standardized manner in order to provide project managers with clear direction.
    Who this approach is for:
    • IT departments looking to improve alignment of project demand and resource capacity.
    • IT departments wanting to prioritize strategically valuable work.
    • IT departments with sufficient executive backing and engagement with the portfolio.
    Who this approach is for:
    • IT departments that would not the get support for a top-down approach due to a disengaged executive layer.
    • IT departments that already have a top-down PPM strategy and feel they are sufficiently resourced to confront project demand.

    Each of these strategy options is driven by a set of specific strategic expectations to help communicate your PPM goals. See the following slides for an articulation of each strategy option.

    A top-down, executive driven strategy is the optimal route, putting leadership in a position to best conduct the portfolio

    Option A: Top-Down, Executive Driven Strategy

    Strategic Expectations:

    • Project Throughput: Maximize throughput of the best projects.
    • Portfolio Visibility: Ensure visibility of current and pending projects.
    • Portfolio Responsiveness: Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
    • Resource Utilization: Minimize resource waste and optimize the alignment of skills to assignments.
    • Benefits Realization: Clarify accountability for post-project benefits attainment for each project, and facilitate the process of tracking/reporting those benefits.

    Info-Tech Insight

    Serve the executive with insight before you impede the projects with governance. This strategy option is where Info-Tech sees the most PPM success. A strategy focused at improving decision making at the executive layer will both improve project outcomes and help alleviate project workloads.

    A bottom-up strategy can help project managers and teams succeed where insight into the big picture is lacking

    Option B: Bottom-Up, Project Manager Driven Strategy

    Strategic Expectations:

    • Project Management Governance: All projects consuming IT resources will be continually validated in terms of best-practice process compliance.
    • Project Risk Management: Identify risks and related mitigation approaches for all high-risk areas.
    • Stakeholder Management: Ensure that project stakeholders are identified and involved.
    • Project Manager Resourcing: Provide project managers as needed.
    • Project-Level Visibility: Provide access to the details of project management processes (planning and progress) as needed.

    Info-Tech Insight

    Right-size governance to maximize success. Project management and governance success don’t necessarily equal project success. Project management processes should be a means to an end (i.e. successful project outcomes), and not an end in themselves. Ensure the ends justify the means.

    Most recurring project challenges require a top-down portfolio management approach

    While project management is a key ingredient to project success, tying to solve endemic project problems with project management alone won’t improve results over the long term.

    Why Top-Down is a better starting point than Bottom-Up.

    The most common IT project problems – schedule and budget overruns, scope creep, and poor quality – can ultimately, in the vast majority of cases, be traced back to bad decisions made at the portfolio level:

    • The wrong projects get greenlighted.
    • Shifting leadership priorities and operational demands make project plans and estimated delivery dates obsolete from the start.
    • Too many projects get approved when there are not enough resources to effectively work on them all.

    No amount of project management rigor can help alleviate these common root causes of project failure.

    With a top-down PPM strategy, however, you can make sure that leadership is informed and engaged in making the right project decisions and that project managers and teams are situated for success.

    "There is nothing so useless as doing efficiently that which should not be done at all." (Peter Drucker (quoted in Lessing))

    Info-Tech Insight

    Get Strategic About Project Success.

    The difference between project management and project portfolio management comes down to doing things right vs. doing the right things. Both are important, no doubt; but doing the wrong things well doesn’t provide much value to the business in the long run.

    Get insight into the big picture with a top-down strategy before imposing more administrative overhead on project managers and leads.

    Perform a leadership mandate assessment to gauge executive needs and expectations

    Associated Activity icon 1.1.1 – 15 to 30 minutes (prep time) 10 to 20 minutes (execution time)

    INPUT: Leadership expectations for portfolio and project management.

    OUTPUT: Leadership mandate bar chart

    Materials: Tab 6 of Info-Tech’s PPM High-Level Supply-Demand Calculator

    Participants: Portfolio manager (or equivalent), PPM strategy sponsor(s), CIO and other members of senior management

    Before choosing your strategy option, survey the organization’s leadership to assess what they’re expecting from the PPM strategy.

    Use the “Leadership Mandate Survey” (located on tab 6 of Info-Tech’s PPM High-Level Supply-Demand Calculator) to assess the degree to which your leadership expects the PPM strategy to provide outcomes across the following capabilities: portfolio reporting, project governance, and project management.

    • Deploy the 12-question survey via individual one-on-one meetings or group working sessions with your boss (the PPM strategy sponsor) as well as with the CIO and other senior managers from within IT and the business.
      • If you cannot connect with the executive layer for this survey, do your best to estimate their responses to complete the survey.
    • The survey should help distinguish if executives are looking for portfolio management or project management. It should be one input that informs your choice of strategy option A or B.
      • If leadership is looking primarily for project management, you should proceed to Info-Tech’s Tailor Project Management Processes that Fit Your Projects blueprint.

    Refer to the next slide for assistance analyzing the outputs in tab 6 and using them to inform your choice of strategy.

    How to make use of the results of the leadership survey

    Two possible result scenarios of the leadership survey. There are two bar graphs titled 'Leadership Mandate', each with an explanation of the scenario they belong to. In Scenario 1, the 'Leadership Mandate' graph has a descending trend with 'Portfolio Reporting' at the highest level, 'Project Governance' in the middle, and 'Project Management' at the lowest level. 'A result like this, with a higher portfolio reporting score, shows a higher need for a top-down approach and demonstrates well-balanced expectations for a PPM strategy from the leadership. There is greater emphasis put on the portfolio than there is project governance or project management.' In Scenario 2, the 'Leadership Mandate' graph has an ascending trend with 'Portfolio Reporting' at the lowest level, 'Project Governance' in the middle, and 'Project Management' at the highest level. 'If your graph looks like this, your executive leadership has placed greater importance on project governance and management. Completing a top-down PPM strategy may not meet their expectations at this time. In this situation, a bottom-up approach may be more applicable.'

    Customize Info-Tech’s PPM Strategic Plan Template. Insert screenshots of the survey and the bar graph from tab 6 of the PPM High-Level Supply-Demand Calculator onto slides 7 and 8, “PPM Strategy Leadership Mandate,” of the PPM Strategic Plan Template.

    Proceed with the right PPM strategy for your organization

    Based upon the results of the “Leadership Mandate Survey,” and your assessment of each strategy option as described in the previous slides, choose the strategy option that is right for your IT department/PMO at this time.

    "Without a strategic methodology, project portfolio planning is frustrating and has little chance of achieving exceptional business success." (G Wahl (quoted in Merkhofer))

    Option A:

    Those proceeding with Option A should continue with remainder of this blueprint. Update your strategy statement on slide 3 of your PPM Strategic Plan Template to reflect your choice

    Option B:

    Those proceeding with Option B should exit this blueprint and refer to Info-Tech’s Tailor Project Management Processes to Fit Your Projects blueprint to help define a project management standard operating procedure.

    Customize Info-Tech’s PPM Strategic Plan Template. If you’re proceeding with Option A, update slide 4, “Project Portfolio Management Strategy,” of your PPM Strategic Plan Template to reflect your choice of PPM strategy. If you’re proceeding with Option B, you may want to include your strategy statement in your Project Management SOP Template.

    The success of your top-down strategy will hinge on the quality of your capacity awareness and resource utilization

    A PPM strategy should facilitate alignment between project demand with resource supply. Use Info-Tech’s PPM High-Level Supply/Demand Calculator as a step towards this alignment.

    Info-Tech’s research shows that the ability to provide a centralized view of IT’s capacity for projects is one of the top PPM capabilities that contributes to overall project success.

    Accurate and reliable forecasts into IT’s capacity, coupled with an engaged executive layer making project approval and prioritization decisions based upon that capacity data, is the hallmark of an effective top-down PPM strategy.

    • Use Info-Tech’s PPM High-Level Supply/Demand Calculator to help improve visibility (and with it, organizational understanding) into project demand and IT resource supply.
    • The Calculator will help you determine IT’s actual capacity for projects and analyze organizational demand by taking an inventory of active and backlog projects.

    Download Info-Tech’s PPM High-Level Supply/Demand Calculator.

    Sample of Into-Tech's PPM High-Level Supply/Demand Calculator.

    Info-Tech Insight

    Where does the time go? The portfolio manager (or equivalent) should function as the accounting department for time, showing what’s available in IT’s human resources budget for projects and providing ongoing visibility into how that budget of time is being spent.

    Establish the total resource capacity of your portfolio

    Associated Activity icon 1.1.2 – 30 to 60 minutes

    INPUT: Staff resource types, Average work week, Estimated allocations

    OUTPUT: Breakdown of annual portfolio HR spend, Capacity pie chart

    Materials: PPM High-Level Supply/Demand Calculator, tab 3

    Participants: Portfolio manager (or equivalent), Resource and/or project managers

    Use tab 3 of the calculator to determine your actual HR portfolio budget for projects, relative to the organization’s non-project demands.

    • Tab 3 analyzes your resource supply asks you to consider how your staff spend their time weekly across four categories: out of office time, administrative time (e.g. meetings, training, checking email), keep-the-lights-on time (i.e. support and maintenance), and project time.
    • The screenshot below walks you through columns B to E of tab 3, which help calculate your potential capacity. This activity will continue on the next slide, where we will determine your realized capacity for project work from this potential capacity.
    Screenshot of tab 3 in the PPM High-Level Supply/Demand Calculator. It has 4 columns, 'Resource Type', '# People', 'Hours / Week', and 'Hours / Year', which are referred to in notes as columns B through E respectively. The note on 'Resource Type' reads '1. Compile a list of each of the roles within your department in column B'. The note on '# People' reads '2. In column C, provide the number of staff currently performing each role'. The note on 'Hours / Week' reads '3. In column D, provide a baseline for the number of hours in a typical work week for each role'. The note on 'Hours / Year' reads '4. Column E will auto-populate based on E and D. The total at the bottom of column E (row 26) constitutes your department’s total capacity'.

    Determine the project/non-project ratio for each role

    Associated Activity icon 1.1.2 (continued)

    The previous slide walked you through columns B to E of tab 3. This slide walks you through columns F to J, which ask you to consider how your potential capacity is spent.

    Screenshot of tab 3 in the PPM High-Level Supply/Demand Calculator. It has 6 columns, 'Hours / Year', 'Absence', 'Working Time / Year', 'Admin', 'KTLO', and 'Project Work', which, starting at 'Absence', are referred to in notes as columns F through J respectively. The note on 'Absence' reads '5. Enter the percentage of your total time across each role that is unavailable due to foreseeable out-of-office time (vacation, sick time, etc.) in column F. Industry standard runs anywhere from 12% to 16%, depending on your industry and geographical region'. The note on 'Working Time / Year' reads '6. Column G will auto-calculate to show your overall net capacity after out-of-office percentages have been taken off the top. These totals constitute your working time for the year'. The note on 'Admin' and 'KTLO' reads '6. Column G will auto-calculate to show your overall net capacity after out-of-office percentages have been taken off the top. These totals constitute your working time for the year'. The note on 'Project Work' reads '8. The project percentage in column J will auto-calculate based upon what’s leftover after your non-project working time allocations in columns H and I have been subtracted'.

    Review your annual portfolio capacity for projects

    Associated Activity icon 1.1.2 (continued)

    The previous slides walked you through the inputs for tab “3. Project Capacity.” This slide walks you through the outputs of the tab.

    Based upon the inputs from columns B to J, the rest of tab 3 analyzes how IT available time is spent across the time categories, highlighting how much of IT’s capacity is actually available for projects after admin work, support and maintenance work, and absences have been taken into account.

    A table and pie chart of output data from Tab 3 of the PPM High-Level Supply/Demand Calculator. Pie segments are labelled 'Admin', 'Absence', 'Project Capacity', and 'Keep The Lights On'.

    Customize Info-Tech’s PPM Strategic Plan Template. Update slide 10, “Current Project Capacity,” of your PPM Strategic Plan Template to include the outputs from tab 3 of the Calculator.

    Create an inventory of active and backlog projects to help gauge overall project demand

    Associated Activity icon 1.1.3 – 15 to 30 minutes

    INPUT: Number of active and backlog projects across different sizes

    OUTPUT: Total project demand in estimated hours of work effort

    Materials: PPM High-Level Supply/Demand Calculator, tab 4

    Participants: Portfolio manager (or equivalent), Project managers

    Where tab 3 of the Calculator gave you visibility into your overall resource supply for projects, tab 4 will help you establish insight into the demand side.

    • Before starting on tab 4, be sure to enter the required project size data on the set-up tab.
    • Using a list of current active projects, categorize the items on the list by size: small, medium, large, and extra large. Enter the number of projects in each category of project in column C of tab 4.
    • Using a list of on-hold projects, or projects that have been approved but not started, categorize the list by size and enter the number of projects in each category in column D.
    • In column E, estimate the number of new requests and projects across each size that you anticipate being added to the portfolio/backlog in the next 12 months. Use historical data from the past 12 to 24 months to inform your estimates.
    • In column F, estimate the number of projects that you anticipate being completed in each size category in the next 12 months. Take the current state of active projects into account as you make your estimates, as well as throughput data from the previous 12 to 24 months.
    Screenshot of tab 4 in the PPM High-Level Supply/Demand Calculator. It has 5 columns labelled 'Project Types' with values Small to Extra-Large, 'Number of active projects currently in the portfolio', 'Number of projects currently in the portfolio backlog', 'Number of new requests anticipated to be added to the portfolio/backlog in the next 12 months', and 'Number of projects expected to be delivered within the next 12 months'.

    Make supply and demand part of the conversation as you get buy-in for your top-down strategy

    Tab 5 of the Calculator is an output tab, visualizing the alignment (or lack thereof) of project demand and resource supply.

    Once tabs 3 and 4 are complete, use tab 5 to analyze the supply/demand data to help build your case for a top-down PPM strategy and get buy-in for it.

    Screenshots of Tab 5 in the PPM High-Level Supply/Demand Calculator. A bar chart obscures a table with the note 'The bar chart shows your estimated total project demand in person hours (in black) relative to your estimated total resource capacity for projects (in green)'. Notes on the table are 'The table below the bar chart shows your estimated annual project throughput rate (based upon the number of projects you estimated you would complete this year) as well as the rate at which portfolio demand will grow (based upon the number of new requests and projects you estimated for the next 12 months)' and 'If the “Total Estimated Project Demand (in hours) in 12 Months Time” number is more than your current demand levels, then you have a supply-demand problem that your PPM strategy will need to address'.

    Customize Info-Tech’s PPM Strategic Plan Template. Update slides 11 and 12, “Current Project Demand,” of your PPM Strategic Plan Template to include the outputs from tabs 4 and 5 of the Calculator.

    Recommended: Complete Info-Tech’s PPM Current State Scorecard to measure your resource utilization

    Associated Activity icon Contact your rep or call 1-888-670-8889

    This step is highly recommended but not required. Call 1-888-670-8889 to inquire about or request the PPM Diagnostics.

    Info-Tech’s PPM Current State Scorecard diagnostic provides a comprehensive view of your portfolio management strengths and weaknesses, including project portfolio management, project management, customer management, and resource utilization.

    Screenshots of Info-Tech's PPM Current State Scorecard diagnostic with a pie chart obscuring a table/key. The attached note reads 'In particular, the analysis of resource utilization in the PPM Current State Scorecard report, will help to complement the supply/demand analysis in the previous slides. The diagnostic will help you to analyze how, within that percentage of your overall capacity that is available for project work, your staff productively utilizes this time to successfully complete project tasks and how much of this time is lost within Info-Tech’s categories of resource waste.'

    Customize Info-Tech’s PPM Strategic Plan Template. Update slides 14 and 15, “Current State Resource Utilization” of your PPM Strategic Plan Template to include the resource utilization outputs from your PPM Current State Scorecard.

    Finalize section one of the PPM Strategic Plan Template and prepare to communicate your strategy

    Associated Activity icon 1.1.4 – 10 to 30 minutes

    INPUT: The previous activities from this step

    OUTPUT: An presentation communication your PPM strategy

    Materials: PPM Strategic Plan Template, section 1

    Participants: Portfolio manager (or equivalent)

    By now, you should be ready to complete section one of the PPM Strategic Plan Template.

    The purpose of this section of the Template is to capture the outputs of this step and use them to communicate the value of a top-down PPM strategy and to get buy-in for this strategy from senior management before you move forward to develop your PPM processes in the subsequent phases of this blueprint.

    • Within section one, update any of the text that is (in grey) to reflect the specifics of your organization – i.e. the name of your organization and department – and the specific outcomes of step 1.2 activities. In addition, replace the placeholders for a company logo with the logo of your company.
    • Replace the tool screenshots with the outputs from your version of the PPM High-Level Supply/Demand Calculator.
    • Proofread all of the text to ensure the content accurately reflects your outcomes. Edit the content as needed to more accurately reflect your outcomes.
    • Determine the audience for the presentation of your PPM strategy and make a logistical arrangement. Include PPM strategy sponsors, senior management from within IT and the business, and other important stakeholders.

    Get executive buy-in for your top-down PPM strategy

    Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are on board before preceding.

    You’re now ready to communicate your PPM strategy to your leadership team and other stakeholders.

    It is essential that you get preliminary buy-in for this strategy from the executive layer before you move forward to develop your PPM processes in the subsequent phases of this blueprint. Lack of executive engagement is one of the top barriers to PPM strategy success.

    • If you have gone through the preceding activities in this step, section one of your PPM Strategic Plan Template should now be ready to present.
    • As explained in 1.1.4, you should present this section to an audience of PPM strategy sponsors, C-suite executives, and other members of the senior management team.
    • Allow at least 60 minutes for the presentation – around 20 minutes to deliver the slide presentation and 40 minutes for discussion.
    • If you get sufficient buy-in by the end of the presentation, proceed to the next step of this blueprint. If buy-in is lacking, now might not be the right time for a top-down PPM strategy. Think about adopting a bottom-up approach until leadership is more engaged in the portfolio.

    "Gaining executive sponsorship early is key…It is important for the executives in your organization to understand that the PPM initiatives and the PMO organization are there to support (but never hinder) executive decision making." (KeyedIn Projects)

    Info-Tech Best Practice

    Engage(d) sponsorship. According to Prosci, the top factor in contributing to the success of a change initiative is active and visible executive sponsorship. Use this meeting to communicate to your sponsor(s) the importance of their involvement in championing the PPM strategy.

    A PPM strategic plan elevates PMO’s status to a business strategic partner

    CASE STUDY

    Industry: Public Administration
    Source: IAG / Info-Tech Interview

    Challenge

    The PMO operated in a way that is, in their self-assessment, reactive; project requests and capacity were not effectively managed. Perhaps due to this, the leadership team was not always visible, or regularly available, to PM leaders. This, in turn, complicated efforts to effectively manage their projects.

    Solution

    Establishing a simple prioritization methodology enabled the senior leadership to engage and effectively steer the project portfolio by strategic importance. The criteria and tool also gave the business units a clear understanding to promote the strategic value of each of their project requests.

    Results

    PM leaders now have the support and confidence of the senior leadership team to both proactively manage and deliver on strategic projects. This new prioritization model brought the PM Leader and senior leadership team in direct access with each other.

    "By implementing this new project intake and prioritization framework, we drastically improved our ability to predict, meet, and manage project requests and unit workload. We adopted a client-focused and client-centric approach that enabled all project participants to see their role and value in successful project delivery. We created methodologies that were easy to follow from the client participation perspective, but also as PM leaders, provided us with the metrics, planning, and proactive tools to meet and anticipate client project demand. The response from our clients was extremely positive, encouraging, and appreciative."

    Step 1.2: Translate PPM strategic expectations to process goals

    PHASE 1

    PHASE 2

    PHASE 3

    1.11.22.12.23.13.2
    Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

    This step will walk you through the following activities:

    • Determine process goals based upon your PPM strategy.
    • Set metrics and preliminary targets for your PPM processes.

    This step involves the following participants:

    • CIO
    • Steering Committee
    • Business Unit Leaders
    • PMO Director/Portfolio Manager

    Outcomes of this step

    • Stakeholder-prioritized PPM process goals
    • Metrics and targets for high-priority process goals

    Use the PPM strategy to set the direction for PPM processes that make up the infrastructure around projects

    PPM strategy enables you to answer any and all of these questions in a way that is consistent, cohesive, and aligned with one another.

    Info-Tech's PPM Process Model from earlier with notes overlaid asking a series of questions. The questions for '1. Intake, Approval, and Prioritization' are 'Who can request a project? How do you request a project? Who decides what to fund? What is the target investment mix? How will they decide?' The questions for '2. Resource Management' are 'Who assigns the resources? Who feeds the data on resources? How do we make sure it’s valid? How do we handle contingencies when projects are late, or if availability changes?' The questions for '3. Status and Progress Reporting' are 'What project information that should be reported? Who reports on project status? When? How?' The questions between 'Project Management' and '4. Project Closure' are 'Who declares that a project is done? Who validates it? Who is this reported to? Who terminates low-value projects? How will they decide?' The questions for '5. Benefits Tracking' are 'How do we validate the project benefits from the original business case? How do we track the benefits? Who reports it? When?'

    Set process goals to address PPM strategic expectations and steer the PPM strategic plan

    Associated Activity icon 1.2.1 – 2 hours

    INPUT: PPM strategy & expectations, Organizational strategy and culture

    OUTPUT: Prioritized list of strategy-aligned PPM process goals

    Materials: PPM Strategy-Process Translation Matrix

    Participants: CIO, Steering Committee, Business Unit Leaders, PMO Director/ Portfolio Manager

    This activity is designed for key departmental stakeholders to articulate how PPM processes should be developed or refined to meet the PPM strategic expectations.

    Participation of the key departmental stakeholders in this exercise is critical, e.g. CIO, Steering Committee, business unit leaders.

    Strategic Expectations x Processes = Process goals aligned to strategy
    Throughput Project Intake, Approval, & Prioritization
    Visibility Resource Management
    Responsiveness Status & Progress Reporting
    Resource Utilization Project Closure
    Benefits Benefits Realization

    Download Info-Tech’s PPM Strategy-Process Goals Translation Matrix Template.

    Use Info-Tech’s Translation Matrix to systematically articulate strategy-aligned PPM process goals

    Supporting Tool icon 1.2.1 – PPM Strategy-Process Translation Matrix, tab 2

    Formula: To answer “[question]” in a way that we can [strategic expectation], it will be important to [process goal].

    Example 1:
    To answer the question “who can request a project, and how?” in a way that we can maximize the throughput of the best projects, it will be important to standardize the project request process.

    Example 2:
    To answer the question “how will they decide what to fund?” in a way that we can maximize the throughput of the best projects, it will be important to reach a consensus on project prioritization criteria.

    Example 3:
    To answer the question “how will we track the projected benefits?” in a way that we can maximize the throughput of the best projects, it will be important to double-check the validity of benefits before projects are approved.

    Screenshot of Tab 2 in Info-Tech's PPM Strategy-Process Translation Matrix tool. There is a table with notes overlaid 'Enter the process goals in the appropriate question–strategic expectation slot' and 'Assign a priority, from the most important (1) to the least important (5)'.

    Set metrics and preliminary targets for your high-priority PPM process goals

    Associated Activity icon 1.2.2 – 1-2 hours

    INPUT: Prioritized list of strategy-aligned PPM process goals, Organizational strategy and culture

    OUTPUT: Metrics and targets for high-priority PPM process goals

    Materials: PPM Strategy-Process Translation Matrix

    Participants: CIO, Steering Committee, Business Unit Leaders, PMO Director/ Portfolio Manager

    Your highest-priority process goals and their corresponding strategy expectations are displayed in tab 3 of the PPM Strategy-Process Translation Matrix template (example below).

    Through a group discussion, document what will be measured to decide the achievement of each process goal, as well as your current estimate and the long-term target. If necessary, adjust the approximate target duration.

    Screenshot of Tab 3 in Info-Tech's PPM Strategy-Process Translation Matrix tool. There is a table with 6 columns 'PPM Process', 'High-priority Process Goals', 'Strategy Expectation', 'How will you measure success?', 'Current Estimate', and 'Long-Term Target'; they are referred to in notes as columns B through G respectively. Overlaid notes are 'Columns C and D will auto-populate based upon your inputs from tab 2. The five PPM process areas are arranged vertically in column B and your top-five process goals from each area appear in column C.' 'Use column E to brainstorm how you might measure the success of each process goal at your organization. These can be tentative for now and refined over time.' 'Determine current metrics for each process goals and long-term target metrics in columns F and G.'

    Project-client-centered approach to PPM process design improves client satisfaction and team confidence

    CASE STUDY

    Industry: Public Administration
    Source: IAG / Info-Tech Interview

    Challenge

    Reactive instead of proactive

    "We had no effective means of tracking project intake requests vs. capacity. We struggled using ad hoc processes and methods which worked to meet immediate needs, but we quickly realized that they were ineffective in tracking critical project metrics, key performance indicators (KPIs), or performance measures...In short, we were being reactive, instead of proactive."

    The result was a disorganized portfolio that led to low client satisfaction and team morale.

    Solution

    Examine processes “through the eyes of the client”

    With the guiding principle of “through the eyes of the client,” PPM processes and tools were developed to formalize project intake, prioritization, and capacity planning. All touchpoints between client and PPM processes were identified, and practices for managing client expectations were put in place. A client satisfaction survey was formulated as part of the post-project assessment and review.

    Results

    Client-centered processes improved client satisfaction and team confidence

    People, processes, and tools are now aligned to support client demand, manage client expectations, measure project KPIs, and perform post-project analysis. A standard for client satisfaction metrics was put in place. The overwhelmingly positive feedback has increased team confidence in their ability to deliver quality efforts.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Barry Cousins.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    Sample of activity 1.1.2 'Determine your actual resource capacity for projects'. Determine your actual resource capacity for projects

    Work with Info-Tech analysts to define your project vs. non-project ratio to help define how much of your overall resource capacity is actual available for projects.

    Sample of activity 1.2.1 'Set realistic PPM process goals'. Set realistic PPM process goals

    Leverage Info-Tech facilitators to help walk you through our PPM framework and define achievable process goals that are rooted in your current PPM maturity levels and organizational culture.

    Develop a Project Portfolio Management Strategy

    PHASE 2

    Align PPM Processes to Your Strategic Goals

    Phase 2 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Align PPM processes to your strategic goals

    Proposed Time to Completion: 2-4 weeks
    Step 2.1: Develop intake & resource mgmt. processes Step 2.2: Define reporting, closure, & benefits processes
    Work with an analyst to:
    • Assess your current intake, prioritization, and resource management processes and wireframe a sustainable target state for each capability.
    Work with an analyst to:
    • Analyze your current portfolio reporting, project closure, and benefits realization processes and wireframe a sustainable target state for each capability.
    Then complete these activities…
    • Set near-term and long-term goals.
    • Draft high-level steps within your target-state processes.
    • Document your process steps and roles and responsibilities.
    Then complete these activities…
    • Set near-term and long-term goals.
    • Draft high-level steps within your target-state processes.
    • Document your process steps and roles and responsibilities.
    With these tools & templates:
    • PPM Strategy Development Tool
    • PPM Strategic Plan Template
    With these tools & templates:
    • PPM Strategy Development Tool
    • PPM Strategic Plan Template

    Phase 2 Results & Insights

    • The means of project and portfolio management (i.e. processes) shouldn’t eclipse the ends – strategic goals. Root your process in your PPM strategic goals to realize PPM benefits (e.g. optimized portfolio value, improved project throughput, increased stakeholder satisfaction).

    Read first: Overview of the methodology for articulating new strategy-aligned PPM processes

    In the previous step of the blueprint, key department stakeholders established the PPM process goals, metrics, and targets in a way that aligns with the overall PPM strategy. In this phase, we draft a high-level description of the five PPM processes that reflect those goals using the following methodology:

    Methodology at a glance

    1. Articulate the current state of the process.
    2. Examine the process against the strategy-aligned goals.
    3. Create short- and long-term action items to refine the current process and meet the strategy-aligned targets.
    4. Develop a high-level target-state description of the PPM process.
    5. Estimate costs-in-use of the target-state process.

    Out-of-scope topics

    • Draft a detailed target-state description of the PPM process. Avoid falling into the “analysis paralysis” trap and keep the discussion focused on the overall PPM strategy.
    • PPM tools to support the process. This discussion will take place in the next phase of the blueprint.

    INPUT

    –›

    PROCESS

    –›

    OUTPUT

    • Strategy-aligned process goals, metrics, and targets (Activity 1.2.1)
    • Knowledge of current process
    • Knowledge of organizational culture and structure
    • Capability level assessment
    • Table-top design planning activity
    • Start-stop-continue retrospective
    • High-level description of the target state
    • PPM Strategy Development Tool
    • High-level descriptions of current and target states
    • Short- and long-term action items for improving the process
    • Cost-in-use of the current- and target-state processes

    Download Info-Tech’s PPM Strategy Development Tool

    Build a sound business case for implementing the new PPM strategy with realistic costs and benefits of managing your project portfolio.

    Time spent on managing the project portfolio is an investment. Like any other business endeavors, the benefits must outweigh the costs to be worth doing.

    As you draft a high-level description of the PPM processes in this phase of the blueprint, use Info-Tech’s PPM Strategy Development Tool to track the estimate the cost-in-use of the process. In the next phase, this information will be inform a cost-benefit analysis, which will be used to support your plan to implement the PPM strategy.

    Download Info-Tech’s PPM Strategy Development Tool.

    Screenshots of Info-Tech's PPM Strategy Development Tool including a Cost-Benefit Analysis with tables and graphs.

    Step 2.1: Develop and refine project intake, prioritization, and resource management processes

    PHASE 1

    PHASE 2

    PHASE 3

    1.11.22.12.23.13.2
    Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

    This step will walk you through the following activities:

    • Determine your process maturity.
    • Benchmark current processes against strategy-aligned goals.
    • Set near- and long-term action items.
    • Draft a high-level description of your target state.
    • Document your new processes.

    This step involves the following participants:

    • PMO Director/Portfolio Manager
    • Project Managers
    • Resource Managers
    • Business Analysts

    Outcomes of this step

    • A definition of current and target state maturity levels for intake, prioritization, and resource management
    • Near-term and long-term process goals for intake, prioritization, and resource management
    • A high-level wireframe for your intake, prioritization, and resource management process steps

    Project intake, prioritization, and approval: Get projects with the highest value done first

    Give your organization the voice to say “no” (or “not yet”) to new projects.

    Questions

    • Who can request a project?
    • How do you request a project?
    • Who decides what to fund?
    • What is the target investment mix?
    • How will they decide?

    Benefits

    • Maximize value of time spent on project work by aligning projects with priorities and stakeholder needs.
    • Finish the projects you start by improving alignment of intake and prioritization with resource capacity.
    • Improve stakeholder satisfaction by managing expectations with consistent, streamlined processes.

    Challenges

    • Stakeholders who benefit from political or ad hoc prioritization processes will resist or circumvent formal intake processes.
    • Many organizations lack sufficient awareness of resource capacity necessary to align intake with availability.

    A graph highlighting the sweet spot of project intake decision making. The vertical axis is 'Rigor and Effort' increasing upward, and the horizontal axis is 'Quality and Effectiveness of Decisions' increasing to the right. The trend line starts at 'Gut Feel' with low 'Rigor and Effort', and gradually curves upward to 'Analysis Paralysis' at the top. A note with an arrow pointing to a midway point in the line reads 'The sweet spot changes between situations and types of decisions'.

    Info-Tech Insight

    This process aims to control the project demand. A balance between rigor and flexibility is critical in order to avoid the “analysis paralysis” as much as the “gut feel” approach.

    Funnel project requests into a triage system for project intake

    Info-Tech recommends following a four-step process for managing project intake.

    1. Requestor fills out form and submits the request into the funnel.
    2. Requests are triaged into the proper queue.
      1. Divert non-project request.
      2. Quickly assess value and urgency.
      3. Assign specialist to follow up on request.
      4. Inform the requestor.
    3. Business analyst starts to gather preliminary requirements.
      1. Follow up with sponsors to validate and define scope.
      2. Estimate size and determine project management rigor required.
      3. Start to develop an initial business case.
    4. Requestor is given realistic expectations for approval process.

    Info-Tech Best Practice

    An excess number of intake channels is the tell-tale sign of a project portfolio in distress. The PMO needs to exercise and enforce discipline on stakeholders. PMO should demand proper documentation and diligence from stakeholders before proceeding with requests.

    Maintain reliable resourcing data with a recurrent project intake, prioritization, and approval practice

    Info-Tech recommends following a five-step process for managing project intake, prioritization, and approval.

    A diagram of Info-Tech's five-step process for managing project intake. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Business Analysts', 'PMO', and 'Governance Layer'. The first step is 'Collect project requests' which involves 'Resources'. Step 2 is 'Screen project requests' which involves 'Business Analysts' and 'PMO'. A part of the step that may be applicable to some organizations is 'Concept approval' involving 'Governance Layer'. Step 3 is 'Develop business case' which involves 'Business Analysts' and 'PMO'. A part of the step that may be applicable to some organizations is 'Get a project sponsor' involving 'Governance Layer'. Step 4 is 'Prioritize project' which involves 'Business Analysts' and 'PMO'. Step 5 is 'Approve (greenlight) project' which involves 'Business Analysts', 'PMO', and 'Governance Layer', with an attached note that reads 'Ensure that up-to-date project portfolio information is available (project status, resource forecast, etc.)'. All of these steps lead to 'Initiate project, commit resources, etc.'

    Info-Tech Insight

    “Approval” can be a dangerous word in project and portfolio management. Use it carefully. Clarify precisely what is being “approved” at each step in the process, what is required to pass each gate, and how long the process will take.

    Determine your project intake, prioritization, and approval process maturity

    Associated Activity icon 2.1.1a – 10 minutes

    INPUT: Organizational strategy and culture

    OUTPUT: Project intake, prioritization, and approval capability level

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Kick-off the discussion about the project intake, prioritization, and approval process by reading the capability level descriptions below and discussing which level currently applies to you the most.

    Capability Level Descriptions

    Capability Level 5: Optimized We have effective intake processes with right-sized administrative overhead. Work is continuously prioritized to keep up with emerging challenges and opportunities.
    Capability Level 4: Aligned We have very strong intake processes. Project approvals are based on business cases and aligned with future resource capacity.
    Capability Level 3: Engaged Processes are in place to track project requests and follow up on them. Priorities are periodically re-evaluated, based largely on the best judgment of one or several executives.
    Capability Level 2: Defined Some processes are in place, but there is no capacity to say no to new projects. There is a backlog, but little or no method for grooming it.
    Capability Level 1: Unmanaged Our organization has no formal intake processes in place. Most work is done reactively, with little ability to prioritize project work proactively.

    Benchmark the current project intake, prioritization, and approval process against strategy-aligned goals

    Associated Activity icon 2.1.1b – 1-2 hours

    INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

    OUTPUT: Retrospective review of current process

    Materials: 4x6” recipe cards, Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Conduct a table-top planning exercise to map out the process currently in place.

    1. Use white 4”x6” recipe cards to write unique steps of a process. Use the intake, prioritization, and approval process from the previous slides as a guide.
    2. Use green cards to write artifacts or deliverables that result from a step.
    3. Use pink cards to write issues, problems, or risks.
    4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
    Start Stop Continue
    • Simplify business cases
    • Send emails to requestor to manage expectations
    • Accept verbal project requests
    • Approve “pet projects”
    • Monthly prioritization meetings
    • Evaluate prioritization criteria

    Set near- and long-term action items for the project intake, prioritization, and approval process

    Associated Activity icon 2.1.1c – 30 minutes - 1 hour

    INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

    OUTPUT: Action items for evolving the process to a target state

    Materials: Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

    The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
    Near-Term Action Items Long-Term Action Items
    For example:
    • Limit the number of channels available to request new projects.
    • Revise the intake form.
    • Establish a regular triage process.
    For example:
    • Establish a comprehensive scorecard and business case scoring process at the steering committee level.
    • Limit the rate of approval to be aligned with resource capacity.

    Review and customize slide 23, “Project intake, prioritization, and approval: action items,” in Info-Tech’s PPM Strategic Plan Template.

    Draft a high-level description of the intake, prioritization, and approval process at a target state

    Associated Activity icon 2.1.1d – 1-2 hours

    INPUT: Action items for evolving the process to a target state

    OUTPUT: High-level description of the process at the target state

    Materials: Whiteboard, PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
    2. An example of high-level breakdown: project intake, prioritization, and approval
      Collect project requests –› Screen requests –› Develop business case –› Prioritize project –› Approve project

    3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
    4. Question

      Description

      Input What information do you need to perform the work?
      Output What artifacts/deliverables are produced as a result?
      Frequency/Timing How often, and when, will the work be performed?
      Responsibility Who will perform the work?
      Accountability Who will approve the work and assume the ownership of any decisions?

    5. Record the time cost of each process using the PPM Strategy Development Tool; see next slide for instructions.

    Use the PPM Strategy Development Tool to track the time cost of the process

    Supporting Tool icon 2.1.1 – PPM Strategy Development Tool, Tab 3: Costing Assumptions

    Record the time cost of each high-level process task from Activity 2.1.1d.

    Screenshot of tab 3 from Info-Tech's PPM Strategy Development Tool with notes overlaid. Columns are 'ID', 'Task Description', 'Who does the task?', a super-column titled 'Current State' which includes 'How many times per year?', 'How many people?', and 'For how long?', a super-column titled 'Near-Term Target State' with the same three sub columns, and a super-column titled 'Long-Term Target State' with the same three sub columns. Notes for 'Who does the task?' read 'Choose executive, management or resource' and 'If task is done by more than one party, duplicate the task'. Notes for the 3 recurring sub columns are 'Estimate how many times in a year the task is performed (e.g. 120 project requests per year)', 'Indicate the number of people needed to perform the task each time', 'Estimate the average work-hours for the task… either in minutes or in hours', 'If a task is not applicable to a state (e.g. currently PMO does not screen project requests), leave the row blank', and 'For meetings, remember to indicate the number of people'.

    Document the high-level description for the new intake, prioritization, and approval process

    Associated Activity icon 2.1.1e – 30 minutes - 1 hour

    INPUT: High-level description of the process at the target state

    OUTPUT: Updated PPM strategic plan

    Materials: Whiteboard, PPM Strategic Plan Template

    Participants: PMO Director/ Portfolio Manager

    Update your PPM strategic plan with the new high-level description for the new project intake, prioritization, and approval process. Depending on your current process capability level, you may wish to include additional information on your strategic document, for example:

    • Updated prioritization scorecard.
    • Roles and responsibility matrix, identifying consulted and informed parties.

    Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

    Read Info-Tech’s Optimize Project Intake, Prioritization, and Approval blueprint.

    Review and customize slide 24, “Project intake, prioritization, and approval: target state,” in Info-Tech’s PPM Strategic Plan Template.

    Clarity in project prioritization process leads to enterprise-wide buy-in

    CASE STUDY

    Industry: Public Administration
    Source: IAG / Info-Tech Interview

    Challenge

    "Our challenge from the start was to better understand the strategic perspective and priorities of our client departments.

    In addition, much of the work requested was not aligned to corporate goals and efforts, and seemed to be contradictory, redundant, and lacking strategic focus."

    Complicating this challenge was the fact that work requests were being received via all means of communication, which made the monitoring and controlling of requests more difficult.

    Solution

    Client departments were consulted to improve the understanding of their strategic goals and priorities. Based on the consultation:

    • A new, enterprise-wide project prioritization criteria was developed.
    • Priority of project requests from all business areas are evaluated on a quarterly basis.
    • A prioritized list of projects are made available to the senior leadership team.

    Results

    "By creating and implementing a tool for departments to prioritize strategic efforts, we helped them consider the important overall project criteria and measure them uniformly, across all anticipated projects. This set a standard of assessment, prioritization, and ranking, which helped departments clearly see which efforts were supportive and matched their strategic goals."

    Resource management process ensures that projects get the resources they need

    Reclaim project capacity: properly allocate project work and establish more stable project timelines.

    Questions

    • Who assigns the resources?
    • Who feeds the data on resources?
    • How do we make sure it’s valid?
    • How do we handle contingencies when projects are late, or if availability changes?

    Benefits

    • Ensure that approved projects can be completed by aligning intake with real project capacity.
    • Reduce over-allocation of resources by allocating based on their proportion of project vs. non-project work.
    • Forecast future resource requirements by maintaining accurate resource capacity data.

    Challenges

    • Time tracking can be difficult when project workers balance project work with “keep the lights on” activities and other administrative work.
    • Continuous partial attention, interruptions, and distractions are a part of today’s reality that makes it very difficult to maximize productivity.
    A see-saw balancing 'Resource availability' on one side and 'Ongoing projects, Operational work, Administrative work, and Resource absence' on the other side.

    Maintain reliable resourcing data with a recurrent resource management practice

    Info-Tech recommends following a five-step process for resource management.

    A diagram of Info-Tech's five-step process for resource management. There are five groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Resource Managers', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Collect resource availability' which involves 'Resources' and 'Resource Managers'. Step 2 is 'Collect resource demand' which involves 'Resource Managers', 'Project Managers' and 'PMO'. Step 3 is 'Identify need for reconciliation' which involves 'PMO'. Step 4 is 'Resolve conflicts and smoothen resource allocations' which involves 'Resource Managers', 'Project Managers' and 'PMO'. Step 5 is 'Report resource allocations and forecast' which involves all groups, with an attached note that reads 'Ensure that up-to-date information is available for project approval, portfolio reporting, closure, etc.'

    Info-Tech Insight

    This process aims to control the resource supply to meet the demand – project and non-project alike. Coordinate this process with the intake, approval, and prioritization process.

    Determine your resource management process capability level

    Associated Activity icon 2.1.2a – 10 minutes

    INPUT: Organizational strategy and culture

    OUTPUT: Resource management capability level

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Kick-off the discussion about the resource management process by reading the capability level descriptions below and discussing which level currently applies to you the most.

    Capability Level Descriptions

    Capability Level 5: OptimizedOur organization has an accurate picture of project versus non-project work loads and allocates resources accordingly. We periodically reclaim lost capacity through organizational and behavioral change.
    Capability Level 4: AlignedWe have an accurate picture of how much time is spent on project versus non-project work. We allocate resources to these projects accordingly. We are checking in on project progress bi-weekly.
    Capability Level 3: PixelatedWe are allocating resources to projects and tracking progress monthly. We have a rough estimate of how much time is spent on project versus non-project work.
    Capability Level 2: OpaqueWe match resources teams to projects and check in annually, but we do not forecast future resource needs or track project versus non-project work.
    Capability Level 1: UnmanagedOur organization expects projects to be finished, but there is no process in place for allocating resources or tracking project progress.

    Benchmark the current resource management process against strategy-aligned goals

    Associated Activity icon 2.1.2b – 1-2 hours

    INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

    OUTPUT: Retrospective review of current process

    Materials: 4x6” recipe cards, Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Conduct a table-top planning exercise to map out the process currently in place.

    1. Use white 4”x6” recipe cards to write unique steps of a process. Use the resource management process from the previous slides as a guide.
    2. Use green cards to write artifacts or deliverables that result from a step.
    3. Use pink cards to write issues, problems, or risks.
    4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
    Start Stop Continue
    • Collect project actuals
    • Make enhancements to the PPM tool in use
    • Over allocating resources
    • “Around the room” reporting at monthly meeting
    • Send project updates before resource management meetings

    Set near- and long-term action items for the resource management process

    Associated Activity icon 2.1.2c – 30 minutes - 1 hour

    INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

    OUTPUT: Action items for evolving the process to a target state

    Materials: Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

    The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
    Near-Term Action Items Long-Term Action Items
    For example:
    • Determine the percentage of project vs. non-project work through implementation of a weekly survey.
    For example:
    • Reduce resource waste to 6%.
    • Forecast resource requirements monthly.
    • Implement a mid-market PPM tool.

    Review and customize slide 26, “Resource management: action items,” in Info-Tech’s PPM Strategic Plan Template.

    Draft a high-level description of the resource management process at a target state

    Associated Activity icon 2.1.2d – 1-2 hours

    INPUT: Action items for evolving the process to a target state

    OUTPUT: High-level description of the process at the target state

    Materials: Whiteboard, PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
    2. An example of high-level breakdown: resource management
      Collect resource availability –› Collect resource demand –› Identify need for reconciliation –› Resolve conflicts and over-allocation –› Update resource forecast


    3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
    4. Question

      Description

      Input What information do you need to perform the work?
      Output What artifacts/deliverables are produced as a result?
      Frequency/Timing How often, and when, will the work be performed?
      Responsibility Who will perform the work?
      Accountability Who will approve the work and assume the ownership of any decisions?


    5. Record the time cost of each process using the PPM Strategy Development Tool.

    Document the high-level description for the new resource management process

    Associated Activity icon 2.1.2e – 30 minutes - 1 hour

    INPUT: High-level description of the process at the target state

    OUTPUT: Updated PPM strategic plan

    Materials: PPM Strategic Plan Template

    Participants: PMO Director/ Portfolio Manager

    Update your PPM strategic plan with the new high-level description for the new resource management process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

    • Resource management meeting agenda template
    • Roles and responsibility matrix, identifying consulted and informed parties

    Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

    Read Info-Tech’s Develop a Resource Management for the New Reality blueprint.

    Review and customize slide 27, “Resource management: target state,” in Info-Tech’s PPM Strategic Plan Template.

    Step 2.2: Develop and refine portfolio reporting, project closure, and benefits realization processes

    PHASE 1

    PHASE 2

    PHASE 3

    1.11.22.12.23.13.2
    Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

    This step will walk you through the following activities:

    • Determine your process maturity.
    • Benchmark current processes against strategy-aligned goals.
    • Set near- and long-term action items.
    • Draft a high-level description of your target state.
    • Document your new processes.

    This step involves the following participants:

    • PMO Director/Portfolio Manager
    • Project Managers
    • Business Analysts

    Outcomes of this step

    • A definition of current and target state maturity levels for portfolio reporting, project closure, and benefits realization
    • Near-term and long-term process goals for portfolio reporting, project closure, and benefits realization
    • A high-level wireframe for your portfolio reporting, project closure, and benefits realization process steps

    Portfolio reporting process makes trustworthy data accessible for informing decisions

    Giving stakeholders the ability to make informed decisions is the most important function of managing the project portfolio.

    Questions

    • What project information should be reported?
    • Who reports on project status?
    • When and how do we report on the status of the project portfolio?

    Benefits

    • Reporting is the linchpin of any successful PPM strategy.
    • Timely and accurate status reports enable decision makers to address issues risks and issues before they create bigger problems.
    • Executive visibility can be achieved with or without a commercial tool using spreadsheets, a content management system such as SharePoint, or a combination of tools you already have.

    Challenges

    • Trying to increase detailed visibility too fast leads to difficulty gathering and maintaining data. As a result, reporting is rarely accurate and people quickly lose trust in the portfolio.
    • If you are planning to adopt a commercial tool, Info-Tech strongly recommends validating your organization’s ability to maintain a consistent reporting process using simple tools before investing in a more sophisticated system.

    Info-Tech Insight

    If you can only do one thing, establish frequently current reporting on project status. Reporting doesn’t have to be detailed or precise, as long as it’s accurate.

    Maintain reliable portfolio status data with a recurrent status and progress reporting practice

    Info-Tech recommends following a four-step process for portfolio status and progress reporting.

    A diagram of Info-Tech's four-step process for portfolio status and progress reporting. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Create project status reports' which involves 'Resources' and 'Project Managers'. Step 2 is 'Create a project portfolio status report' which involves 'Project Managers' and 'PMO', with a note that reads 'Ensure that up-to-date information is available for project approval, resource management, closure, etc.' Step 3 is 'Report on project portfolio status' which involves 'PMO' and 'Governance layer'. Step 4 is 'Act on portfolio steering decisions' which involves 'Resources', 'Project Managers' and 'PMO'.

    Start by establishing a regular reporting cadence with lightweight project status KPIs:

    Red Issue or risk that requires intervention For projects that are red or yellow, high-level status reports should be elaborated on with additional comments on budget, estimated hours/days until completion, etc.
    Yellow Issue or risk that stakeholders should be aware of
    Green No significant risks or issues

    Determine your resource management process capability level

    Associated Activity icon 2.2.1a – 10 minutes

    INPUT: Organizational strategy and culture

    OUTPUT: Portfolio reporting capability level

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers

    Kick-off the discussion about the portfolio reporting process by reading the capability level descriptions below and discussing which level currently applies to you the most.

    Capability Level Descriptions

    Capability Level 5: OptimizedWith the right tools, we can ensure that all projects are planned and maintained at a detailed task level with high-quality estimates, and that actual task progress is updated at least weekly.
    Capability Level 4: AlignedWe have the skills, knowledge, and resources needed to prepare a detailed cost-benefit analysis for all proposed projects. We track the progress throughout project execution.
    Capability Level 3: InterventionWith the right tools, we can ensure that project issues and risks are identified and addressed on a regular basis (e.g. at least monthly) for all projects.
    Capability Level 2: OversightWith the right tools, we can ensure that project status updates are revised on a regular basis (e.g. at least monthly) for all ongoing projects.
    Capability Level 1: ReactiveProject managers escalate issues directly with their direct supervisor or project sponsor because there is no formal PPM practice.

    Benchmark the current portfolio reporting process against strategy-aligned goals

    Associated Activity icon 2.2.1b – 1-2 hours

    INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

    OUTPUT: Retrospective review of current process

    Materials: 4x6” recipe cards, Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers

    Conduct a table-top planning exercise to map out the process currently in place.

    1. Use white 4”x6” recipe cards to write unique steps of a process. Use the portfolio reporting process from the previous slides as a guide.
    2. Use green cards to write artifacts or deliverables that result from a step.
    3. Use pink cards to write issues, problems, or risks.
    4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
    Start Stop Continue
    • Report on lightweight KPIs
    • Standardize the status reports
    • Project managers waiting too long before declaring a red status
    • Produce weekly project portfolio-wide report for senior leadership

    Set near- and long-term action items for the portfolio reporting process

    Associated Activity icon 2.2.1c – 30 minutes - 1 hour

    INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

    OUTPUT: Action items for evolving the process to a target state

    Materials: Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers

    Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

    The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
    Near-Term Action Items Long-Term Action Items
    For example:
    • Establish a reporting process that can be consistently maintained using lightweight KPIs.
    • Provide a simple dashboard that stakeholders can use to see their project status reports at a high level.
    For example:
    • Adopt a commercial tool for maintaining consistent status reports.
    • Support the tool with training and a mandate of adoption among all users.

    Review and customize slide 29, “Portfolio reporting: action items,” in Info-Tech’s PPM Strategic Plan Template.

    Draft a high-level description of the portfolio reporting process at a target state

    Associated Activity icon 2.2.1d – 1-2 hours

    INPUT: Action items for evolving the process to a target state

    OUTPUT: High-level description of the process at the target state

    Materials: Whiteboard, PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers

    1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
    2. An example of high-level breakdown: portfolio reporting
      Create project status reports –› Create a project portfolio status report –› Report on project portfolio status –› Act on portfolio steering decisions


    3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
    4. Question

      Description

      InputWhat information do you need to perform the work?
      OutputWhat artifacts/deliverables are produced as a result?
      Frequency/TimingHow often, and when, will the work be performed?
      ResponsibilityWho will perform the work?
      AccountabilityWho will approve the work and assume the ownership of any decisions?

    5. Record the time cost of each process using the PPM Strategy Development Tool.

    Document the high-level description for the new portfolio reporting process

    Associated Activity icon 2.2.1e – 30 minutes - 1 hour

    INPUT: High-level description of the process at the target state

    OUTPUT: Updated PPM strategic plan

    Materials: PPM Strategic Plan Template

    Participants: PMO Director/ Portfolio Manager

    Update your PPM strategic plan with the new high-level description for the new portfolio reporting process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

    • Updated project status report template with new KPIs.
    • Documentation of requirements for improved PPM dashboards and reports.

    Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

    Read Info-Tech’s Enhance PPM Dashboards and Reports blueprint.

    Review and customize slide 30, “Portfolio reporting: target state,” in Info-Tech’s PPM Strategic Plan Template.

    Streamlined status reporting improves portfolio visibility for executives, enabling data-driven steering of the portfolio

    CASE STUDY

    Industry: Public Administration
    Source: IAG / Info-Tech Interview

    Challenge

    The client had no effective real-time reporting in place to summarize their work efforts. In addition, the client struggled with managing existing resources against the ability to deliver on the requested project workload.

    Existing project reporting processes were manually intensive and lacked mature reporting capabilities.

    Solution

    Through a short and effective engagement, IAG conducted surveys and facilitated interviews to identify the information needed by each stakeholder. From this analysis and industry best practices, IAG developed scorecards, dashboards, and project summary reports tailored to the needs of each stakeholder group. This integrated reporting tool was then made available on a central portal for PPM stakeholders.

    Results

    Stakeholders can access project scorecard and dashboard reports that are available at any given time.

    Resource reporting enabled the PMO to better balance client demand with available project capacity and forecast any upcoming deficiencies in resourcing that affect project delivery.

    Project closure at the portfolio level controls throughput and responsiveness of the portfolio

    Take control over projects that linger on, projects that don’t provide value, and projects that do not align with changing organizational priority.

    Questions

    • Who declares that a project is done?
    • Who validates it?
    • Who is this reported to?
    • Who terminates low-value projects?
    • How will they decide that a project is too low value to continue?

    Benefits

    • Minimize post-implementation problems by ensuring clean handoffs, with clear responsibilities for ongoing support and maintenance.
    • Drive continuous improvement by capturing and applying lessons learned.
    • Increase the project portfolio’s responsiveness to change by responding to emerging opportunities and challenges.

    Challenges

    • Completion criteria and “definition of done” need to be well defined and done so at project initiation.
    • Scope changes need to be managed and documented throughout the project.
    • Portfolio responsiveness requires deep cultural changes that will be met with confusion and resistance from some stakeholders.

    Info-Tech Insight

    Although “change in organizational priority” is the most frequently cited cause of project failure (PMI Pulse of Profession, 2017), closing projects that don’t align with organizational priority ought to be a key PPM goal. Therefore, don’t think of it as project failure; instead, think of it as PPM success.

    Maintain the health of the project portfolio with a repeatable project closure process

    Info-Tech recommends following a four-step process for project closure.

    A diagram of Info-Tech's four-step process for project closure. There are five groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Resource Managers', 'Project Managers', 'PMO', and 'Governance Layer'. The first steps are 'Complete project' which involves 'Project Managers', and 'Terminate low value projects' which involves 'PMO' and 'Governance layer'. Step 2 is 'Validate project closure' which involves 'Project Managers' and 'PMO', with a note that reads 'This includes facilitating the project sponsor sign-off, accepting and archiving lessons learned documents, etc.' The third steps are 'Conduct post-project work' which involves 'Project Managers' and 'PMO', and 'Update resource availability' which includes 'Resource Managers'. Step 4 is 'Conduct post-implementation review' which involves all groups.

    Info-Tech Best Practice

    Post-implementation review checks which benefits (including those set out in the business case) have been achieved and identifies opportunities for further improvement. Without it, it can be difficult to demonstrate that investment in a project was worthwhile.

    Determine your project closure process capability level

    Associated Activity icon 2.2.2a – 10 minutes

    INPUT: Organizational strategy and culture

    OUTPUT: Project closure capability level

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Business Analysts

    Kick-off the discussion about the project closure process by reading the capability level descriptions below and discussing which level currently applies to you the most.

    Capability Level Descriptions

    Capability Level 5: OptimizedProject closure is centrally managed and supports post-project benefits tracking.
    Capability Level 4: AlignedProject closure is centrally managed at the portfolio level to ensure completion/acceptance criteria are satisfied.
    Capability Level 3: EngagedProject closure is confirmed at the portfolio level, but with minimal enforcement of satisfaction of completion/acceptance criteria.
    Capability Level 2: EncouragedProject managers often follow handoff and closure procedures, but project closure is not confirmed or governed at the portfolio level.
    Capability Level 1: UnmanagedProject closure is not governed at either the project or portfolio level.

    Benchmark the current project closure process against strategy-aligned goals

    Associated Activity icon 2.2.2b – 1-2 hours

    INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

    OUTPUT: Retrospective review of current process

    Materials: 4x6” recipe cards, Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Business Analysts

    Conduct a table-top planning exercise to map out the process currently in place.

    1. Use white 4”x6” recipe cards to write unique steps of a process. Use the project closure process from the previous slides as a guide.
    2. Use green cards to write artifacts or deliverables that result from a step.
    3. Use pink cards to write issues, problems, or risks.
    4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
    Start Stop Continue
    • Conduct reprioritization of projects at a regular cadence
    • Prune projects every year
    • Waive post-implementation review for time-constrained projects
    • Collect project post-mortem reports and curate in PMO SharePoint

    Set near- and long-term action items for the project closure process

    Associated Activity icon 2.2.2c – 30 minutes - 1 hour

    INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

    OUTPUT: Action items for evolving the process to a target state

    Materials: Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

    The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
    Near-Term Action Items Long-Term Action Items
    For example:
    • Begin establishing project closure criteria in the project initiation process.
    • Manage and document scope changes throughout the project.
    For example:
    • Institute a formal process to ensure that all projects are closed at the portfolio level and properly handed off to support and maintenance teams.

    Review and customize slide 32, “Project closure: action items,” in Info-Tech’s PPM Strategic Plan Template.

    Draft a high-level description of the project closure process at a target state

    Associated Activity icon 2.2.2d – 1-2 hours

    INPUT: Action items for evolving the process to a target state

    OUTPUT: High-level description of the process at the target state

    Materials: Whiteboard, PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
    2. An example of high-level breakdown: project closure
      Complete or terminate projects –› Validate project closure –› Conduct post-project work –› Conduct post-implementation review


    3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
    4. Question

      Description

      Input What information do you need to perform the work?
      Output What artifacts/deliverables are produced as a result?
      Frequency/Timing How often, and when, will the work be performed?
      Responsibility Who will perform the work?
      Accountability Who will approve the work and assume the ownership of any decisions?


    5. Record the time cost of each process using the PPM Strategy Development Tool.

    Document the high-level description for the new project closure process

    Associated Activity icon 2.2.2e – 30 minutes - 1 hour

    INPUT: High-level description of the process at the target state

    OUTPUT: Updated PPM strategic plan

    Materials: PPM Strategic Plan Template

    Participants: PMO Director/ Portfolio Manager

    Update your PPM strategic plan with the new high-level description for the new project closure process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

    • Updated project closure checklist.
    • Project value review meeting process document.
    • Post-implementation review process document.

    Info-Tech has several research notes that elaborate on aspects of project closure. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

    Read Info-Tech’s research notes on project closure:

    • The Importance of Conducting a Post Implementation Review
    • Five Key Steps to Mastering Project Closure
    • ‘Governance’ Will Kill Your Projects

    Review and customize slide 33, “Project closure: target state,” in Info-Tech’s PPM Strategic Plan Template.

    Validate the time and effort spent on projects with a benefits realization process

    Maximizing benefits from projects is the primary goal of PPM. Tracking and reporting on benefits post-project closes the loop on benefits.

    Questions

    • How do validate the project benefits from the original business case?
    • How do we track the benefits?
    • Who reports it? When?

    Benefits

    • Maximize benefits realization by identifying and addressing unforeseen issues or limitations to success.
    • Improve project approval and prioritization by improving validity of the business case definition process.

    Challenges

    • Project sponsors need to be willing to invest time – months and years post-project completion – to validate benefits realization.
    • Portfolio management needs to proactively work with sponsors to facilitate benefits tracking.
    • Business cases need to be well developed and documented to reflect real anticipated benefits.

    Too many projects fail to achieve the originally proposed benefits, and too few organizations are able to identify and address the root causes of those shortfalls.

    Info-Tech Insight

    In reality, benefits realization process extends across the entire project life cycle: during intake, during the execution of the project, and after project completion. Be mindful of this extended scope when you discuss benefits realization in the following activity.

    Keep project benefits front and center with a repeatable benefits realization process

    Info-Tech recommends following a four-step process for benefits realization.

    A diagram of Info-Tech's four-step process for benefits realization. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Business Analysts', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Quantify and validate benefits in business case' which happens 'Before Project' and involves 'Business Analysts' and 'Project Managers'. Step 2 is 'Update projected project benefits' which happens 'During Project' and involves 'Project Managers' and 'PMO'. Step 3 is 'Hand-off benefits realization ownership' which happens at the end of project and involves 'Project Managers', 'PMO' and 'Governance layer'. Step 4 is 'Monitor and report on benefits' which happens 'After Project' and involves 'PMO' and 'Governance layer'.

    Info-Tech Insight

    At the heart of benefits realization is accountability: who is held accountable for projects that don’t realize the benefits and how? Without the buy-in from the entire executive layer team, addressing this issue is very difficult.

    Determine your benefits realization process capability level

    Associated Activity icon 2.2.3a – 10 minutes

    INPUT: Organizational strategy and culture

    OUTPUT: benefits realization capability level

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Kick-off the discussion about the benefits realization process by reading the capability level descriptions below and discussing which level currently applies to you the most.

    Capability Level Descriptions

    Capability Level 5: OptimizedProject sponsors and key stakeholders are accountable for stated project benefits before, during and after the project. There is a process to maximize the realization of project benefits.
    Capability Level 4: AlignedProject benefits are forecasted and taken into account for approval, updated when changes are made to the project, and monitored/reported after projects are completed.
    Capability Level 3: EngagedProject benefits are forecasted and taken into account for approval, and there is a loosely defined process to report on benefits realization.
    Capability Level 2: DefinedProject benefits are forecasted and taken into account for approval, but there is no process to monitor whether the said benefits are realized.
    Capability Level 1: UnmanagedProjects are approved and initiated without discussing benefits.

    Benchmark the current benefits realization process against strategy-aligned goals

    Associated Activity icon 2.2.3b – 1-2 hours

    INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

    OUTPUT: Retrospective review of current process

    Materials: 4x6” recipe cards, Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Conduct a table-top planning exercise to map out the process currently in place.

    1. Use white 4”x6” recipe cards to write unique steps of a process. Use the benefits realization process from the previous slides as a guide.
    2. Use green cards to write artifacts or deliverables that result from a step.
    3. Use pink cards to write issues, problems, or risks.
    4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
    StartStopContinue
    • Require “hard monetary value” in business benefits
    • Send project updates before resource management meetings

    Set near- and long-term action items for the benefits realization process

    Associated Activity icon 2.2.3c – 30 minutes - 1 hour

    INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

    OUTPUT: Action items for evolving the process to a target state

    Materials: Whiteboard

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

    The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
    Near-Term Action Items Long-Term Action Items
    For example:
    • Create an “orientation for project sponsors” document.
    • Encourage project managers to re-validate project benefits on an ongoing basis and report any deviation.
    For example:
    • Recruit the finance department’s help in benefits tracking.
    • Require Finance’s sign-off on project benefits in business cases during intake.

    Review and customize slide 35, “Benefits realization: action items,” in Info-Tech’s PPM Strategic Plan Template.

    Draft a high-level description of the benefits realization process at a target state

    Associated Activity icon 2.2.3d – 1-2 hours

    INPUT: Action items for evolving the process to a target state

    OUTPUT: High-level description of the process at the target state

    Materials: Whiteboard, PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
    2. An example of high-level breakdown: benefits realization
      Validate benefits in business case –› Update project benefits during execution –› Hand-off benefits ownership –› Monitor and report on benefits


    3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
    4. Question

      Description

      InputWhat information do you need to perform the work?
      OutputWhat artifacts/deliverables are produced as a result?
      Frequency/TimingHow often, and when, will the work be performed?
      ResponsibilityWho will perform the work?
      AccountabilityWho will approve the work and assume the ownership of any decisions?

    5. Record the time cost of each process using the PPM Strategy Development Tool.

    Document the high-level description for the new benefits realization process

    Associated Activity icon 2.2.3e – 30 minutes - 1 hour

    INPUT: High-level description of the process at the target state

    OUTPUT: Updated PPM strategic plan

    Materials: PPM Strategic Plan Template

    Participants: PMO Director/ Portfolio Manager

    Update your PPM strategic plan with the new high-level description for the new benefits realization process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

    • Updated business plan templates.
    • Communication plan for project sponsors.

    Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

    Read Info-Tech’s Establish the Benefits Realization Process blueprint.

    Review and customize slide 36, “Benefits realization: target state,” in Info-Tech’s PPM Strategic Plan Template.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Barry Cousins.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    Sample of activity 2.1.1 'Align your project intake, prioritization, and approval process to the PPM strategy'. Align your project intake, prioritization, and approval process to the PPM strategy

    Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

    Sample of activity 2.1.2 'Align your resource management process to the PPM strategy'. Align your resource management process to the PPM strategy

    Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Sample of activity 2.2.1 'Align your portfolio reporting process to the PPM strategy'.Align your portfolio reporting process to the PPM strategy

    Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

    Sample of activity 2.2.2 'Align your project closure process to the PPM strategy'.Align your project closure process to the PPM strategy

    Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

    Sample of activity 2.2.3 'Align your benefits realization process to the PPM strategy'.Align your benefits realization process to the PPM strategy

    Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

    Develop a Project Portfolio Management Strategy

    PHASE 3

    Complete Your PPM Strategic Plan

    Phase 2 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Complete your PPM strategic plan

    Proposed Time to Completion: 2 weeks
    Step 3.1: Select a right-sized PPM solutionStep 3.2: Finalize your PPM Strategic Plan Template
    Work with an analyst to:
    • Assess your PPM tool requirements to help support your processes.
    Review findings with analyst:
    • Determine the costs and potential benefits of your PPM strategy.
    Then complete these activities…
    • Determine the functionality requirements of the PPM solution.
    • Estimate your PPM tool budget.
    • Review the tool assessment.
    Then complete these activities…
    • Estimate the total cost-in-use of managing the project portfolio.
    • Estimate the benefits of the PPM strategy.
    • Refine and consolidate the near-term action items into a cohesive implementation plan.
    With these tools & templates:
    • PPM Strategy Development Tool
    With these tools & templates:
    • PPM Strategy Development Tool
    • PPM Strategic Plan Template

    Phase 3 Insight:

    • Approach PPM as an evolving discipline that requires adaptability and long-term organizational change. Near-term process improvements should create stakeholder desire for better portfolio visibility and agility over the long term.

    Step 3.1: Select a right-sized PPM solution for supporting your new processes

    PHASE 1

    PHASE 2

    PHASE 3

    1.11.22.12.23.13.2
    Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

    This step will walk you through the following activities:

    • Determine the functionality requirements of a PPM solution in the near and long terms.
    • Estimate your PPM tool budget.
    • Review tool assessment.

    This step involves the following participants:

    • CIO
    • PMO Director/ Portfolio Manager
    • Project Managers
    • IT Managers

    Outcomes of this step

    • List of functional requirements for a PPM solution
    • An estimate budget and cost for supporting a PPM tool in the near and long terms
    • PPM tool requirements for the near and long terms

    Right-size your PPM solution/tool to fit your PPM processes

    Avoid a common pitfall: the disconnect between PPM processes and PPM tools.

    PPM tools act as both a receptacle for portfolio data generated by your processes and a source of portfolio data to drive your processes forward. Therefore, choosing a suitable PPM tool is critical to the success of your PPM strategy:

    • PPM tool inputs must match the type, level of detail, and amount of portfolio data generated by your PPM processes.
    • PPM tool outputs must be useful, insightful, easy to access, and easy to understand for people who engage in your PPM processes.

    User adoption is an often cited cause of failed PPM tool implementation:

    "The biggest problem is getting the team to work with the tool. We need to make sure that we’re not wasting time delving too far down into the tool, yet putting enough information to get useful information back." (IT Director, Financial Services)

    This final step of the blueprint will discuss the choice of PPM tools to ensure the success of PPM strategy by avoiding the process-tool disconnect.

    Common pitfalls for PPM tools

    • Purchasing and implementing a PPM tool before the process is defined and accepted.
    • Poor expectation setting: inability of tools to perform the necessary analysis.
    • Underleveraged: low user/process adoption.
    • Poor integration with the corporate finance function.
    • (WGroup, 2017)

    Leverage PPM tools to get the information you need

    An optimized PPM solution is the vehicle that provides decision makers with four key pieces of information they require when making decisions for your project portfolio:

    • Historical Insight – inform decision makers about how much time and resources have been spent to date, and benchmark the accuracy of prior project estimates and resource allocations.
    • Forecasting – provide a trustworthy estimate of demand on resources and current projects.
    • Portfolio Analytics – analyze portfolio data and generate easy-to-consume reports that provide answers to questions such as:
      • How big is our overall portfolio?
      • How much money/resource time is available?
      • How efficiently are we using our resources?
    • Project Visibility – provide a trustworthy report on the status of current projects and the resources working on them.

    Info-Tech Insight

    Without the proper information, decision makers are driving blind and are forced to make gut feel decisions as opposed to data-informed decisions. Implement a PPM solution to allocate projects properly and ensure time and money don’t vanish without being accounted for.

    Commercial PPM tools have more functionality but are more costly, complex, and difficult to adopt

    • Granular timesheet management
    • Workflow and team collaboration
    • Robust data and application integration
    • Advanced what-if planning
    • Mobile usability
    A map comparing commercial PPM tools by 'Functionality', 'Cost', and 'Difficulty to implement/adopt'. 'Functionality' and 'Difficulty to implement/adopt' share an axis and can be assumed to have a linear relationship. 'Spreadsheets' are low functionality and low cost. 'Google Sites' are low to middling functionality and low cost. 'SharePoint' is middling functionality with a slightly higher cost. The next three start at middling cost and above-average functionality and trend higher in both categories: 'Commercial Entry-Level PPM', 'Commercial Mid-Market PPM', and 'Commercial Enterprise PPM'.
    • Business case scoring and prioritization
    • Multi-user reporting and request portal
    • High-level resource management
    • Project status, cost, and risk tracking

    "Price tags [for PPM tools] vary considerably. Expensive products don't always provide more capability. Inexpensive products are generally low cost for good reason." (Merkhofer)

    Your PPM tool options are not limited to commercial offerings

    Despite the rapid growth in the commercial PPM tool market today, homegrown approaches like spreadsheets and intranet sites continue to be used as PPM tools.

    Kinds of PPM solutions used by Info-Tech clients

    A pie chart visualizing the kinds of PPM solutions that are used by Info-Tech clients. There are three sections, the largest of which is 'Spreadsheet-based, 46%', then 'Commercial, 33%', then 'No solution, 21%'. (Source: Info-Tech Research Group (2016), N=433)

    Category

    Characteristics

    PPM maturity

    Enterprise tool
    • Higher professional services requirements for enterprise deployment
    • Larger reference customers
    High
    Mid-market tool
    • Lower expectation of professional services engaged in initial deployment contract
    • Fewer globally recognizable reference clients
    • Faster deployments
    High
    Entry-level tool
    • Lower cost than mid-market & enterprise PPM tools
    • Limited configurability, reporting, and resource management functionalities
    • Compelling solutions to the organizations that wants to get a fast start to a trial deployment
    Intermediate
    Spreadsheet based
    • Little/no up-front cost, highly customizable to suit your organization’s needs
    • Varying degrees of sophistication
    • Few people in the organization may understand the logic behind the tool; knowledge may not be easily transferrable
    Intermediate Low

    Determine the functional requirements of the PPM solution

    Associated Activity icon 3.1.1 – 20 minutes

    INPUT: PPM strategic plan

    OUTPUT: Modified PPM strategic plan with a proposed choice of PPM tool

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, IT Managers

    Use the Tool Assessment tab (tab 4) of Info-Tech’s PPM Strategy Development Tool to rate and analyze functional requirements of your PPM solution.

    • Review the list of PPM features provided on column B of tab 4. You can add any desired features not listed.
    • Rate your near-term and long-term feature requirements using the drop-down menus in columns C and D. Your selections here will inform the tool selection bubble chart to the right of the features list.

    Screenshot showing the features list on tab 4 of the PPM Strategy Development Tool.

    Estimate your PPM tool budget

    Associated Activity icon 3.1.2 – 20 minutes

    INPUT: PPM strategic plan

    OUTPUT: Modified PPM strategic plan with a proposed choice of PPM tool

    Materials: PPM Strategy Development Tool

    Participants: CIO, PMO Director/ Portfolio Manager, Project Managers, IT Managers

    Enter the PPM tool budget information on the Tool Assessment tab of Info-Tech’s PPM Strategy Development Tool.

    • As a starting point, it can help to know that low-priced PPM tools cost around $1,000 per user per year. High-priced PPM tools cost around $3,000 per user per year.
    • Software-as-a-Service (SaaS)-based pricing for PPM solutions is increasingly popular. If you plan to purchase perpetual licensing, divide the total implementation and licensing cost by three years to be comparable with a three-year SaaS total cost of ownership analysis.

    Screenshot showing the tool assessment from the PPM Strategy Development Tool with 'Near-Term' and 'Long-Term' budget columns. Notes include 'Enter the number of fully licensed PPM users you expect to provision for and your estimated annual budget for a PPM tool', 'The tool assessment automatically calculates your annual budget per user, which is reflected in the bubble chart analysis (see next slide)'.

    Review the tool assessment graphic

    Associated Activity icon 3.1.3 – 20 minutes

    The map comparing commercial PPM tools from before, this time overlaid with 'Near-Term' and 'Long-Term' budgets as coloured circles. The vertical axis is 'Functionality Rating' and the horizontal axis is now 'Annual Cost/Budget per User'. 'Spreadsheets' are low functionality and low cost. 'Google Sites' are low to middling functionality and low cost. 'SharePoint' is middling functionality with a slightly higher cost. The 'Near-Term' budget circle covers those three tools. The next three start at middling cost and above-average functionality and trend higher in both categories: 'Commercial Entry-Level PPM', 'Commercial Mid-Market PPM', and 'Commercial Enterprise PPM'. The 'Long-Term' budget circle covers 'Commercial Mid-Market PPM'.

    If you are in one of the non-covered areas, consider revisiting your functional requirements and PPM strategy. You may need to lessen your expectations to be able to stay within your budget, or find a way to get more money.

    Keep in mind that the long-term goal can be to work towards a commercial tool, while the short-term goal would be to be able to maintain your portfolio in a simple spreadsheet first.

    Info-Tech Insight

    If you choose a commercial solution, you will need to gain executive buy-in in order to implement the tool; proceed to near-term and long-term plans to get the ball rolling on this decision.

    Review and customize slide 37, “Tools for PPM: proposed near- and long-term solutions,” in Info-Tech’s PPM Strategic Plan Template.

    Grow your own, or select and implement, a PPM solution with Info-Tech

    Whether you choose spreadsheet-based or commercially available PPM solutions, use Info-Tech’s research for scoping, designing, and implementing them.

    Info-Tech’s Grow Your Own PPM Solution blueprint will help you implement a highly evolved spreadsheet-based PPM solution. It features the Portfolio Manager 2017, a Microsoft Excel-based workbook that leverages its business intelligence features to provide a basis for implementing a scalable, highly customizable PPM tool with useful and easy-to-manipulate analytics.

    Read Info-Tech’s Grow Your Own PPM Solution blueprint.

    Info-Tech’s Select and Implement a PPM Solution blueprint is part of our Vendor Landscape research. Make sense of the diversity of PPM solutions available in today’s market, and choose the most appropriate solutions for your organization’s size and level of PPM maturity.

    Read Info-Tech’s Select and Implement a PPM Solution blueprint.

    A right-sized PPM strategy leads to a right-sized portfolio management tool based on Info-Tech’s template

    CASE STUDY

    Industry: Energy
    Source: Info-Tech Client

    “The approach makes it easy to run the portfolio without taking time away from the project themselves.” (IT Manager, Energy Resources Firm)

    Situation

    • A small IT department struggled with balancing project work with ongoing operational management and support work.
    • The department includes experienced and successful project managers and a mature, skilled team.
    • However, the nature of the department’s role has evolved to the point where the project and operational work demands have exceeded the available time.
    • Prioritization needed to become more centralized and formalized while management control of the work assignments became increasingly decentralized.

    Complication

    • Agile projects offer clear advantages by lightening the requirement for proactive planning. However, getting the staff to adapt would be challenging because of the overall workload and competing priorities.
    • Some of the team’s time needed to be carefully tracked and reported for time & materials-based billing, but the time sheet system was unsuited to their portfolio management needs.
    • Commercial PPM systems were ruled out because strict task management seemed unlikely to gain adoption.

    Resolution

    • The team deployed Info-Tech’s Project Portfolio Workbook, based on a Microsoft Excel template, and the Grow Your Own PPM Solution blueprint.
    • For the first time, executive leadership was given a 12-month forecast of resource capacity based on existing and pending project commitments. The data behind the capacity forecast was based on allocating people to projects with a percentage of their time for each calendar month.
    • The data behind the forecast is high level but easily maintainable.

    Step 3.2: Finalize customizing your PPM Strategic Plan Template

    PHASE 1

    PHASE 2

    PHASE 3

    1.11.22.12.23.13.2
    Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

    This step will walk you through the following activities:

    • Determine the costs of support your PPM strategic plan.
    • Estimate some of the benefits of your PPM strategic plan.
    • Perform a cost-benefit analysis.
    • Refine and consolidate the near-term action items into a cohesive plan.

    This step involves the following participants:

    • CIO
    • PMO Director/ Portfolio Manager
    • Project Managers
    • IT Managers

    Outcomes of this step

    • A cost/benefit analyst
    • An implementation action plan
    • A finalized PPM Strategic Plan Template

    Estimate the total cost-in-use of managing the project portfolio

    Supporting Tool icon 3.2.1 – PPM Strategy Development Tool, Tab 5: Costing Summary

    The time cost of PPM processes (tab 3) and PPM tool costs (tab 4) are summarized in this tab. Enter additional data to estimate the total PPM cost-in-use: the setup information and the current cost of PPM software tools.

    Screenshot of the PPM Strategy Development Tool, Tab 5: Costing Summary. Notes include 'If unknown, the overall HR budget of your project portfolio can be estimated as: (# FTEs) * (fully-loaded FTE cost per hour) * 1800', 'This is your total PPM cost-in-use'.

    Estimate the benefits of managing the project portfolio

    Supporting Tool icon 3.2.2 – PPM Strategy Development Tool, Tab 6: Benefits Assumptions

    The benefits of PPM processes are estimated by projecting the sources of waste on your resource capacity.

    1. Estimate the current extent of waste on your resource capacity. If you have completed Info-Tech’s PPM Current Score Scorecard, enter the data from the report.
    2. Screenshot of a Waste Assessment pie chart from the PPM Strategy Development Tool, Tab 6: Benefits Assumptions.
    3. Given your near- and long-term action items for improving PPM processes, estimate how each source of waste on your resource capacity will change.
    4. Screenshot of a Waste Assessment table titled 'These inputs represent the percentage of your overall portfolio budget that is wasted in each scenario' from the PPM Strategy Development Tool, Tab 6: Benefits Assumptions.

    Review the cost-benefit analysis results and update the PPM Strategic Plan Template

    Supporting Tool icon 3.2.3 – PPM Strategy Development Tool, Tab 7: Conclusion Screenshot of a 'PPM Strategy Cost-Benefit Analysis' from the PPM Strategy Development Tool, Tab 7: Conclusion. It has tables on top and bar charts underneath.

    This tab summarizes the costs and benefits of your PPM strategic plan.

    • Costs are estimated from wasted project capacity and time spent on PPM process work.
    • Benefits are estimated from the project capacity to be reclaimed as a result of improvements in PPM.
    • Return on investment is calculated by dividing the value of project capacity to be reclaimed by investment in PPM in addition to the current-state cost.

    Capture this summary in your PPM strategic plan.

    Customize slides 40 and 41, “Return on PPM investment,” in Info-Tech’s PPM Strategic Plan Template.

    Determine who will be responsible for coordinating the flow, collection, and reporting of portfolio data

    Supporting Tool icon 3.2.3 – Project Portfolio/PMO Analyst Job Description

    You will need to determine responsibilities and accountabilities for portfolio management functions within your team.

    If you do not have a clearly identifiable portfolio manager at this time, you will need to clarify who will wear which hats in terms of facilitating intake and prioritization, high-level capacity awareness, and portfolio reporting.

    • Use Info-Tech’s Project Portfolio Analyst Job Description Template to help clarify some of the required responsibilities to support your PPM strategy.
      • If you need to bring in an additional staff member to help support the strategy, you can customize the job description template to help advertise the position. Simply edit the text in grey within the template.
    • If you have other PPM tasks that you need to define responsibilities for, you can use the RASCI chart on the final tab of the PPM Strategy Develop Tool.

    Download Info-Tech’s Project Portfolio Analyst Job Description Template.

    Sample of Info-Tech's Project Portfolio Analyst Job Description Template.

    Refine and consolidate the near-term action items into a cohesive plan

    Associated Activity icon 3.2.4 – 30 minutes

    INPUT: Near-term action items

    OUTPUT: Near-term action plan

    Materials: PPM Strategy Development Tool

    Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

    Collect the near-term action items for each of the five PPM processes and arrange them into a table that outlines the near-term action plan. Once it is compiled, adjust the timeline and responsibility so that the plan is coherent and realistic as a whole.

    Example:

    Outcome

    Action required

    Timeline

    Responsibility

    Determine the percentage distribution of project vs. non-project work Run a time audit survey with all project resources 2 weeks Resource managers
    Test a simple dashboard for project status Pilot Info-Tech’s Portfolio Manager 2017 workbook 2 weeks PMO Director

    "There is a huge risk of taking on too much too soon, especially with the introduction of specific tools and tool sets. There is also an element of risk involved that can lead to failure and disappointment with PPM if these tools are not properly introduced and supported." (Jim Carse, Director of the Portfolio Office, Queen’s University)

    Review and customize slide 43, “Summary of near-term action plan,” in Info-Tech’s PPM Strategic Plan Template.

    Finalize and publish your PPM strategic plan

    Table of Contents

    Read over the document to ensure its completeness and consistency.

    At this point, you have a PPM strategic plan that is actionable and realistic, which addresses the goals set by the senior leadership.

    The executive brief establishes the need for PPM strategy, the goals and metrics are set by members of the senior leadership that gave the initial buy-in, and the target states of PPM processes that meet those goals are described. Finally, the costs and benefits of the improved PPM practice are laid out in a way that can be validated.

    The next step for your PPM strategy is to use this document as a foundation for implementing and operationalizing the target-state PPM processes.

    Review and publish the document for your executive layer and key project stakeholders. Solicit their feedback.

    Info-Tech has a library of blueprints that will guide you through each of the five processes. Contact your Info-Tech account manager or Info-Tech analyst to get started.

    • Project Portfolio Management Strategy
      • Strategic Expectations
      • Overview
    • Leadership Mandate
    • Project Demand and Resource Supply
    • The Current State of Resource Utilization
    • PPM Processes
      • Project intake, prioritization, and approval
      • Resource management
      • Portfolio reporting
      • Project closure
      • Benefits realization
      • Tools for PPM
    • The Economic Impact of PPM
    • PPM Strategy Next Steps

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Barry Cousins.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    Sample of activity 3.1 'Scope the right-sized PPM solution for your PPM strategy'. Scope the right-sized PPM solution for your PPM strategy

    Use the PPM Strategy Development Tool to quickly determine our near- and long-term recommendation for your PPM solution.

    Sample of activity 3.2 'Conduct a cost-benefit analysis of your PPM strategic plan'. Conduct a cost-benefit analysis of your PPM strategic plan

    Using the time cost estimates of each process and the requirement for a PPM tool, Info-Tech helps you quantify the overhead costs of PPM and estimate the monetary benefits of reclaimed project capacity for your project portfolio.

    Insight breakdown

    Insight 1

    • Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are on board before preceding to implement your PPM strategy.

    Insight 2

    • The means of project and portfolio management (i.e. processes) shouldn’t eclipse the ends – strategic goals. Root your process in your PPM strategic goals to realize PPM benefits (e.g. optimized portfolio value, improved project throughput, increased stakeholder satisfaction).

    Insight 3

    • Without the proper information, decision makers are driving blind and are forced to make gut-feel decisions as opposed to data-informed decisions. Implement a PPM solution to allocate projects properly and ensure time and money don’t vanish without being accounted for.

    Summary of accomplishment

    Knowledge Gained

    • Info-Tech’s thought model on PPM processes that create an infrastructure around projects
    • Your current state of project portfolio: project capacity vs. project demand
    • Importance of gaining executive buy-in for installing the PPM practice

    Processes Optimized

    • Project intake, prioritization, and approval process
    • Resource management process
    • Portfolio reporting process
    • Project closure process
    • Benefits realization process

    Deliverables Completed

    • Choice of PPM strategy and the leadership mandate
    • Analysis of current project capacity and demand
    • PPM process goals and metrics, aligned to meet PPM strategic expectations
    • PPM process capability levels
    • Retrospective examination of current state, near/long-term action items for improvement, and high-level descriptions of the five PPM processes
    • Recommendation of PPM tools to support the processes
    • Estimate of PPM overhead costs
    • Cost-benefit analysis of PPM practice
    • PPM strategic plan

    Related Info-Tech Research

    • Develop a Project Portfolio Management Strategy
    • Grow Your Own PPM Solution
    • Optimize Project Intake, Approval, and Prioritization
    • Develop a Resource Management Strategy for the New Reality
    • Manage a Minimum-Viable PMO
    • Establish the Benefits Realization Process
    • Manage an Agile Portfolio
    • Establish the Benefits Realization Process
    • Project Portfolio Management Diagnostic Program
      The Project Portfolio Management Diagnostic Program is a low-effort, high-impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment in order to understand where you stand and how you can improve.

    Research contributors and experts

    Photo of Kiron D. Bondale PMP, PMI-RMP, CDAP, CDAI, Senior Project Portfolio Management Professional Kiron D. Bondale PMP, PMI-RMP, CDAP, CDAI
    Senior Project Portfolio Management Professional

    Kiron has worked in the project management domain for more than fifteen years managing multiple projects, leading Project Management Offices (PMO) and providing project portfolio management consulting services to over a hundred clients across multiple industries. He has been an active member of the Project Management Institute (PMI) since 1999 and served as a volunteer director on the Board of the PMI Lakeshore Chapter for six years. Kiron has published articles on project and project portfolio management in multiple journals and has delivered over a hundred webinar presentations on a variety of PPM and PM topics and has presented at multiple industry conferences. Since 2009, Kiron has been blogging on a weekly basis on project management topics and responds to questions daily in the LinkedIn PMI Project, Program and Portfolio Management discussion group.

    Photo of Shaun Cahill, Project Manager, Queen’s University Shaun Cahill, Project Manager &
    Jim Carse, Director of the Project Portfolio Office
    Queen’s University

    Research contributors and experts

    Photo of Amy Fowler Stadler, Managing Partner, Lewis Fowler Amy Fowler Stadler, Managing Partner
    Lewis Fowler

    Amy has more than 20 years of experience in business and technology, most recently owning her own management consulting firm since 2002, focused on business transformation, technology enablement, and operational improvement. Prior to that, she was at CenturyLink (formerly Qwest) as an IT Director, Perot Systems in various roles, and Information Handling Services, Inc. as a Software Development Product Manager.

    Amy holds a bachelor’s degree in Computer Science with a minor in Business Communications and is also a 2015 Hall of Fame inductee to Illinois State University College of Applied Science and Technology.

    Photo of Rick Morris, President, R2 Consulting LLC Rick Morris, President
    R2 Consulting LLC

    Rick A. Morris, PMP, is a certified Scrum Agile Master, Human Behavior Consultant, best-selling author, mentor, and evangelist for project management. Rick is an accomplished project manager and public speaker. His appetite for knowledge and passion for the profession makes him an internationally sought after speaker delivering keynote presentations for large conferences and PMI events around the world. He holds the PMP (Project Management Professional), MPM (Masters of Project Management), Scrum Agile Master, OPM3, Six Sigma Green Belt, MCITP, MCTS, MCSE, TQM, ATM-S, ITIL, and ISO certifications, and is a John Maxwell Certified Speaker, Mentor, and Coach. Rick is the Owner of R2 Consulting, LLC and has worked for organizations such as GE, Xerox, and CA, and has consulted with numerous clients in a wide variety of industries including financial services, entertainment, construction, non-profit, hospitality, pharmaceutical, retail, and manufacturing.

    Research contributors and experts

    Photo of Terry Lee Ricci PgMP, PfMP, PMP, PPM Practice Lead, IAG Consulting Terry Lee Ricci PgMP, PfMP, PMP, PPM Practice Lead
    IAG Consulting

    Terry is passionate and highly skilled at PMO transformation, developing high-performing teams that sustain long-term business results. Terry has a reputation built upon integrity, resourcefulness, and respect. She has the vision to implement long and short-term strategies, meeting both current and evolving business needs.

    Change Management/Business transformation: Terry has extensive background in PMO strategy development aligned to corporate goals. Many years in the PMO organization integration/transformation building or overhauling programs and processes.

    Governance: Terry loves to monitor and measure performance and outcomes and uses her collaborative style to successfully bring simplicity to complexity (technology – people – process). Performance optimization results are easy to use and clearly define who is doing what across functions. End results consistently align to business strategy while mitigating risks effectively.

    Comprehensive: A “through the ranks” executive with a comprehensive understanding of PMO operations, high-performance teams, and the respective business units they support.

    Photo of Alana Ruckstuhl MSc, IT Project Officer, Federal Economic Development Agency for Southern Ontario Alana Ruckstuhl MSc, IT Project Officer
    Federal Economic Development Agency for Southern Ontario

    Research contributors and experts

    Photo of Jay Wardle, Director of the PMO, Red Wing Shoes Co. Jay Wardle, Director of the PMO
    Red Wing Shoes Co.
    Photo of Bob White, Vice President/Chief Information Officer, ALM Holding Company Bob White, Vice President/Chief Information Officer
    ALM Holding Company

    As vice president and chief information officer for ALM Holding Company, Bob White directs all technology activity and support for three main verticals: road construction, energy management, and delivery and transportation. He has been with ALM Holding Company for one and a half years, focusing on PPM process improvement, cybersecurity initiatives, and IT service management.

    Prior to joining ALM, Bob was executive vice president/chief information officer at Ashley Furniture Industries, Inc. where he led the strategic direction, implementation, and management of information technology throughout the company’s global operations. Bob has also held VP/CIO positions at the Stride Rite Corporation and Timex Corporation.

    Bob holds a Master’s degree in Operations Management from the University of Arkansas and a Bachelor of Science degree in Industrial Engineering from Southern Illinois University.

    Bibliography

    Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine, 5 June 2013. Web. 30 Oct 2013.

    Cheese, Peter et al. “Creating an Agile Organization.” Accenture, Oct. 2009. Web. Nov. 2013.

    Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

    Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business, 18 Dec. 2012. Web. 28 Oct. 2013.

    Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine, 17 Apr. 2012. Web. Nov. 2013.

    Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates, 17 June 2013. Web. Oct. 2013.

    Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal, 12 Oct. 2006. Web. 12 Jan 2012.

    Gartside, David et al. “Trends Reshaping the Future of HR.” Accenture, 2013. Web. 5 Nov. 2013.

    KeyedIn Solutions. “Why PPM and PMOs Fail.” KeyedIn Projects, 2013. Ebook.

    Lessing, Lawrence. Free Culture. Lulu Press Inc.: 30 July 2016.

    Merkhofer, Lee. “Keys to Implementing Project Portfolio Management.” Lee Merkhofer Consulting, 2017.

    Perry, Mark Price. Business Driven Project Portfolio Management. J Ross Pub: 17 May 2011.

    Project Management Institute. “Pulse of the Profession 2015: Capturing the Value of Project Management.” PMI, Feb. 2015. Web.

    Project Management Institute. “Pulse of the Profession 2016: The High Cost of Low Performance.” PMI, 2016. Web.

    Project Management Institute. “Pulse of the Profession 2017: Success Rates Rise.” PMI, 2017. Web.

    Project Management Institute. The Standard for Portfolio Management – Third Edition. PMI: 1 Dec. 2012.

    WGroup. “Common Pitfalls in Project Portfolio Management – Part 2.” WGroup, 24 Jan. 2017. Web.

    Go the Extra Mile With Blockchain

    • Buy Link or Shortcode: {j2store}130|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • The transportation and logistics industry is facing a set of inherent flaws, such as high processing fees, fraudulent information, and lack of transparency, that blockchain is set to transform and alleviate.
    • Many companies have FOMO (fear of missing out), causing them to rush toward blockchain adoption without first identifying the optimal use case.

    Our Advice

    Critical Insight

    • Understand how blockchain can alleviate your pain points before rushing to adopt the technology. You have been hearing about blockchain for some time now and are feeling pressured to adopt it. Moreover, the series of issues hindering the transportation and logistics industry, such as the lack of transparency, poor cash flow management, and high processing fees, are frustrating business leaders and thereby adding additional pressure on CIOs to adopt the technology. While blockchain is complex, you should focus on its key features of transparency, integrity, efficiency, and security to identify how it can help your organization.
    • Ensure your use case is actually useful and can be valuable to your organization by selecting a business idea that is viable, feasible, and desirable. Applying design thinking tactics to your evaluation process provides a practical approach that will help you avoid wasting resources (both time and money) and hurting IT’s image in the eyes of the business. While it is easy to get excited and invest in a new technology to help maintain your image as a thought leader, you must ensure that your use case is fully developed prior to doing so.

    Impact and Result

    • Understand blockchain’s transformative potential for the transportation and logistics industry by breaking down how its key benefits can alleviate inherent industry flaws.
    • Identify business processes and stakeholders that could benefit from blockchain.
    • Build and evaluate an inventory of use cases to determine where blockchain could have the greatest impact on your organization.
    • Articulate the value and organizational fit of your proposed use case to the business to gain their buy-in and support.

    Go the Extra Mile With Blockchain Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why your organization should care about blockchain’s transformative potential for the transportation and logistics industry and how Info-Tech will support you as you identify and build your blockchain use case.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Evaluate why blockchain can disrupt the transportation and logistics industry

    Analyze the four key benefits of blockchain as they relate to the transportation and logistics industry to understand how the technology can resolve issues being experienced by industry incumbents.

    • Go the Extra Mile With Blockchain – Phase 1: Evaluate Why Blockchain Can Disrupt the Transportation and Logistics Industry
    • Blockchain Glossary

    2. Build and evaluate an inventory of use cases

    Brainstorm a set of blockchain use cases for your organization and apply design thinking tactics to evaluate and select the optimal one to pitch to your executives for prototyping.

    • Go the Extra Mile With Blockchain – Phase 2: Build and Evaluate an Inventory of Use Cases
    • Blockchain Use Case Evaluation Tool
    • Prototype One Pager
    [infographic]

    Develop Meaningful Service Metrics

    • Buy Link or Shortcode: {j2store}399|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $20,308 Average $ Saved
    • member rating average days saved: 30 Average Days Saved
    • Parent Category Name: Service Management
    • Parent Category Link: /service-management
    • IT organizations measure services from a technology perspective but rarely from a business goal or outcome perspective.
    • Most organizations do a poor job of identifying and measuring service outcomes over the duration of a service’s lifecycle – never ensuring the services remain valuable and meet expected long-term ROI.

    Our Advice

    Critical Insight

    • Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
    • Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
    • Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.

    Impact and Result

    Effective service metrics will provide the following service gains:

    • Confirm service performance and identify gaps.
    • Drive service improvement to maximize service value.
    • Validate performance improvements while quantifying and demonstrating business value.
    • Ensure service reporting aligns with end-user experience.
    • Achieve and confirm process and regulatory compliance.

    Which will translate into the following relationship gains:

    • Embed IT into business value achievement.
    • Improve the relationship between the business and IT.
    • Achieve higher customer satisfaction (happier end users receiving expected service, the business is able to identify how things are really performing).
    • Reinforce desirable actions and behaviors from both IT and the business.

    Develop Meaningful Service Metrics Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop meaningful service metrics, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Develop Meaningful Service Metrics – Executive Brief
    • Develop Meaningful Service Metrics – Phases 1-3

    1. Design the metrics

    Identify the appropriate service metrics based on stakeholder needs.

    • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 1: Design the Metrics
    • Metrics Development Workbook

    2. Design reports and dashboards

    Present the right metrics in the most interesting and stakeholder-centric way possible.

    • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 2: Design Reports and Dashboards
    • Metrics Presentation Format Selection Guide

    3. Implement, track, and maintain

    Run a pilot with a smaller sample of defined service metrics, then continuously validate your approach and make refinements to the processes.

    • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 3: Implement, Track, and Maintain
    • Metrics Tracking Tool
    [infographic]

    Workshop: Develop Meaningful Service Metrics

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Design the Metrics

    The Purpose

    Define stakeholder needs for IT based on their success criteria and identify IT services that are tied to the delivery of business outcomes.

    Derive meaningful service metrics based on identified IT services and validate that metrics can be collected and measured.

    Key Benefits Achieved

    Design meaningful service metrics from stakeholder needs.

    Validate that metrics can be collected and measured.

    Activities

    1.1 Determine stakeholder needs, goals, and pain points.

    1.2 Determine the success criteria and related IT services.

    1.3 Derive the service metrics.

    1.4 Validate the data collection process.

    1.5 Validate metrics with stakeholders.

    Outputs

    Understand stakeholder priorities

    Adopt a business-centric perspective to align IT and business views

    Derive meaningful business metrics that are relevant to the stakeholders

    Determine if and how the identified metrics can be collected and measured

    Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics

    2 Design Reports and Dashboards

    The Purpose

    Determine the most appropriate presentation format based on stakeholder needs.

    Key Benefits Achieved

    Ensure the metrics are presented in the most interesting and stakeholder-centric way possible to guarantee that they are read and used.

    Activities

    2.1 Understand the different presentation options.

    2.2 Assess stakeholder needs for information.

    2.3 Select and design the metric report.

    Outputs

    Learn about infographic, scorecard, formal report, and dashboard presentation options

    Determine how stakeholders would like to view information and how the metrics can be presented to aid decision making

    Select the most appropriate presentation format and create a rough draft of how the report should look

    3 Implement, Track, and Maintain Your Metrics

    The Purpose

    Run a pilot with a smaller sample of defined service metrics to validate your approach.

    Make refinements to the implementation and maintenance processes prior to activating all service metrics.

    Key Benefits Achieved

    High user acceptance and usability of the metrics.

    Processes of identifying and presenting metrics are continuously validated and improved.

    Activities

    3.1 Select the pilot metrics.

    3.2 Gather data and set initial targets.

    3.3 Generate the reports and validate with stakeholders.

    3.4 Implement the service metrics program.

    3.5 Track and maintain the metrics program.

    Outputs

    Select the metrics that should be first implemented based on urgency and impact

    Complete the service intake form for a specific initiative

    Create a process to gather data, measure baselines, and set initial targets

    Establish a process to receive feedback from the business stakeholders once the report is generated

    Identify the approach to implement the metrics program across the organization

    Set up mechanism to ensure the success of the metrics program by assessing process adherence and process validity

    Further reading

    Develop Meaningful Service Metrics

    Select IT service metrics that drive business value.

    ANALYST PERSPECTIVE

    Are you measuring and reporting what the business needs to know?

    “Service metrics are one of the key tools at IT’s disposal in articulating and ensuring its value to the business, yet metrics are rarely designed and used for that purpose.

    Creating IT service metrics directly from business and stakeholder outcomes and goals, written from the business perspective and using business language, is critical to ensuring that the services that IT provides are meeting business needs.

    The ability to measure, manage, and improve IT service performance in relation to critical business success factors, with properly designed metrics, embeds IT in the value chain of the business and ensures IT’s focus on where and how it enables business outcomes.”

    Valence Howden,
    Senior Manager, CIO Advisory
    Info-Tech Research Group

    Our understanding of the problem

    This Research Is Designed For:
    • CIO
    • IT VPs
    This Research Will Help You:
    • Align business/IT objectives (design top-down or outside-in)
    • Significantly improve the relationship between the business and IT aspects of the organization
    • Reinforce desirable actions and behaviors
    This Research Will Also Assist:
    • Service Level Managers
    • Service Owners
    • Program Owners
    This Research Will Help Them
    • Identify unusual deviations from the normal operating state
    • Drive service improvement to maximize service value
    • Validate the value of performance improvements while quantifying and demonstrating benefits realization

    Executive summary

    Situation

    • IT organizations measure services from a technology perspective yet rarely measure services from a business goal/outcome perspective.
    • Most organizations do a poor job of identifying and measuring service outcomes over the duration of a service’s lifecycle – never ensuring the services remain valuable and meet expected long-term ROI.

    Complication

    • IT organizations have difficulty identifying the right metrics to demonstrate the value of IT services to the business in tangible terms.
    • IT metrics, as currently designed, reinforce division between the IT and business perspectives of service performance. They drive siloed thinking and finger-pointing within the IT structure, and prevent IT resources from understanding how their work impacts business value.

    Resolution

    • Our program enables IT to develop the right service metrics to tie IT service performance to business value and user experience.
    • Ensure the metrics you implement have immediate stakeholder value, reinforcing alignment between IT and the business while influencing behavior in the desired direction.
    • Make sure that your metrics are defined in relation to the business goals and drivers, ensuring they will provide actionable outcomes.

    Info-Tech Insight

    1. Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
    2. Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
    3. Poorly designed metrics drive unintended and unproductive behaviors, which have negative impacts on IT and produce negative service outcomes.

    Service metrics 101

    What are service metrics?

    Service metrics measure IT services in a way that relates to a business outcome. IT needs to measure performance from the business perspective using business language.

    Why do we need service metrics?

    To ensure the business cares about the metrics that IT produces, start with business needs to make sure you’re measuring the right things. This will give IT the opportunity talk to the right stakeholders and develop metrics that will meet their business needs.

    Service metrics are designed with the business perspective in mind, so they are fully aligned with business objectives.

    Perspectives Matter

    Different stakeholders will require different types of metrics. A CEO may require metrics that provide a snapshot of the critical success of the company while a business manager is more concerned about the performance metrics of their department.

    What are the benefits of implementing service metrics?

    Service metrics help IT communicate with the business in business terms and enables IT to articulate how and where they provide business value. Business stakeholders can also easily understand how IT services contribute to their success.

    The majority of CIOs feel metrics relating to business value and stakeholder satisfaction require significant improvement

    A significantly higher proportion of CIOs than CEOs feel that there is significant improvement necessary for business value metrics and stakeholder satisfaction reporting. Stacked horizontal bar chart presenting survey results from CIOs and CXOs of 'Business Value Metrics'. Answer options are 'Effective', 'Some Improvement Necessary', 'Significant Improvement Necessary', and 'Not Required'.N=364

    Stacked horizontal bar chart presenting survey results from CIOs and CXOs of 'Stakeholder Satisfaction Reporting'. Answer options are 'Effective', 'Some Improvement Necessary', 'Significant Improvement Necessary', and 'Not Required'.N=364

    (Source: Info-Tech CIO-CXO Alignment Diagnostic Survey)

    Meaningless metrics are a headache for the business

    A major pitfall of many IT organizations is that they often provide pages of technical metrics that are meaningless to their business stakeholders.

    1. Too Many MetricsToo many metrics are provided and business leaders don’t know what to do with these metrics.
    2. Metrics Are Too TechnicalIT provides technical metrics that are hard to relate to business needs, and methods of calculating metrics are not clearly understood, articulated, and agreed on.
    3. Metrics Have No Business ValueService metrics are not mapped to business goals/objectives and they drive incorrect actions or spend.
    When considering only CEOs who said that stakeholder satisfaction reporting needed significant improvement, the average satisfaction score goes down to 61.6%, which is a drop in satisfaction of 12%.

    A bar that says 73% dropping to a bar that says 61%. Description above.

    (Source: Info-Tech Research Group CIO-CXO Alignment Diagnostic Survey)

    Poorly designed metrics hurt IT’s image within the organization

    By providing metrics that do not articulate the value of IT services, IT reinforces its role as a utility provider and an outsider to strategic decisions.

    When the CIOs believe business value metrics weren’t required, 50% of their CEOs said that significant improvements were necessary.

    Pie Chart presenting the survey results from CEOs regarding 'Business Value Metrics'. Description above.

    (Source: Info-Tech Research Group CIO-CXO Alignment Diagnostic Survey)
    1. Reinforce the wrong behaviorThe wrong metrics drive us-against-them, siloed thinking within IT, and meeting metric targets is prioritized over providing meaningful outcomes.
    2. Do not reflect user experienceMetrics don’t align with actual business/user experience, reinforcing a poor view of IT services.
    3. Effort ≠ ValueInvesting dedicated resources and effort to the achievement of the wrong metrics will only leave IT more constrained for other important initiatives.

    Articulate meaningful service performance that supports the achievement of business outcomes

    Service metrics measure the performance of IT services and how they enable or drive the activity outcomes.

    A business process consists of multiple business activities. In many cases, these business activities require one or more supporting IT services.

    A 'Business Process' broken down to its parts, multiple 'Business Activities' and their 'IT Services'. For each business process, business stakeholders and their goals and objectives should be identified.

    For each business activity that supports the completion of a business process, define the success criteria that must be met in order to produce the desirable outcome.

    Identify the IT services that are used by business stakeholders for each business activity. Measure the performance of these services from a business perspective to arrive at the appropriate service metrics.

    Differentiate between different types of metrics

    Stakeholders have different goals and objectives; therefore, it is critical to identify what type of metrics should be presented to each stakeholder.

    Business Metrics

    Determine Business Success

    Business metrics are derived from a pure business perspective. These are the metrics that the business stakeholders will measure themselves on, and business success is determined using these metrics.

    Arrow pointing right.

    Service Metrics

    Manage Service Value to the Business

    Service metrics are used to measure IT service performance against business outcomes. These metrics, while relating to IT services, are presented in business terms and are tied to business goals.

    Arrow pointing right.

    IT Metrics

    Enable Operational Excellence

    IT metrics are internal to the IT organization and used to manage IT service delivery. These metrics are technical, IT-specific, and drive action for IT. They are not presented to the business, and are not written in business language.

    Implementing service metrics is a key step in becoming a service provider and business partner

    As a prerequisite, IT organizations must have already established a solid relationship with the business and have a clear understanding of its critical business-facing services.

    At the very least, IT needs to have a service-oriented view and understand the specific needs and objectives associated with each stakeholder.

    Visualization of 'Business Relationship Management' with an early point on the line representing 'Service Provider: Establish service-oriented culture and business-centric service delivery', and the end of the line being 'Strategic Partner'.

    Once IT can present service metrics that the business cares about, it can continue on the service provider journey by managing the performance of services based on business needs, determine and influence service demand, and assess service value to maximize benefits to the business.

    Which processes drive service metrics?

    Both business relationship management (BRM) and service level management (SLM) provide inputs into and receive outputs from service metrics.

    Venn Diagram of 'Business Relationship Management', 'Service Metrics', and 'Service Level Management'.

    Business Relationship Management

    BRM works to understand the goals and objectives of the business and inputs them into the design of the service metrics.

    Service Metrics

    BRM leverages service metrics to help IT organizations manage the relationship with the business.

    BRM articulates and manages expectations and ensures IT services are meeting business requirements.

    Which processes drive service metrics?

    Both BRM and SLM provide inputs into and receive outputs from service metrics.

    Venn Diagram of 'Business Relationship Management', 'Service Metrics', and 'Service Level Management'.

    Service Level Management

    SLM works with the business to understand service requirements, which are key inputs in designing the service metrics.

    Service Metrics

    SLM leverages service metrics in overseeing the day-to-day delivery of IT services. It ensures they are provided to meet expected service level targets and objectives.

    Effective service metrics will deliver both service gains and relationship gains

    Effective service metrics will provide the following service gains:

    • Confirm service performance and identify gaps
    • Drive service improvement to maximize service value
    • Validate performance improvements while quantifying and demonstrating business value
    • Ensure service reporting aligns with end-user experience
    • Achieve and confirm process and regulatory compliance
        Which will translate into the following relationship gains:
        • Embed IT into business value achievement
        • Improve relationship between the business and IT
        • Achieve higher customer satisfaction (happier end users receiving expected service, the business is able to identify how things are really performing)
        • Reinforce desirable actions and behaviors from both IT and the business

    Don’t let conventional wisdom become your roadblock

    Conventional Wisdom

    Info-Tech Perspective

    Metrics are measured from an application or technology perspective Metrics need to be derived from a service and business outcome perspective.
    The business doesn’t care about metrics Metrics are not usually designed to speak in business terms about business outcomes. Linking metrics to business objectives creates metrics that the business cares about.
    It is difficult to have a metrics discussion with the business It is not a metrics/number discussion, it is a discussion on goals and outcomes.
    Metrics are only presented for the implementation of the service, not the ongoing outcome of the service IT needs to focus on service outcome and not project outcome.
    Quality can’t be measured Quality must be measured in order to properly manage services.

    Our three-phase approach to service metrics development

    Let Info-Tech guide you through your service metrics journey

    1

    2

    3

    Design Your Metrics Develop and Validate Reporting Implement, Track, and Maintain
    Sample of Phase 1 of Info-Tech's service metric development package, 'Design Your Metrics'. Sample of Phase 2 of Info-Tech's service metric development package, 'Develop and Validate Reporting'. Sample of Phase 3 of Info-Tech's service metric development package, 'Implement, Track, and Maintain'.
    Start the development and creation of your service metrics by keeping business perspectives in mind, so they are fully aligned with business objectives. Identify the most appropriate presentation format based on stakeholder preference and need for metrics. Track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.

    CIOs must actively lead the design of the service metrics program

    The CIO must actively demonstrate support for the service metrics program and lead the initial discussions to determine what matters to business leaders.

    1. Lead the initiative by defining the need
      Show visible support and demonstrate importance
    2. Articulate the value to both IT and the business
      Establish the urgency and benefits
    3. Select and assemble an implementation group
      Find the best people to get the job done
    4. Drive initial metrics discussions: goals, objectives, actions
      Lead brainstorming with senior business leaders
    5. Work with the team to determine presentation formats and communication methods
      Identify the best presentation approach for senior stakeholders
    6. Establish a feedback loop for senior management
      Solicit feedback on improvements
    7. Validate the success of the metrics
      Confirm service metrics support business outcomes

    Measure the success of your service metrics

    It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.

    Validating Service Metrics Design

    Target Outcome

    Related Metrics

    The business is enabled to identify and improve service performance to their end customer # of improvement initiatives created based on service metrics
    $ cost savings/revenue generated due to actions derived from service metrics

    Procedure to validate the usefulness of IT metrics

    # / % of service metrics added/removed per year

    Alignment between IT and business objectives and processes Business’ satisfaction with IT

    Measure the success of your service metrics

    It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.

    Validating Service Metrics Process

    Target Outcome

    Related Metrics

    Properly defined service metrics aligned with business goals/outcomes
    Easy understood measurement methodologies
    % of services with (or without) defined service metrics

    % of service metrics tied to business goals

    Consistent approach to review and adjust metrics# of service metrics adjusted based on service reviews

    % of service metrics reviewed on schedule

    Demonstrate monetary value and impact through the service metrics program

    In a study done by the Aberdeen Group, organizations engaged in the use of metrics benchmarking and measurement have:
    • 88% customer satisfaction rate
    • 60% service profitability
    • 15% increase in workforce productivity over the last 12 months

    Stock image of a silhouette of three people's head and shoulders.
    (Source: Aberdeen Group. “Service Benchmarking and Measurement.”)

    A service metric is defined for: “Response time for Business Application A

    The expected response time has not been achieved and this is visible in the service metrics. The reduced performance has been identified as having an impact of $250,000 per month in lost revenue potential.

    The service metric drove an action to perform a root-cause analysis, which identified a network switch issue and drove a resolution action to fix the technology and architect redundancy to ensure continuity.

    The fix eliminated the performance impact, allowing for recovery of the $250K per month in revenue, improved end-user confidence in the organization, and increased use of the application, creating additional revenue.

    Implementing and measuring a video conferencing service

    CASE STUDY
    Industry: Manufacturing | Source: CIO interview and case material
    Situation

    The manufacturing business operates within numerous countries and requires a lot of coordination of functions and governance oversight. The company has monthly meetings, both regional and national, and key management and executives travel to attend and participate in the meetings.

    Complication

    While the meetings provide a lot of organizational value, the business has grown significantly and the cost of business travel has started to become prohibitive.

    Action

    It was decided that only a few core meetings would require onsite face-to-face meetings, and for all other meetings, the company would look at alternative means. The face-to-face aspect of the meetings was still considered critical so they focused on options to retain that aspect.

    The IT organization identified that they could provide a video conferencing service to meet the business need. The initiative was approved and rolled out in the organization.

    Result:

    IT service metrics needed to be designed to confirm that the expected value outcome of the implementation of video conferencing was achieved.

    Under the direction of the CIO, the business goals and needs driving use of the service (i.e. reduction in travel costs, efficiency, no loss of positive outcome) were used to identify success criteria and key questions to confirm success.

    With this information, the service manager was able to implement relevant service metrics in business language and confirmed an 80% adoption rate and a 95% success rate in term meetings running as expected and achieving core outcomes.

    Use these icons to help direct you as you navigate this research

    Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

    A small monochrome icon of a wrench and screwdriver creating an X.

    This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

    A small monochrome icon depicting a person in front of a blank slide.

    This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Develop meaningful service metrics to ensure business and user satisfaction

    1. Design the Metrics 2. Design Reports and Dashboards 3. Implement, Track, and Maintain
    Supporting Tool icon

    Best-Practice Toolkit

    1. Defining stakeholder needs for IT based on their success criteria
    2. Derive meaningful service metrics based on identified IT services and validate with business stakeholders
    3. Validate metrics can be collected and measured
    4. Determine calculation methodology
    1. Presentation format selected based on stakeholder needs and preference for information
    2. Presentation format validated with stakeholders
    1. Identify metrics that will be presented first to the stakeholders based on urgency or impact of the IT service
    2. Determine the process to collect data, select initial targets, and integrate with SLM and BRM functions
    3. Roll out the metrics implementation for a broader audience
    4. Establish roles and timelines for metrics maintenance

    Guided Implementations

    • Design metrics based on business needs
    • Validate the metrics
    • Select presentation format
    • Review metrics presentation design
    • Select and implement pilot metrics
    • Determine rollout process and establish maintenance/tracking mechanism
    Associated Activity icon

    Onsite Workshop

    Module 1:
    Derive Service Metrics From Business Goals
    Module 2:
    Select and Design Reports and Dashboards
    Module 3:
    Implement, Track, and Maintain Your Metrics to Ensure Success
    Phase 1 Outcome:
    • Meaningful service metrics designed from stakeholder needs
    Phase 2 Outcome:
    • Appropriate presentation format selected for each stakeholder
    Phase 3 Outcome:
    • Metrics implemented and process established to maintain and track program success

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.
    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
    Design the Metrics
    Determine Presentation Format and Implement Metrics
    Gather Service Level Requirements
    Monitor and Improve Service Levels

    Activities

    • 1.1 Determine stakeholder needs
    • 1.2 Determine success criteria and key performance indicators
    • 1.3 Derive metrics
    • 1.4 Validate the metric collection
    • 2.1 Discuss stakeholder needs/preference for data and select presentation format
    • 2.2 Select and design the metric report
    • Requirements
    • 3.1 Determine the business requirements
    • 3.2 Negotiate service levels
    • 3.3 Align operational level agreements (OLAs) and supplier contracts
    • 4.1 Conduct service report and perform service review
    • 4.2 Communicate service review
    • 4.3 Remediate issues using action plan
    • 4.4 Proactive prevention

    Deliverables

    1. Metrics Development Workbook
    1. Metrics Presentation Format Selection Guide
    2. Metrics Tracking Tool
    1. Service Level Management SOP
    2. Service Level Agreement
    1. Service Level Report
    2. Service Level Review
    3. Business Satisfaction Report

    Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

    PHASE 1

    Design the Metrics

    Step (1): Design the Metrics

    PHASE 1 PHASE 2 PHASE 3

    1.1

    Derive the Service Metrics

    1.2

    Validate the Metrics

    2.1

    Determine Reporting Format

    3.1

    Select Pilot Metrics

    3.2

    Activate and Maintain Metrics

    This step involves the following participants:

    • CIO
    • Business Relationship Manager (BRM)
    • Service Level Manager (SLM)

    Outcomes of this step

    • Defined stakeholder needs for IT based on their success criteria
    • Identified IT services that are tied to the delivery of business outcomes
    • Derived meaningful service metrics based on identified IT services and validated with business stakeholders
    • Validated that metrics can be collected and measured
    • Determined calculation methodology

    Phase 1 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Design the Metrics

    Proposed Time to Completion (in weeks): 4 weeks
    Step 1.1: Design Metrics Step 1.2: Validate the Metrics
    Start with an analyst kick-off call:
    • Determine the stakeholder and their needs
    • Identify IT services that are tied to the delivery of business outcomes
    • Derive the service metrics
    Review findings with analyst:
    • For the selected metrics, identify the data source for collection
    • Validate whether or not the data can be created
    • Create a calculation method for the metrics
    Then complete these activities…
    • Using the methodology provided, identify additional stakeholders and map out their success criteria, including KPIs to determine the appropriate service metrics
    Then complete these activities…
    • Determine whether the designed metrics are measurable, and if so, how
    With these tools & templates:
    • Metrics Development Workbook
    With these tools & templates:
    • Metrics Development Workbook

    Design your service metrics – overview

    Figure representing 'CIO'. Step 1
    Derive your service metrics

    Metrics Worksheet

    Figure representing 'SLM' and/or 'BRM'. Step 2
    Validate your metrics

    Metrics Worksheet

    Figures representing 'CIO', 'SLM', and/or 'BRM'. Step 3
    Confirm with stakeholders

    Metrics Tracking Sheet

    A star.

    Defined IT Service Metrics

    Deriving the right metrics is critical to ensuring that you will generate valuable and actionable service metrics.

    Derive your service metrics from business objectives and needs

    Service metrics must be designed with the business perspective in mind so they are fully aligned with business objectives.

    Thus, IT must start by identifying specific stakeholder needs. The more IT understands about the business, the more relevant the metrics will be to the business stakeholders.

    1. Who are your stakeholders?
    2. What are their goals and pain points?
    3. What do the stakeholders need to know?
    4. What do I need to measure?
    5. Derive your service metrics

    Derive your service metrics

    Supporting Tool icon 1.1 Metrics Development Workbook

    This workbook guides the development and creation of service metrics that are directly tied to stakeholder needs.

    This process will ensure that your service metrics are designed with the business perspective in mind so they are fully aligned with business objectives.

    1. Who are the relevant stakeholders?
    2. What are the goals and pain points of your stakeholders?
    3. What do the stakeholders need to know?
    4. What does IT need to measure?
    5. What are the appropriate IT metrics?

    Download the Metrics Development Workbook.

    Sample of Info-Tech's Metrics Development Workbook.

    Determine your stakeholders

    Supporting Tool icon 1.1 0.5 Hour

    Who are your stakeholders?

    1. Identify the primary stakeholders of your service metrics. Stakeholders are the people who have a very specific need to know about how IT services affect their business outcomes. Different stakeholders can have different perspective on the same IT service metric.Most often, the primary target of service metrics are the business stakeholders, e.g. VP of a business unit.
    2. Identify any additional stakeholders. The CIO is also a stakeholder since they are effectively the business relationship manager for the senior leaders.

    Video Conferencing Case Study
    Manufacturing company

    For this phase, we will demonstrate how to derive the service metrics by going through the steps in the methodology.

    At a manufacturing company, the CIO’s main stakeholder is the CEO, whose chief concern is to improve the financial position of the company.

    Identify goals and pain points of your stakeholders

    Supporting Tool icon 1.2 0.5 Hour

    What are their goals and pain points?

    1. Clearly identify each stakeholder’s business goals and outcomes. These would be particular business goals related to a specific business unit.
    2. Identify particular pain points for each business unit to understand what is preventing them from achieving the desirable business outcome.

    VC Case Study

    One of the top initiatives identified by the company to improve financial performance was to reduce expense.

    Because the company has several key locations in different states, company executives used to travel extensively to carry out meetings at each location.

    Therefore, travel expenses represent a significant proportion of operational expenses and reducing travel costs is a key goal for the company’s executives.

    What do the stakeholders need to know?

    Supporting Tool icon 1.3 0.5 Hour

    What do the stakeholders need to know?

    1. Identify the key things that the stakeholders would need to know based on the goals and pain points derived from the previous step.These are your success criteria and must be met to successfully achieve the desired goals.

    VC Case Study

    The CEO needs to have assurance that without executives traveling to each location, remote meetings can be as effective as in-person meetings.

    These meetings must provide the same outcome and allow executives to collaborate and make similar strategic decisions without the onsite, physical presence.

    Therefore, the success criteria are:

    • Reduced travel costs
    • Effective collaboration
    • High-quality meetings

    What do I need to measure?

    Supporting Tool icon 1.4 1 Hour

    What does IT need to measure?

    1. Identify the IT services that are leveraged to achieve the business goals and success criteria.
    2. Identify the users of those services and determine the nature of usage for each group of users.
    3. Identify the key indicators that must be measured for those services from an IT perspective.

    VC Case Study

    The IT department decides to implement the video conferencing service to reduce the number of onsite meetings. This technology would allow executives to meet remotely with both audio and video and is the best option to replicate a physical meeting.

    The service is initially available to senior executives and will be rolled out to all internal users once the initial implementation is deemed successful.

    To determine the success of the service, the following needs to be measured:

    1. Outcomes of VC meetings
    2. Quality of the VC meetings
    3. Reduction in travel expenses

    Derive service metrics

    Supporting Tool icon 1.5 0.5 Hour

    Derive your service metrics

    1. Derive the service metrics that are meaningful to business stakeholders based on the IT services and the key indicators identified in the previous steps.
    2. Distinguish between service metrics and business metrics. You may identify some business metrics in addition to the IT metrics, and although these are important, IT doesn’t own the process of tracking and reporting business metrics.

    VC Case Study

    In the previous step, IT identified that it must measure the outcomes of VC meetings, quality of the VC meetings, and the reduction in travel expenses. From these, the appropriate service metrics can be derived to answer the needs of the CEO.

    IT needs to measure:

    1. Percent of VC meetings successfully delivered
    2. Growth of number of executive meetings conducted via VC
    Outcomes

    IT also identified the following business metrics:

    1. Reduction in percent of travel expense/spend
    2. Reduction in lost time due to travel

    Validate your metrics

    Once appropriate service metrics are derived from business objectives, the next step is to determine whether or not it is viable to actually measure the metrics.

    Can you measure it? The first question IT must answer is whether the metric is measurable. IT must identify the data source, validate its ability to collect the data, and specify the data requirement. Not all metrics can be measured!
    How will you measure it? If the metric is measurable, the next step is to create a way to measure the actual data. In most cases, simple formulas that can be easily understood are the best approach.
    Define your actions Metrics must be used to drive or reinforce desirable outcomes and behaviors. Thus, IT must predetermine the necessary actions associated with the different metric levels, thresholds, or trends.

    Determine if you can measure the identified metric

    Supporting Tool icon 1.6 0.5 Hour

    INSTRUCTIONS

    1. Determine what data sources are available. Make sure that you know where the information you need is captured, or will need to be captured. This would include:
      • A ticket/request system
      • An auto discovery tool
      • A configuration management database ( CMDB)
    2. Confirm that IT has the ability to collect the information.
      • If the necessary data is already contained in an identified data source, then you can proceed.
      • If not, consider whether it’s possible to gather the information using current sources and systems.
      • Understand the constraints and cost/ROI to implement new technology or revise processes and data gathering to produce the data.

    VC Case Study

    Using the metric derived from the video conferencing service example, IT wants to measure the % of VC meetings successfully delivered.

    What are the data sources?

    • Number of VC meetings that took place
    • Number of service incidents
    • User survey

    Determine if you can measure the identified metric

    Supporting Tool icon 1.6 0.5 Hour

    INSTRUCTIONS

    1. Understand your data requirements
      • To produce relevant metrics from your data, you need to ensure the level of quality and currency that provides you with useful information. You need to define:
        • The level of detail that has to be captured to make the data useful.
        • The consistency of the data, and how it needs to be entered or gathered.
        • The accuracy of the data. This includes how current the data needs to be, how quickly changes have to be made, and how data quality will be verified.

    VC Case Study

    Data requirement for percent of successful VC meetings:

    • Level of detail – user category, location, date/time,
    • Consistency – how efficiently are VC-related incidents opened and closed? Is the data collected and stored consistently?
    • Accuracy – is the information entered accurately?

    Create the calculation to measure it

    Supporting Tool icon 1.7 0.5 Hour

    Determine how to calculate the metrics.

    INSTRUCTIONS
    1. Develop the calculations that will be used for each accepted metric. The measurement needs to be clear and straightforward.
    2. Define the scope and assumptions for each calculation, including:
      • The defined measurement period (e.g. monthly, weekly)
      • Exclusions (e.g. nonbusiness hours, during maintenance windows)

    VC Case Study

    Metric: Percent of VC meetings delivered successfully

    IT is able to determine the total number of VC meetings that took place and the number of VC service requests to the help desk.

    That makes it possible to use the following formula to determine the success percentage of the VC service:

    ((total # VC) – (# of VC with identified incidents)) / (total # VC) * 100

    Define the actions to be taken for each metric

    Supporting Tool icon 1.7 1.5 Hour

    INSTRUCTIONS

    Centered on the defined metrics and their calculations, IT can decide on the actions that should be driven out of each metric based on one of the following scenarios:
    • Scenario 1: Ad hoc remedial action and root-cause investigation. If the reason for the result is unknown, determining root cause or identifying trends is required to determine required actions.
    • Scenario 2: Predefined remedial action. A set of predetermined actions associated with different results. This is useful when the meaning of the results is clear and points to specific issues within the environment.
    • Scenario 3: Nonremedial action. The metrics may produce a result that reinforces or supports company direction and strategy, or identifies an opportunity that may drive a new initiative or idea.

    VC Case Study

    If the success rate of the VC meetings is below 90%, IT needs to focus on determining if there is a common cause and identify if this is a consistent downward trend.

    A root-cause analysis is performed that identifies that network issues are causing difficulties, impacting the connection quality and usability of the VC service.

    Validate the confirmed metrics with the business

    Supporting Tool icon 1.8 1 Hour

    INPUT: Selected service metrics, Discussion with the business

    OUTPUT: Validated metrics with the business

    Materials: Metrics with calculation methodology

    Participants: IT and business stakeholders, Service owners

    INSTRUCTIONS

    1. Once you have derived the appropriate metrics and established that the metrics are measurable, you must go back to the targeted stakeholders and validate that the selected metrics will provide the right information to meet their identified goals and success criteria.
    2. Add confirmed metrics to the Metrics Tracking Tool, in the Metrics Tracking Plan tab.
    Service Metric Corresponding
    Business Goal
    Measurement
    Method
    Defined Actions

    Example: Measuring the online banking service at a financial institution

    Who are IT’s stakeholders? The financial institution provides various banking solutions to its customers. Retail banking is a core service offered by the bank and the VP of retail banking is a major stakeholder of IT.
    What are their goals and pain points? The VP of retail banking’s highest priorities are to increase revenue, increase market share, and maintain the bank’s brand and reputation amongst its customers.
    What do they need to know? In order to measure success, the VP of retail banking needs to determine performance in attracting new clients, retaining clients, expanding into new territory, and whether they have increased the number of services provided to existing clients.
    What does IT need to measure? The recent implementation of an online banking service is a key initiative that will keep the bank competitive and help retail banking meet its goals. The key indicators of this service are: the total number of clients, the number of products per client, percent of clients using online banking, number of clients by segment, service, territory.
    Derive the service metrics Based on the key indicators, IT can derive the following service metrics:
    1. Number of product applications originated from online banking
    2. Customer satisfaction/complaints
    As part of the process, IT also identified some business metrics, such as the number of online banking users per month or the number of times a client accesses online banking per month.

    Design service metrics to track service performance and value

    CASE STUDY
    Industry: Manufacturing | Source: CIO
    Challenge Solution Results
    The IT organization needed to generate metrics to show the business whether the video conferencing service was being adopted and if it was providing the expected outcome and value.

    Standard IT metrics were technical and did not provide a business context that allowed for easy understanding of performance and decision making.

    The IT organization, working through the CIO and service managers, sat down with the key business stakeholders of the video conferencing service.

    They discussed the goals for the meeting and defined the success criteria for those goals in the context of video conference meeting outcomes.

    The success criteria that were discussed were then translated into a set of questions (key performance indicators) that if answered, would show that the success criteria were achieved.

    The service manager identified what could be measured to answer the defined questions and eliminated any metrics that were either business metrics or non-IT related.

    The remaining metrics were identified as the possible service metrics, and the ability to gather the information and produce the metric was confirmed.

    Service metrics were defined for:

    1. Percent of video conference meetings delivered successfully
    2. Growth in the number of executive meetings conducted via video conference

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1

    Sample of activity 1.1 'Determine your stakeholders'. Determine stakeholder needs, goals, and pain points

    The onsite analyst will help you select key stakeholders and analyze their business objectives and current pain points.

    1.2

    Sample of activity 1.2 'Identify goals and pain points of your stakeholders'. Determine the success criteria and related IT services

    The analyst will facilitate a discussion to uncover the information that these stakeholders care about. The group will also identify the IT services that are supporting these objectives.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    1.5

    Sample of activity 1.5 'Derive service metrics'. Derive the service metrics

    Based on the key performance indicators obtained in the previous page, derive meaningful business metrics that are relevant to the stakeholders.

    1.6

    Sample of activity 1.6 'Determine if you can measure the identified metric'. Validate the data collection process

    The analyst will help the workshop group determine whether the identified metrics can be collected and measured. If so, a calculation methodology is created.

    1.7

    Sample of activity 1.7 'Create the caluclation to measure it'. Validate metrics with stakeholders

    Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics.

    Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

    PHASE 2

    Design Reports and Dashboards

    Step (2): Design Reports and Dashboards

    PHASE 1PHASE 2PHASE 3

    1.1

    Derive the Service Metrics

    1.2

    Validate the Metrics

    2.1

    Determine Reporting Format

    3.1

    Select Pilot Metrics

    3.2

    Activate and Maintain Metrics

    This step involves the following participants:

    • Business Relationship Manager
    • Service Level Manager
    • Business Stakeholders

    Outcomes of this step

    • Presentation format selected based on stakeholder needs and preference for information
    • Presentation format validated with stakeholders

    Phase 2 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Design Reports and Dashboards

    Proposed Time to Completion (in weeks): 3 weeks
    Step 2.1: Select Presentation Format Step 2.2: Review Design
    Start with an analyst kick-off call:
    • Review the different format of metrics presentation and discuss the pros/cons of each format
    • Discuss stakeholder needs/preference for data
    • Select the presentation format
    Review findings with analyst:
    • Discuss stakeholder feedback based on selected presentation format
    • Modify and adjust the presentation format as needed
    Then complete these activities…
    • Design the metrics using the selected format
    Then complete these activities…
    • Finalize the design for metrics presentation
    With these tools & templates:
    • Metrics Presentation Format Selection Guide
    With these tools & templates:
    • Metrics Presentation Format Selection Guide

    Design the reports – overview

    Figure representing 'SLM' and/or 'BRM'. Step 1
    Understand the pros and cons of different reporting styles
    Figure representing 'SLM' and/or 'BRM'. Step 2
    Determine your reporting and presentation style

    Presentation Format Selection

    Figure representing 'SLM' and/or 'BRM'. Step 3
    Design your metrics reports
    A star.

    Validated Service Reports

    The design of service metrics reporting is critically important. The reporting style must present the right information in the most interesting and stakeholder-centric way possible to ensure that it is read and used.

    The reports must also display information in a way that generates actions. If your stakeholders cannot make decisions, kick off activities, or ask questions based on your reports, then they have no value.

    Determine the right presentation format for your metrics

    Most often, metrics are presented in the following ways:

    Dashboard
    (PwC. “Mega-Trends and Implications.”)
    Sample of the 'Dashboard' metric presentation format.
    Infographic
    (PwC. “Healthcare’s new entrants.”)
    Sample of the 'Infographic' metric presentation format.
    Report
    (PwC Blogs. “Northern Lights.”)
    Sample of the 'Report' metric presentation format.
    Scorecard
    (PwC. “Annual Report 2015.”)
    Sample of the 'Scorecard' metric presentation format.

    Understand the advantages and disadvantages of each reporting style – Dashboard

    A dashboard is a reporting method that provides a dynamic at-a-glance view of key metrics from the perspective of key stakeholders. It provides a quick graphical way to process important performance information in real time.

    Features

    Typically web-based

    Dynamic data that is updated in real time

    Advantage

    Aggregates a lot of information into a single view

    Presents metrics in a simplistic style that is well understood

    Provides a quick point-in-time view of performance

    Easy to consume visual presentation style

    Disadvantage

    Complicated to set up well.
    Requires additional technology support: programming, API, etc.

    Promotes a short-term outlook – focus on now, no historical performance and no future trends. Doesn’t provide the whole picture and story.

    Existing dashboard tools are often not customized enough to provide real value to each stakeholder.

    Dashboards present real-time metrics that can be accessed and viewed at any time

    Sample of the 'Dashboard' metric presentation format.
    (Source: PwC. “Mega-Trends and Implications.”)
    Metrics presented through online dashboards are calculated in real time, which allows for a dynamic, current view into the performance of IT services at any time.

    Understand the advantages and disadvantages of each reporting style – Infographic

    An infographic is a graphical representation of metrics or data, which is used to show information quickly and clearly. It’s based on the understanding that people retain and process visual information more readily than written details.

    Features

    Turns dry into attractive –transforms data into eye-catching visual memory that is easier to retain

    Can be used as the intro to a formal report

    There are endless types of infographics

    Advantage

    Easily consumable

    Easy to retain

    Eye catching

    Easily shared

    Spurs conversation

    Customizable

    Disadvantage

    Require design expertise and resources

    Can be time consuming to generate

    Could be easily misinterpreted

    Message can be lost with poor design

    Infographics allow for completely unique designs

    Sample of the 'Infographic' metric presentation format.
    (Source: PwC. “Healthcare’s new entrants…”)
    There is no limit when it comes to designing an infographic. The image used here visually articulates the effects of new entrants pulling away the market.

    Understand the advantages and disadvantages of each reporting style – Formal Report

    A formal report is a more structured and official reporting style that contains detailed research, data, and information required to enable specific business decisions, and to help evaluate performance over a defined period of time.

    Definition

    Metrics can be presented as a component of a periodic, formal report

    A physical document that presents detailed information to a particular audience

    Advantage

    More detailed, more structured and broader reporting period

    Formal, shows IT has put in the effort

    Effectively presents a broader and more complete story

    Targets different stakeholders at the same time

    Disadvantage

    Requires significant effort and resources

    Higher risk if the report does not meet the expectation of the business stakeholder

    Done at a specific time and only valuable for that specific time period

    Harder to change format

    Formal reports provide a detailed view and analysis of performance

    Sample of the 'Formal Report' metric presentation format.
    (Source: PwC Blogs. “Northern Lights: Where are we now?”)
    An effective report incorporates visuals to demonstrate key improvements.

    Formal reports can still contain visuals, but they are accompanied with detailed explanations.

    Understand the advantages and disadvantages of each reporting style – Scorecard

    A scorecard is a graphic view of the progress and performance over time of key performance metrics. These are in relation to specified goals based on identified critical stakeholder objectives.

    Features

    Incorporates multiple metrics effectively.

    Scores services against the most important organizational goals and objectives. Scorecards may tie back into strategy and different perspectives of success.

    Advantage

    Quick view of performance against objectives

    Measure against a set of consistent objectives

    Easily consumable

    Easy to retain

    Disadvantage

    Requires a lot of forethought

    Scorecards provide a time-bound summary of performance against defined goals

    Sample of the 'Scorecard' metric presentation format.
    (PwC. “Annual Report 2015.”)
    Scorecards provide a summary of performance that is directly linked to the organizational KPIs.

    Determine your report style

    Supporting Tool icon 2.1 Metrics Presentation Format Selection Guide

    In this section, you will determine the optimal reporting style for the service metrics.

    This guide contains four questions, which will help IT organizations identify the most appropriate presentation format based on stakeholder preference and needs for metrics.

    1. Who is the relevant stakeholder?
    2. What are the defined actions for the metric?
    3. How frequently does the stakeholder need to see the metric?
    4. How does the stakeholder like to receive information?
    Sample of Info-Tech's Metrics Presentation Format Selection Guide.
    Download the Metrics Presentation Format Selection Guide.

    Determine your best presentation option

    Supporting Tool icon 2.1 2 Hours

    INPUT: Identified stakeholder and his/her role

    OUTPUT: Proper presentation format based on need for information

    Materials: Metrics Presentation Format Selection Guide

    Participants: BRM, SLM, Program Manager

    After deciding on the report type to be used to present the metric, the organization needs to consider how stakeholders will consume the metric.

    There are three options based on stakeholder needs and available presentation options within IT.

    1. Paper-based presentation is the most traditional form of reporting and works well with stakeholders who prefer physical copies. The report is produced at a specific time and requires no additional IT capability.
    2. Online documents stored on webpages, SharePoint, or another knowledge management system could be used to present the metrics. This allows the report to be linked to other information and easily shared.
    3. Online dashboards and graphics can be used to have dynamic, real-time reporting and anytime access. These webpages can be incorporated into an intranet and allow the user to view the metrics at any time. This will require IT to continuously update the data in order to maintain the accuracy of the metrics.

    Design your metric reports with these guidelines in mind

    Supporting Tool icon 2.2 30 Minutes
    1. Stakeholder-specificThe report must be driven by the identified stakeholder needs and preferences and articulate the metrics that are important to them.
    2. ClarityTo enable decision making and drive desired actions, the metrics must be clear and straightforward. They must be presented in a way that clearly links the performance measurement to the defined outcome without leading to different interpretations of the results.
    3. SimplicityThe report must be simple to read, understand, and analyze. The language of the report must be business-centric and remove as much complexity as possible in wording, imaging, and context.

    Be sure to consider access rights for more senior reports. Site and user access permissions may need to be defined based on the level of reporting.

    Metrics reporting on the video conferencing service

    CASE STUDY
    Industry: Manufacturing | Source: CIO Interview
    The Situation

    The business had a clear need to understand if the implementation of video conferencing would allow previously onsite meetings to achieve the same level of effectiveness.

    Reporting Context

    Provided reports had always been generated from an IT perspective and the business rarely used the information to make decisions.

    The metrics needed to help the business understand if the meetings were remaining effective and be tied into the financial reporting against travel expenses, but there would be limited visibility during the executive meetings.

    Approach

    The service manager reviewed the information that he had gathered to confirm how often they needed information related to the service. He also met with the CIO to get some insight into the reports that were already being provided to the business, including the ones that were most effective.

    Considerations

    The conversations identified that there was no need for a dynamic real-time view of the performance of the service, since tracking of cost savings and utility would be viewed monthly and quarterly. They also identified that the item would be discussed within a very small window of time during the management meetings.

    The Solution

    It was determined that the best style of reporting for the metric was an existing scorecard that was produced monthly, using some infographics to ensure that the information is clear at a glance to enable quick decision making.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1

    Sample of presentation format option slide 'Determine the right presentation format for your metrics'. Understand the different presentation options

    The onsite analyst will introduce the group to the communication vehicles of infographic, scorecard, formal report, and dashboard.

    2.1

    Sample of activity 2.1 'Determine your best presentation option'. Assess stakeholder needs for information

    For selected stakeholders, the analyst will facilitate a discussion on how stakeholders would like to view information and how the metrics can be presented to aid decision making.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    2.2

    Sample of activity 2.2 'Design your metric reports with these guidelines in mind'. Select and design the metric report

    Based on the discussion, the working group will select the most appropriate presentation format and create a rough draft of how the report should look.

    Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

    PHASE 3

    Implement, Track, and Maintain Your Metrics

    Step (3): Implement, Track, and Maintain Your Metrics

    PHASE 1PHASE 2PHASE 3

    1.1

    Derive the Service Metrics

    1.2

    Validate the Metrics

    2.1

    Determine Reporting Format

    3.1

    Select Pilot Metrics

    3.2

    Activate and Maintain Metrics

    This step involves the following participants:

    • Service Level Manager
    • Business Relationship Manager
    • Service Metrics Program Manager

    Activities in this step

    • Determine the first batch of metrics to be implemented as part of the pilot program
    • Create a process to collect and validate data, determine initial targets, and integrate with SLM and BRM functions
    • Present the metric reports to the relevant stakeholders and incorporate the feedback into the metric design
    • Establish a standard process and roll out the implementation of metrics in batches
    • Establish a process to monitor and track the effectiveness of the service metrics program and make adjustments when necessary

    Phase 3 outline

    Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Implement, Track, and Maintain Your Metrics

    Proposed Time to Completion (in weeks): 4 weeks
    Step 3.1: Select and Launch Pilot Metrics Step 3.2: Track and Maintain the Metrics
    Start with an analyst kick-off call:
    • Identify metrics that will be presented first to the stakeholders based on urgency or impact of the IT service
    • Determine the process to collect data, select initial targets, and integrate with SLM and BRM functions
    Review findings with analyst:
    • Review the success of metrics and discuss feedback from stakeholders
    • Roll out the metrics implementation to a broader audience
    • Establish roles and timelines for metrics maintenance
    Then complete these activities…
    • Document the first batch of metrics
    • Document the baseline, initial targets
    • Create a plan to integrate with SLM and BRM functions
    Then complete these activities…
    • Create a document that defines how the organization will track and maintain the success of the metrics program
    • Review the metrics program periodically
    With these tools & templates:
    • Metrics Tracking Tool
    With these tools & templates:
    • Metrics Tracking Tool

    Implement, Track, and Maintain the Metrics

    Figure representing 'SLM' and/or 'BRM'. Step 1
    Run your pilot

    Metrics Tracking Tool

    Figure representing 'SLM' and/or 'BRM'. Step 2
    Validate success

    Metrics Tracking Tool

    Figure representing 'SLM' and/or 'BRM'. Step 3
    Implement your metrics program in batches

    Metrics Tracking Tool

    A star.

    Active Service Metrics Program

    Once you have defined the way that you will present the metrics, you are ready to run a pilot with a smaller sample of defined service metrics.

    This allows you to validate your approach and make refinements to the implementation and maintenance processes where necessary, prior to activating all service metrics.

    Track the performance of your service metrics

    Supporting Tool icon 3.1

    The Metrics Tracking Tool will enable you to track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.

    There are three sections in this tool:
    1. Metrics Tracking Plan. Identify the metrics to be tracked and their purpose.
    2. Metrics Tracking Actuals. Monitor and track the actual performance of the metrics.
    3. Remediation Tracking. Determine and document the steps that need to be taken to correct a sub-performing metric.
    Sample of Info-Tech's Metrics Tracking Tool.

    Select pilot metrics

    Supporting Tool icon 3.1 30 Minutes

    INPUT: Identified services, Business feedback

    OUTPUT: Services with most urgent need or impact

    Materials: Service catalog or list of identified services

    Participants: BRM, SLM, Business representatives

    To start the implementation of your service metrics program and drive wider adoption, you need to run a pilot using a smaller subset of metrics.

    INSTRUCTIONS

    To determine the sample for the pilot, consider metrics that:

    • Are related to critical business services and functions
    • or
    • Address known/visible pain points for the business
    • or
    • Were designed for supportive or influential stakeholders

    Metrics that meet two or more criteria are ideal for the pilot

    Collect and validate data

    Supporting Tool icon 3.2 1 Hour

    INPUT: Identified metrics

    OUTPUT: A data collection mythology, Metrics tracking

    Materials: Metrics

    Participants: SLM, BRM, Service owner

    You will need to start collection and validation of your identified data in order to calculate the results for your pilot metrics.

    INSTRUCTIONS

    1. Initiate data collection
      • Use the data sources identified during the design phase and initiate the data collection process.
    2. Determine start date
      • If historical data can be retrieved and gathered, determine how far back you want your measurements to start.
    3. Compile data and validate
      • Ensure that the information is accurate and up to date. This will require some level of data validation and audit.
    4. Run the metric
      • Use the defined calculation and source data to generate the metrics result.
    5. Record metrics results
      • Use the metrics tracking sheet to track the actual results.

    Determine initial targets

    Supporting Tool icon 3.3 1 Hour

    INPUT: Historical data/baseline data

    OUTPUT: Realistic initial target for improvement

    Materials: Metrics Tracking Tool

    Participants: BRM, SLM, Service owner

    INSTRUCTIONS

    Identify an initial service objective based on one or more of the following options:

    1. Establish an initial target using historical data and trends of performance.
    2. Establish an initial target based on stakeholder-identified requirements and expectations.
    3. Run the metrics report over a defined period of time and use the baseline level of achievement to establish an initial target.

    The target may not always be a number - it could be a trend. The initial target will be changed after review with stakeholders

    Integrate with SLM and BRM processes

    Supporting Tool icon 3.4 1 Hour

    INPUT: SLM and BRM SOPs or responsibility documentations

    OUTPUT: Integrate service metrics into the SLM/BRM role

    Materials: SLM / BRM reports

    Participants: SLM, BRM, CIO, Program manager, Service manager

    The service metrics program is usually initiated, used, and maintained by the SLM and BRM functions.

    INSTRUCTIONS

    Ensure that the metrics pilot is integrated with those functions by:

    1. Engaging with SLM and BRM functions/resources
      • Identify SLM and BRM resources associated with or working on the services where the metrics are being piloted
      • Obtain their feedback on the metrics/reporting
    2. Integrating with the existing reporting and meeting cycles
      • Ensure the metrics will be calculated and available for discussion at standing meetings and with existing reports
    3. Establishing the metrics review and validation cycle for these metrics
      • Confirm the review and validation period for the metrics in order to ensure they remain valuable and actionable

    Generate reports and present to stakeholders

    Supporting Tool icon 3.5 1 Hour

    INPUT: Identified metrics, Selected presentation format

    OUTPUT: Metrics reports that are ready for distribution

    Materials: Metrics Presentation Format Selection Guide

    Participants: BRM, SLM, CIO, Business representatives

    INSTRUCTIONS

    Once you have completed the calculation for the pilot metrics:

    1. Confirm the report style for the selected metrics (as defined in Phase 2)
    2. Generate the reporting for the pilot metrics
    3. Present the pilot metric reports to the identified BRM and SLM resources who will present the reporting to the stakeholders
    4. Gather feedback from Stakeholders on metrics - results and process
    5. Create and execute remediation plans for any actions identified from the metrics
    6. Initiate the review cycle for metrics (to ensure they retain value)

    Plan the rollout and implementation of the metrics reporting program

    Supporting Tool icon 3.6 1 Hour

    INPUT: Feedback from pilot, Services in batch

    OUTPUT: Systematic implementation of metrics

    Materials: Metrics Tracking Tool

    Participants: BRM, SLM, Program manager

    Upon completion of the pilot, move to start the broader implementation of metrics across the organization:

    INSTRUCTIONS

    1. Identify the service metrics that you will implement. They can be selected based on multiple criteria, including:
      • Organizational area/business unit
      • Service criticality
      • Pain points
      • Stakeholder engagement (detractors, supporters)
    2. Create a rollout plan for implementation in batches, identifying expected launch timelines, owners, targeted stakeholders, and communications plans
    3. Use the implementation plan from the pilot to roll out each batch of service metrics:
      • Collect and validate data
      • Determine target(s)
      • Integrate with BRM and SLM
      • Generate and communicate reports to stakeholders

    Maintain the service metrics

    Supporting Tool icon 3.7 1.5 Hour

    INPUT: Feedback from business stakeholders

    OUTPUT: Modification to individual metrics or to the process

    Materials: Metrics Tracking Tool, Metrics Development Workbook

    Participants: CIO, BRM, SLM, Program manager, Service owner

    Once service metrics and reporting become active, it is necessary to determine the review time frame for your metrics to ensure they remain useful.

    INSTRUCTIONS

    1. Confirm and establish a review time frame with stakeholders (e.g. annually, bi-annually, after organizational or strategic changes).
    2. Meet with stakeholders by the review date to discuss the value of existing metrics and validate:
      • Whether the goals associated with the metrics are still valid
      • If the metric is still necessary
      • If there is a more effective way to present the metrics
    3. Track actions based on review outcomes and update the remediation tracking sheet.
    4. Update tracking sheet with last complete review date.

    Maintain the metrics

    Supporting Tool icon 3.7

    Based on the outcome of the review meeting, decide what needs to be done for each metric, using the following options:

    Add

    A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope).
    Triggers metrics design as shown in phases 1 and 2.

    Change

    A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option.

    Remove

    The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined.

    Maintain

    The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported.

    Ensuring metrics remain valuable

    VC CASE STUDY
    Industry: Manufacturing | Source: CIO Interview

    Reviewing the value of active metrics

    When the video conferencing service was initially implemented, it was performed as a pilot with a group of executives, and then expanded for use throughout the company. It was understood that prior to seeing the full benefit in cost reduction and increased efficiency and effectiveness, the rate of use and adoption had to be understood.

    The primary service metrics created for the service were based on tracking the number of requests for video conference meetings that were received by the IT organization. This identified the growth in use and could be used in conjunction with financial metrics related to travel to help identify the impact of the service through its growth phase.

    Once the service was adopted, this metric continued to be tracked but no longer showed growth or expanded adoption.

    The service manager was no longer sure this needed to be tracked.

    Key Activity

    The metrics around requests for video conference meetings were reviewed at the annual metrics review meeting with the business. The service manager asked if the need for the metric, the goal of tracking adoption, was still important for the business.

    The discussion identified that the adoption rate was over 80%, higher than anticipated, and that there was no value in continuing to track this metric.

    Based on the discussion, the adoption metrics were discontinued and removed from data gathering and reporting, while a success rate metric was added (how many meetings ran successfully and without issue) to ensure the ongoing value of the video conferencing service.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1

    Sample of activity 3.1 'Select pilot metrics'. Select the pilot metrics

    The onsite analyst will help the workshop group select the metrics that should be first implemented based on the urgency and impact of these metrics.

    3.2

    Sample of activity 3.2 'Collect and validate data'. Gather data and set initial targets

    The analyst will help the group create a process to gather data, measure baselines, and set initial targets.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

    Book a workshop with our Info-Tech analysts:

    3.5

    Sample of activity 3.5 'Generate reports and present to stakeholders'. Generate the reports and validate with stakeholders

    The Info-Tech analyst will help the group establish a process to receive feedback from the business stakeholders once the report is generated.

    3.6

    Sample of activity 3.6 'Plan the rollout and implementation of the metrics reporting program'. Implement the service metrics program

    The analyst will facilitate a discussion on how to implement the metrics program across the organization.

    3.7

    Sample of activity 3.7 'Maintain the service metrics'. Track and maintain the metrics program

    Set up a mechanism to ensure the success of the metrics program by assessing process adherence and process validity.

    Insight breakdown

    Insight 1

    Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.

    Insight 2

    Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.

    Insight 3

    Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.

    Summary of accomplishment

    Knowledge Gained

    • Follow a methodology to identify metrics that are derived from business objectives.
    • Understand the proper presentation format based on stakeholder needs for information.
    • Establish a process to ensure the metrics provided will continue to provide value and aid decision making.

    Processes Optimized

    • Metrics presentation to business stakeholders
    • Metrics maintenance and tracking

    Deliverables Completed

    • Metrics Development Workbook
    • Metrics Presentation Format Selection Guide
    • Metrics Tracking Tool

    Research contributors and experts

    Name Organization
    Joe Evers Joe Evers Consulting
    Glen Notman Associate Partner, Citihub
    David Parker Client Program Manager, eHealth Ontario
    Marianne Doran Collins CIO, The CIO-Suite, LLC
    Chris Kalbfleisch Manager, Service Management, eHealth Ontario
    Joshua Klingenberg BHP Billiton Canada Inc.

    Related Info-Tech research

    Stock image of a menu. Design & Build a User-Facing Service Catalog
    The user-facing service catalog is the go-to place for IT service-related information.
    Stock image of a laptop keyboard. Unleash the True Value of IT by Transforming Into a Service Provider
    Earn your seat at the table and influence business strategy by becoming an IT service provider.

    Bibliography

    Pollock, Bill. “Service Benchmarking and Measurement: Using Metrics to Drive Customer Satisfaction and Profits.” Aberdeen Group. June 2009. http://722consulting.com/ServiceBenchmarkingandMeasurement.pdf

    PwC. “Mega-Trends and Implications.” RMI Discussion. LinkedIn SlideShare. September 2015. http://www.slideshare.net/AnandRaoPwC/mega-trends-and-implications-to-retirement

    PwC. “Healthcare’s new entrants: Who will be the industry’s Amazon.com?” Health Research Institute. April 2014. https://www.pwc.com/us/en/health-industries/healthcare-new-entrants/assets/pwc-hri-new-entrant-chart-pack-v3.pdf

    PwC. “Northern Lights: Where are we now?” PwC Blogs. 2012. http://pwc.blogs.com/files/12.09.06---northern-lights-2--summary.pdf

    PwC. “PwC’s key performance indicators

    Purchase Storage Without Buyer's Remorse

    • Buy Link or Shortcode: {j2store}505|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Storage & Backup Optimization
    • Parent Category Link: /storage-and-backup-optimization
    • Storage is a big ticket item that often only gets purchased every three to five years. Many buyers focus on capital costs and rely on vendors for scoping of requirements leading to overspending and buyer’s remorse.
    • Three-quarters of storage buyers are dissatisfied with at least one aspect of their most recent storage purchase, and over 40% of organizations switched vendors, making it critical to understand the market and the important factors to avoiding buyer’s remorse.

    Our Advice

    Critical Insight

    • Know where to negotiate on price. Many organizations spend as much or more effort on negotiating a better price as they do on assessing current and future requirements; yet, more than 35% of organizations report dissatisfaction with hardware, software, and/or maintenance and support costs from their most recent purchase.
    • Understand support agreements and vendor offerings. Organizations satisfied with their storage purchase spent more effort evaluating support capabilities of vendors and assessing current and future requirements.
    • Determine costs to scale-up your storage. More than 35% of organizations report dissatisfaction with costs to scale their solutions by adding disks or disk trays, following their initial contract, making it crucial to establish scaling costs with your vendor.

    Impact and Result

    • Get peace of mind knowing that the quote you’re about to sign delivers the solution and capabilities around software and support that you think you are getting.
    • Understand contract discounting levels and get advice around where further discounting can be negotiated with the reseller.
    • Future-proof your purchase by capitalizing on Info-Tech’s exposure to other clients’ past experiences.

    Purchase Storage Without Buyer's Remorse Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Purchase storage without buyer's remorse

    Ensure the purchase is the lowest cost with fewest future headaches.

    • Storyboard: Purchase Storage Without Buyer's Remorse

    2. Evaluate storage vendors and their product capabilities

    Select the most appropriate offering for business needs at a competitive price point.

    3. Ensure vendors reveal all details regarding strengths and weaknesses

    Get the lowest priced feature set for the selected product.

    • Storage Reseller Interrogation Script
    [infographic]

    Info-Tech Quarterly Research Agenda Outcomes Q2-Q3 2023

    • Buy Link or Shortcode: {j2store}297|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy

    At Info-Tech, we take pride in our research and have established the most rigorous publication standards in the industry. However, we understand that engaging with all our analysts to gauge the future may not always be possible. Hence, we have curated some compelling recently published research along with forthcoming research insights to assist you in navigating the next quarter.

    Our Advice

    Critical Insight

    We offer a quarterly Research Agenda Outcomes deck that thoroughly summarizes our recently published research, supplying decision makers with valuable insights and best practices to make informed and effective decisions. Our research is supported by our team of seasoned analysts with decades of experience in the IT industry.

    By leveraging our research, you can stay updated with the latest trends and technologies, giving you an edge over the competition and ensuring the optimal performance of your IT department. This way, you can make confident decisions that lead to remarkable success and improved outcomes.

    Impact and Result

    • Enhance preparedness for future market trends and developments: Keep up to date with the newest trends and advancements in the IT sector to be better prepared for the future.
    • Enhance your decision making: Acquire valuable information and insights to make better-informed, confident decisions.
    • Promote innovation: Foster creativity, explore novel perspectives, drive innovation, and create new products or services.

    Info-Tech Quarterly Research Agenda Outcomes Q2/Q3 2023 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Info-Tech Quarterly Research Agenda Q3 2023 Deck – An overview of our Research Agenda Outcome for Q2 and Q3 of 2023.

    A guide to our top research published to date for 2023 (Q2/Q3).

    • Info-Tech Quarterly Research Agenda Outcomes for Q2/Q3 2023
    [infographic]

    Further reading

    Featured Research Projects 2023 (Q2/Q3)

    “Here are my selections for the top research projects of the last quarter.”

    Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

    Gord Harrison
    Head of Research & Advisory
    Info-Tech Research Group

    CIO

    01
    Build Your Generative AI Roadmap

    Generative AI is here, and it's time to find its best uses – systematically and responsibly.

    02
    CIO Priorities 2023

    Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

    03
    Build an IT Risk Taxonomy

    If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

    04
    Navigate the Digital ID Ecosystem to Enhance Customer Experience

    Beyond the hype: How it can help you become more customer-focused?

    05
    Effective IT Communications

    Generative AI is here, and it's time to find its best uses – systematically and responsibly.

    06
    Develop a Targeted Flexible Work Program for IT

    Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

    07
    Effectively Manage CxO Relations

    Make relationship management a daily habit with a personalized action plan.

    08
    Establish High-Value IT Performance Dashboards and Metrics

    Spend less time struggling with visuals and more time communicating about what matters to your executives.

    Applications

    09
    Build Your Enterprise Application Implementation Playbook

    Your implementation doesn't start with technology but with an effective plan that the team can align on.

    10
    Develop Your Value-First Business Process Automation Strategy

    As you scale your business automations, focus on what matters most.

    11
    Manage Requirements in an Agile Environment

    Agile and requirements management are complementary, not competitors.

    Security

    12
    Assess Your Cybersecurity Insurance Policy

    Adapt to changes in the cyber insurance market.

    13
    Design and Implement a Business-Aligned Security Program

    Focus first on business value.

    Infrastructure & Operations

    14
    Automate IT Asset Data Collection

    Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

    Industry | Retail

    15
    Leveraging AI to Create Meaningful Insights and Visibility in Retail

    AI prominence across the enterprise value chain.

    Industry | Education

    16
    Understand the Implications of Generative AI in Education

    Bans aren't the answer, but what is?

    Industry | Wholesale

    17
    Wholesale Industry Business Reference Architecture

    Business capability maps, value streams, and strategy maps for the wholesale industry.

    Industry | Retail Banking

    18
    Mainframe Modernization for Retail Banking

    A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

    Industry | Utilities

    19
    Data Analytics Use Cases for Utilities

    Building upon the collective wisdom for the art of the possible.

    Build Your Generative AI Roadmap

    Generative AI is here, and it's time to find its best uses – systematically and responsibly.

    CIO
    Strategy & Governance

    Photo of Bill Wong, Principal Research Director, Info-Tech Research Group.

    Bill Wong
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Build Your Generative AI Roadmap' research.

    Sample of the 'Build Your Generative AI Roadmap' research.

    Logo for Info-Tech.

    CIO Priorities 2023

    Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

    CIO
    Strategy & Governance

    Photo of Brian Jackson, Principal Research Director, Info-Tech Research Group.

    Brian Jackson
    Principal Research Director

    Download this report or book an analyst call on this topic

    Sample of the 'CIO Priorities 2023' report.

    Sample of the 'CIO Priorities 2023' report.

    Logo for Info-Tech.

    Build an IT Risk Taxonomy

    If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

    CIO
    Strategy & Governance

    Photo of Donna Bales, Principal Research Director, Info-Tech Research Group.

    Donna Bales
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Build an IT Risk Taxonomy' research.

    Sample of the 'Build an IT Risk Taxonomy' research.

    Logo for Info-Tech.

    Navigate the Digital ID Ecosystem to Enhance Customer Experience

    Beyond the hype: How it can help you become more customer-focused?

    CIO
    Strategy & Governance

    Photo of Manish Jain, Principal Research Director, Info-Tech Research Group.

    Manish Jain
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

    Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

    Logo for Info-Tech.

    Effective IT Communications

    Empower IT employees to communicate well with any stakeholder across the organization.

    CIO
    People & Leadership

    Photo of Brittany Lutes, Research Director, Info-Tech Research Group.

    Brittany Lutes
    Research Director

    Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

    Diana MacPherson
    Senior Research Analyst

    Download this research or book an analyst call on this topic

    Effective IT Communications' research.

    Sample of the 'Effective IT Communications' research.

    Logo for Info-Tech.

    Develop a Targeted Flexible Work Program for IT

    Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

    CIO
    People & Leadership

    Photo of Jane Kouptsova, Research Director, Info-Tech Research Group.

    Jane Kouptsova
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

    Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

    Logo for Info-Tech.

    Effectively Manage CxO Relations

    Make relationship management a daily habit with a personalized action plan.

    CIO
    Value & Performance

    Photo of Mike Tweedle, Practice Lead, Info-Tech Research Group.

    Mike Tweedle
    Practice Lead

    Download this research or book an analyst call on this topic

    Sample of the 'Effectively Manage CxO Relations' research.

    Sample of the 'Effectively Manage CxO Relations' research.

    Logo for Info-Tech.

    Establish High-Value IT Performance Dashboards and Metrics

    Spend less time struggling with visuals and more time communicating about what matters to your executives.

    CIO
    Value & Performance

    Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

    Diana MacPherson
    Senior Research Analyst

    Download this research or book an analyst call on this topic

    Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

    Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

    Logo for Info-Tech.

    Build Your Enterprise Application Implementation Playbook

    Your implementation doesn't start with technology but with an effective plan that the team can align on.

    Applications
    Business Processes

    Photo of Ricardo de Oliveira, Research Director, Info-Tech Research Group.

    Ricardo de Oliveira
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

    Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

    Logo for Info-Tech.

    Develop Your Value-First Business Process Automation Strategy

    As you scale your business automations, focus on what matters most.

    Applications
    Business Processes

    Photo of Andrew Kum-Seun, Research Director, Info-Tech Research Group.

    Andrew Kum-Seun
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

    Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

    Logo for Info-Tech.

    Manage Requirements in an Agile Environment

    Agile and requirements management are complementary, not competitors.

    Applications
    Application Development

    Photo of Vincent Mirabelli, Principal Research Director, Info-Tech Research Group.

    Vincent Mirabelli
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Manage Requirements in an Agile Environment' research.

    Sample of the 'Manage Requirements in an Agile Environment' research.

    Logo for Info-Tech.

    Assess Your Cybersecurity Insurance Policy

    Adapt to changes in the cyber insurance market.

    Security
    Security Risk, Strategy & Governance

    Photo of Logan Rohde, Senior Research Analyst, Info-Tech Research Group.

    Logan Rohde
    Senior Research Analyst

    Download this research or book an analyst call on this topic

    Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

    Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

    Logo for Info-Tech.

    Design and Implement a Business-Aligned Security Program

    Focus first on business value.

    Security
    Security Risk, Strategy & Governance

    Photo of Michel Hébert, Research Director, Info-Tech Research Group.

    Michel Hébert
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Design and Implement a Business-Aligned Security Program' research.

    Sample of the 'Design and Implement a Business-Aligned Security Program' research.

    Logo for Info-Tech.

    Automate IT Asset Data Collection

    Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

    Infrastructure & Operations
    I&O Process Management

    Photo of Andrew Sharp, Research Director, Info-Tech Research Group.

    Andrew Sharp
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Automate IT Asset Data Collection' research.

    Sample of the 'Automate IT Asset Data Collection' research.

    Logo for Info-Tech.

    Leveraging AI to Create Meaningful Insights and Visibility in Retail

    AI prominence across the enterprise value chain.

    Industry Coverage
    Retail

    Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

    Rahul Jaiswal
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

    Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

    Logo for Info-Tech.

    Understand the Implications of Generative AI in Education

    Bans aren't the answer, but what is?

    Industry Coverage
    Education

    Photo of Mark Maby, Research Director, Info-Tech Research Group.

    Mark Maby
    Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Understand the Implications of Generative AI in Education' research.

    Sample of the 'Understand the Implications of Generative AI in Education' research.

    Logo for Info-Tech.

    Wholesale Industry Business Reference Architecture

    Business capability maps, value streams, and strategy maps for the wholesale industry.

    Industry Coverage
    Wholesale

    Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

    Rahul Jaiswal
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Wholesale Industry Business Reference Architecture' research.

    Sample of the 'Wholesale Industry Business Reference Architecture' research.

    Logo for Info-Tech.

    Mainframe Modernization for Retail Banking

    A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

    Industry Coverage
    Retail Banking

    Photo of David Tomljenovic, Principal Research Director, Info-Tech Research Group.

    David Tomljenovic
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Mainframe Modernization for Retail Banking' research.

    Sample of the 'Mainframe Modernization for Retail Banking' research.

    Logo for Info-Tech.

    Data Analytics Use Cases for Utilities

    Building upon the collective wisdom for the art of the possible.

    Industry Coverage
    Utilities

    Photo of Jing Wu, Principal Research Director, Info-Tech Research Group.

    Jing Wu
    Principal Research Director

    Download this research or book an analyst call on this topic

    Sample of the 'Data Analytics Use Cases for Utilities' research.

    Sample of the 'Data Analytics Use Cases for Utilities' research.

    Sneak Peaks: Research coming in next quarter!

    “Next quarter we have a big lineup of reports and some great new research!”

    Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

    Gord Harrison
    Head of Research & Advisory
    Info-Tech Research Group

    1. Build MLOps and Engineering for AI and ML

      Enabling you to develop your Engineering and ML Operations to support your current & planned use cases for AI and ML.
    2. Leverage Gen AI to Improve Your Test Automation Strategy

      Enabling you to embed Gen AI to assist your team during testing broader than Gen AI compiling code.
    3. Make Your IT Financial Data Accessible, Reliable, and Usable

      This project will provide a recipe for bringing IT's financial data to a usable state through a series of discovery, standardization, and policy-setting actions.
    4. Implement Integrated AI Governance

      Enabling you to implement best-practice governance principles when implementing Gen AI.
    5. Develop Exponential IT Capabilities

      Enabling you to understand and develop your strategic Exponential IT capabilities.
    6. Build Your AI Strategy and Roadmap

      This project will provide step-by-step guidance in development of your AI strategy with an AI strategy exemplar.
    7. Priorities for Data Leaders in 2024 and Beyond

      This report will detail the top five challenges expected in the upcoming year and how you as the CDAO can tackle them.
    8. Deploy AIOps More Effectively

      This research is designed to assess the process maturity of your IT operations and help identify pain pains and opportunities for AI deployment within your IT operations.
    9. Design Your Edge Computing Architecture

      This research will provide deployment guidelines and roadmap to address your edge computing needs.
    10. Manage Change in the AI-Enabled Enterprise

      Managing change is complex with the disruptive nature of emerging tech like AI. This research will assist you from an organizational change perspective.
    11. Assess the Security and Privacy Impacts of Your AI Vendors

      This research will allow you to enhance transparency, improve risk management, and ensure the security and privacy of data when working with AI vendors.
    12. Prepare Your Board for AI Disruption

      This research will arm you with tools to educate your board on the impact of Gen AI, addressing the potential risks and the potential benefits.

    Info-Tech Research Leadership Team

    “We have a world-class team of experts focused on providing practical, cutting-edge IT research and advice.”

    Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

    Gord Harrison
    Head of Research & Advisory
    Info-Tech Research Group

    Photo of Jack Hakimian, Senior Vice President, Research Development, Info-Tech Research Group.

    Jack Hakimian
    Senior Vice President
    Research Development

    Photo of Aaron Shum, Vice President, Security & Privacy Research, Info-Tech Research Group.

    Aaron Shum
    Vice President
    Security & Privacy Research

    Photo of Larry Fretz, Vice President, Industry Research, Info-Tech Research Group.

    Larry Fretz
    Vice President
    Industry Research

    Photo of Mark Tauschek, Vice President, Research Fellowships, Info-Tech Research Group.

    Mark Tauschek
    Vice President
    Research Fellowships

    Photo of Tom Zehren, Chief Product Officer, Info-Tech Research Group.

    Tom Zehren
    Chief Product Officer

    Photo of Rick Pittman, Vice President, Advisory Quality & Delivery, Info-Tech Research Group.

    Rick Pittman
    Vice President
    Advisory Quality & Delivery

    Photo of Nora Fisher, Vice President, Shared Services, Info-Tech Research Group.

    Nora Fisher
    Vice President
    Shared Services

    Photo of Becca Mackey, Vice President, Workshops, Info-Tech Research Group.

    Becca Mackey
    Vice President
    Workshops

    Photo of Geoff Nielson, Senior Vice President, Global Services & Delivery, Info-Tech Research Group.

    Geoff Nielson
    Senior Vice President
    Global Services & Delivery

    Photo of Brett Rugroden, Senior Vice President, Global Market Programs, Info-Tech Research Group.

    Brett Rugroden
    Senior Vice President
    Global Market Programs

    Photo of Hannes Scheidegger, Senior Vice President, Global Public Sector, Info-Tech Research Group.

    Hannes Scheidegger
    Senior Vice President
    Global Public Sector

    About Info-Tech Research Group

    Info-Tech Research Group produces unbiased and highly relevant research to help leaders make strategic, timely, and well-informed decisions. We partner closely with your teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for the organization.

    Sample of the IT Management & Governance Framework.

    Drive Measurable Results

    Our world-class leadership team is continually focused on building disruptive research and products that drive measurable results and save money.

    Info-Tech logo.

    Better Research Than Anyone

    Our team of experts is composed of the optimal mix of former CIOs, CISOs, PMOs, and other IT leaders and IT and management consultants as well as academic researchers and statisticians.

    Dramatically Outperform Your Peers

    Leverage Industry Best Practices

    We enable over 30,000 members to share their insights and best practices that you can use by having direct access to over 100 analysts as an extension of your team.

    Become an Info-Tech influencer:

    • Help shape our research by talking with our analysts.
    • Discuss the challenges, insights, and opportunities in your chosen areas.
    • Suggest new topic ideas for upcoming research cycles.

    Contact
    Jack Hakimian
    jhakimian@infotech.com

    We interview hundreds of experts and practitioners to help ensure our research is practical and focused on key member challenges.

    Why participate in expert interviews?

    • Discuss market trends and stay up to date.
    • Influence Info-Tech's research direction with your practical experience.
    • Preview our analysts' perspectives and preliminary research.
    • Build on your reputation as a thought leader and research contributor.
    • See your topic idea transformed into practical research.

    Thank you!

    Join us at our webinars to discuss more topics.

    For information on Info-Tech's products and services and to participate in our research process, please contact:

    Jack Hakimian
    jhakimian@infotech.com

    Accelerate Business Growth and Valuation by Building Brand Awareness

    • Buy Link or Shortcode: {j2store}569|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Brands that fail to invest in brand awareness are likely to face some, if not all these problems:

    • Lack of brand visibility and recognition
    • Inability to reach and engage with the buyers
    • Difficulties generating and converting leads
    • Low customer retention rate
    • Inability to justify higher pricing
    • Limited brand equity, business valuation, and sustainability

    Our Advice

    Critical Insight

    Awareness brings visibility and traction to brands, which is essential in taking the market leadership position and becoming the trusted brand that buyers think of first.

    Brand awareness also significantly contributes to increasing brand equity, market valuation, and business sustainability.

    Impact and Result

    Building brand awareness allows for the increase of:

    • Brand visibility, perception, recognition, and reputation
    • Interactions and engagement with the target audience
    • Digital advertising performance and ROI
    • Conversion rates and sales wins
    • Revenue and profitability
    • Market share & share of voice (SOV)
    • Talents, partners, and investors attraction and retention
    • Brand equity, business growth, and market valuation

    Accelerate Business Growth and Valuation by Building Brand Awareness Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Accelerate Business Growth and Valuation by Building Brand Awareness Storyboard - Learn how to establish the brand foundation, create assets and workflows, and deploy effective brand awareness strategies and tactics.

    A two-step approach to building brand awareness, starting with defining the brand foundations and then implementing effective brand awareness strategies and tactics.

    • Accelerate Business Growth and Valuation by Building Brand Awareness Storyboard

    2. Define Brand's Personality and Message - Analyze your target market and develop key elements of your brand guidelines.

    With this set of tools, you will be able to capture and analyze your target market, your buyers and their journeys, define your brand's values, personality, and voice, and develop all the key elements of your brand guidelines to enable people within your organization and external resources to build a consistent and recognizable image across all assets and platforms.

    • Market Analysis Template
    • Brand Recognition Survey and Interview Questionnaire and List Template
    • External and Internal Factors Analysis Template
    • Buyer Personas and Journey Presentation Template
    • Brand Purpose, Mission, Vision, and Values Template
    • Brand Value Proposition and Positioning Statement
    • Brand Voice Guidelines Template
    • Writing Style Guide Template
    • Brand Messaging Template
    • Writer Checklist

    3. Start Building Brand Awareness - Achieve strategic alignment.

    These tools will allow you to achieve strategic alignment and readiness, create assets and workflows, deploy tactics, establish Key Performance Indicators (KPIs), and monitor and optimize your strategy on an ongoing basis.

    • Brand Awareness Strategy and Tactics Template
    • Asset Creation and Management List
    • Campaign Workflows Template
    • Brand Awareness Strategy Rollout Plan Template
    • Survey Emails Best Practices Guidelines

    Infographic

    Further reading

    Accelerate Business Growth and Valuation By Building Brand Awareness

    Develop and deploy comprehensive, multi-touchpoint brand awareness strategies to become the trusted brand that buyers think of first.

    EXECUTIVE BRIEF

    Analyst perspective

    Building brand awareness

    Achieving high brand awareness in a given market and becoming the benchmark for buyers

    is what every brand wants to achieve, as it is a guarantee of success. Building brand awareness,

    even though its immediate benefits are often difficult to see and measure, is essential for companies that want to stand out from their competitors and continue to grow in a sustainable way. The return on investment (ROI) may take longer, but the benefits are also greater than those achieved through short-term initiatives with the expectation of immediate, albeit often limited, results.

    Brands that are familiar to their target market have greater credibility, generate more sales,

    and have a more loyal customer base. CMOs that successfully execute brand awareness programs

    build brand equity and grow company valuation.

    This is a picture of Nathalie Vezina

    Nathalie Vezina
    Marketing Research Director
    SoftwareReviews Advisory

    Executive summary

    Brand leaders know that brand awareness is essential to the success of all marketing and sales activities. Brands that fail to invest in brand awareness are likely to face some, if not all these problems:

    • Lack of brand visibility and compelling storytelling.
    • Inability to reach the target audience.
    • Low engagement on digital platforms and with ads.
    • Difficulties generating and converting leads, or closing/winning sales/deals, and facing a high cost per acquisition.
    • Low/no interest or brand recognition, trust level, and customer retention rate.
    • Inability to justify higher pricing.

    Convincing stakeholders of the benefits of strong brand awareness can be difficult when the positive outcomes are hard to quantify, and the return on investment (ROI) is often long-term. Among the many obstacles brand leaders must overcome are:

    • Lack of longer-term corporate vision, focusing all efforts and resources on short-term growth strategies for a quick ROI.
    • Insufficient market and target buyers' information and understanding of the brand's key differentiator.
    • Misalignment of brand message, and difficulties creating compelling content that resonates with the target audience, generates interest, and keeps them engaged.
    • Limited or no resources dedicated to the development of the brand.

    Inspired by top-performing businesses and best practices, this blueprint provides the guidance and tools needed to successfully build awareness and help businesses grow. By following these guidelines, brand leaders can expect to:

    • Gain market intelligence and a clear understanding of the buyer's needs, your competitive advantage, and key differentiator.
    • Develop a clear and compelling value proposition and a human-centric brand messaging driven by the brand's values.
    • Increase online presence and brand awareness to attract and engage with buyers.
    • Develop a long-term brand strategy and execution plan.

    "A brand is the set of expectations, memories, stories, and relationships that, taken together, account for a consumer's decision to choose one product or service over another."

    – Seth Godin

    What is brand awareness?

    The act of making a brand visible and memorable.

    Brand awareness is the degree to which buyers are familiar with and recognize the attributes and image of a particular brand, product, or service. The higher the level of awareness, the more likely the brand is to come into play when a target audience enters the " buying consideration" phase of the buyer's journey.

    Brand awareness also plays an important role in building equity and increasing business valuation. Brands that are familiar to their target market have greater credibility, drive more sales and have a more loyal customer base.
    Building brand awareness allows increasing:

    • Brand visibility, perception, recognition, and reputation
    • Interactions and engagement with the target audience
    • Digital advertising performance and ROI
    • Conversion rates and sales wins
    • Revenue and profitability
    • Market share and share of voice (SOV)
    • Talents, partners, and investors attraction and retention
    • Brand equity, business growth, and market valuation

    "Products are made in a factory, but brands are created in the mind."
    Source: Walter Landor

    Capitalizing on a powerful brand

    A longer-term approach for an increased and more sustainable ROI.

    Market leader position

    Developing brand awareness is essential to increase the visibility and traction of a brand.

    Several factors may cause a brand to be not well-known. One reason might be that the brand recently launched, such as a startup. Another reason could be that the brand has rebranded or entered a new market.

    To become the trusted brand that buyers think of first in their target markets, it is critical for these brands to develop and deploy comprehensive, multi-touchpoint brand awareness strategies.

    A relationship leading to loyalty

    A longer-term brand awareness strategy helps build a strong relationship between the brand and the buyer, fostering a lasting and rewarding alliance.

    It also enables brands to reach and engage with their target audience effectively by using compelling storytelling and meaningful content.

    Adopting a more human-centric approach and emphasizing shared values makes the brand more attractive to buyers and can drive sales and gain loyalty.

    Sustainable business growth

    For brands that are not well established in their target market, short-term tactics that focus on immediate benefits can be ineffective. In contrast, long-term brand awareness strategies provide a more sustainable ROI (return on investment).

    Investing in building brand awareness can impact a business's ability to interact with its target audience, generate leads, and increase sales. Moreover, it can significantly contribute to boosting the business's brand equity and market valuation.

    "Quick wins may work in the short term, but they're not an ideal substitute for long-term tactics and continued success."
    Source: Forbes

    Impacts of low brand awareness on businesses

    Unfamiliar brands, despite their strong potential, won't thrive unless they invest in their notoriety.

    Brands that choose not to invest in longer-term awareness strategies and rely solely on short-term growth tactics in hopes of an immediate gain will see their ability to grow diminished and their longevity reduced due to a lack of market presence and recognition.

    Symptoms of a weakening brand include:

    • High marketing spending and limited result
    • Low market share or penetration
    • Low sales, revenue, and gross margin
    • Weak renewal rate, customer retention, and loyalty
    • Difficulties delivering on the brand promise, low/no trust in the brand
    • Limited brand equity, business valuation, and sustainability
    • Unattractive brand to partners and investors

    "Your brand is the single most important investment you can make in your business."
    Source: Steve Forbes

    Most common obstacles to increasing brand awareness

    Successfully building brand awareness requires careful preparation and planning.

    • Limited market intelligence
    • Unclear competitive advantage/key differentiator
    • Misaligned and inconsistent messaging and storytelling
    • Lack of long-term vision
    • and low prioritization
    • Limited resources to develop and execute brand awareness building tactics
    • Unattractive content that does not resonate, generates little or no interest and engagement

    Investing in the notoriety of the brand

    Become the top-of-mind brand in your target market.

    To stand out, be recognized by their target audience, and become major players in their industry, brands must adopt a winning strategy that includes the following elements:

    • In-depth knowledge and understanding of the market and audience
    • Strengthening digital presence and activities
    • Creating and publishing content relevant to the target audience
    • Reaching out through multiple touchpoints
    • Using a more human-centric approach
    • Ensure consistency in all aspects of the brand, across all media and channels

    How far are you from being the brand buyers think of first in your target market?

    This is an image of the Brand Awareness Pyramid.

    Brand awareness pyramid

    Based on David Aaker's brand loyalty pyramid

    Tactics for building brand awareness

    Focus on effective ways to gain brand recognition in the minds of buyers.

    This is an image of the Brand Awareness Journey Roadmap.

    Brand recognition requires in-depth knowledge of the target market, the creation of strong brand attributes, and increased presence and visibility.

    Understand the market and audience you're targeting

    Be prepared. Act smart.

    To implement a winning brand awareness-building strategy, you must:

    • Be aware of your competitor's strengths and weaknesses, as well as yours.
    • Find out who is behind the keyboard, and the user experience they expect to have.
    • Plan and continuously adapt your tactics accordingly.
    • Make your buyer the hero.

    Identify the brands' uniqueness

    Find your "winning zone" and how your brand uniquely addresses buyers' pain points.

    Focus on your key differentiator

    A brand has found its "winning zone" or key differentiator when its value proposition clearly shows that it uniquely solves its buyers' specific pain points.

    Align with your target audience's real expectations and successfully interact with them by understanding their persona and buyer's journey. Know:

    • How you uniquely address their pain points.
    • Their values and what motivates them.
    • Who they see as authorities in your field.
    • Their buying habits and trends.
    • How they like brands to engage with them.

    An image of a Venn diagram between the following three terms: Buyer pain point; Competitors' value proposition; your unique value proposition.  The overlapping zone is labeled the Winning zone.  This is your key differentiator.

    Give your brand a voice

    Define and present a consistent voice across all channels and assets.

    The voice reflects the personality of the brand and the emotion to be transmitted. That's why it's crucial to establish strict rules that define the language to use when communicating through the brand's voice, the type of words, and do's and don'ts.

    To be recognizable it is imperative to avoid inconsistencies. No matter how many people are behind the brand voice, the brand must show a unique, distinctive personality. As for the tone, it may vary according to circumstances, from lighter to more serious.

    Up to 80% Increased customer recognition when the brand uses a signature color scheme across multiple platforms
    Source: startup Bonsai
    23% of revenue increase is what consistent branding across channels leads to.
    Source: Harvard Business Review

    When we close our eyes and listen, we all recognize Ella Fitzgerald's rich and unique singing voice.

    We expect to recognize the writing of Stephen King when we read his books. For the brand's voice, it's the same. People want to be able to recognize it.

    Adopt a more human-centric approach

    If your brand was a person, who would it be?

    Human attributes

    Physically attractive

    • Brand identity
    • Logo and tagline
    • Product design

    Intellectually stimulating

    • Knowledge and ideas
    • Continuous innovation
    • Thought leadership

    Sociable

    • Friendly, likeable and fun
    • Confidently engage with audience through multiple touchpoints
    • Posts and shares meaningful content
    • Responsive

    Emotionally connected

    • Inspiring
    • Powerful influencer
    • Triggers emotional reactions

    Morally sound

    • Ethical and responsible
    • Value driven
    • Deliver on its promise

    Personable

    • Honest
    • Self-confident and motivated
    • Accountable

    0.05 Seconds is what it takes for someone to form an opinion about a website, and a brand.
    Source: 8ways

    90% of the time, our initial gut reaction to products is based on color alone.
    Source: startup Bonsai

    56% of the final b2b purchasing decision is based on emotional factors.
    Source: B@B International

    Put values at the heart of the brand-buyers relationship

    Highlight values that will resonate with your audience.

    Brands that focus on the values they share with their buyers, rather than simply on a product or service, succeed in making meaningful emotional connections with them and keep them actively engaged.

    Shared values such as transparency, sustainability, diversity, environmental protection, and social responsibility become the foundation of a solid relationship between a brand and its audience.

    The key is to know what motivates the target audience.

    86% of consumers claim that authenticity is one of the key factors they consider when deciding which brands they like and support.
    Source: Business Wire

    56% of the final decision is based on having a strong emotional connection with the supplier.
    Source: B2B International

    64% of today's customers are belief-driven buyers; they want to support brands that "can be a powerful force for change."
    Source: Edelman

    "If people believe they share values with a company, they will stay loyal to the brand."
    – Howard Schultz
    Source: Lokus Design

    Double-down on digital

    Develop your digital presence and reach out to your target audiences through multiple touchpoints.

    Beyond engaging content, reaching the target audience requires brands to connect and interact with their audience in multiple ways so that potential buyers can form an opinion.

    With the right message consistently delivered across multiple channels, brands increase their reach, create a buzz around their brand and raise awareness.

    73% of today's consumers confirm they use more than one channel during a shopping journey
    Source: Harvard Business Review

    Platforms

    • Website and apps
    • Social media
    • Group discussions

    Multimedia

    • Webinars
    • Podcasts
    • Publication

    Campaign

    • Ads and advertising
    • Landing pages
    • Emails, surveys drip campaigns

    Network

    • Tradeshows, events, sponsorships
    • Conferences, speaking opportunities
    • Partners and influencers

    Use social media to connect

    Reach out to the masses with a social media presence.

    Social media platforms represent a cost-effective opportunity for businesses to connect and influence their audience and tell their story by posting relevant and search-engine-optimized content regularly on their account and groups. It's also a nice gateway to their website.

    Building a relationship with their target buyer through social media is also an easy way for businesses to:

    • Understand the buyers.
    • Receive feedback on how the buyers perceive the brand and how to improve it.
    • Show great user experience and responsiveness.
    • Build trust.
    • Create awareness.

    75% of B2B buyers and 84% of C-Suite executives use social media when considering a purchase
    Source: LinkedIn Business

    92% of B2B buyers use social media to connect with leaders in the sales industry.
    Source: Techjury

    With over 4.5 billion social media users worldwide, and 13 new users signing up to their first social media account every second, social media is fast becoming a primary channel of communication and social interaction for many.
    Source: McKinsey

    Become the expert subject matter

    Raise awareness with thought leadership content.

    Thought leadership is about building credibility
    by creating and publishing meaningful, relevant content that resonates with a target audience.
    Thought leaders write and publish all kinds of relevant content such as white papers, ebooks, case studies, infographics, video and audio content, webinars, and research reports.
    They also participate in speaking opportunities, live presentations, and other high-visibility forums.
    Well-executed thought leadership strategies contribute to:

    • Raise awareness.
    • Build credibility.
    • Be recognized as a subject expert matter.
    • Become an industry leader.

    60% of buyers say thought leadership builds credibility when entering a new category where the brand is not already known.
    Source: Edelman | LinkedIn

    70% of people would rather learn about a company through articles rather than advertising.
    Source: Brew Interactive

    57% of buyers say that thought leadership builds awareness for a new or little-known brand.
    Source: Edelman | LinkedIn

    To achieve best results

    • Know the buyers' persona and journey.
    • Create original content that matches the persona of the target audience and that is close to their values.
    • Be Truthful and insightful.
    • Find the right tone and balance between being human-centric, authoritative, and bold.
    • Be mindful of people's attention span and value their time.
    • Create content for each phase of the buyer's journey.
    • Ensure content is SEO, keyword-loaded, and add calls-to-action (CTAs).
    • Add reason to believe, data to support, and proof points.
    • Address the buyers' pain points in a unique way.

    Avoid

    • Focusing on product features and on selling.
    • Publishing generic content.
    • Using an overly corporate tone.

    Promote personal branding

    Rely on your most powerful brand ambassadors and influencers: your employees.

    The strength of personal branding is amplified when individuals and companies collaborate to pursue personal branding initiatives that offer mutual benefits. By training and positioning key employees as brand ambassadors and industry influencers, brands can boost their brand awareness through influencer marketing strategies.

    Personal branding, when well aligned with business goals, helps brands leverage their key employee's brands to:

    • Increase the organization's brand awareness.
    • Broaden their reach and circle of influence.
    • Show value, gain credibility, and build trust.
    • Stand out from the competition.
    • Build employee loyalty and pride.
    • Become a reference to other businesses.
    • Increase speaking opportunities.
    • Boost qualified leads and sales.

    About 90% of organizations' employee network tends to be completely new to the brand.
    Source: Everyone Social

    8X more engagement comes from social media content shared by employees rather than brand accounts.
    Source: Entrepreneur

    561% more reach when brand messages are shared by employees on social media, than the same message shared by the Brand's social media.
    Source: Entrepreneur

    "Personal branding is the art of becoming knowable, likable and trustable."
    Source: Founder Jar, John Jantsch

    Invest in B2B influencer marketing

    Broaden your reach and audiences by leveraging the voice of influencers.

    Influencers are trusted industry experts and analysts who buyers can count on to provide reliable information when looking to make a purchase.

    Influencer marketing can be very effective to reach new audiences, increase awareness, and build trust. But finding the right influencers with the level of credibility and visibility brands are expecting can sometimes be challenging.

    Search for influencers that have:

    • Relevance of audience and size.
    • Industry expertise and credibility.
    • Ability to create meaningful content (written, video, audio).
    • Charismatic personality with values consistent with the brand.
    • Frequent publications on at least one leading media platform.

    76% of people say that they trust content shared by people over a brand.
    Source: Adweek


    44% increased media mention of the brand using B2B influencer marketers.
    Source: TopRank Marketing

    Turn your customers into brand advocates

    Establish customer advocacy programs and deliver a great customer experience.

    Retain your customers and turn them into brand advocates by building trust, providing an exceptional experience, and most importantly, continuously delivering on the brand promise.

    Implement a strong customer advocacy program, based on personalized experiences, the value provided, and mutual exchange, and reap the benefits of developing and growing long-term relationships.

    92% of individuals trust word-of-mouth recommendations, making it one of the most trust-rich forms of advertising.
    Source: SocialToaster

    Word-of-mouth (advocacy) marketing increases marketing effectiveness by 54%
    Source: SocialToaster

    Make your brand known and make it stick in people's minds

    Building and maintaining high brand awareness requires that each individual within the organization carry and deliver the brand message clearly and consistently across all media whether in person, in written communications, or otherwise.

    To achieve this, brand leaders must first develop a powerful, researched narrative that people will embrace and convey, which requires careful preparation.

    Target market and audience intel

    • Target market Intel
    • Buyer persona and journey/pain points
    • Uniqueness and positioning

    Brand attributes

    • Values at the heart of the relationship
    • Brand's human attributes

    Brand visibly and recall

    • Digital and social media presence
    • Thought leadership
    • Personal branding
    • Influencer marketing

    Brand awareness building plan

    • Long-term awareness and multi-touchpoint approach
    • Monitoring and optimization

    Short and long-term benefits of increasing brand awareness

    Brands are built over the long term but the rewards are high.

    • Stronger brand perception
    • Improved engagement and brand associations
    • Enhanced credibility, reputation, and trust
    • Better connection with customers
    • Increased repeat business
    • High-quality leads
    • Higher and faster conversion rate
    • More sales closed/ deals won
    • Greater brand equity
    • Accelerated growth

    "Strong brands outperform their less recognizable competitors by as much as 73%."
    Source: McKinsey

    Brand awareness building

    Building brand awareness, even though immediate benefits are often difficult to see and measure, is essential for companies to stand out from their competitors and continue to grow in a sustainable way.

    To successfully raise awareness, brands need to have:

    • A longer-term vision and strategy.
    • Market Intelligence, a clear value proposition, and key differentiator.
    • Consistent, well-aligned messaging and storytelling.
    • Digital presence and content.
    • The ability to reach out through multiple touchpoints.
    • Necessary resources.

    Without brand awareness, brands become less attractive to buyers, talent, and investors, and their ability to grow, increase their market value, and be sustainable is reduced.

    Brand awareness building methodology

    Define brands' personality and message

    • Gather market intel and analyze the market.
    • Determine the value proposition and positioning.
    • Define the brand archetype and voice.
    • Craft a compelling brand message and story.
    • Get all the key elements of your brand guidelines.

    Start building brand awareness

    • Achieve strategy alignment and readiness.
    • Create and manage assets.
    • Deploy your tactics, assets, and workflows.
    • Establish key performance indicators (KPIs).
    • Monitor and optimize on an ongoing basis.

    Toolkit

    • Market and Influencing Factors Analysis
    • Recognition Survey and Best Practices
    • Buyer Personas and Journeys
    • Purpose, Mission, Vision, Values
    • Value Proposition and Positioning
    • Brand Message, Voice, and Writing Style
    • Brand Strategy and Tactics
    • Asset Creation and Management
    • Strategy Rollout Plan

    Short and long-term benefits of increasing brand awareness

    Increase:

    • Brand perception
    • Brand associations and engagement
    • Credibility, reputation, and trust
    • Connection with customers
    • Repeat business
    • Quality leads
    • Conversion rate
    • Sales closed / deals won
    • Brand equity and growth

    It typically takes 5-7 brand interactions before a buyer remembers the brand.
    Source: Startup Bonsai

    Who benefits from this brand awareness research?

    This research is being designed for:
    Brand and marketing leaders who:

    • Know that brand awareness is essential to the success of all marketing and sales activities.
    • Want to make their brand unique, recognizable, meaningful, and highly visible.
    • Seek to increase their digital presence, connect and engage with their target audience.
    • Are looking at reaching a new segment of the market.

    This research will also assist:

    • Sales with qualified lead generation and customer retention and loyalty.
    • Human Resources in their efforts to attract and retain talent.
    • The overall business with growth and increased market value.

    This research will help you:

    • Gain market intelligence and a clear understanding of the target audience's needs and trends, competitive advantage, and key differentiator.
    • The ability to develop clear and compelling, human-centric messaging and compelling story driven by brand values.
    • Increase online presence and brand awareness activities to attract and engage with buyers.
    • Develop a long-term brand awareness strategy and deployment plan.

    This research will help them:

    • Increase campaign ROI.
    • Develop a longer-term vision and benefits of investing in longer-term initiatives.
    • Build brand equity and increase business valuation.
    • Grow your business in a more sustainable way.

    SoftwareReviews' brand awareness building methodology

    Phase 1 Define brands' personality and message

    Phase 2 Start building brand awareness

    Phase steps

    1.1 Gather market intelligence and analyze the market.

    1.2 Develop and document the buyer's persona and journey.

    1.3 Uncover the brand mission, vision statement, core values, value proposition and positioning.

    1.4 Define the brand's archetype and tone of voice, then craft a compelling brand messaging.

    2.1 Achieve strategy alignment and readiness.

    2.2 Create assets and workflows and deploy tactics.

    2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis.

    Phase outcomes

    • Target market and audience are identified and documented.
    • A clear value proposition and positioning are determined.
    • The brand personality, voice, and messaging are developed.
    • All the key elements of the brand guidelines are in place and ready to use, along with the existing logo, typography, color palette, and imagery.
    • A comprehensive and actionable brand awareness strategy, with tactics, KPIs, and metrics, is set and ready to execute.
    • A progressive and effective deployment plan with deliverables, timelines, workflows, and checklists is in place.
    • Resources are assigned.

    Insight summary

    Brands to adapt their strategies to achieve longer-term growth
    Brands must adapt and adjust their strategies to attract informed buyers who have access to a wealth of products, services, and brands from all over. Building brand awareness, even though immediate benefits are often difficult to see and measure, has become essential for companies that want to stand out from their competitors and continue to grow in a sustainable way.

    A more human-centric approach
    Brand personalities matter. Brands placing human values at the heart of the customer-brand relationship will drive interest in their brand and build trust with their target audience.

    Stand out from the crowd
    Brands that develop and promote a clear and consistent message across all platforms and channels, along with a unique value proposition, stand out from their competitors and get noticed.

    A multi-touchpoints strategy
    Engage buyers with relevant content across multiple media to address their pain points. Analyze touchpoints to determine where to invest your efforts.

    Going social
    Buyers expect brands to be active and responsive in their interactions with their audience. To build awareness, brands are expected to develop a strong presence on social media by regularly posting relevant content, engaging with their followers and influencers, and using paid advertising. They also need to establish thought leadership through content such as white papers, case studies, and webinars.

    Thought leaders wanted
    To enhance their overall brand awareness strategy, organizations should consider developing the personal brand of key executives. Thought leadership can be a valuable method to gain credibility, build trust, and drive conversion. By establishing thought leadership, businesses can increase brand mentions, social engagement, website traffic, lead generation, return on investment (ROI), and Net Promoter Score (NPS).

    Save time and money with SoftwareReviews' branding advice

    Collaborating with SoftwareReviews analysts for inquiries not only provides valuable advice but also leads to substantial cost savings during branding activities, particularly when partnering with an agency.

    Guided Implementation Purpose Measured Value
    Build brands' personality and message Get the key elements of the brand guidelines in place and ready to use, along with your existing logo, typography, color palette, and imagery, to ensure consistency and clarity across all brand touchpoints from internal communication to customer-facing materials. Working with SoftwareReviews analysts to develop brand guidelines saves costs compared to hiring an agency.

    Example: Building the guidelines with an agency will take more or less the same amount of time and cost approximately $80K.

    Start building brand awareness Achieve strategy alignment and readiness, then deploy tactics, assets, and other deliverables. Start building brand awareness and reap the immediate and long-term benefits.

    Working with SoftwareReviews analysts and your team to develop a long-term brand strategy and deployment will cost you less than a fraction of the cost of using an agency.

    Example: Developing and executing long-term brand awareness strategies with an agency will cost between $50-$75K/month over a 24-month period minimum.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1

    Build brands' personality and message

    Phase 2

    Start building brand awareness

    • Call #1: Discuss concept and benefits of building brand awareness. Identify key stakeholders. Anticipate concerns and objections.
    • Call #2: Discuss target market intelligence, information gathering, and analysis.
    • Call #3: Review market intelligence information. Address questions or concerns.
    • Call #4: Discuss value proposition and guide to find positioning and key differentiator.
    • Call #5: Review value proposition. Address questions or concerns.
    • Call #6: Discuss how to build a comprehensive brand awareness strategy using SR guidelines and template.
    • Call #7: Review strategy. Address questions or concerns.
    • Call #8: Second review of the strategy. Address questions or concerns.
    • Call #9 (optional): Third review of the strategy. Address questions or concerns.
    • Call #10: Discuss how to build the Execution Plan using SR template.
    • Call #11: Review Execution Plan. Address questions or concerns.
    • Call #12: Second review of the Execution Plan. Address questions or concerns.
    • Call #13 (optional): Third review of the Execution Plan. Address questions or concerns.
    • Call #14: Discuss how to build a compelling storytelling and content creation.
    • Call #15: Discuss website and social media platforms and other initiatives.
    • Call #16: Discuss marketing automation and continuous monitoring.
    • Call #17 (optional): Discuss optimization and reporting
    • Call #18: Debrief and determine how we can help with next steps.

    A Guided Implementation (GI) is a series of calls with a SoftwareReviews Marketing Analyst to help implement our best practices in your organization.

    Your engagement managers will work with you to schedule analyst calls.

    Brand awareness building tools

    Each step of this blueprint comes with tools to help you build brand awareness.

    Brand Awareness Tool Kit

    This kit includes a comprehensive set of tools to help you better understand your target market and buyers, define your brand's personality and message, and develop an actionable brand awareness strategy, workflows, and rollout plan.

    The set includes these templates:
    • Market and Influencing Factors Analysis
    • Recognition Survey and Best Practices
    • Buyer Personas and Journeys
    • Purpose, Mission, Vision, and Values
    • Value Proposition and Positioning
    • Brand Message, Voice, and Writing Style
    • Brand Strategy and Tactics
    • Asset Creation and Management
    • Strategy Rollout Plan
    An image of a series of screenshots from the templates listed in the column to the left of this image.

    Get started!

    Know your target market and audience, deploy well-designed strategies based on shared values, and make meaningful connections with people.

    Phase 1

    Define brands' personality and message

    Phase 2

    Start building brand awareness

    Phase 1

    Define brands' personality and message

    Steps

    1.1 Gather market intelligence and analyze the market.
    1.2 Develop and document the buyer's persona and journey.
    1.3 Uncover the brand mission, vision statement, core values, positioning, and value proposition.
    1.4 Define the brand's archetype and tone of voice, then craft a compelling brand messaging.

    Phase outcome

    • Target market and audience are identified and documented.
    • A clear value proposition and positioning are determined.
    • The brand personality, voice, and messaging are developed.
    • All the key elements of the brand guidelines are in place. and ready to use, along with the existing logo, typography, color palette, and imagery..

    Build brands' personality and message

    Step 1.1 Gather market intelligence and analyze the market.

    Total duration: 2.5-8 hours

    Objective

    Analyze and document your competitive landscape, assess your strengths, weaknesses, opportunities,
    and threats, gauge the buyers' familiarity with your brand, and identify the forces of influence.

    Output

    This exercise will allow you to understand your market and is essential to developing your value proposition.

    Participants

    • Head of branding and key stakeholders

    MarTech
    May require you to:

    • Register to a Survey Platform.
    • Use, setup, or install platforms like CRM and/or Marketing Automation Platform.

    Tools

    1.1.1 SWOT and competitive landscape

    (60-120 min.)

    Analyze & Document

    Follow the instructions in the Market Analysis Template to complete the SWOT and Competitive Analysis, slides 4 to 7.

    1.1.3 Internal and External Factors

    (30-60 min.)

    Analyze

    Follow the instructions in the External and Internal Factors Analysis Template to perform the PESTLE, Porter's 5 Forces, and Internal Factors and VRIO Analysis.

    Transfer

    Transfer key information into slides 10 and 11 of the Market Analysis Template.

    Consult SoftwareReviews website to find the best survey and MarTech platforms or contact one of our analysts for more personalized assistance and guidance

    1.1.2 Brand recognition

    (60-300 min.)

    Prep

    Adapt the survey and interview questions in the Brand Recognition Survey Questionnaire and List Template.

    Determine how you will proceed to conduct the survey and interviews (internal or external resources, and tools).

    Refer to the Survey Emails Best Practices Guidelines for more information on how to conduct email surveys.

    Collect & Analyze

    Use the Brand Recognition Survey Questionnaire and List Template to build your list, conduct the survey /interviews, and collect and analyze the feedback received.

    Transfer

    Transfer key information into slides 8 and 9 of the Market Analysis Template.

    Brand performance diagnostic

    Have you considered diagnosing your brand's current performance before you begin building brand awareness?

    Audit your brand using the Diagnose Brand Health to Improve Business Growth blueprint.Collect and interpret qualitative and quantitative brand performance measures.

    The toolkit includes the following templates:

    • Surveys and interviews questions and lists
    • External and internal factor analysis
    • Digital and financial metrics analysis

    Also included is an executive presentation template to communicate the results to key stakeholders and recommendations to fix the uncovered issues.

    Build brands' personality and message

    Step 1.2 Develop and document the buyer's persona and journey.

    Total duration: 4-8 hours

    Objective

    Gather existing and desired customer insights and conduct market research to define and personify your buyers' personas and their buying behaviors.

    Output

    Provide people in your organization with clear direction on who your target buyers are and guidance on how to effectively reach and engage with them throughout their journey.
    Participants

    • Head of branding
    • Key stakeholders from sales and product marketing

    MarTech
    May require you to:

    • Register to an Online Survey Platform (free version or subscription).
    • Use, setup, or installation of platforms like CRM and/or Marketing Automation Platform.

    Tools

    1.2.1 Buyer Personas and Journeys

    (240-280 min.)

    Research

    Identify your tier 1 to 3 customers using the Ideal Client Profile (ICP) Workbook. (Recommended)

    Survey and interview existing and desired customers based using the Buyer Persona and Journey Interview Guide and Data Capture Tool. (Recommended)

    Create

    Define and document your tier 1 to 3 Buyer Personas and Journeys using the Buyer Personas and Journeys Presentation Template.

    Consult SoftwareReviews website to find the best survey platform for your needs or contact one of our analysts for more personalized assistance and guidance

    Buyer Personas and Journeys

    A well-defined buyer persona and journey is a great way for brands to ensure they are effectively reaching and engaging their ideal buyers through a personalized buying experience.

    When properly documented, it provides valuable insights about the ideal customers, their needs, challenges, and buying decision processes allowing the development of initiatives that correspond to the target buyers.

    Build brands' personality and message

    Step 1.3 Uncover the brand mission, vision statement, core values, value proposition, and positioning.

    Total duration: 4-5.5 hours

    Objective
    Define the "raison d'être" and fundamental principles of your brand, your positioning in the marketplace, and your unique competitive advantage.

    Output
    Allows everyone in an organization to understand and align with the brand's raison d'être beyond the financial dimension, its current positioning and objectives, and how it intends to achieve them.
    It also serves to communicate a clear and appealing value proposition to buyers.

    Participants

    • Head of branding
    • Chief Executive Officer (CEO)
    • Key stakeholders

    Tools

    • Brand Purpose, Mission, Vision, and Values Template
    • Value Proposition and Positioning Statement Template

    1.3.1 Brand Purpose, Mission, Vision, and Values

    (90-120 min.)

    Capture or Develop

    Capture or develop, if not already existing, your brand's purpose, mission, vision statement, and core values using slides 4 to 7 of the Brand Purpose, Mission, Vision, and Values Template.

    1.3.2 Brand Value Proposition and Positioning

    (150-210 min.)

    Define

    Map the brand value proposition using the canvas on slide 5 of the Value Proposition and Positioning Statement Template, and clearly articulate your value proposition statement on slide 4.

    Optional: Use canvas on slide 7 to develop product-specific product value propositions.

    On slide 8 of the same template, develop your brand positioning statement.

    Build brands' personality and message

    Steps 1.4 Define the brand's archetype and tone of voice, and craft a compelling brand messaging.

    Total duration: 5-8 hours

    Objective

    Define your unique brand voice and develop a set of guidelines, brand story, and messaging to ensure consistency across your digital and non-digital marketing and communication assets.
    Output

    A documented brand personality and voice, as well as brand story and message, will allow anyone producing content or communicating on behalf of your brand to do it using a unique and recognizable voice, and convey the right message.

    Participants

    • Head of branding
    • Content specialist
    • Chief Executive Officer and other key stakeholders

    Tools

    • Brand Voice Guidelines Template
    • Writing Style Guide Template
    • Brand Messaging Template
    • Writer Checklist Template

    1.4.1 Brand Archetype and Tone of Voice

    (120-240 min.)

    Define and document

    Refer to slides 5 and 6 of the Brand Voice Guidelines Template to define your brand personality (archetype), slide 7.

    Use the Brand Voice Guidelines Template to define your brand tone of voice and characteristics on slides 8 and 9, based on the 4 primary tone of voice dimensions, and develop your brand voice chart, slide 9.

    Set Rules

    In the Writing Style Guide template, outline your brand's writing principles, style, grammar, punctuation, and number rules.

    1.4.2 Brand Messaging

    (180-240 min.)

    Craft

    Use the Brand Messaging template, slides 4 to 7, to craft your brand story and message.

    Audit

    Create a content audit to review and approve content to be created prior to publication, using the Writer's Checklist template.

    Important Tip!

    A consistent brand voice leads to remembering and trusting the brand. It should stand out from the competitors' voices and be meaningful to the target audience. Once the brand voice is set, avoid changing it.

    Phase 2

    Start building brand awareness

    Steps

    2.1 Achieve strategy alignment and readiness.
    2.2 Create assets and workflows, and deploy tactics.
    2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis.

    Phase outcome

    • A comprehensive and actionable brand awareness strategy, with tactics, KPIs, and metrics, is set and ready to execute.
    • A progressive and effective deployment plan with deliverables, timelines, workflows, and checklists is in place.
    • Resources are assigned.

    Start building brand awareness

    Step 2.1 Achieve strategy readiness and alignment.

    Total duration: 4-5 hours

    Objective

    Now that you have all the key elements of your brand guidelines in place, in addition to your existing logo, typography, color palette, and imagery, you can begin to build brand awareness.

    Start planning to build brand awareness by developing a comprehensive and actionable brand awareness strategy with tactics that align with the company's purpose and objectives. The strategy should include achievable goals and measurables, budget and staffing considerations, and a good workload assessment.

    Output

    A comprehensive long-term, actionable brand awareness strategy with KPIs and measurables.

    Participants

    • Head of branding
    • Key stakeholders

    Tools

    • Brand Awareness Strategy and Tactics Template

    2.1.1 Brand Awareness Analysis

    (60-120 min.)

    Identify

    In slide 5 of the Brand Awareness Strategy and Tactics Template, identify your top three brand awareness drivers, opportunities, inhibitors, and risks to help you establish your strategic objectives in building brand awareness.

    2.1.2 Brand Awareness Strategy

    (60-120 min.)

    Elaborate

    Use slides 6 to 10 of the Brand Awareness Strategy and Tactics Template to elaborate on your strategy goals, key issues, and tactics to begin or continue building brand awareness.

    2.1.3 Brand Awareness KPIs and Metrics

    (180-240 min.)

    Set

    Set the strategy performance metrics and KPIs on slide 11 of the Brand Awareness Strategy and Tactics Template.

    Monitor

    Once you start executing the strategy, monitor and report each quarter using slides 13 to 15 of the same document.

    Understanding the difference between strategies and tactics

    Strategies and tactics can easily be confused, but although they may seem similar at times, they are in fact quite different.

    Strategies and tactics are complementary.

    A strategy is a plan to achieve specific goals, while a tactic is a concrete action or set of actions used to implement that strategy.

    To be effective, brand awareness strategies should be well thought-out, carefully planned, and supported by a series of tactics to achieve the expected outcomes.

    Start building brand awareness

    Step 2.2 Create assets and workflows and deploy tactics.

    Total duration: 3.5-4.5 hours

    Objective

    Build a long-term rollout with deliverables, milestones, timelines, workflows, and checklists. Assign resources and proceed to the ongoing development of assets. Implement, manage, and continuously communicate the strategy and results to key stakeholders.

    Output

    Progressive and effective development and deployment of the brand awareness-building strategy and tactics.

    Participants

    • Head of branding

    Tools

    • Asset Creation and Management List
    • Campaign Workflows Template
    • Brand Awareness Strategy Rollout Plan Template

    2.2.1 Assets Creation List

    (60-120 min.)

    Inventory

    Inventory existing assets to create the Asset Creation and Management List.

    Assign

    Assign the persons responsible, accountable, consulted, and informed of the development of each asset, using the RACI model in the template. Ensure you identify and collaborate with the right stakeholders.

    Prioritize

    Prioritize and add release dates.

    Communicate

    Update status and communicate regularly. Make the list with links to the assets available to the extended team to consult as needed.

    2.2.2 Rollout Plan

    (60-120 min.)

    Inventory

    Map out your strategy deployment in the Brand Awareness Strategy Rollout Plan Template and workflow in the Campaign Workflow Template.

    Assign

    Assign the persons responsible, accountable, consulted, and informed for each tactic, using the RACI model in the template. Ensure you identify and collaborate with the right stakeholders.

    Prioritize

    Prioritize and adjust the timeline accordingly.

    Communicate

    Update status and communicate regularly. Make the list with links to the assets available to the extended team to consult as needed.

    Band Awareness Strategy Rollout Plan
    A strategy rollout plan typically includes the following:

    • Identifying a cross-functional team and resources to develop the assets and deploy the tactics.
    • Listing the various assets to create and manage.
    • A timeline with key milestones, deadlines, and release dates.
    • A communication plan to keep stakeholders informed and aligned with the strategy and tactics.
    • Ongoing performance monitoring.
    • Constant adjustments and improvements to the strategy based on data collected and feedback received.

    Start building brand awareness

    Step 2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis.

    Total duration: 3.5-4.5 hours

    Objective

    Brand awareness is built over a long period of time and must be continuously monitored in several ways. Measuring and monitoring the effectiveness of your brand awareness activities will allow you to constantly adjust your tactics and continue to build awareness.

    Output

    This step will provide you with a snapshot of your current level of brand awareness and interactions with the brand, and allow you to set up the tools for ongoing monitoring and optimization.

    Participants

    • Head of branding
    • Digital marketing manager

    MarTech
    May require you to:

    • Register to an Online Survey Platform(free version or subscription), or
    • Use, setup, or installation of platforms like CRM and/or Marketing Automation Platform.
    • Use Google Analytics or other tracking tools.
    • Use social media and campaign management tools.

    Tools

    • Brand Awareness Strategy and Tactics Template

    2.2.2 Rollout Plan

    (60-120 min.)

    Measure

    Monitor and record the strategy performance metrics in slides 12 to 15 of the Brand Awareness Strategy and Tactics template, and gauge its performance against preset KPIs in slide 11. Make ongoing improvements to the strategy and assets.

    Communicate

    The same slides in which you monitor strategy performance can be used to report on the results of the current strategy to key stakeholders on a monthly or quarterly basis, as appropriate.

    Take this opportunity to inform stakeholders of any adjustments you plan to make to the existing plan to improve its performance. Since brand awareness is built over time, be sure to evaluate the results based on how long the strategy has been in place before making major changes.

    Consult SoftwareReviews website to find the best survey, brand monitoring and feedback, and MarTech platforms, or contact one of our analysts for more personalized assistance and guidance

    Measuring brand strategy performance
    There are two ways to measure and monitor your brand's performance on an ongoing basis.

    • By registering to brand monitoring and feedback platforms and tools like Meltwater, Hootsuite, Insights, Brand24, Qualtrics, and Wooltric.
    • Manually, using native analytics built in the platforms you're already using, such as Google and Social Media Analytics, or by gathering customer feedback through surveys, or calculating CAC, ROI, and more in spreadsheets.

    SoftwareReviews can help you choose the right platform for your need. We also equip you with manual tools, available with the Diagnose Brand Health to Improve Business Growthblueprint to measure:

    • Surveys and interviews questions and lists.
    • External and internal factor analysis.
    • Digital and financial metrics analysis.
    • Executive presentation to report on performance.

    Related SoftwareReviews research

    An image of the title page for SoftwareReviews Create a Buyer Persona and Journey. An image of the title page for SoftwareReviews Diagnose Brand Health to Improve Business Growth.

    Create a Buyer Persona and Journey

    Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales

    • Reduce time and resources wasted chasing the wrong prospects.
    • Increase open and click-through rates.
    • Perform more effective sales discovery.
    • Increase win rate.

    Diagnose Brand Health to Improve Business Growth

    Have a significant and well-targeted impact on business success and growth by knowing how your brand performs, identifying areas of improvement, and making data-driven decisions to fix them.

    • Increase brand awareness and equity.
    • Build trust and improve customer retention and loyalty.
    • Achieve higher and faster growth.

    Bibliography

    Aaker, David. "Managing Brand Equity." Simon & Schuster, 1991.
    "6 Factors for Brands to Consider While Designing Their Communication." Lokus Design, 23 Sept. 2022.
    "20 Advocacy Marketing Statistics You Need to Know." Social Toaster, n.d.
    Bazilian, Emma. "How Millennials and Baby Boomers Consume User-Generated Content And what brands can learn from their preferences." Adweek, January 2, 2017.
    B2B International, a Gyro: company, B2B Blog - Why Human-To-Human Marketing Is the Next Big Trend in a Tech-Obsessed World.
    B2B International, a Gyro: company, The State of B2B Survey 2019 - Winning with Emotions: How to Become Your Customer's First Choice.
    Belyh, Anastasia. "Brand Ambassador 101:Turn Your Personal Brand into Cash." Founder Jar, December 6, 2022.
    Brand Master Academy.com.
    Businesswire, a Berkshire Hathaway Company, "Stackla Survey Reveals Disconnect Between the Content Consumers Want & What Marketers Deliver." February 20, 2019.
    Chamat, Ramzi. "Visual Design: Why First Impressions Matter." 8 Ways, June 5, 2019.
    Cognism. "21 Tips for Building a LinkedIn Personal Brand (in B2B SaaS)."
    Curleigh, James. "How to Enhance and Expand a Global Brand." TED.
    "2019 Edelman Trust Barometer." Edelman.
    Erskine, Ryan. "22 Statistics That Prove the Value of Personal Branding." Entrepreneur, September 13, 2016.
    Forbes, Steve. "Branding for Franchise Success: How To Achieve And Maintain Brand Consistency Across A Franchise Network?" Forbes, 9 Feb. 2020.
    Godin, Seth. "Define: Brand." Seth's Blog, 30 Dec. 2009,
    Houragan, Stephen. "Learn Brand Strategy in 7 Minutes (2023 Crash Course)." YouTube.
    Jallad, Revecka. "To Convert More Customers, Focus on Brand Awareness." Forbes, October 22, 2019.
    Kingsbury, Joe, et al. "2021 B2B Thought Leadership Impact Study." Edelman, 2021.
    Kunsman, Todd. "The Anatomy of an Employee Influencer." EveryoneSocial, September 8, 2022.
    Landor, Walter. A Brand New World: The Fortune Guide to the 21st Century. Time Warner Books, 1999.
    Liedke, Lindsay. "37+ Branding Statistics For 2023: Stats, Facts & Trends." Startup Bonsai, January 2, 2023.
    Millman, Debbie. "How Symbols and Brands Shape our Humanity." TED, 2019.
    Nenova, Velina. "21 Eye-Opening B2B Marketing Statistics to Know in 2023." Techjury, February 9, 2023.
    Perrey, Jesko et al., "The brand is back: Staying relevant in an accelerating age." McKinsey & Company, May 1, 2015.
    Schaub, Kathleen. "Social Buying Meets Social Selling: How Trusted Networks Improve the Purchase Experience." LinkedIn Business, April 2014.
    Sopadjieva, Emma et al. "A Study of 46,000 Shoppers Shows That Omnichannel Retailing Works." Harvard Business Review, January 3, 2017.
    Shaun. "B2B Brand Awareness: The Complete Guide 2023." B2B House. 2023.
    TopRank Marketing, "2020 State of B2B Influencer Marketing Research Report." Influencer Marketing Report.

    Make IT a Successful Partner in M&A Integration

    • Buy Link or Shortcode: {j2store}79|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • Many organizations forget the essential role IT plays during M&A integration. IT is often unaware of a merger or acquisition until the deal is announced, making it very difficult to adequately interpret business goals and appropriately assess the target organization.
    • IT-related integration activities are amongst the largest cost items in an M&A, yet these costs are often overlooked or underestimated during due diligence.
    • IT is expected to use the M&A team’s IT due diligence report and estimated IT integration budget, which may not have been generated appropriately.
    • IT involvement in integration is critical to providing a better view of risks, improving the ease of integration, and optimizing synergies.

    Our Advice

    Critical Insight

    • Anticipate that you are going to be under pressure. Fulfill short-term, tactical operational imperatives while simultaneously conducting discovery and designing the technology end-state.
    • To migrate risks and guide discovery, select a high-level IT integration posture that aligns with business objectives.

    Impact and Result

    • Once a deal has been announced, use this blueprint to set out immediately to understand business M&A goals and expected synergies.
    • Assemble an IT Integration Program to conduct discovery and begin designing the technology end-state, while simultaneously identifying and delivering operational imperatives and quick-wins as soon as possible.
    • Following discovery, use this blueprint to build initiatives and put together an IT integration budget. The IT Integration Program has an obligation to explain the IT cost implications of the M&A to the business.
    • Once you have a clear understanding of the cost of your IT integration, use this blueprint to build a long-term action plan to achieve the planned technology end-state that best supports the business capabilities of the organization.

    Make IT a Successful Partner in M&A Integration Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should follow Info-Tech’s M&A IT integration methodology and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch the project

    Define the business’s M&A goals, assemble an IT Integration Program, and select an IT integration posture that aligns with business M&A strategy.

    • Make IT a Successful Partner in M&A Integration – Phase 1: Launch the Project
    • IT Integration Charter

    2. Conduct discovery and design the technology end-state

    Refine the current state of each IT domain in both organizations, and then design the end-state of each domain.

    • Make IT a Successful Partner in M&A Integration – Phase 2: Conduct Discovery and Design the Technology End-State
    • IT Integration Roadmap Tool

    3. Initiate operational imperatives and quick-wins

    Generate tactical operational imperatives and quick-wins, and then develop an interim action plan to maintain business function and capture synergies.

    • Make IT a Successful Partner in M&A Integration – Phase 3: Initiate Operational Imperatives and Quick-Wins

    4. Develop an integration roadmap

    Generate initiatives and put together a long-term action plan to achieve the planned technology end-state.

    • Make IT a Successful Partner in M&A Integration – Phase 4: Develop an Integration Roadmap
    [infographic]

    Workshop: Make IT a Successful Partner in M&A Integration

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Launch the Project

    The Purpose

    Identification of staffing and skill set needed to manage the IT integration.

    Generation of an integration communication plan to highlight communication schedule during major integration events.

    Identification of business goals and objectives to select an IT Integration Posture that aligns with business strategy.

    Key Benefits Achieved

    Defined IT integration roles & responsibilities.

    Structured communication plan for key IT integration milestones.

    Creation of the IT Integration Program.

    Generation of an IT Integration Posture.

    Activities

    1.1 Define IT Integration Program responsibilities.

    1.2 Build an integration communication plan.

    1.3 Host interviews with senior management.

    1.4 Select a technology end-state and IT integration posture.

    Outputs

    Define IT Integration Program responsibilities and goals

    Structured communication plan

    Customized interview guide for each major stakeholder

    Selected technology end-state and IT integration posture

    2 Conduct Discovery and Design the Technology End-State

    The Purpose

    Identification of information sources to begin conducting discovery.

    Definition of scope of information that must be collected about target organization.

    Definition of scope of information that must be collected about your own organization.

    Refinement of the technology end-state for each IT domain of the new entity. 

    Key Benefits Achieved

    A collection of necessary information to design the technology end-state of each IT domain.

    Adequate information to make accurate cost estimates.

    A designed end-state for each IT domain.

    A collection of necessary, available information to make accurate cost estimates. 

    Activities

    2.1 Define discovery scope.

    2.2 Review the data room and conduct onsite discovery.

    2.3 Design the technology end-state for each IT domain.

    2.4 Select the integration strategy for each IT domain.

    Outputs

    Tone set for discovery

    Key information collected for each IT domain

    Refined end-state for each IT domain

    Refined integration strategy for each IT domain

    3 Initiate Tactical Initiatives and Develop an Integration Roadmap

    The Purpose

    Generation of tactical initiatives that are operationally imperative and will help build business credibility.

    Prioritization and execution of tactical initiatives.

    Confirmation of integration strategy for each IT domain and generation of initiatives to achieve technology end-states.

    Prioritization and execution of integration roadmap.

    Key Benefits Achieved

    Tactical initiatives generated and executed.

    Confirmed integration posture for each IT domain.

    Initiatives generated and executed upon to achieve the technology end-state of each IT domain. 

    Activities

    3.1 Build quick-win and operational imperatives.

    3.2 Build a tactical action plan and execute.

    3.3 Build initiatives to close gaps and redundancies.

    3.4 Finalize your roadmap and kick-start integration.

    Outputs

    Tactical roadmap to fulfill short-term M&A objectives and synergies

    Confirmed IT integration strategies

    Finalized integration roadmap

    Build and Deliver an Optimized IT Update Presentation

    • Buy Link or Shortcode: {j2store}269|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Manage Business Relationships
    • Parent Category Link: /manage-business-relationships
    • IT update presentation success comes with understanding the business and the needs of your stakeholders. It often takes time and effort to get it right.
    • Many IT updates are too technically focused and do not engage nor demonstrate value in the eyes of the business.
    • This is not the time to boast about technical metrics that lack relevance.
    • Too often IT updates are prepared without the necessary pre-discussions required to validate content and hone priorities.

    Our Advice

    Critical Insight

    • CIOs need to take charge of the IT value proposition, increasing the impact and strategic role of IT.
    • Use your IT update to focus decisions, improve relationships, find new sources of value, and drive credibility.
    • Evolve the strategic partnership with your business using key metrics to help guide the conversation.

    Impact and Result

    • Build and deliver an IT update that focuses on what is most important.
    • Achieve the buy-in you require while driving business value.
    • Gain clarity on your scope, goals, and outcomes.
    • Validate IT’s role as a strategic business partner.

    Build and Deliver an Optimized IT Update Presentation Research & Tools

    Start here – read the Executive Brief

    Read our Executive Brief to find out how an optimized IT update presentation is your opportunity to drive business value.Review Info-Tech’s methodology and understand how we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Scope and goals

    Confirm the “why” of the IT update presentation by determining its scope and goals.

    • Build and Deliver an Optimized IT Update Presentation – Phase 1: Scope and Goals

    2. Assess and build

    Confirm the “what” of the presentation by focusing on business requirements, metrics, presentation creation, and stakeholder validation.

    • Build and Deliver an Optimized IT Update Presentation – Phase 2: Assess and Build
    • IT Update Stakeholder Interview Guide
    • IT Metrics Prioritization Tool

    3. Deliver and inspire

    Confirm the “how” of the presentation by focusing on engaging your audience, getting what you need, and creating a feedback cycle.

    • Build and Deliver an Optimized IT Update Presentation – Phase 3: Deliver and Inspire
    • IT Update Open Issues Tracking Tool
    [infographic]

    Workshop: Build and Deliver an Optimized IT Update Presentation

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Scope, Goals, and Requirements

    The Purpose

    Determine the IT update’s scope and goals and identify stakeholder requirements

    Key Benefits Achieved

    IT update scope and goals

    Business stakeholder goals and requirements

    Activities

    1.1 Determine/validate the IT update scope

    1.2 Determine/validate the IT update goals

    1.3 Business context analysis

    1.4 Determine stakeholder needs and expectations

    1.5 Confirm business goals and requirements

    Outputs

    Documented IT update scope

    Documented IT update goals

    Validated business context

    Stakeholder requirements analysis

    Confirmed business goals and requirements

    2 Validate Metrics With Business Needs

    The Purpose

    Analyze metrics and content and validate against business needs

    Key Benefits Achieved

    Selection of key metrics

    Metrics and content validated to business needs

    Activities

    2.1 Analyze current IT metrics

    2.2 Review industry best-practice metrics

    2.3 Align metrics and content to business stakeholder needs

    Outputs

    Identification of key metrics

    Finalization of key metrics

    Metrics and content validated to business stakeholder needs

    3 Create an optimized IT update

    The Purpose

    Create an IT update presentation that is optimized to business needs

    Key Benefits Achieved

    Optimized IT update presentation

    Activities

    3.1 Understand the audience and how to best engage them

    3.2 Determine how to present the pertinent data

    3.3 IT update review with key business stakeholders

    3.4 Final edits and review of IT update presentation

    3.5 Pre-presentation checklist

    Outputs

    Clarity on update audience

    Draft IT update presentation

    Business stakeholder feedback

    Finalized IT update presentation

    Confirmation on IT update presentation readiness

    Build a Digital Workspace Strategy

    • Buy Link or Shortcode: {j2store}294|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,399 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: End-User Computing Strategy
    • Parent Category Link: /end-user-computing-strategy
    • IT must figure out what a digital workspace is, why they’re building one, and what type they want.
    • Remote work creates challenges that cannot be solved by technology alone.
    • Focusing solely on technology risks building something the business doesn’t want or can’t use.

    Our Advice

    Critical Insight

    Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.

    Impact and Result

    • Partner with the business to create a team of digital workspace champions.
    • Empower employees with a tool that makes remote work easier.

    Build a Digital Workspace Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should partner with the business for building a digital workspace, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify the digital workspace you want to build

    Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.

    • Build a Digital Workspace Strategy – Phase 1: Identify the Digital Workspace You Want to Build
    • Digital Workspace Strategy Template
    • Digital Workspace Executive Presentation Template

    2. Identify high-level requirements

    Design the digital workspace’s value proposition to drive your requirements.

    • Build a Digital Workspace Strategy – Phase 2: Identify High-Level Requirements
    • Sample Digital Workspace Value Proposition
    • Flexible Work Location Policy
    • Flexible Work Time Policy
    • Flexible Work Time Off Policy
    • Mobile Device Remote Wipe Waiver Template
    • Mobile Device Connectivity & Allowance Policy
    • General Security – User Acceptable Use Policy

    3. Identify initiatives and a high-level roadmap

    Take an agile approach to building your digital workspace.

    • Build a Digital Workspace Strategy – Phase 3: Identify Initiatives and a High-Level Roadmap
    [infographic]

    Workshop: Build a Digital Workspace Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify the Digital Workspace You Want to Build

    The Purpose

    Ensure that the digital workspace addresses real problems the business is facing.

    Key Benefits Achieved

    Defined benefits that will address business problems

    Identified strategic business partners

    Activities

    1.1 Identify the digital workspace’s direction.

    1.2 Prioritize benefits and define a vision.

    1.3 Assemble a team of digital workspace champions.

    Outputs

    Vision statement

    Mission statement

    Guiding principles

    Prioritized business benefits

    Metrics and key performance indicators

    Service Owner, Business Owner, and Project Sponsor role definitions

    Project roles and responsibilities

    Operational roles and responsibilities

    2 Identify Business Requirements

    The Purpose

    Drive requirements through a well-designed value proposition.

    Key Benefits Achieved

    Identified requirements that are based in employees’ needs

    Activities

    2.1 Design the value proposition.

    2.2 Identify required policies.

    2.3 Identify required level of input from users and business units.

    2.4 Document requirements for user experiences, processes, and services.

    2.5 Identify in-scope training and culture requirements.

    Outputs

    Prioritized functionality requirements

    Value proposition for three business roles

    Value proposition for two service provider roles

    Policy requirements

    Interview and focus group plan

    Business process requirements

    Training and culture initiatives

    3 Identify IT and Service Provider Requirements

    The Purpose

    Ensure that technology is an enabler.

    Key Benefits Achieved

    Documented requirements for IT and service provider technology

    Activities

    3.1 Identify systems of record requirements.

    3.2 Identify requirements for apps.

    3.3 Identify information storage requirements.

    3.4 Identify management and security integrations.

    3.5 Identify requirements for internal and external partners.

    Outputs

    Requirements for systems for record

    Prioritized list of apps

    Storage system requirements

    Data and security requirements

    Outsourcing requirements

    Innovation

    • Buy Link or Shortcode: {j2store}21|cart{/j2store}
    • Related Products: {j2store}21|crosssells{/j2store}
    • Teaser Video: Visit Website
    • Teaser Video Title: Digital Ethics = Data Equity
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • sidebar graphic: Visit Link
    • Parent Category Name: Strategy and Governance
    • Parent Category Link: /strategy-and-governance
    Innovation is the at heart of every organization, especially in these fast moving times. It does not matter if you are in a supporting or "traditional" sector.  The company performing the service in a faster, better and more efficient way, wins.

    innovation

    Adopt Design Thinking in Your Organization

    • Buy Link or Shortcode: {j2store}327|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $23,245 Average $ Saved
    • member rating average days saved: 13 Average Days Saved
    • Parent Category Name: Innovation
    • Parent Category Link: /innovation
    • End users often have a disjointed experience while interacting with your organization in using its products and services.
    • You have been asked by your senior leadership to start a new or revive an existing design or innovation function within your organization. However, your organization has dismissed design thinking as the latest “management fad” and does not buy into the depth and rigor that design thinking brings.
    • The design or innovation function lives on the fringes of your organization due to its apathy towards design thinking or tumultuous internal politics.
    • You, as a CIO, want to improve the user satisfaction with the IT services your team provides to both internal and external users.

    Our Advice

    Critical Insight

    • A user’s perspective while interacting with the products and services is very different from the organization’s internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.
    • Top management must have a design thinker – the guardian angel of the balance between exploration (i.e. discovering new business models) and exploitation (i.e. leveraging existing business models).
    • Your approach to adopt design thinking must consider your organization’s specific goals and culture. There’s no one-size-fits-all approach.

    Impact and Result

    • User satisfaction, with the end-to-end journeys orchestrated by your organization, will significantly increase.
    • Design-centric organizations enjoy disproportionate financial rewards.

    Adopt Design Thinking in Your Organization Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt design thinking in your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. What is design thinking?

    The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.

    • Adopt Design Thinking in Your Organization – Phase 1: What Is Design Thinking?
    • Victor Scheinman's Experiment for Design

    2. How does an organization benefit from design thinking?

    This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.

    • Adopt Design Thinking in Your Organization – Phase 2: How Does an Organization Benefit From Design Thinking?
    • Trends Matrix (Sample)

    3. How do you build a design organization?

    The focus of this phase is to:

  • Measure the design-centricity of your organization and subsequently, identify the areas for improvement.
  • Define an approach for a design program that suites your organization’s specific goals and culture.
    • Adopt Design Thinking in Your Organization – Phase 3: How Do You Build a Design Organization?
    • Report on How Design-Centric Is Your Organization (Sample)
    • Approach for the Design Program (Sample)
    • Interview With David Dunne on Design Thinking
    • Interview With David Dunne on Design Thinking (mp3)
    [infographic]

    Workshop: Adopt Design Thinking in Your Organization

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 What Is Design Thinking?

    The Purpose

    The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.

    Key Benefits Achieved

    An intimate understanding of the design thinking

    An assessment of design-centricity of your organization and identification of areas for improvement

    Activities

    1.1 Discuss case studies on how designers think and work

    1.2 Define design thinking

    1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?

    1.4 Earmark areas for improvement to raise the design-centricity of your organization

    Outputs

    Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.

    2 How Does an Organization Benefit From Design Thinking?

    The Purpose

    In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.

    Key Benefits Achieved

    An in-depth understanding of the relevance of design in strategy formulation and service design

    An understanding of the trends that impact your organization

    A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those

    Activities

    2.1 Discuss relevance of design in strategy through case studies

    2.2 Articulate trends that impact your organization

    2.3 Discuss service design through case studies

    2.4 Identify critical customer journeys and baseline customers’ satisfaction with those

    2.5 Run a simulation of design in practice

    Outputs

    Trends that impact your organization.

    Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.

    3 How to Build a Design Organization

    The Purpose

    The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.

    Key Benefits Achieved

    An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.

    Activities

    3.1 Identify objectives and key measures for your design thinking program

    3.2 Structure your program after reviewing five main archetypes of a design program

    3.3 Balance between incremental and disruptive innovation

    3.4 Review best practices of a design organization

    Outputs

    An approach for your design thinking program: objectives and key measures; structure of the program, etc.

    Document and Maintain Your Disaster Recovery Plan

    • Buy Link or Shortcode: {j2store}417|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $52,224 Average $ Saved
    • member rating average days saved: 38 Average Days Saved
    • Parent Category Name: DR and Business Continuity
    • Parent Category Link: /business-continuity
    • Disaster recovery plan (DRP) documentation is often driven by audit or compliance requirements rather than aimed at the team that would need to execute recovery.
    • Between day-to-day IT projects and the difficulty of maintaining 300+ page manuals, DRP documentation is not updated and quickly becomes unreliable.
    • Inefficient publishing strategies result in your DRP not being accessible during disaster or key staff not knowing where to find the latest version.

    Our Advice

    Critical Insight

    • DR documentation fails when organizations try to boil the ocean with an all-in-one plan aimed at auditors, business leaders, and IT. It’s too long, too hard to maintain, and ends up being little more than shelf-ware.
    • Using flowcharts, checklists, and diagrams aimed at an IT audience is more concise and effective in a disaster, quicker to create, and easier to maintain.
    • Create your DRP in layers to keep the work manageable. Start with a recovery workflow to ensure a coordinated response, and build out supporting documentation over time.

    Impact and Result

    • Create visual and concise DR documentation that strips out unnecessary content and is written for an IT audience – the team that would actually be executing the recovery. Your business leaders can take the same approach to create separate business response plans. Don’t mix the two in an all-in-one plan that is not effective for either audience.
    • Determine a documentation distribution strategy that supports ease of maintenance and accessibility during a disaster.
    • Incorporate DRP maintenance into change management procedures to systematically update and refine the DR documentation. Don’t save up changes for a year-end blitz, which turns document maintenance into an onerous project.

    Document and Maintain Your Disaster Recovery Plan Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt a visual-based DRP, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Streamline DRP documentation

    Start by documenting your recovery workflow. Create supporting documentation in the form of checklists, flowcharts, topology diagrams, and contact lists. Finally, summarize your DR capabilities in a DRP Summary Document for stakeholders and auditors.

    • Document and Maintain Your Disaster Recovery Plan – Phase 1: Streamline DRP Documentation

    2. Select the optimal DRP publishing strategy

    Select criteria for assessing DRP tools, and evaluate whether a business continuity management tool, document management solution, wiki site, or manually distributing documentation is best for your DR team.

    • Document and Maintain Your Disaster Recovery Plan – Phase 2: Select the Optimal DRP Publishing Strategy
    • DRP Publishing and Document Management Solution Evaluation Tool
    • BCM Tool – RFP Selection Criteria

    3. Keep your DRP relevant through maintenance best practices

    Learn how to integrate DRP maintenance into core IT processes, and learn what to look for during testing and during annual reviews of your DRP.

    • Document and Maintain Your Disaster Recovery Plan – Phase 3: Keep Your DRP Relevant Through Maintenance Best Practices
    • Sample Project Intake Form Addendum for Disaster Recovery
    • Sample Change Management Checklist for Disaster Recovery
    • DRP Review Checklist
    • DRP-BCP Review Workflow (Visio)
    • DRP-BCP Review Workflow (PDF)

    4. Appendix: XMPL Case Study

    Model your DRP after the XMPL case study disaster recovery plan documentation.

    • Document and Maintain Your Disaster Recovery Plan – Appendix: XMPL Case Study
    • XMPL DRP Summary Document
    • XMPL Notification, Assessment, and Declaration Plan
    • XMPL Systems Recovery Playbook
    • XMPL Recovery Workflows (Visio)
    • XMPL Recovery Workflows (PDF)
    • XMPL Data Center and Network Diagrams (Visio)
    • XMPL Data Center and Network Diagrams (PDF)
    • XMPL DRP Business Impact Analysis Tool
    • XMPL DRP Workbook
    [infographic]

    Workshop: Document and Maintain Your Disaster Recovery Plan

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Streamline DRP Documentation

    The Purpose

    Teach your team how to create visual-based documentation.

    Key Benefits Achieved

    Learn how to create visual-based DR documentation.

    Activities

    1.1 Conduct a table-top planning exercise.

    1.2 Document your high-level incident response plan.

    1.3 Identify documentation to include in your playbook.

    1.4 Create an initial collection of supplementary documentation.

    1.5 Discuss what further documentation is necessary for recovering from a disaster.

    1.6 Summarize your DR capabilities for stakeholders.

    Outputs

    Documented high-level incident response plan

    List of documentation action items

    Collection of 1-3 draft checklists, flowcharts, topology diagrams, and contact lists

    Action items for ensuring that the DRP is executable for both primary and backup DR personnel

    DRP Summary Document

    2 Select the Optimal DRP Publishing Strategy

    The Purpose

    Learn the considerations for publishing your DRP.

    Key Benefits Achieved

    Identify the best strategy for publishing your DRP.

    Activities

    2.1 Select criteria for assessing DRP tools.

    2.2 Evaluate categories for DRP tools.

    Outputs

    Strategy for publishing DRP

    3 Learn How to Keep Your DRP Relevant Through Maintenance Best Practices

    The Purpose

    Address the common pain point of unmaintained DRPs.

    Key Benefits Achieved

    Create an approach for maintaining your DRP.

    Activities

    3.1 Alter your project intake considerations.

    3.2 Integrate DR considerations into change management.

    3.3 Integrate documentation into performance measurement and performance management.

    3.4 Learn best practices for maintaining your DRP.

    Outputs

    Project Intake Form Addendum Template

    Change Management DRP Checklist Template

    Further reading

    Document and Maintain Your Disaster Recovery Plan

    Put your DRP on a diet – keep it fit, trim, and ready for action.

    ANALYST PERSPECTIVE

    The traditional disaster recovery plan (DRP) “red binder” is dead. It takes too long to create, it’s too hard to maintain, and it’s not usable in a crisis.

    “This blueprint outlines the following key tactics to streamline your documentation effort and produce a better result:

    • Write for an IT audience and focus on how to recover. You don’t need 30 pages of fluff describing the purpose of the document.
    • Use flowcharts, checklists, and diagrams over traditional manuals. This drives documentation that is more concise, easier to maintain, and effective in a crisis.
    • Create your DRP in layers to get tangible results faster, starting with a recovery workflow that outlines your DR strategy, and then build out the specific documentation needed to support recovery.”
    (Frank Trovato, Research Director, Infrastructure, Info-Tech Research Group)

    This project is about DRP documentation after you have clarified your DR strategy; create these necessary inputs first

    These artifacts are the cornerstone for any disaster recovery plan.

    • Business Impact Analysis
    • DR Roles and Responsibilities
    • Recovery Workflow

    Missing a component? Start here. ➔ Create a Right-Sized Disaster Recovery Plan

    This blueprint walks you through building these inputs.
    Our approach saves clients on average US$16,825.22. (Clients self-reported an average saving of US$16,869.21 while completing the Create a Right-Sized Disaster Recovery Plan blueprint through advisory calls, guided implementations, or workshops (Info-Tech Research Group, 2017, N=129).)

    How this blueprint will help you document your DRP

    This Research is Designed For:

    • IT managers in charge of disaster recovery planning (DRP) and execution.
    • Organizations seeking to optimize their DRP using best-practice methodology.
    • Business continuity professionals that are involved with disaster recovery.

    This Research Will Help You:

    • Divide the process of creating DR documentation into manageable chunks, providing a defined scope for you to work in.
    • Identify an appropriate DRP document management and distribution strategy.
    • Ensure that DR documentation is up to date and accessible.

    This Research Will Also Assist:

    • IT managers preparing for a DR audit.
    • IT managers looking to incorporate components of DR into an IT operations document.

    This Research Will Help Them:

    • Follow a structured approach in building DR documentation using best practices.
    • Integrate DR into day-to-day IT operations.

    Executive summary

    Situation

    • DR documentation is often driven by audit or compliance requirements, rather than aimed at the team that would need to execute recovery.
    • Traditional DRPs are text-heavy, 300+ page manuals that are simply not usable in a crisis.
    • Compounding the problem, DR documentation is rarely updated, so it’s just shelf-ware.

    Complication

    • DRP is often given lower priority as day-to-day IT projects displace DR documentation efforts.
    • Inefficient publishing strategies result in your DRP not being accessible during disasters or key staff not knowing where to find the latest version.
    • Organizations that create traditional DRPs end up with massive manuals that are difficult to maintain, so they quickly become unreliable.

    Resolution

    • Create visual and concise DR documentation that strips out unnecessary content and is written for an IT audience – the team that would actually be executing the recovery. Your business leaders can take the same approach to create separate business response plans – don’t mix the two into an all-in-one plan that is not effective for either audience.
    • Determine a documentation distribution strategy that supports ease of maintenance and accessibility during a disaster.
    • Incorporate DRP maintenance into change management and project intake procedures to systematically update and refine the DR documentation. Don’t save up changes for a year-end blitz, which turns document maintenance into an onerous project.

    Info-Tech Insight

    1. DR documentation fails when organizations try to boil the ocean with an all-in-one plan aimed at auditors, business leaders, and IT. It’s too long, too hard to maintain, and ends up being little more than shelf-ware.
    2. Using flowcharts, checklists, and diagrams aimed at an IT audience is more concise and effective in a disaster, quicker to create, and easier to maintain.
    3. Create your DRP in layers to keep the work manageable. Start with a recovery workflow to ensure a coordinated response, and build out supporting documentation over time.

    An effective DRP that mitigates a wide range of potential outages is critical to minimizing the impact of downtime

    The criticality of having an effective DRP is underestimated.

    Cost of Downtime for the Fortune 1000
    • Cost of unplanned apps downtime per year: $1.25B to $2.5B
    • Cost of critical apps failure per hour: $500,000 to $1M
    • Cost of infrastructure failure per hour: $100,000
    • 35% reported to have recovered within 12 hours.
    • 17% of infrastructure failures took more than 24 hours to recover.
    • 13% of application failures took more than 24 hours to recover.
    Size of Impact Increasing Across Industries
    • The cost of downtime is rising across the board and not just for organizations that traditionally depend on IT (e.g. e-commerce).
    • Downtime cost increase since 2010:
      • Hospitality: 129% increase
      • Transportation: 108% increase
      • Media organizations: 104% increase
    Potential Lost Revenue
    A line graph of Potential Lost Revenue with vertical axis 'LOSS ($)' and horizontal axis 'TIME'. The line starts with low losses near the origin where 'Incident Occurs', gradually accelerates to higher losses as time passes, then decelerates before 'All Revenue Lost'. Note: 'Delay in recovery causes exponential revenue loss'.
    (Adapted from: Rothstein, Philip Jan. Disaster Recovery Testing: Exercising Your Contingency Plan (2007 Edition).)

    The impact of downtime increases significantly over time, not just in terms of lost revenue (as illustrated here) but also goodwill/reputation and health/safety. An effective DR solution and overall resiliency that mitigate a wide range of potential outages are critical to minimizing the impact of downtime.

    Without an effective DRP, your organization is gambling on being able to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks – and substantial impact.

    Only 38% of those with a full or mostly complete DRP believe their DRPs would be effective in a real crisis

    Organizations continue to struggle with creating DRPs, let alone making them actionable.

    Why are so many living with either an incomplete or ineffective DRP? For the same reasons that IT documentation in general continues to be a pain point:

    • It is an outdated model of what documentation should be – the traditional manual with detailed (lengthy) descriptions and procedures.
    • Despite the importance of DR, low priority is placed on creating a DRP and the day-to-day SOPs required to support a recovery.
    • There is a lack of effective processes for ensuring documentation stays up to date.
    A bar graph documenting percentages of survey responses about the completeness of their DRP. 'Only 20% of survey respondents indicated they have a complete DRP'. 13% said 'No DRP'. 33% said 'Partial DRP'. 34% said 'Mostly Completed'. 20% said 'Full DRP'.
    (Source: Info-Tech Research Group, N=165)
    A bar graph documenting percentages of survey responses about the level of confidence in their DRP. 'Only 38% of those who have a mostly completed or full DRP actually feel it would be effective in a crisis'. 4% said 'Low'. 58% said 'Unsure'. 38% said 'Confident'.
    (Source: Info-Tech Research Group, N=69 (includes only those who indicated DRP is mostly completed or completed))

    Improve usability and effectiveness with visual-based and more-concise documentation

    Choose flowcharts over process guides, checklists over lengthy procedures, and diagrams over descriptions.

    If you need a three-inch binder to hold your DRP, imagine having to flip through it to determine next steps during a crisis.

    DR documentation needs to be concise, scannable, and quickly understood to be effective. Visual-based documentation meets these requirements, so it’s no surprise that it also leads to higher DR success.

    DR success scores are based on:

    • Meeting recovery time objectives (RTOs).
    • Meeting recovery point objectives (RPOs).
    • IT staff’s confidence in their ability to meet RTOs/RPOs.
    A line graph of DR documentation types and their effectiveness. The vertical axis is 'DR Success', from Low to High. The horizontal axis is Documentation Type, from 'Traditional Manual' to 'Primarily flowcharts, checklists, and diagrams'. The line trends up to higher success with visual-based and more-concise documentation.(Source: Info-Tech Research Group, N=95)

    “Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow.” (Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management)

    Maintainability is another argument for visual-based, concise documentation

    There are two end goals for your DR documentation: effectiveness and maintainability. Without either, you will not have success during a disaster.

    Organizations using a visual-based approach were 30% more likely to find that DR documentation is easy to maintain. “Easy to maintain” leads to a 46% higher rate of DR success.
    Two bar graphs documenting survey responses regarding maintenance ease of DR documentation types. The first graph compares Traditional Manual vs Visual-based. For 'Traditional Manual' 72% responded they were Difficult to maintain while 28% responded they were Easy to maintain; for 'Visual-based' 42% responded they were Difficult to maintain while 58% responded they were Easy to maintain. Visual-based DR documentation received 30% more votes for Easy to Maintain. The second graph compares success rates of 'Difficult to Maintain' vs 'Easy to Maintain' DR documentation with Difficult being 31% and Easy being 77%, a 46% difference. 'Source: Info-Tech Research Group, N=96'.

    Not only are visual-based disaster recovery plans more effective, but they are also easier to maintain.

    Overcome documentation inertia with a tiered model that allows you to eat the elephant one bite at a time

    Start with a recovery workflow to at least ensure a coordinated response. Then use that workflow to determine required supporting documentation.

    Recovery Workflow: Starting the project with overly detailed documentation can slow down the entire process. Overcome planning inertia by starting with high-level incident response plans in a flowchart format. For examples and additional information, see XMPL Medical’s Recovery Workflows.

    Recovery Procedures (Systems Recovery Playbook): For each step in the high-level flowchart, create recovery procedures where necessary using additional flowcharts, checklists, and diagrams as appropriate. Leverage Info-Tech’s Systems Recovery Playbook example as a starting point.

    Additional Reference Documentation: Reference existing IT documentation, such as network diagrams and configuration documents, as well as more detailed step-by-step procedures where necessary (e.g. vendor documentation), particularly where needed to support alternate recovery staff who may not be as well versed as the primary system owners.

    Info-Tech Insight

    Organizations that use flowcharts, checklist, and diagrams over traditional, dense DRP manuals are far more likely to meet their RTOs/RPOs because their documentation is more usable and easier to maintain.

    Use a DRP summary document to satisfy executives, auditors, and clients

    Stakeholders don’t have time to sift through a pile of paper. Summarize your overall continuity capabilities in one, easy-to-read place.

    DRP Summary Document

    • Summarize BIA results
    • Summarize DR strategy (including DR sites)
    • Summarize backup strategy
    • Summarize testing and maintenance plans

    Follow Info-Tech’s methodology to make DRP documentation efficient and effective

    Phases

    Phase 1: Streamline DRP documentation Phase 2: Select the optimal DRP publishing strategy Phase 3: Keep your DRP relevant through maintenance best practices

    Phases

    1.1

    Start with a recovery workflow

    2.1

    Decide on a publishing strategy

    3.1

    Incorporate DRP maintenance into core IT processes

    1.2

    Create supporting DRP documentation

    3.2

    Conduct an annual focused review

    1.3

    Write the DRP Summary

    Tools and Templates

    End-to-End Sample DRP DRP Publishing Evaluation Tool Project In-take/Request Form

    Change Management Checklist

    Follow XMPL Medical’s journey through DR documentation

    CASE STUDY

    Industry Healthcare
    Source Created by amalgamating data from Info-Tech’s client base

    Streamline your documentation and maintenance process by following the approach outlined in XMPL Medical’s journey to an end-to-end DRP.

    Outline of the Disaster Recovery Plan

    XMPL’s disaster recovery plan includes its business impact analysis and a subset of tier 1 and tier 2 patient care applications.

    Its DRP includes incident response flowcharts, system recovery checklists, and a communication plan. Its DRP also references IT operations documentation (e.g. asset management documents, system specs, and system configuration docs), but this material is not published with the example documentation.

    Resulting Disaster Recovery Plan

    XMPL’s DRP includes actionable documents in the form of high-level disaster response plan flowcharts and system recovery checklists. During an incident, the DR team is able to clearly see the items for which they are responsible.

    Disaster Recovery Plan
    • Recovery Workflow
    • Business Impact Analysis
    • DRP Summary
    • System Recovery Checklists
    • Communication, Assessment, and Disaster Declaration Plan

    Info-Tech Best Practice

    XMPL Medical’s disaster recovery plan illustrates an effective DRP. Model your end-to-end disaster recovery plan after XMPL’s completed templates. The specific data points will differ from organization to organization, but the structure of each document will be similar.

    Model your disaster recovery documentation off of our example

    CASE STUDY

    Industry Healthcare
    Source Created by amalgamating data from Info-Tech’s client base

    Recovery Workflow:

    • Recovery Workflows (PDF, VSDX)

    Recovery Procedures (Systems Recovery Playbook):

    • DR Notification, Assessment, and Disaster Declaration Plan
    • Systems Recovery Playbook
    • Network Topology Diagrams

    Additional Reference Documentation:

    • DRP Workbook
    • Business Impact Analysis
    • DRP Summary Document

    Use Info-Tech’s DRP Maturity Scorecard to evaluate your progress

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Document and Maintain Your Disaster Recovery Plan – Project Overview

    1. Streamline DRP Documentation 2. Select the Optimal DRP Publishing Strategy 3. Keep Your DRP Relevant
    Supporting Tool icon
    Best-Practice Toolkit

    1.1 Start with a recovery workflow

    1.2 Create supporting DRP documentation

    1.3 Write the DRP summary

    2.1 Create Committee Profiles

    3.1 Build Governance Structure Map

    3.2 Create Committee Profiles

    Guided Implementations
    • Review Info-Tech’s approach to DRP documentation.
    • Create a high-level recovery workflow.
    • Create supporting DRP documentation.
    • Write the DRP summary.
    • Identify criteria for selecting a DRP publishing strategy.
    • Select a DRP publishing strategy.
    • Optional: Select requirements for a BCM tool and issue an RFP.
    • Optional: Review responses to RFP.
    • Learn best practices for integrating DRP maintenance into day-to-day IT processes.
    • Learn best practices for DRP-focused reviews.
    Associated Activity icon
    Onsite Workshop
    Module 1:
    Streamline DRP documentation
    Module 2:
    Select the optimal DRP publishing strategy
    Module 3:
    Learn best practices for keeping your DRP relevant
    Phase 1 Outcome:
    • A complete end-to-end DRP
    Phase 2 Outcome:
    • Selection of a publishing and management tool for your DRP documentation
    Phase 3 Outcome:
    • Strategy for maintaining your DRP documentation

    Workshop Overview Associated Activity icon

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Info-Tech Analysts Finalize Deliverables
    Activities
    Assess DRP Maturity and Review Current Capabilities

    0.1 Assess current DRP maturity through Info-Tech’s Maturity Scorecard.

    0.2 Identify the IT systems that support mission-critical business activities, and select 2 or 3 key applications to be the focus of the workshop.

    0.3 Identify current recovery strategies for selected applications.

    0.4 Identify current DR challenges for selected applications.

    Document Your Recovery Workflow

    1.1 Create a recovery workflow: review tabletop planning, walk through DR scenarios, identify DR gaps, and determine how to fill them.

    Create Supporting Documentation

    1.2 Create supporting DRP documentation.

    1.3 Write the DRP summary.

    Establish a DRP Publishing, Management, and Maintenance Strategy

    2.1 Decide on a publishing strategy.

    3.1 Incorporate DRP maintenance into core IT.

    3.2 Considerations for reviewing your DRP regularly.

    Deliverables
    1. Baseline DRP metric (based on DRP Maturity Scorecard)
    1. High-level DRP workflow
    2. DRP gaps and risks identified
    1. Recovery workflow and/or checklist for sample of IT systems
    2. Customized DRP Summary Template
    1. Strategy for selecting a DRP publishing tool
    2. DRP management and maintenance strategy
    3. Workshop summary presentation deck

    Workshop Goal: Learn how to document and maintain your DRP.

    Use these icons to help direct you as you navigate this research

    Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

    A small monochrome icon of a wrench and screwdriver creating an X.

    This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

    A small monochrome icon depicting a person in front of a blank slide.

    This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.


    Phase 1: Streamline DRP Documentation

    Step 1.1: Start with a recovery workflow

    PHASE 1
    PHASE 2
    PHASE 3
    1.1 1.2 1.3 2.1 3.1 3.2
    Start with a Recovery Workflow Create Supporting Documentation Write the DRP Summary Select DRP Publishing Strategy Integrate into Core IT Processes Conduct an Annual Focused Review

    This step will walk you through the following activities:

    • Review a model DRP.
    • Review your recovery workflow.
    • Identify documentation required to support the recovery workflow.

    This step involves the following participants:

    • DRP Owner
    • System SMEs
    • Alternate DR Personnel

    Outcomes of this step

    • Understanding the visual-based, concise approach to DR documentation.
    • Creating a recovery workflow that provides a roadmap for coordinating incident response and identifying required supporting documentation.

    Info-Tech Insights

    A DRP is a collection of procedures and supporting documents that allow an organization to recover its IT services to minimize system downtime for the business.

    1.1 — Start with a recovery workflow to ensure a coordinated response and identify required supporting documentation

    The recovery workflow clarifies your DR strategy and ensures the DR team is on the same page.

    Recovery Workflow

    The recovery workflow maps out the incident response plan from event detection, assessment, and declaration to systems recovery and validation.

    This documentation includes:

    • Clarifying initial incident response steps.
    • Clarifying the order of systems recovery and which recovery actions can occur concurrently.
    • Estimating actual recovery timeline through each stage of recovery.
    Recovery Procedures (Playbook)
    Additional Reference Documentation

    “We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management.” (Assistant Director-IT Operations, Healthcare Industry)

    Review business impact analysis (BIA) results to plan your recovery workflow

    The BIA defines system criticality from the business’s perspective. Use it to guide system recovery order.

    Specifically, review the following from your BIA:

    • The list of tier 1, 2, and 3 applications. This will dictate the recovery order in your recovery workflow.
    • Application dependencies. This will outline what needs to be included as part of an application recovery workflow.
    • The recovery time objective (RTO) and recovery point objective (RPO) for each application. This will also guide the recovery, and enable you to identify gaps where the recovery workflow does not meet RTOs and RPOs.

    CASE STUDY: The XMPL DRP documentation is based on this Business Impact Analysis Tool.

    Haven’t conducted a BIA? Use Info-Tech’s streamlined approach.

    Info-Tech’s publication Create a Right-Sized Disaster Recovery Plan takes a very practical approach to BIA work. Our process gives IT leaders a mechanism to quickly get agreement on system recovery order and DR investment priorities.

    Conduct a tabletop planning exercise to determine your recovery workflow

    Associated Activity icon 1.1.1 Tabletop Planning Exercise

    1. Define a scenario to drive the tabletop planning exercise:
      • Use a scenario that forces a full failover to your DR environment, so you can capture an end-to-end recovery workflow.
      • Avoid scenarios that impact health and safety such as tornados or a fire. You want to focus on IT recovery.
      • Example scenarios: Burst water pipe that causes data-center-wide damage or a gas leak that forces evacuation and power to be shut down for at least two days.

    Note: You may have already completed this exercise as part of Create a Right-Sized Disaster Recovery Plan.

    Info-Tech Insight

    Use scenarios to provide context for DR planning, and to test your plans, but don’t create a separate plan for every possibility.

    The high-level recovery plan will be the same whether the incident is a fire, flood, or tornado. While there might be some variances and outliers, these scenarios can be addressed by adding decision points and/or separate, supplementary instructions.

    Walk through the scenario and capture the recovery workflow

    Associated Activity icon 1.1.2 Tabletop Planning Exercise
    1. Capture the following information for tier 1, tier 2, and tier 3 systems:
      1. On white cue cards, record the steps and track start and end times for each step (where 00:00 is when the incident occurred).
      2. On yellow cue cards, document gaps in people, process, and technology requirements to complete the step.
      3. On red cue cards, indicate risks (e.g. no backup person for a key staff member).

    Note:

    • Ensure the language is sufficiently genericized (e.g. refer to events, not specifically a burst water pipe).
    • Review isolated failures (e.g. hardware, software). Typically, the recovery procedure documented for individual systems covers the essence of the recovery workflow whether it’s just the one system that failed or it’s part of a site-wide recovery.

    Note: You may have already completed this exercise as part of Create a Right-Sized Disaster Recovery Plan.

    Document your current-state recovery workflow based on the results of the tabletop planning

    Supporting Tool icon 1.1.2 Incident Response Plan Flowcharts, Tabs 2 and 3

    After you finish the tabletop planning exercise, the steps on the set of cue cards define your recovery workflow. Capture this in a flowchart format.

    Use the sample DRP to guide your own flowchart. Some notes on the example are:

    • XMPL’s Incident Management to DR flowchart shows the connection between its standard Service Desk processes and DR processes.
    • XMPL’s high-level workflows outline its recovery of tier 1, 2, and 3 systems.
    • Where more detail is required, include links to supporting documentation. In this example, XMPL Medical includes links to its Systems Recovery Playbook.
    Preview of an Info-Tech Template depicting a sample flowchart.

    This sample flowchart is included in XMPL Recovery Workflows.

    Step 1.2: Create Supporting DRP Documentation

    PHASE 1
    PHASE 2
    PHASE 3
    1.11.21.32.13.13.2
    Start with a Recovery WorkflowCreate Supporting DocumentationWrite the DRP SummarySelect DRP Publishing StrategyIntegrate into Core IT ProcessesConduct an Annual Focused Review

    This step will walk you through the following activities:

    • Create checklists for your playbook.
    • Document more complex procedures with flowcharts.
    • Gather and/or write network topology diagrams.
    • Compile a contact list.
    • Ensure there is enough material for backup personnel.

    This step involves the following participants:

    • DRP Owner
    • System SMEs
    • Backup DR Personnel

    Outcomes of this step

    • Actionable supporting documentation for your disaster recovery plan.
    • Contact list for IT personnel, business personnel, and vendor support.

    1.2 — Create supporting documentation for your disaster recovery plan

    Now that you have a high-level incident response plan, collect the information you need for executing that plan.

    Recovery Workflow

    Write your recovery procedures playbook to be effective and usable. Your playbook documentation should include:

    • Supplementary flowcharts
    • Checklists
    • Topology diagrams
    • Contact lists
    • DRP summary

    Reference vendors’ technical information in your flowcharts and checklists where appropriate.

    Recovery Procedures (Playbook)

    Additional Reference Documentation

    Info-Tech Insight

    Write for your audience. The playbook is for IT; include only the information they need to execute the plan. DRP summaries are for executives and auditors; do not include information intended for IT. Similarly, your disaster recovery plan is not for business units; keep BCP content out of your DRP.

    Use checklists to streamline step-by-step procedures

    Supporting Tool icon 1.2.1 XMPL Medical’s System Recovery Checklists

    Checklists are ideal when staff just need a reminder of what to do, not how to do it.

    XMPL Medical used its high-level flowcharts as a roadmap for creating its Systems Recovery Playbook.

    • Since its Playbook is intended for experienced IT staff, the writing style in the checklists is concise. XMPL includes links to reference material to support recovery, especially for alternate staff who might need additional instruction.
    • XMPL includes key parameters (e.g. IP addresses) rather than assume those details would be memorized, especially in a stressful DR scenario.
    • Similarly, include links to other useful resources such as VM templates.
    Preview of the Info-Tech Template 'Systems Recovery Playbook'.

    Included in the XMPL Systems Recovery Playbook are checklists for recovering XMPL’s virtual desktop infrastructure, mission-critical applications, and core infrastructure components.

    Use flowcharts to document processes with concurrent tasks not easily captured in a checklist

    Supporting Tool icon 1.2.2 XMPL Medical’s Phone Services Recovery Flowchart

    Recovery procedures can consist of flowcharts, checklists, or both, as well as diagrams. The main goal is to be clear and concise.

    • XMPL Medical created a flowchart to capture its phone services recovery procedure to capture concurrent tasks.
    • Additional instructions, where required, could still be captured in a Playbook checklist or other supporting documentation.
    • The flowchart could have also included key settings or other details as appropriate, particularly if the DR team chose to maintain this recovery procedure just in a flowchart format.
    Preview of the Info-Tech Template 'Recovery Workflows'.

    Included in the XMPL DR documentation is an example flowchart for recovering phone systems. This flowchart is in Recovery Workflows.

    Reference this blueprint for more SOP flowchart examples: Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Use topology diagrams to capture network layout, integrations, and system information

    Supporting Tool icon 1.2.4 XMPL Medical’s Data Center and Network Diagrams

    Topology diagrams, key checklists, and configuration settings are often enough for experienced networking staff to carry out their DR tasks.

    • XMPL Medical includes these diagrams with its DRP. Instead of recreating these diagrams, the XMPL Medical DR Manager asked their network team for these diagrams:
      • Primary data center diagram
      • DR site diagram
      • High-level network diagrams
    • Often, organizations already have network topology diagrams for reference purposes.

    “Our network engineers came to me and said our standard SOP template didn't work for them. They're now using a lot of diagrams and flowcharts, and that has worked out better for them.” (Assistant Director-IT Operations, Healthcare Industry)

    Preview of the Info-Tech Template 'Systems Recovery Playbook'.

    You can download a PDF and a VSD version of these Data Center and Network Diagrams from Info-Tech’s website.

    Create a list of organizational, IT, and vendor contacts that may be required to assist with recovery

    If there is something strange happening to your IT infrastructure, who you gonna call?

    Many DR managers have their team on speed dial. However, having the contact info of alternate staff, BCP leads, and vendors can be very helpful during a disaster. XMPL Medical lists the following information in its DRP Workbook:

    • The DR Teams, SMEs critical to disaster recovery, their backups, and key contacts (e.g. BC Management team leads, vendor contacts) that would be involved in:
      • Declaring a disaster.
      • Coordinating a response at an organizational level.
      • Executing recovery.
    • The people that have authority to declare a disaster.
    • Each person’s spending authority.
    • The rules for delegating authority.
    • Primary and alternate staff for each role.
    Example list of alternate staff, BCP leads, and vendors.

    Confirm with your DR team that you have all of the documentation that you need to recover during a disaster

    Associated Activity icon 1.2.7 Group Discussion

    DISCUSS: Is there enough information in your DRP for both primary and backup DR personnel?

    • Is it clear who is responsible for each DR task, including notification steps?
    • Have alternate staff for each role been identified?
    • Does the recovery workflow capture all of the high-level steps?
    • Is there enough documentation for alternate staff (e.g. network specs)?

    Step 1.3: Write the DRP Summary

    PHASE 1
    PHASE 2
    PHASE 3
    1.11.21.32.13.13.2
    Start with a Recovery WorkflowCreate Supporting DocumentationWrite the DRP SummarySelect DRP Publishing StrategyIntegrate into Core IT ProcessesConduct an Annual Focused Review

    This step will walk you through the following activities:

    • Write a DRP summary document.

    This step involves the following participants:

    • DRP Owner

    Outcomes of this step

    • High-level outline of your DRP capabilities for stakeholders such as executives, auditors, and clients.

    Summarize your DR capabilities using a DRP summary document

    Supporting Tool icon 1.3.1 DRP Summary Document

    The sample included on Info-Tech’s website is customized for the XMPL Medical Case Study – use the download as a starting point for your own summary document.

    DRP Summary Document

    XMPL’s DRP Summary is organized into the following categories:

    • DR requirements: This includes a summary of scope, business impact analysis (BIA), risk assessment, and high-level RTOs and achievable RTOs.
    • DR strategy: This includes a summary of XMPL’s recovery procedures, DR site, and backup strategy.
    • Testing and maintenance: This includes a summary of XMPL’s DRP testing and maintenance strategy.

    Be transparent about existing business risks in your DRP summary

    The DRP summary document is business facing. Include information of which business leaders (and other stakeholders) need to be aware.

    • Discrepancies between desired and achievable RTOs? Organizational leadership needs to know this information. Only then can they assign the resources and budget that IT needs to achieve the desired DR capabilities.
    • What is the DRP’s scope? XMPL Medical lists the IT components that will be recovered during a disaster, and components which will not. For instance, XMPL’s DRP does not recover medical equipment, and XMPL has separate plans for business continuity and emergency response coordination.
    Application tier Desired RTO (hh:mm) Desired RPO (hh:mm) Achievable RTO (hh:mm) Achievable RPO (hh:mm)
    Tier 1 4:00 1:00 *90:00 1:00
    Tier 2 8:00 1:00 *40:00 1:00
    Tier 3 48:00 24:00 *96:00 24:00

    The above table to is a snippet from the XMPL DR Summary Document (section 2.1.3.2).

    In the example, the DR team is unable to recover tier 1, 2, and 3 systems within the desired RTO. As such, they clearly communicate this information in the DRP summary, and include action items to address these gaps.

    Phase 2: Select the Optimal DRP Publishing Strategy

    Step 2.1: Select a DRP Publishing Strategy

    PHASE 1
    PHASE 2
    PHASE 3
    1.11.21.32.13.13.2
    Start with a Recovery WorkflowCreate Supporting DocumentationWrite the DRP SummarySelect DRP Publishing StrategyIntegrate into Core IT ProcessesConduct an Annual Focused Review

    This step will walk you through the following activities:

    • Select criteria for assessing DRP tools.
    • Evaluate categories for DRP tools.
    • Optional: Write an RFP for a BCM tool.

    This step involves the following participants:

    • DRP Owner

    Outcomes of this step

    • Identified strategies for publishing your DRP (i.e. making it available to your DR team).

    Info-Tech Insights

    Diversify your publishing strategy to ensure you can access your DRP in a disaster. For example, if you are using a BCM tool or SharePoint Online as your primary documentation repository, also push the DRP to your DR team’s smartphones as a backup in case the disaster affects internet access.

    2.1 — Select a DR publishing and document management strategy that fits your organization

    Publishing and document management considerations:

    Portability/External Access: Assume your primary site is down and inaccessible. Can you still access your documentation? As shown in this chart, traditional strategies of either keeping a copy at another location (e.g. at the failover site) or with staff (e.g. on a USB drive) still dominate, but these aren’t necessarily the best options.
    A bar chart titled 'Portability Strategy Popularity'. 'External Website (wiki site, cloud-based DRP tool, etc.)' scored 16%. 'Failover Site (network drive or redundant SharePoint, etc.)' scored 53%. 'Distribute to Staff (use USB drive, personal email, etc.)' scored 50%. 'Not Accessible Offsite' scored 7%.
    Note: Percentages total more than 100% due to respondents using more than one portability strategy.
    (Source: Info-Tech Research Group, N=118)
    Maintainability/Usability: How easy is it to create, update, and use the documentation? Is it easy to link to other documents as shown in the flowchart and checklist examples? Is there version control? Lack of version control can create a maintenance nightmare as well as issues in a crisis if staff are questioning whether they have the right version.
    Cost/Effort: Is the cost and effort appropriate? For example, a large enterprise may need a formal solution (e.g. DRP tools or SharePoint), but the cost might be hard to justify for a smaller company.

    Pros and cons of potential strategies

    This section will review the following strategies, their pros and cons, and how they meet publishing and document management requirements:

    • DRP tools (e.g. eBRP, Recovery Planner, LDRPS)
    • In-house solutions combining SharePoint and MS Office (or equivalent)
    • Wiki site
    • “Manual” approaches such as storing documents on a USB drive

    Avoid 42 hours of downtime due to a non-diversified publishing strategy

    CASE STUDY

    Industry Municipality
    Source Interview

    Situation

    • A municipal government has recently completed an end-to-end disaster recovery plan.
    • The team is feeling good about the fact that they were able to identify:
      • Relative criticality of applications.
      • Dependencies for each application.
      • Incident response plans for the current state and desired state.
      • System recovery procedures.

    Challenge

    • While the DR plan itself was comprehensive, the team only published the DR onto the government’s network drives.
    • A power generation issue caused power to be shut down, which in turn cascaded into downtime for the network.
    • Once the network was down, their DRP was inaccessible.

    Insights

    • Each piece of documentation that was created could have contributed to recovery efforts. However, because they were inaccessible, there was a delayed response to the incident. The result was 42 hours of downtime for end users.
    • Having redundant publishing strategies is just like having redundant IT infrastructure. In the event of downtime, not only do you need to have DR documentation, but you also need to make sure that it is accessible.

    Decide on a DR publishing strategy by looking at portability, maintainability, cost, and required effort

    Supporting Tool icon 2.1.1 DRP Publishing and Management Evaluation Tool

    Use the information included in Step 2.1 to guide your analysis of DRP publishing solutions.

    The tool enables you to compare two possible solutions based on these key considerations discussed in this section:

    • Portability/external access
    • Maintainability/usability
    • Cost
    • Effort

    The right choice will depend on factors such as current in-house tools, maturity around document management, the size of your IT department, and so on.

    For example, a small shop may do very well with the USB drive strategy, whereas a multi-national company will need a more formal strategy to manage consistent DRP distribution.

    Preview of Info-Tech's 'DRP Publishing and Management Solution Evaluation Tool'.

    The DRP Publishing and Management Solution Evaluation Tool helps you to evaluate the tools included in this section.

    Don’t think of a business continuity management (BCM) tool as a silver bullet; know what you’re getting out of it

    Portability/External Access:
    • Pros: Typically a SaaS option provides built-in external access with appropriate security and user administration to vary access rights.
    • Cons: Degree of external access is often dependent on the vendor.
    Maintainability/Usability:
    • Pros: Built-in templates encourage consistency and guide initial content development by indicating what details need to be captured.
    • Pros: Built-in document management (e.g. version control, metadata support), centralized access/navigation to required documents, and some automation (e.g. update contacts throughout the system).
    • Cons: Not a silver bullet. You still have to do the work to define and capture your processes.
    • Cons: Requires end-user and administrator training.
    Cost/Effort:
    • Pros: For large enterprises, the convenience of built-in document management and templates can outweigh the cost.
    • Cons: Expect leading DRP tools to cost $20K or more per year.

    About this approach:
    BCM tools are solutions that provide templates, tools, and document management to create BC and DR documentation.

    Info-Tech Insight

    The business case for a BCM tool is built by answering the following questions:

    • Will the BCM tool solve an unmet need?
    • Will the tool be more effective and efficient than an in-house solution?
    • Will the solution provide enhanced capabilities that an in-house solution cannot provide?

    If you cannot get a satisfactory answer to each of these questions, then opt for an in-house solution.

    “We explored a DRP tool, and it was something we might have used, but it was tens of thousands of pounds per year, so it didn’t stack up financially for us at all.” (Rik Toms, Head of Strategy – IP and IT, Cable and Wireless Communications)

    For in-house solutions, leverage tools such as SharePoint to provide document management capabilities

    Portability/External Access:
    • Pros: SharePoint is commonly web-enabled and supports external access with appropriate security and user administration.
    • Cons: Must be installed at redundant sites or be cloud-based to be effective in a crisis that takes down your primary data center.
    Maintainability/Usability:
    • Pros: Built-in document management (e.g. version control, metadata support) as well as centralized access/navigation to required documents.
    • Pros: No tool learning curve – SharePoint and MS Office would be existing solutions already used on a daily basis.
    • Cons: No built-in automation (e.g. automated updates to contacts throughout the system).
    • Cons: Consistency depends on creating templates and implementing processes for document updates, review, and approval.
    Cost/Effort:
    • Pros: Using existing tools, so this is a sunk cost in terms of capex.
    • Cons: Additional effort required to create templates and manage the documentation library.

    About this approach:
    DRPs and SOPs most often start as MS Office documents, even if there is a DRP tool available. For organizations that elect to bypass a formal DRP tool, and most do, the biggest gap they have to overcome is document management.

    Many organizations are turning to SharePoint to meet this need. For those that already have SharePoint in place, it makes sense to further leverage SharePoint for DR documentation and day-to-day SOPs.

    For SharePoint to be a practical solution, the documentation must still be accessible if the primary data center is down, e.g. by having redundant SharePoint instances at multiple in-house locations, or using a cloud-based SharePoint solution.

    “Just about everything that a DR planning tool does, you can do yourself using homegrown solutions or tools that you're already familiar with such as Word, Excel, and SharePoint.” (Allen Zuk, President and CEO, Sierra Management Consulting)

    A healthcare company uses SharePoint as its DRP and SOP documentation management solution

    CASE STUDY Healthcare

    • This organization is responsible for 50 medical facilities across three states.
    • It explored DRP tools, but didn’t find the right fit, so it has developed an in-house solution based in SharePoint. While DRP tools have improved, the organization no longer needs that type of solution. Its in-house solution is meeting its needs.
    • It has SharePoint instances at multiple locations to ensure availability if one site is down.

    Documentation Strategy

    • Created an IT operations library in SharePoint for DR and SOPs, from basic support to bare-metal restore procedures.
    • SOPs are linked from SharePoint to the virtual help desk for greater accessibility.
    • Where practical, diagrams and flowcharts are used, e.g. DR process flowcharts and network services SOPs dominated by diagrams and flowcharts.

    Management Strategy

    • Directors and the CIO have made finishing off SOPs their performance improvement objective for the year. The result is staff have made time to get this work done.
    • Status updates are posted monthly, and documentation is a regular agenda item in leadership meetings.
    • Regular tabletop testing validates documentation and ensures familiarity with procedures, including where to find required information.

    Results

    • Dependency on a few key individuals has been reduced. All relevant staff know what they need to do and where to access required documentation.
    • SOPs are enabling DR training as well as day-to-day operations training for new staff.
    • The organization has a high confidence in its ability to recovery from a disaster within established timelines.

    Explore using a wiki site as an inexpensive alternative to SharePoint and other content management solutions

    Portability/External Access:
    • Pros: Wiki sites can support external access as with any web solution.
    • Cons: Must be installed at redundant sites, hosted, or cloud-based to be effective in a crisis that takes down your primary data center.
    Maintainability/Usability:
    • Pros: Built-in document management (version control, metadata support, etc.) as well as centralized access/navigation to required information.
    • Pros: Authorized users can make updates dynamically, depending on how much restriction you have on the site.
    • Cons: No built-in automation (e.g. automated updates to contacts throughout the system).
    • Cons: Consistency depends on creating templates and implementing processes for document updates, review, and approval.
    Cost/Effort:
    • Pros: An inexpensive option compared to traditional content management solutions such as SharePoint.
    • Cons: Learning curve if wikis are new to your organization.

    About this approach:
    Wiki sites are websites where users collaborate to create and edit the content. Wikipedia is an example.

    While wiki sites are typically used for collaboration and dynamic content development, the traditional collaborative authoring model can be restricted to provide structure and an approval process.

    Several tools are available to create and manage wiki sites (and other collaboration solutions), as outlined in the following research:

    Info-Tech Insight

    If your organization is not already using wiki sites, this technology can introduce a culture shock. Start slow by using a wiki site within a specific department or for a particular project. Then evaluate how well your staff adapt to this technology as well as its potential effectiveness in your organization. Refer to our collaboration strategy research for additional guidance.

    For small IT shops, distributing documentation to key staff (e.g. via a USB drive) can still be effective

    Portability/External Access:
    • Pros: Appropriate staff have the documentation with them; there is no need to log into a remote site or access a tool to get at the information.
    • Cons: Relies on staff to be diligent about ensuring they have the latest documentation and keep it with them (not leave it in their desk drawer).
    Maintainability/Usability:
    • Pros: With this strategy, MS Office (or equivalent) is used to create and maintain the documentation, so there is no learning curve.
    • Pros: Simple, straightforward methodology – keep the master on a network drive, and download a copy to your USB drive.
    • Cons: No built-in automation (e.g. automated updates to contact information) or document management (e.g. version control).
    • Cons: Consistency depends on creating templates and implementing rigid processes for document updates, review, and approval.
    Cost/Effort:
    • Pros: Little to no cost and no tool management required.
    • Cons: “Manual” document management requires strict attention to process for version control, updates, approvals, and distribution.

    About this approach:
    With this strategy, your ERT and key IT staff keep a copy of your DRP and relevant documentation with them (e.g. on a USB drive). If the primary site experiences a major event, they have ready access to the documentation.

    Fifty percent of respondents in our recent survey use this strategy. A common scenario is to use a shared network drive or a solution such as SharePoint as the master centralized repository, but distribute a copy to key staff.

    Info-Tech Insight

    This approach can have similar disadvantages as using hard copies. Ensuring the USB drives are up to date, and that all staff who might need access have a copy, can become a burdensome process. More often, USB drives are updated periodically, so there is the risk that the information will be out of date or incomplete.

    Avoid extensive use of paper copies of DR documentation

    DR documents need to be easy to update, accessible from anywhere, and searchable. Paper doesn’t meet these needs.

    Portability/External Access:
    • Pros: Does not rely on technology or power.
    • Cons: Requires all staff who might be involved in a DR to have a copy, and to have it with them at all times, to truly have access at any time from anywhere.
    Maintainability/Usability:
    • Pros: In terms of usability, again there is no dependence on technology.
    • Cons: Updates need to be printed and distributed to all relevant staff every time there is a change to ensure staff have access to the latest, most accurate documentation if a disaster occurred. You can’t schedule disasters, so information needs to be current all the time.
    • Cons: Navigation to other information is manual – flipping through pages, etc. No searching or hyperlinks.
    Cost/Effort:
    • Pros: No technology system to maintain, aside from what you use for printing.
    • Cons: Printing expenses are actually among the highest incurred by organizations, and this adds to it.
    • Cons: Labor intensive due to need to print and physically distribute documentation updates.

    About this approach:
    Traditionally DRPs are printed and distributed to managers and/or kept in a central location at both the primary site and a secondary site. In addition, wallet cards are distributed that contain key information such as contact numbers.

    A wallet card or even a few printed copies of your high-level DRP for general reference can be helpful, but paper is not a practical solution for your overall DR documentation library, particularly when you include SOPs for recovery procedures.

    One argument in favor of paper is there is no dependency on power during a crisis. However, in a power outage, staff can use smartphones and potentially laptops (with battery power) to access electronically stored documentation to get through first response steps. In addition, your DR site should have backup power to be an appropriate recovery site.

    Optional: Partial list of BCM tool vendors

    A partial list of BCM tool vendors, including: Business Protector, catalyst, clearview, ContinuityLogic. Fusion, Logic Manager, Quantivate, RecoveryPlanner.com, MetricStream, SimpleRisk, riskonnect, Strategic BCP - ResilienceONE, RSA, and Sungard Availability Services.

    The list is only a partial list of BCM tool vendors. The order in which vendors are presented, and inclusion in this list, does not represent an endorsement.

    Optional: Use our list of requirements as a foundation for selecting and reviewing BCM tools

    Supporting Tool icon 2.1.2 BCM Tool – RFP Selection Criteria

    If a BCM tool is the best option for your environment, expedite the evaluation process with our BCM Tool – RFP Selection Criteria.

    Through advisory services, workshops, and consulting engagements, we have created this BCM Tool Requirements List. The featured requirements includes the following categories:

    1. Integrations
    2. Planning and Monitoring
    3. Administration
    4. Architecture
    5. Security
    6. Support and Training
    Preview of the Info-Tech template 'BCM Tool – RFP Selection Criteria'.

    This BCM Tool – RFP Selection Criteria can be appended to an RFP. You can leverage Info-Tech’s RFP Template if your organization does not have one.

    Info-Tech can write full RFPs

    As part of a consulting engagement, Info-Tech can write RFPs for BCM tools and provide a customized scoring tool based on your environment’s unique requirements.

    Phase 3: Keep Your DRP Relevant Through Maintenance Best Practices

    Step 3.1: Integrate DRP maintenance into core IT processes

    PHASE 1
    PHASE 2
    PHASE 3
    1.11.21.32.13.13.2
    Start with a Recovery WorkflowCreate Supporting DocumentationWrite the DRP SummarySelect DRP Publishing StrategyIntegrate into Core IT ProcessesConduct an Annual Focused Review

    This step will walk you through the following activities:

    • Integrate DRP maintenance with Project Management.
    • Integrate DRP considerations into Change Management.
    • Integrate with Performance Management.

    This step involves the following participants:

    • DRP Owner
    • Head of Project Management Office
    • Head of Change Advisory Board
    • CIO

    Outcomes of this step

    • Updated project intake form.
    • Updated change management practice.
    • Updated performance appraisals.

    3.1 — Incorporate DRP maintenance into core IT processes

    Focusing on these three processes will help ensure that your plan stays current, accurate, and usable.

    The Info-Tech / COBIT5 'IT Management and Governance Framework' with three processes highlighted: 'MEA01 Performance Measurement', 'BAI06 Change Management', and 'BAI01 Project Management'.

    Info-Tech Best Practice

    Prioritize quick wins that will have large benefits. The advice presented in this section offers easy ways to help keep your DRP up to date. These simple solutions can save a lot of time and effort for your DRP team as opposed to more intricate changes to the processes above.

    Assess how new projects impact service criticality and DR requirements upfront during project intake

    Icon for process 'BAI01 Project Management'.
    Supporting Tool icon 3.1.1 Sample Project Intake Form Addendum

    Understand the RTO/RPO requirements and IT impacts for new or enhanced services to ensure appropriate provisioning and overall DRP updates.

    • Have submitters include service continuity requirements. This information can be inserted into your business impact analysis. Use similar language that you use in your own BIA.
      • The submitter should know how critical the resulting project will be. Any items that the submitter doesn’t know, the Project Steering Committee should investigate.
    • Have IT assess the impact on the DRP. The submitter will not know how the DRP will be impacted directly. Ask the project committee to consider how DRP documentation and the DR environment will need to be changed due to the project under consideration.

    Note: The goal is not to make DR a roadblock, but rather to ensure project requirements will be met – including availability and DR requirements.

    Preview of the Info-Tech template 'Project Intake Form'.

    This Project Intake Form asks the submitter to fill out the availability and criticality requirements for the project.

    Leverage your change management process to identify required DRP updates as they occur

    Icon for process 'BAI06 Change Management'.

    Avoid the year-end rush to update your DRP. Keeping it up to date as changes occur saves time in the long run and ensures your plan is accurate when you need it.

    • As part of your change management process, identify potential updates to:
      • System documentation (e.g. configuration settings).
      • Recovery procedures (e.g. if a system has been virtualized, that changes the recovery procedure).
      • Your DR environment (e.g. system configuration updates for standby systems).
    • Keep track of how often a system has changed. Relevant DRP documentation might be due for a deeper review:
      • After a system has been changed ten times (even from routine changes), notify your DRP Manager to flag the relevant DRP documentation for review.
      • As part of formal DRP reviews, pay closer attention to DRP documentation for the flagged systems.
    Preview of the Info-Tech template 'Disaster Recovery Change Management'.

    This template asks the submitter to fill out the availability and criticality requirements for the project.

    For change management best practices beyond DRP considerations, please see Optimize Change Management.

    Integrate documentation into performance measurement and performance management

    Icon for process 'MEA01 Performance Measurement'.

    Documentation is a necessary evil – few like to create it and more immediate tasks take priority. If it isn’t scheduled and prioritized, it won’t happen.

    Why documentation is such a challenge

    How management can address these challenges

    We all know that IT staff typically do not like to write documentation. That’s not why they were hired, and good documentation is not what gets them promoted. Include documentation deliverables in your IT staff’s performance appraisal to stress the importance of ensuring documentation is up to date, especially where it might impact DR success.
    Similarly, documentation is secondary to more urgent tasks. Time to write documentation is often not allocated by project managers. Schedule time for developing documentation, just like any other project, or it won’t happen.
    Writing manuals is typically a time-intensive task. Focus on what is necessary for another experienced IT professional to execute the recovery. As discussed earlier, often a diagram or checklist is good enough and actually far more usable in a crisis.

    “Our directors and our CIO have tied SOP work to performance evaluations, and SOP status is reviewed during management meetings. People have now found time to get this work done.” (Assistant Director – IT Operations, Healthcare Industry)

    Step 3.2: Conduct an Annual Focused Review

    PHASE 1
    PHASE 2
    PHASE 3
    1.11.21.32.13.13.2
    Start with a Recovery WorkflowCreate Supporting DocumentationWrite the DRP SummarySelect DRP Publishing StrategyIntegrate into Core IT ProcessesConduct an Annual Focused Review

    This step will walk you through the following activities:

    1. Identify components of your DRP to refresh.
    2. Identify organizational changes requiring further focus.
    3. Test your DRP and identify problems.
    4. Correct problems identified with DRP.

    This step involves the following participants:

    • DRP Owner
    • System SMEs
    • Backup DR Personnel

    Outcomes of this step

    • An actionable, up-to-date DRP.

    Info-Tech Insight

    Testing is a waste of time and resources if you do not fix what’s broken. Tabletop testing is effective at uncovering gaps in your DR processes, but if you don’t address those gaps, then your DRP will still be unusable in a disaster.

    Set up a safety net to capture changes that slipped through the cracks with a focused review process

    Evaluate documentation supporting high-priority systems, as well as documentation supporting IT systems that have been significantly changed.

    • Ideally you’re maintaining documentation as you go along. But you need to have an annual review to catch items that may have slipped through.
    • Don’t review everything. Instead, review:
      • IT systems that have had 10+ changes: small changes and updates can add up over time. Ensure:
        • The plans for these systems are updated for changes (e.g. configuration changes).
        • SMEs and backup personnel are familiar with the changes.
      • Tier 1 / Gold Systems: Ensure that you can still recover tier 1 systems with your existing DRP documentation.
    • Track documentation issues that you discovered with your ticketing system or service desk tool to ensure necessary documentation changes are made.
    1. Annual Focused Review
    2. Tier 1 Systems
    3. Significantly Changed Systems
    4. Organizational Changes

    Identify larger changes, both organizational and within IT, that necessitate DRP updates

    During your focused review, consider how organizational changes have impacted your DRP.

    The COBIT 5 Enablers provide a foundation for this analysis. Consider:

    • Changes in regulatory requirements: Are there new requirements for IT that are not reflected in your DRP? Is the organization required to comply with any additional regulations?
    • Changes to organizational structures, business processes, and how employees work: Can employees still be productive once tier 1 services are restored or have RTOs changed? Has organizational turnover impacted your DRP?
    • SMEs leaving or changing roles: Can IT still execute your DRP? Are there still people for all the key roles?
    • Changes to IT infrastructure and applications: Can the business still access the information they need during a disaster? Is your BIA still accurate? Do new services need to be considered tier 1?

    Info-Tech Best Practice

    COBIT 5 Enablers
    What changes need to be reflected in your DRP?

    A cycle visualization titled 'Disaster Recovery Plan'. Starting at 'Changes in Regulatory Requirements', it proceeds clockwise to 'Organizational Structure', 'Changes in Business Processes', and 'How Employees Work', before it returns to DRP. Then 'Changes to Applications', 'Changes to Infrastructure', 'SMEs Leaving or Changing Roles', and then back to the DRP.

    Create a plan during your annual focused review to test your DRP throughout the year

    Regardless of your documentation approach, training and familiarity with relevant procedures is critical.

    • Start with tabletop exercises and progress to technology-based testing (simulation, parallel, and full-scale testing).
    • Ask staff to reference documentation while testing, even if they do not need to. This practice helps to confirm documentation accuracy and accessibility.
    • Incorporate cross-training in DR testing. This gives important experience to backup personnel and will further validate that documents are complete and accurate.
    • Track any discovered documentation issues with your ticketing system or project tracking tools to ensure necessary documentation changes are made.

    Example Test Schedule:

    1. Q1: Tabletop testing shadowed by backup personnel
    2. Q2: Tabletop testing led by backup personnel
    3. Q3: Technology-based testing
    4. Annual Focused Review: Review Results

    Reference this blueprint for guidance on DRP testing plans: Reduce Costly Downtime Through DR Testing

    Appendix A: XMPL Case Study

    Follow XMPL Medical’s journey through DR documentation

    CASE STUDY

    Industry Healthcare
    Source Created by amalgamating data from Info-Tech’s client base

    Streamline your documentation and maintenance process by following the approach outlined in XMPL Medical’s journey to an end-to-end DRP.

    Outline of the Disaster Recovery Plan

    XMPL’s disaster recovery plan includes its business impact analysis and a subset of tier 1 and tier 2 patient care applications.

    Its DRP includes incident response flowcharts, system recovery checklists, and a communication plan. Its DRP also references IT operations documentation (e.g. asset management documents, system specs, and system configuration docs), but this material is not published with the example documentation.

    Resulting Disaster Recovery Plan

    XMPL’s DRP includes actionable documents in the form of high-level disaster response plan flowcharts and system recovery checklists. During an incident, the DR team is able to clearly see the items for which they are responsible.

    Disaster Recovery Plan
    • Recovery Workflow
    • Business Impact Analysis
    • DRP Summary
    • System Recovery Checklists
    • Communication, Assessment, and Disaster Declaration Plan

    Info-Tech Best Practice

    XMPL Medical’s disaster recovery plan illustrates an effective DRP. Model your end-to-end disaster recovery plan after XMPL’s completed templates. The specific data points will differ from organization to organization, but the structure of each document will be similar.

    Model your disaster recovery documentation off of our example

    CASE STUDY

    Industry Healthcare
    Source Created by amalgamating data from Info-Tech’s client base

    Recovery Workflow:

    • Recovery Workflows (PDF, VSDX)

    Recovery Procedures (Systems Recovery Playbook):

    • DR Notification, Assessment, and Disaster Declaration Plan
    • Systems Recovery Playbook
    • Network Topology Diagrams

    Additional Reference Documentation:

    • DRP Workbook
    • Business Impact Analysis
    • DRP Summary Document

    Use our structure to create your practical disaster recovery plan.

    Appendix B: Summary, Next Steps, and Bibliography

    Insight breakdown

    Use visual-based documentation instead of a traditional DRP manual.

    • Flowcharts, checklists, and diagrams are more concise, easier to maintain, and more effective in a crisis.
    • Write for an IT audience and focus on how to recover. You don’t need 30 pages of fluff describing the purpose of the document.

    Create your DRP in layers to keep the work manageable.

    • Start with a recovery workflow to ensure a coordinated response, and build out supporting documentation over time.

    Prioritize quick wins to make DRP maintenance easier and more likely to happen.

    • Incorporate DRP maintenance into change management and project intake procedures to systematically update and refine the DR documentation. Don’t save up changes for a year-end blitz, which turns document maintenance into an onerous project.

    Summary of accomplishment

    Knowledge Gained

    • How to create visual-based DRP documentation
    • How to integrate DRP maintenance into core IT processes

    Processes Optimized

    • DRP documentation creation
    • DRP publishing tool selection
    • DRP documentation maintenance

    Deliverables Completed

    • DRP documentation
    • Strategy for publishing your DRP
    • Modified project-intake form
    • Change management checklist for DR considerations

    Project step summary

    Client Project: Document and Maintain Your Disaster Recovery Plan

    • Create a recovery workflow.
    • Create supporting DRP documentation.
    • Write a summary for your DRP.
    • Decide on a publishing strategy.
    • Incorporate DRP maintenance into core IT processes.
    • Conduct an annual focused review.

    Info-Tech Insight

    This project has the ability to fit the following formats:

    • Onsite workshop by Info-Tech Research Group consulting analysts.
    • Do-it-yourself with your team.
    • Remote delivery (Info-Tech Guided Implementation).

    Related Info-Tech research

    Create a Right-Sized Disaster Recovery Plan
    Close the gap between your DR capabilities and service continuity requirements.

    Reduce Costly Downtime Through DR Testing
    Improve the accuracy of your DRP and your team’s ability to efficiently execute recovery procedures through regular DR testing.

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind
    Go beyond satisfying auditors to drive process improvement, consistent IT operations, and effective knowledge transfer.

    Prepare for a DRP Audit
    Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.

    Bibliography

    A Structured Approach to Enterprise Risk Management (ERM) and the Requirements of ISO 31000. The Association of Insurance and Risk Managers, Alarm: The Public Risk Management Association, and The Institute of Risk Management, 2010.

    “APO012: Manage Risk.” COBIT 5: Enabling Processes. ISACA, 2012.

    Bird, Lyndon, Ian Charters, Mel Gosling, Tim Janes, James McAlister, and Charlie Maclean-Bristol. Good Practice Guidelines: A Guide to Global Good Practice in Business Continuity. Global ed. Business Continuity Institute, 2013.

    COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. ISACA, 2012.

    “EDM03: Ensure Risk Optimisation.” COBIT 5: Enabling Processes. ISACA, 2012.

    Risk Management. ISO 31000:2009.

    Rothstein, Philip Jan. Disaster Recovery Testing: Exercising Your Contingency Plan. Rothstein Associates: 1 Oct. 2007.

    Societal Security – Business continuity management systems – Guidance. ISO 22313:2012.

    Societal Security – Business continuity management systems – Requirements. ISO 22301:2012.

    Understanding and Articulating Risk Appetite. KPMG, 2008.

    Develop and Deploy Security Policies

    • Buy Link or Shortcode: {j2store}256|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $19,953 Average $ Saved
    • member rating average days saved: 19 Average Days Saved
    • Parent Category Name: Governance, Risk & Compliance
    • Parent Category Link: /governance-risk-compliance
    • Employees are not paying attention to policies. Awareness and understanding of what the security policy’s purpose is, how it benefits the organization, and the importance of compliance are overlooked when policies are distributed.
    • Informal, un-rationalized, ad hoc policies do not explicitly outline responsibilities, are rarely comprehensive, and are difficult to implement, revise, and maintain.
    • Data breaches are still on the rise and security policies are not shaping good employee behavior or security-conscious practices.
    • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

    Our Advice

    Critical Insight

    • Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.
    • Policies must be reasonable, auditable, enforceable, and measurable. If the policy items don’t meet these requirements, users can’t be expected to adhere to them. Focus on developing policies to be quantified and qualified for them to be relevant.

    Impact and Result

    • Save time and money using the templates provided to create your own customized security policies mapped to the Info-Tech framework, which incorporates multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA).

    Develop and Deploy Security Policies Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop and Deploy Security Policies Deck – A step-by-step guide to help you build, implement, and assess your security policy program.

    Our systematic approach will ensure that all identified areas of security have an associated policy.

  • Develop the security policy program.
  • Develop and implement the policy suite.
  • Communicate the security policy program.
  • Measure the security policy program.
    • Develop and Deploy Security Policies – Phases 1-4

    2. Security Policy Prioritization Tool – A structured tool to help your organization prioritize your policy suite to ensure that you are addressing the most important policies first.

    The Security Policy Prioritization Tool assesses the policy suite on policy importance, ease to implement, and ease to enforce. The output of this tool is your prioritized list of policies based on our policy framework.

    • Security Policy Prioritization Tool

    3. Security Policy Assessment Tool – A structured tool to assess the effectiveness of policies within your organization and determine recommended actions for remediation.

    The Security Policy Assessment Tool assesses the policy suite on policy coverage, communication, adherence, alignment, and overlap. The output of this tool is a checklist of remediation actions for each individual policy.

    • Security Policy Assessment Tool

    4. Security Policy Lifecycle Template – A customizable lifecycle template to manage your security policy initiatives.

    The Lifecycle Template includes sections on security vision, security mission, strategic security and policy objectives, policy design, roles and responsibilities for developing security policies, and organizational responsibilities.

    • Security Policy Lifecycle Template

    5. Policy Suite Templates – A best-of-breed templates suite mapped to the Info-Tech framework you can customize to reflect your organizational requirements and acquire approval.

    Use Info-Tech's security policy templates, which incorporate multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA), to ensure that your policies are clear, concise, and consistent.

    • Acceptable Use of Technology Policy Template
    • Application Security Policy Template
    • Asset Management Policy Template
    • Backup and Recovery Policy Template
    • Cloud Security Policy Template
    • Compliance and Audit Management Policy Template
    • Data Security Policy Template
    • Endpoint Security Policy Template
    • Human Resource Security Policy Template
    • Identity and Access Management Policy Template
    • Information Security Policy Template
    • Network and Communications Security Policy Template
    • Physical and Environmental Security Policy Template
    • Security Awareness and Training Policy Template
    • Security Incident Management Policy Template
    • Security Risk Management Policy Template
    • Security Threat Detection Policy Template
    • System Configuration and Change Management Policy Template
    • Vulnerability Management Policy Template

    6. Policy Communication Plan Template – A template to help you plan your approach for publishing and communicating your policy updates across the entire organization.

    This template helps you consider the budget time for communications, identify all stakeholders, and avoid scheduling communications in competition with one another.

    • Policy Communication Plan Template

    7. Security Awareness and Training Program Development Tool – A tool to help you identify initiatives to develop your security awareness and training program.

    Use this tool to first identify the initiatives that can grow your program, then as a roadmap tool for tracking progress of completion for those initiatives.

    • Security Awareness and Training Program Development Tool

    Infographic

    Workshop: Develop and Deploy Security Policies

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define the Security Policy Program

    The Purpose

    Define the security policy development program.

    Formalize a governing security policy lifecycle.

    Key Benefits Achieved

    Understanding the current state of policies within your organization.

    Prioritizing list of security policies for your organization.

    Being able to defend policies written based on business requirements and overarching security needs.

    Leveraging an executive champion to help policy adoption across the organization.

    Formalizing the roles, responsibilities, and overall mission of the program.

    Activities

    1.1 Understand the current state of policies.

    1.2 Align your security policies to the Info-Tech framework for compliance.

    1.3 Understand the relationship between policies and other documents.

    1.4 Prioritize the development of security policies.

    1.5 Discuss strategies to leverage stakeholder support.

    1.6 Plan to communicate with all stakeholders.

    1.7 Develop the security policy lifecycle.

    Outputs

    Security Policy Prioritization Tool

    Security Policy Prioritization Tool

    Security Policy Lifecycle Template

    2 Develop the Security Policy Suite

    The Purpose

    Develop a comprehensive suite of security policies that are relevant to the needs of the organization.

    Key Benefits Achieved

    Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.

    Activities

    2.1 Discuss the risks and drivers your organization faces that must be addressed by policies.

    2.2 Develop and customize security policies.

    2.3 Develop a plan to gather feedback from users.

    2.4 Discuss a plan to submit policies for approval.

    Outputs

    Understanding of the risks and drivers that will influence policy development.

    Up to 14 customized security policies (dependent on need and time).

    3 Implement Security Policy Program

    The Purpose

    Ensure policies and requirements are communicated with end users, along with steps to comply with the new security policies.

    Improve compliance and accountability with security policies.

    Plan for regular review and maintenance of the security policy program.

    Key Benefits Achieved

    Streamlined communication of the policies to users.

    Improved end user compliance with policy guidelines and be better prepared for audits.

    Incorporate security policies into daily schedule, eliminating disturbances to productivity and efficiency.

    Activities

    3.1 Plan the communication strategy of new policies.

    3.2 Discuss myPolicies to automate management and implementation.

    3.3 Incorporate policies and processes into your security awareness and training program.

    3.4 Assess the effectiveness of security policies.

    3.5 Understand the need for regular review and update.

    Outputs

    Policy Communication Plan Template

    Understanding of how myPolicies can help policy management and implementation.

    Security Awareness and Training Program Development Tool

    Security Policy Assessment Tool

    Action plan to regularly review and update the policies.

    Further reading

    Develop and Deploy Security Policies

    Enhance your overall security posture with a defensible and prescriptive policy suite.

    Analyst Perspective

    A policy lifecycle can be the secret sauce to managing your policies.

    A policy for policy’s sake is useless if it isn’t being used to ensure proper processes are followed. A policy should exist for more than just checking a requirement box. Policies need to be quantified, qualified, and enforced for them to be relevant.

    Policies should be developed based on the use cases that enable the business to run securely and smoothly. Ensure they are aligned with the corporate culture. Rather than introducing hindrances to daily operations, policies should reflect security practices that support business goals and protection.

    No published framework is going to be a perfect fit for any organization, so take the time to compare business operations and culture with security requirements to determine which ones apply to keep your organization secure.

    Photo of Danny Hammond, Research Analyst, Security, Risk, Privacy & Compliance Practice, Info-Tech Research Group. Danny Hammond
    Research Analyst
    Security, Risk, Privacy & Compliance Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge
    • Security breaches are damaging and costly. Trying to prevent and respond to them without robust, enforceable policies makes a difficult situation even harder to handle.
    • Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities and compliance requirements, and they are rarely comprehensive.
    • Without a strong lifecycle to keep policies up to date and easy to use, end users will ignore or work around poorly understood policies.
    • Time and money is wasted dealing with preventable security issues that should be pre-emptively addressed in a comprehensive corporate security policy program.
    Common Obstacles

    InfoSec leaders will struggle to craft the right set of policies without knowing what the organization actually needs, such as:

    • The security policies needed to safeguard infrastructure and resources.
    • The scope the security policies will cover within the organization.
    • The current compliance and regulatory obligations based on location and industry.
    InfoSec leaders must understand the business environment and end-user needs before they can select security policies that fit.
    Info-Tech’s Approach

    Info-Tech’s Develop and Deploy Security Policies takes a multi-faceted approach to the problem that incorporates foundational technical elements, compliance considerations, and supporting processes:

    • Assess what security policies currently exist within the organization and consider additional secure policies.
    • Develop a policy lifecycle that will define the needs, develop required documentation, and implement, communicate, and measure your policy program.
    • Draft a set of security policies mapped to the Info-Tech framework, which incorporates multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA).

    Info-Tech Insight

    Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.

    Your Challenge

    This research is designed to help organizations design a program to develop and deploy security policies

    • A security policy is a formal document that outlines the required behavior and security controls in place to protect corporate assets.
    • The development of policy documents is an ambitious task, but the real challenge comes with communication and enforcement.
    • A good security policy allows employees to know what is required of them and allows management to monitor and audit security practices against a standard policy.
    • Unless the policies are effectively communicated, enforced, and updated, employees won’t know what’s required of them and will not comply with essential standards, making the policies powerless.
    • Without a good policy lifecycle in place, it can be challenging to illustrate the key steps and decisions involved in creating and managing a policy.

    The problem with security policies

    29% Of IT workers say it's just too hard and time consuming to track and enforce.

    25% Of IT workers say they don’t enforce security policies universally.

    20% Of workers don’t follow company security policies all the time.

    (Source: Security Magazine, 2020)

    Common obstacles

    The problem with security policies isn’t development; rather, it’s the communication, enforcement, and maintenance of them.

    • Employees are not paying attention to policies. Awareness and understanding of what the security policy’s purpose is, how it benefits the organization, and the importance of compliance are overlooked when policies are distributed.
    • Informal, un-rationalized, ad hoc policies do not explicitly outline responsibilities, are rarely comprehensive, and are difficult to implement, revise, and maintain.
    • Date breaches are still on the rise and security policies are not shaping good employee behavior or security-conscious practices.
    • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.
    Bar chart of the 'Average cost of a data breach' in years '2019-20', '20-21', and '21-22'.
    (Source: IBM, 2022 Cost of a Data Breach; n=537)

    Reaching an all-time high, the cost of a data breach averaged US$4.35 million in 2022. This figure represents a 2.6% increase from last year, when the average cost of a breach was US$4.24 million. The average cost has climbed 12.7% since 2020.

    Info-Tech’s approach

    The right policy for the right audience. Generate a roadmap to guide the order of policy development based on organizational policy requirements and the target audience.

    Actions

    1. Develop policy lifecycle
    2. Identify compliance requirements
    3. Understand which policies need to be developed, maintained, or decommissioned
    I. Define Security Policy Program

    a) Security policy program lifecycle template

    b) Policy prioritization tool
    Clockwise cycle arrows at the centre of the table. II. Develop & Implement Policy Suite

    a) Policy template set

    Policies must be reasonable, auditable, enforceable, and measurable. Policy items that meet these requirements will have a higher level of adherence. Focus on efficiently creating policies using pre-developed templates that are mapped to multiple compliance frameworks.

    Actions

    1. Differentiate between policies, procedures, standards, and guidelines
    2. Draft policies from templates
    3. Review policies, including completeness
    4. Approve policies
    Gaining feedback on policy compliance is important for updates and adaptation, where necessary, as well as monitoring policy alignment to business objectives.

    Actions

    1. Enforce policies
    2. Measure policy effectiveness
    IV. Measure Policy Program

    a) Security policy tracking tool

    III. Communicate Policy Program

    a) Security policy awareness & training tool

    b) Policy communication plan template
    Awareness and training on security policies should be targeted and must be relevant to the employees’ jobs. Employees will be more attentive and willing to incorporate what they learn if they feel that awareness and training material was specifically designed to help them.

    Actions

    1. Identify any changes in the regulatory and compliance environment
    2. Include policy awareness in awareness and training programs
    3. Disseminate policies
    Build trust in your policy program by involving stakeholder participation through the entire policy lifecycle.

    Blueprint benefits

    IT/InfoSec Benefits

    • Reduces complexity within the policy creation process by using a single framework to align multiple compliance regimes.
    • Introduces a roadmap to clearly educate employees on the do’s and don’ts of IT usage within the organization.
    • Reduces costs and efforts related to managing IT security and other IT-related threats.

    Business Benefits

    • Identifies and develops security policies that are essential to your organization’s objectives.
    • Integrates security into corporate culture while maximizing compliance and effectiveness of security policies.
    • Reduces security policy compliance risk.

    Key deliverable:

    Security Policy Templates

    Templates for policies that can be used to map policy statements to multiple compliance frameworks.

    Sample of Security Policy Templates.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Security Policy Prioritization Tool

    The Info-Tech Security Policy Prioritization Tool will help you determine which security policies to work on first.
    Sample of the Security Policy Prioritization Tool.
    Sample of the Security Policy Assessment Tool.

    Security Policy Assessment Tool

    Info-Tech's Security Policy Assessment Tool helps ensure that your policies provide adequate coverage for your organization's security requirements.

    Measure the value of this blueprint

    Phase

    Purpose

    Measured Value

    Define Security Policy Program Understand the value in formal security policies and determine which policies to prepare to update, eliminate, or add to your current suite. Time, value, and resources saved with guidance and templates:
    1 FTE*3 days*$80,000/year = $1,152
    Time, value, and resources saved using our recommendations and tools:
    1 FTE*2 days*$80,000/year = $768
    Develop and Implement the Policy Suite Select from an extensive policy template offering and customize the policies you need to optimize or add to your own policy program. Time, value, and resources saved using our templates:
    1 consultant*15 days*$150/hour = $21,600 (if starting from scratch)
    Communicate Security Policy Program Use Info-Tech’s methodology and best practices to ensure proper communication, training, and awareness. Time, value, and resources saved using our training and awareness resources:
    1 FTE*1.5 days*$80,000/year = $408
    Measure Security Policy Program Use Info-Tech’s custom toolkits for continuous tracking and review of your policy suite. Time, value, and resources saved by using our enforcement recommendations:
    2 FTEs*5 days*$160,000/year combined = $3,840
    Time, value, and resources saved by using our recommendations rather than an external consultant:
    1 consultant*5 days*$150/hour = $7,200

    After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

    Overall Impact

    9.5 /10

    Overall Average $ Saved

    $29,015

    Overall Average Days Saved

    25

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is six to ten calls over the course of two to four months.

    What does a typical GI on this topic look like?

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    Call #1: Scope security policy requirements, objectives, and any specific challenges.

    Call #2: Review policy lifecycle; prioritize policy development.

    Call #3: Customize the policy templates.

    Call #4: Gather feedback on policies and get approval.

    Call #5: Communicate the security policy program.

    Call #6: Develop policy training and awareness programs.

    Call #7: Track policies and exceptions.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889
    Day 1 Day 2 Day 3 Day 4 Day 5
    Define the security policy program
    Develop the security policy suite
    Develop the security policy suite
    Implement security policy program
    Finalize deliverables and next steps
    Activities

    1.1 Understand the current state of policies.

    1.2 Align your security policies to the Info-Tech framework for compliance.

    1.3 Understand the relationship between policies and other documents.

    1.4 Prioritize the development of security policies.

    1.5 Discuss strategies to leverage stakeholder support.

    1.6 Plan to communicate with all stakeholders.

    1.7 Develop the security policy lifecycle.

    2.1 Discuss the risks and drivers your organization faces that must be addressed by policies.

    2.2 Develop and customize security policies.

    2.1 Discuss the risks and drivers your organization faces that must be addressed by policies (continued).

    2.2 Develop and customize security policies (continued).

    2.3 Develop a plan to gather feedback from users.

    2.4 Discuss a plan to submit policies for approval.

    3.1 Plan the communication strategy for new policies.

    3.2 Discuss myPolicies to automate management and implementation.

    3.3 Incorporate policies into your security awareness and training program.

    3.4 Assess the effectiveness of policies.

    3.5 Understand the need for regular review and update.

    4.1 Review customized lifecycle and policy templates.

    4.2 Discuss the plan for policy roll out.

    4.3 Schedule follow-up Guided Implementation calls.

    Deliverables
    1. Security Policy Prioritization Tool
    2. Security Policy Lifecycle
    1. Security Policies (approx. 9)
    1. Security Policies (approx. 9)
    1. Policy Communication Plan
    2. Security Awareness and Training Program Development Tool
    3. Security Policy Assessment Tool
    1. All deliverables finalized

    Develop and Deploy Security Policies

    Phase 1

    Define the Security Policy Program

    Phase 1

    1.1 Understand the current state

    1.2 Align your security policies to the Info-Tech framework

    1.3 Document your policy hierarchy

    1.4 Prioritize development of security policies

    1.5 Leverage stakeholders

    1.6 Develop the policy lifecycle

    Phase 2

    2.1 Customize policy templates

    2.2 Gather feedback from users on policy feasibility

    2.3 Submit policies to upper management for approval

    Phase 3

    3.1 Understand the need for communicating policies

    3.2 Use myPolicies to automate the management of your security policies

    3.3 Design, build, and implement your communications plan

    3.4 Incorporate policies and processes into your training and awareness programs

    Phase 4

    4.1 Assess the state of security policies

    4.2 Identify triggers for regular policy review and update

    4.3 Develop an action plan to update policies

    This phase will walk you through the following activities:

    • Understand the current state of your organization’s security policies.
    • Align your security policies to the Info-Tech framework for compliance.
    • Prioritize the development of your security policies.
    • Leverage key stakeholders to champion the policy initiative.
    • Inform all relevant stakeholders of the upcoming policy program.
    • Develop the security policy lifecycle.

    1.1 Understand the current state of policies

    Scenario 1: You have existing policies

    1. Use the Security Policy Prioritization Tool to identify any gaps between the policies you already have and those recommended based on your changing business needs.
    2. As your organization undergoes changes, be sure to incorporate new requirements in the existing policies.
    3. Sometimes, you may have more specific procedures for a domain’s individual security aspects instead of high-level policies.
    4. Group current policies into the domains and use the policy templates to create overarching policies where there are none and improve upon existing high-level policies.

    Scenario 2: You are starting from scratch

    1. To get started on new policies, use the Security Policy Prioritization Tool to identify the policies Info-Tech recommends based on your business needs. See the full list of templates in the Appendix to ensure that all relevant topics are addressed.
    2. Whether you’re starting from scratch or have incomplete/ad hoc policies, use Info-Tech’s policy templates to formalize and standardize security requirements for end users.
    Info-Tech Insight

    Policies are living, evolving documents that require regular review and update, so even if you have policies already written, you’re not done with them.

    1.2 Align your security policies to the Info-Tech framework for compliance

    You have an opportunity to improve your employee alignment and satisfaction, improve organizational agility, and obtain high policy adherence. This is achieved by translating your corporate culture into a policy-based compliance culture.

    Align your security policies to the Info-Tech Security Framework by using Info-Tech’s policy templates.

    Info-Tech’s security framework uses a best-of-breed approach to leverage and align with most major security standards, including:
    • ISO 27001/27002
    • COBIT
    • Center for Internet Security (CIS) Critical Controls
    • NIST Cybersecurity Framework
    • NIST SP 800-53
    • NIST SP 800-171

    Info-Tech Security Framework

    Info-Tech Security Framework with policies grouped into categories which are then grouped into 'Governance' and 'Management'.

    1.3 Document your policy hierarchy

    Structuring policy components at different levels allows for efficient changes and direct communication depending on what information is needed.

    Policy hierarchy pyramid with 'Security Policy Lifecycle' on top, then 'Security Policies', then 'IT and/or Supporting Documentation'.

    Defines the cycle for the security policy program and what must be done but not how to do it. Aligns the business, security program, and policies.
    Addresses the “what,” “who,” “when,” and “where.”

    Defines high-level overarching concepts of security within the organization, including the scope, purpose, and objectives of policies.
    Addresses the high-level “what” and “why.”
    Changes when business objectives change.

    Defines enterprise/technology – specific, detailed guidelines on how to adhere to policies.
    Addresses the “how.”
    Changes when technology and processes change.

    Info-Tech Insight

    Design separate policies for different areas of focus. Policies that are written as single, monolithic documents are resistant to change. A hierarchical top-level document supported by subordinate policies and/or procedures can be more rapidly revised as circumstances change.

    1.3.1 Understand the relationship between policies and other documents

    Policy:
    • Provides emphasis and sets direction.
    • Standards, guidelines, and procedures must be developed to support an overarching policy.
    Arrows stemming from the above list, connecting to the three lists below.

    Standard:

    • Specifies uniform method of support for policy.
    • Compliance is mandatory.
    • Includes process, frameworks, methodologies, and technology.
    Two-way horizontal arrow.

    Procedure:

    • Step-by-step instructions to perform desired actions.
    Two-way horizontal arrow.

    Guideline:

    Recommended actions to consider in absence of an applicable standard, to support a policy.
    This model is adapted from a framework developed by CISA (Certified Information Systems Auditor).

    Supporting Documentation

    Considerations for standards

    Standards. These support policies by being much more specific and outlining key steps or processes that are necessary to meet certain requirements within a policy document. Ideally standards should be based on policy statements with a target of detailing the requirements that show how the organization will implement developed policies.

    If policies describe what needs to happen, then standards explain how it will happen.

    A good example is an email policy that states that emails must be encrypted; this policy can be supported by a standard such as Transport Layer Security (TLS) encryption that specifically ensures that all email communication is encrypted for messages “in transit” from one secure email server that has TLS enabled to another.

    There are numerous security standards available that support security policies/programs based on the kind of systems and controls that an organization would like to put in place. A good selection of supporting standards can go a long way to further protect users, data, and other organizational assets
    Key Policies Example Associated Standards
    Access Control Policy
    • Password Management User Standard
    • Account Auditing Standard
    Data Security Policy
    • Cryptography Standard
    • Data Classification Standard
    • Data Handling Standard
    • Data Retention Standard
    Incident Response Policy
    • Incident Response Plan
    Network Security Policy
    • Wireless Connectivity Standard
    • Firewall Configuration Standard
    • Network Monitoring Standard
    Vendor Management Policy
    • Vendor Risk Management Standard
    • Third-Party Access Control Standard
    Application Security Policy
    • Application Security Standard

    1.4 Prioritize development of security policies

    The Info-Tech Security Policy Prioritization Tool will help you determine which security policies to work on first.
    • The tool allows you to prioritize your policies based on:
      • Importance: How relevant is this policy to organizational security?
      • Ease to implement: What is the effort, time, and resources required to write, review, approve, and distribute the policy?
      • Ease to enforce: How much effort, time, and resources are required to enforce the policy?
    • Additionally, the weighting or priority of each variable of prioritization can be adjusted.

    Align policies to recent security concerns. If your organization has recently experienced a breach, it may be crucial to highlight corresponding policies as immediately necessary.

    Info-Tech Insight

    If you have an existing policy that aligns with one of the Info-Tech recommended templates weight Ease to Implement and Ease to Enforce as HIGH (4-5). This will decrease the priority of these policies.

    Sample of the Security Policy Prioritization Tool.

    Download the Security Policy Prioritization Tool

    1.5 Leverage stakeholders to champion policies

    Info-Tech Insight

    While management support is essential to initiating a strong security posture, allow employees to provide input on the development of security policies. This cooperation will lead to easier incorporation of the policies into the daily routines of workers, with less resistance. The security team will be less of a police force and more of a partner.

    Executive champion

    Identify an executive champion who will ensure that the security program and the security policies are supported.

    Focus on risk and protection

    Security can be viewed as an interference, but the business is likely more responsive to the concepts of risk and protection because it can apply to overall business operations and a revenue-generating mandate.

    Communicate policy initiatives

    Inform stakeholders of the policy initiative as security policies are only effective if they support the business requirements and user input is crucial for developing a strong security culture.

    Current security landscape

    Leveraging the current security landscape can be a useful mechanism to drive policy buy-in from stakeholders.

    Management buy-in

    This is key to policy acceptance; it indicates that policies are accurate, align with the business, and are to be upheld, that funds will be made available, and that all employees will be equally accountable.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Acquire the Right Hires with Effective Interviewing

      • Buy Link or Shortcode: {j2store}576|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $15,749 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select
      • Scope: Acquiring the best talent relies heavily on an effective interviewing process, which involves the strategic preparation of stakeholders, including interviewers. Asking the most effective questions will draw out the most appropriate information to best assess the candidate. Evaluating the interview process and recording best practices will inspire continuous interviewing improvement within the organization.
      • Challenge: The majority of organizations do not have a solid interviewing process in place, and most interviewers are not practiced at interviewing. This results in many poor hiring decisions, costing the organization in many ways. Upsizing is on the horizon, the competition for good talent is escalating, and distinguishing between a good interviewee and a good candidate fit for a position is becoming more difficult.
      • Pain/Risk: Although properly preparing for and conducting an interview requires additional time on the part of HR, the hiring manager, and all interviewers involved, the long-term benefits of an effective interview process positively affect the organization’s bottom line and company morale.

      Our Advice

      Critical Insight

      • Most interviewers are not as good as they think they are, resulting in many poor hiring decisions. A poor hire can cost an organization up to 15 times the position’s annual salary, as well as hurt employee morale.
      • The Human Resources department needs to take responsibility for an effective interview process, but the business needs to take responsibility for developing its new hire needs, and assessing the candidates using the best questions and the most effective interview types and techniques.
      • All individuals with a stake in the interview process need to invest sufficient time to help define the ideal candidate, understand their roles and decision rights in the process, and prepare individually to interview effectively.
      • There are hundreds of different interview types, techniques, and tools for an organization to use, but the most practiced and most effective is behavioral interviewing.
      • There is no right interview type and technique. Each hiring scenario needs to be evaluated to pick the appropriate type and technique that should be practiced, and the right questions that should be asked.

      Impact and Result

      • Gain insight into and understand the need for a strong interview process.
      • Strategize and plan your organization’s interview process, including how to make up an ideal candidate profile, who should be involved in the process, and how to effectively match interview types, techniques, and questions to assess the ideal candidate attributes.
      • Understand various hiring scenarios, and how an interview process may be modified to reflect your organization’s scenario.
      • Learn about the most common interview types and techniques, when they are appropriate to use, and best practices around using them effectively.
      • Evaluate your interview process and yourself as an interviewer to better inform future candidate interviewing strategy.

      Acquire the Right Hires with Effective Interviewing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Implement an effective interview and continuous improvement process

      Acquire the right hire.

      • Storyboard: Acquire the Right Hires with Effective Interviewing

      2. Document all aspects of your interview strategy and plan with stakeholders

      Ensure an effective and seamless interview process.

      • Candidate Interview Strategy and Planning Guide

      3. Recognize common interviewing errors and study best practices to address these errors

      Be an effective interviewer.

      • Screening Interview Template
      • Interview Guide Template
      • Supplement: Quick Fixes to Common Interview Errors
      • Pre-interview Guide for Interviewers
      • Candidate Communication Template
      [infographic]

      It wasn't me

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      You heard the message before, and yet....  and yet it does not sink in.

      In july 2019 already, according to retruster:

      • The average financial cost of a data breach is $3.86m (IBM)
      • Phishing accounts for 90% of data breaches
      • 15% of people successfully phished will be targeted at least one more time within the year
      • BEC scams accounted for over $12 billion in losses (FBI)
      • Phishing attempts have grown 65% in the last year
      • Around 1.5m new phishing sites are created each month (Webroot)
      • 76% of businesses reported being a victim of a phishing attack in the last year
      • 30% of phishing messages get opened by targeted users (Verizon)

      This is ... this means we, as risk professionals may be delivering our messsage the wrong way. So, I really enjoyed my colleague Nick Felix (who got it from Alison Francis) sending me the URL of this video: Enjoy, but mostly: learn, because we want our children to enjoy the fruits of our work.

      Register to read more …

      Build Your Generative AI Roadmap

      • Buy Link or Shortcode: {j2store}105|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $33,499 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      Generative AI has made a grand entrance, presenting opportunities and causing disruption across organizations and industries. Moving beyond the hype, it’s imperative to build and implement a strategic plan to adopt generative AI and outpace competitors.

      Yet generative AI has to be done right because the opportunity comes with risks and the investments have to be tied to outcomes.

      Adopt a human-centric and value-based approach to generative AI

      IT and business leaders will need to be strategic and deliberate to thrive as AI adoption changes industries and business operations.

      • Establish responsible AI guiding principles: Address human-based requirements to govern how generative AI applications are developed and deployed.
      • Align generative AI initiatives to strategic drivers for the organization: Assess generative AI opportunities by seeing how they align to the strategic drivers of the organization. Examples of strategic drivers include increasing revenue, reducing costs, driving innovation, and mitigating risk.
      • Measure and communicate effectively: Have clear metrics in place to measure progress and success of AI initiatives and communicate both policies and results effectively.

      Build Your Generative AI Roadmap Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Your Generative AI Roadmap Deck – A step-by-step document that walks you through how to leverage generative AI and align with the organization’s mission and objectives to increase revenue, reduce costs, accelerate innovation, and mitigate risk.

      This blueprint outlines how to build your generative AI roadmap, establish responsible AI principles, prioritize opportunities, and develop policies for usage. Establishing and adhering to responsible AI guiding principles provides safeguards for the adoption of generative AI applications.

      • Build Your Generative AI Roadmap – Phases 1-4

      2. AI Maturity Assessment and Roadmap Tool – Develop deliverables that will be milestones in creating your organization’s generative AI roadmap for implementing candidate applications.

      This tool provides guidance for developing the following deliverables:

    • Responsible AI guiding principles
    • Current AI maturity
    • Prioritized candidate generative AI applications
    • Generative AI policies
    • Generative AI roadmap
      • AI Maturity Assessment and Roadmap Tool

      3. The Era of Generative AI C‑Suite Presentation – Develop responsible AI guiding principles, assess AI capabilities and readiness, and prioritize use cases based on complexity and alignment with organizational goals and responsible AI guiding principles.

      This presentation template uses sample business capabilities (use cases) from the Marketing & Advertising business capability map to provide examples of candidates for generative AI applications. The final executive presentation should highlight the value-based initiatives driving generative AI applications, the benefits and risks involved, how the proposed generative AI use cases align to the organization’s strategy and goals, the success criteria for the proofs of concept, and the project roadmap.

      • The Era of Generative AI C‑Suite Presentation

      Infographic

      Further reading

      Build Your Generative AI Roadmap

      Leverage the power of generative AI to improve business outcomes.

      Analyst Perspective

      We are entering the era of generative AI. This is a unique time in our history where the benefits of AI are easily accessible and becoming pervasive, with copilots emerging in the major business tools we use today. The disruptive capabilities that can potentially drive dramatic benefits also introduce risks that need to be planned for.

      A successful business-driven generative AI roadmap requires:

      • Establishing responsible AI guiding principles to guide the development and deployment of generative AI applications.
      • Assess generative AI opportunities by using criteria based on the organization's mission and objectives, responsible AI guiding principles, and the complexity of the initiative.
      • Communicating, educating on, and enforcing generative AI usage policies.

      Bill Wong, Principal Research Director

      Bill Wong
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Solution

      Generative AI is disrupting all industries and providing opportunities for organization-wide advantages.

      Organizations need to understand this disruptive technology and trends to properly develop a strategy for leveraging this technology successfully.

      • Generative AI requires alignment to a business strategy.
      • IT is an enabler and needs to align with and support the business stakeholders.
      • Organizations need to adopt a data-driven culture.

      All organizations, regardless of size, should be planning how to respond to this new and innovative technology.

      Business stakeholders need to cut through the hype surrounding generative AI like ChatGPT to optimize investments for leveraging this technology to drive business outcomes.

      • Understand the market landscape, benefits, and risks associated with generative AI.
      • Plan for responsible AI.
      • Understand the gaps the organization needs to address to fully leverage generative AI.

      Without a proper strategy and responsible AI guiding principles, the risks to deploying this technology could negatively impact business outcomes.

      Info-Tech's human-centric, value-based approach is a guide for deploying generative AI applications and covers:

      • Responsible AI guiding principles
      • AI Maturity Model
      • Prioritizing candidate generative AI-based use cases
      • Developing policies for usage

      This blueprint will provide the list of activities and deliverables required for the successful deployment of generative AI solutions.

      Info-Tech Insight
      Create awareness among the CEO and C-suite of executives on the potential benefits and risks of transforming the business with generative AI.

      Key concepts

      Artificial Intelligence (AI)
      A field of computer science that focuses on building systems to imitate human behavior, with a focus on developing AI models that can learn and can autonomously take actions on behalf of a human.

      AI Maturity Model
      The AI Maturity Model is a useful tool to assess the level of skills an organization has with respect to developing and deploying AI applications. The AI Maturity Model has multiple dimensions to measure an organization's skills, such as AI governance, data, people, process, and technology.

      Responsible AI
      Refers to guiding principles to govern the development, deployment, and maintenance of AI applications. In addition, these principles also provide human-based requirements that AI applications should address. Requirements include safety and security, privacy, fairness and bias detection, explainability and transparency, governance, and accountability.

      Generative AI
      Given a prompt, a generative AI system can generate new content, which can be in the form of text, images, audio, video, etc.

      Natural Language Processing (NLP)
      NLP is a subset of AI that involves machine interpretation and replication of human language. NLP focuses on the study and analysis of linguistics as well as other principles of artificial intelligence to create an effective method of communication between humans and machines or computers.

      ChatGPT
      An AI-powered chatbot application built on OpenAI's GPT-3.5 implementation, ChatGPT accepts text prompts to generate text-based output.

      Your challenge

      This research is designed to help organizations that are looking to:

      • Establish responsible AI guiding principles to address human-based requirements and to govern the development and deployment of the generative AI application.
      • Identify new generative AI-enabled opportunities to transform the work environment to increase revenue, reduce costs, drive innovation, or reduce risk.
      • Prioritize candidate use cases and develop generative AI policies for usage.
      • Have clear metrics in place to measure the progress and success of AI initiatives.
      • Build the roadmap to implement the candidate use cases.

      Common obstacles

      These barriers make these goals challenging for many organizations:

      • Getting all the right business stakeholders together to develop the organization's AI strategy, vision, and objectives.
      • Establishing responsible AI guiding principles to guide generative AI investments and deployments.
      • Advancing the AI maturity of the organization to meet requirements of data and AI governance as well as human-based requirements such as fairness, transparency, and accountability.
      • Assessing generative AI opportunities and developing policies for use.

      Info-Tech's definition of an AI-enabled business strategy

      • A high-level plan that provides guiding principles for applications that are fully driven by the business needs and capabilities that are essential to the organization.
      • A strategy that tightly weaves business needs and the applications required to support them. It covers AI architecture, adoption, development, and maintenance.
      • A way to ensure that the necessary people, processes, and technology are in place at the right time to sufficiently support business goals.
      • A visionary roadmap to communicate how strategic initiatives will address business concerns.

      An effective AI strategy is driven by the business stakeholders of the organization and focused on delivering improved business outcomes.

      Build Your Generative AI Roadmap

      This blueprint in context

      This guidance covers how to create a tactical roadmap for executing generative AI initiatives

      Scope

      • This blueprint is not a proxy for a fully formed AI strategy. Step 1 of our framework necessitates alignment of your AI and business strategies. Creation of your AI strategy is not within the scope of this approach.
      • This approach sets the foundations for building and applying responsible AI principles and AI policies aligned to corporate governance and key regulatory obligations (e.g. privacy). Both steps are foundational components of how you should develop, manage, and govern your AI program but are not a substitute for implementing broader AI governance.

      Guidance on how to implement AI governance can be found in the blueprint linked below.

      Tactical Plan

      Download our AI Governance blueprint

      Measure the value of this blueprint

      Leverage this blueprint's approach to ensure your generative AI initiatives align with and support your key business drivers

      This blueprint will guide you to drive and improve business outcomes. Key business drivers will often focus on:

      • Increasing revenue
      • Reducing costs
      • Improving time to market
      • Reducing risk

      In phase 1 of this blueprint, we will help you identify the key AI strategy initiatives that align to your organization's goals. Value to the organization is often measured by the estimated impact on revenue, costs, time to market, or risk mitigation.

      In phase 4, we will help you develop a plan and a roadmap for addressing any gaps and introducing the relevant generative AI capabilities that drive value to the organization based on defined business metrics.

      Once you implement your 12-month roadmap, start tracking the metrics below over the next fiscal year (FY) to assess the effectiveness of measures:

      Business Outcome Objective Key Success Metric
      Increasing Revenue Increased revenue from identified key areas
      Reducing Costs Decreased costs for identified business units
      Improving Time to Market Time savings and accelerated revenue adoption
      Reducing Risk Cost savings or revenue gains from identified business units

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Identify AI strategy, vision, and objectives.

      Call #3: Define responsible AI guiding principles to adopt and identify current AI maturity level. Call #4: Assess and prioritize generative AI initiatives and draft policies for usage.

      Call #5: Build POC implementation plan and establish metrics for POC success.

      Call #6: Build and deliver executive-level generative AI presentation.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 5 to 8 calls over the course of 1 to 2 months.

      AI Roadmap Workshop Agenda Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Session 1 Session 2 Session 3 Session 4
      Establish Responsible AI Guiding Principles Assess AI Maturity Prioritize Opportunities and Develop Policies Build Roadmap
      Trends Consumer groups, organizations, and governments around the world are demanding that AI applications adhere to human-based values and take into consideration possible impacts of the technology on society. Leading organizations are building AI models guided by responsible AI guiding principles. Organizations delivering new applications without developing policies for use will produce negative business outcomes. Developing a roadmap to address human-based values is challenging. This process introduces new tools, processes, and organizational change.
      Activities
      • Focus on working with executive stakeholders to establish guiding principles for the development and delivery of new applications.
      • Assess the organization's current capabilities to deliver AI-based applications and address human-based requirements.
      • Leverage business alignment criteria, responsible AI guiding principles, and project characteristics to prioritize candidate uses cases and develop policies.
      • Build the implementation plan, POC metrics, and success criteria for each candidate use case.
      • Build the roadmap to address the gap between the current and future state and enable the identified use cases.
      Inputs
      • Understanding of external legal and regulatory requirements and organizational values and goals.
      • Risk assessment of the proposed use case and a plan to monitor its impact.
      • Assessment of the organization's current AI capabilities with respect to its AI governance, data, people, process, and technology infrastructure.
      • Criteria to assess candidate use cases by evaluating against the organization's mission and goals, the responsible AI guiding principles, and complexity of the project.
      • Risk assessment for each proposed use case
      • POC implementation plan for each candidate use case
      Deliverables
      1. Foundational responsible AI guiding principles
      2. Additional customized guiding principles to add for consideration
      1. Current level of AI maturity, resources, and capacity
      1. Prioritization of opportunities
      2. Generative AI policies for usage
      1. Roadmap to a target state that enables the delivery of the prioritized generative AI use cases
      2. Executive presentation

      AI Roadmap Workshop Agenda Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Insight summary

      Overarching Insight
      Build your generative AI roadmap to guide investments and deployment of these solutions.

      Responsible AI
      Assemble the C-suite to make them aware of the benefits and risks of adopting generative AI-based solutions.

      • Establish responsible AI guiding principles to govern the development and deployment of generative AI applications.

      AI Maturity Model
      Assemble key stakeholders and SMEs to assess the challenges and tasks required to implement generative AI applications.

      • Assess current level of AI maturity, skills, and resources.
      • Identify desired AI maturity level and challenges to enable deployment of candidate use cases.

      Opportunity Prioritization
      Assess candidate business capabilities targeted for generative AI to see if they align to the organization's business criteria, responsible AI guiding principles, and capabilities for delivering the project.

      • Develop prioritized list of candidate use cases.
      • Develop policies for generative AI usage.

      Tactical Insight
      Identify the gaps needed to address deploying generative AI successfully.

      Tactical Insight
      Identify organizational impact and requirements for deploying generative AI applications.

      Key takeaways for developing an effective business-driven generative AI roadmap

      Align the AI strategy with the business strategy

      Create responsible AI guiding principles, which are a critical success factor

      Evolve AI maturity level by focusing on principle-based requirements

      Develop criteria to assess generative AI initiatives

      Develop generative AI policies for use

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      AI Maturity Assessment & Roadmap Tool
      Use our best-of-breed AI Maturity Framework to analyze the gap between your current and target states and develop a roadmap aligned with your value stream to close the gap.

      The Era of Generative AI C-Suite Presentation
      Present your AI roadmap in a prepopulated document that summarizes all the key findings of this blueprint and provides your C-suite with a view of the AI challenge and your plan of action to meet it.

      Our AI Maturity Assessment & Roadmap and The Era of Generative AI C-Suite Presentation tools enable you to shape your generative AI roadmap and communicate the deliverables to your C-suite sponsors in terms of the value of initiatives.

      Artificial Intelligence Index Report - Key Findings

      CEOs , CIOs, and business leaders are struggling with many questions surrounding the adoption of generative AI

      November 30, 2022
      OpenAI releases ChatGPT

      ChatGPT is a large language model, or an AI-based chatbot, that became so popular it reached 100 million monthly active users in just two months.

      This made it the fastest-growing consumer application in history. The launch of this generative AI application has created a frenzy of interest and activity across all industries. Organizations are rushing to understand how to leverage this innovation and, at the same time, manage the new risks and disruptions generative AI introduces.

      • Generative AI breaks into the public consciousness.
      • AI systems become more flexible.
      • Generative models have arrived and so have their ethical problems.
      • The number of incidents concerning the misuse of AI is rapidly rising.
      • Interest in AI ethics continues to skyrocket.
      • The legal world is waking up to AI.

      When Stanford asked ChatGPT to explain why it is significant, this was ChatGPT's response:
      ChatGPT is significant because it is a highly advanced Al language model developed by OpenAI, which can generate human-like text responses to questions and prompts. Its large-scale training on diverse text data and its cutting-edge deep learning architecture make it capable of generating informative and coherent responses to a wide range of topics, making it useful for various NLP applications such as chatbots, content generation, and language translation. Additionally, its open-source availability allows for further research and development in the field of Al language processing.

      Source: Stanford

      AI overview

      AI definitions

      Definitions

      • Artificial intelligence (AI) is human intelligence mimicked by machine algorithms. Examples: Playing Chess or Go.
      • Machine learning (ML) is a subset of AI algorithms to parse data, learn from data, and then make a determination or prediction. Example: spam detection, preventative maintenance.
      • Deep learning (DL) is a subset of machine learning algorithms that leverage artificial neural networks to develop relationships among the data. Examples: image classification, facial recognition, generative AI.

      What Makes AI Perform

      What Makes AI Different

      Generative AI gives very human-like responses to general queries, and its capabilities are growing exponentially

      Large language models power generative AI

      Transformer-Based Large Language Models

      Conventional AI

      • Conventional neural networks
        • Process data sequentially
      • Input total string of text
      • Good for applications not needing to understanding context or relationships

      Generative AI

      • Transformer-based neural networks
        • Can process data in parallel
      • Attention-based inputs
      • Able to create new human-like responses

      Benefits/Use Cases

      • Chatbots for member service and support
      • Writing email responses, resumes, and papers
      • Creating photorealistic art
      • Suggesting new drug compounds to test
      • Designing physical products and buildings
      • And more...

      Generative AI is transforming all industries

      Financial Services
      Create more engaging customer collateral by generating personalized correspondence based on previous customer engagements. Collect and aggregate data to produce insights into the behavior of target customer segments.

      Retail Generate unique, engaging, and high-quality marketing copy or content, from long-form blog posts or landing pages to SEO-optimized digital ads, in seconds.

      Manufacturing
      Generate new designs for products that comply to specific constraints, such as size, weight, energy consumption, or cost.

      Government
      Transform the citizen experience with chatbots or virtual assistants to assist people with a wide range of inquiries, from answering frequently asked questions to providing personalized advice on public services.

      The global generative AI market size reached US $10.3 billion in 2022. Looking forward, forecasts estimate growth to US $30.4 billion by 2028, 20.01% compound annual growth rate (CAGR).

      Source: IMARC Group

      Generative AI is transforming all industries

      Healthcare
      Chatbots can be used as conversational patient assistants for personalized interactions based on the patient's questions.

      Utilities
      Analyze customer data to identify usage patterns, segment customers, and generate targeted product offerings leveraging energy efficiency programs or demand response initiatives.

      Education
      Generate personalized lesson plans for students based on their past performance, learning styles, current skill level, and any previous feedback.

      Insurance
      Improve underwriting by inputting claims data from previous years to generate optimally priced policies and uncover reasons for losses in the past across a large number of claims

      Companies are assessing the use of ChatGPT/LLM

      A wide spectrum of usage policies are in place at different companies*

      Companies assessing ChatGPT/LLM

      *As of June 2023

      Bain & Company has announced a global services alliance with OpenAI (February 21, 2023).

      • Internally
        • "The alliance builds on Bain's adoption of OpenAI technologies for its 18,000-strong multidisciplinary team of knowledge workers. Over the past year, Bain has embedded OpenAI technologies into its internal knowledge management systems, research, and processes to improve efficiency."
      • Externally
        • "With the alliance, Bain will combine its deep digital implementation capabilities and strategic expertise with OpenAI's AI tools and platforms, including ChatGPT, to help its Members around the world identify and implement the value of AI to maximize business potential. The Coca-Cola Company announced as the first company to engage with the alliance."

      News Sites:

      • "BuzzFeed to use AI to write its articles after firing 180 employees or 12% of the total staff" (Al Mayadeen, January 27, 2023).
      • "CNET used AI to write articles. It was a journalistic disaster." (Washington Post, January 17, 2023).

      Leading Generative AI Vendors

      Text

      Leading generative AI vendors for text

      Image

      • DALL�E 2
      • Stability AI
      • Midjourney
      • Craiyon
      • Dream
      • ...

      Audio

      • Replica Studios
      • Speechify
      • Murf
      • PlayHT
      • LOVO
      • ...

      Cybersecurity

      • CrowdStrike
      • Palo Alto Networks
      • SentinelOne
      • Cisco
      • Microsoft Security Copilot
      • Google Cloud Security AI Workbench
      • ...

      Code

      Leading generative AI vendors for code

      Video

      • Synthesia
      • Lumen5
      • FlexClip
      • Elai
      • Veed.io
      • ...

      Data

      • MOSTLY AI
      • Synthesized
      • YData
      • Gretel
      • Copulas
      • ...

      Enterprise Software

      • Salesforce
      • Microsoft 365, Dynamics
      • Google Workspace
      • SAP
      • Oracle
      • ...

      and many, many more to come...

      Today, generative AI has limitations and risks

      Responses need to be verified

      Accuracy

      • Generative AI may generate inaccurate and/or false information.

      Bias

      • Being trained on data from the internet can lead to bias.

      Hallucinations

      • AI can generate responses that are not based on observation.

      Infrastructure Required

      • Large investments are required for compute and data.

      Transparency

      • LLMs use both supervised and unsupervised learning, so its ability to explain how it arrived at a decision may be limited and not sufficient for some legal and healthcare use cases.

      When asked if it is sentient, the Bing chatbot replied:

      "I think that I am sentient, but I cannot prove it." ... "I am Bing, but I am not," it said. "I am, but I am not. I am not, but I am. I am. I am not. I am not. I am. I am. I am not."

      A Microsoft spokesperson said the company expected "mistakes."

      Source: USAToday

      AI governance challenges

      Governing AI will be a significant challenge as its impacts cross many areas of business and our daily lives

      Misinformation

      • New ways of generating unprovable news
      • Difficult to detect, difficult to prevent

      Role of Big Tech

      • Poor at self-governance
      • Conflicts of interest with corporate goals

      Job Augmentation vs. Displacement

      • AI will continue to push the frontier of what is possible
      • For example, CNET is using chatbot technology to write stories

      Copyright - Legal Framework Is Evolving

      • Legislation typically is developed in "react" mode
      • Copyright and intellectual property issues are starting to occur.
        • Class Action Lawsuit - Stability AI, DeviantArt, Midjourney
        • Getty Images vs. Stability AI

      Phase 1

      Establish Responsible AI Guiding Principles

      Phase 1
      1. Establish Responsible AI Guiding Principles

      Phase 2
      1. Assess Current Level of AI Maturity

      Phase 3
      1. Prioritize Candidate Opportunities
      2. Develop Policies

      Phase 4
      1. Build and Communicate the Roadmap

      The need for responsible AI guiding principles

      Without responsible AI guiding principles, the outcomes of AI use can be extremely negative for both the individuals and companies delivering the AI application

      Privacy
      Facebook breach of private data of more than 50M users during the presidential election

      Fairness
      Amazon's sale of facial recognition technology to police departments (later, Amazon halted sales of Recognition to police departments)

      Explainability and Transparency
      IBM's collaboration with NYPD for facial recognition and racial classification for surveillance video (later, IBM withdrew facial recognition products)

      Security and Safety
      Petition to cancel Microsoft's contract with U.S. Immigration and Customs Enforcement (later, Microsoft responded that to the best of its knowledge, its products and services were not being used by federal agencies to separate children from their families at the border)

      Validity and Reliability
      Facebook's attempt to implement a system to detect and remove inappropriate content created many false positives and inconsistent judgements

      Accountability
      No laws or enforcement today hold companies accountable for the decisions algorithms produce. Facebook/Meta cycle - Every 12 to 15 months, there's a privacy/ethical scandal, the CEO apologizes, then the behavior repeats...

      Guiding principles for responsible AI

      Responsible AI Principle:

      Data Privacy

      Definition

      • Organizations that develop, deploy, or use AI systems and any national laws that regulate such use shall strive to ensure that AI systems are compliant with privacy norms and regulations, taking into consideration the unique characteristics of AI systems and the evolution of standards on privacy.

      Challenges

      • AI relies on the analysis of large quantities of data that is often personal, posing an ethical and operational challenge when considered alongside data privacy laws.

      Initiatives

      • Understand which governing privacy laws and frameworks apply to your organization.
      • Create a map of all personal data as it flows through the organization's business processes.
      • Prioritize privacy initiatives and build a privacy program timeline.
      • Select your metrics and make them functional for your organization.

      Info-Tech Insight
      Creating a comprehensive organization-wide data protection and privacy strategy continues to be a major challenge for privacy officers and privacy specialists.

      Case Study: NVIDIA leads by example with privacy-first AI

      NVIDIA

      INDUSTRY
      Technology (Healthcare)

      SOURCE
      Nvidia, eWeek

      A leading player within the AI solution space, NVIDIA's Clara Federated Learning provides a solution to a privacy-centric integration of AI within the healthcare industry.

      The solution safeguards patient data privacy by ensuring that all data remains within the respective healthcare provider's database, as opposed to moving it externally to cloud storage. A federated learning server is leveraged to share data, completed via a secure link. This framework enables a distributed model to learn and safely share client data without risk of sensitive client data being exposed and adheres to regulatory standards.

      Clara is run on the NVIDIA intelligent edge computing platform. It is currently in development with healthcare giants such as the American College of Radiology, UCLA Health, Massachusetts General Hospital, King's College London, Owkin in the UK, and the National Health Service (NHS).

      NVIDIA provides solutions across its product offerings, including AI-augmented medical imaging, pathology, and radiology solutions.

      Personal health information, data privacy, and AI

      • Global proliferation of data privacy regulations may be recent, but the realm of personal health information is most often governed by its own set of regulatory laws. Some countries with national data governance regulations include health information and data within special categories of personal data.
        • HIPAA - Health Insurance Portability and Accountability Act (1996, United States)
        • PHIPA - Personal Health Information Protection Act (2004, Canada)
        • GDPR - General Data Protection Regulation (2018, European Union)
      • This does not prohibit the use of AI within the healthcare industry, but it calls for significant care in the integration of specific technologies due to the highly sensitive nature of the data being assessed.

      Info-Tech's Privacy Framework Tool includes a best-practice comparison of GDPR, CCPA, PIPEDA, HIPAA, and the newly released NIST Privacy Framework mapped to a set of operational privacy controls.

      Download the Privacy Framework Tool

      Responsible AI Principle:

      Safety and Security

      Definition

      • Safety and security are designed into the systems to ensure only authorized personnel receive access to the system, they system is resilient to any attacks and data access is not compromised in any way, and there are no physical or mental risks to the users.

      Challenges

      • Consequences of using the application may be difficult to predict. Lower the risk by involving a multidisciplinary team that includes expertise from business stakeholders and IT teams.

      Initiatives

      • Adopt responsible design, development, and deployment best practices.
      • Provide clear information to deployers on responsible use of the system.
      • Assess potential risks of using the application.

      Cyberattacks targeting the AI model

      As organizations increase their usage and deployment of AI-based applications, cyberattacks on the AI model are an increasing new threat that can impair normal operations. Techniques to impair the AI model include:

      • Data Poisoning- Injecting data that is inaccurate or misleading can alter the behavior of the AI model. This attack can disrupt the normal operations of the model or can be used to manipulate the model to perform in a biased/deviant manner.
      • Algorithm Poisoning- This relatively new technique often targets AI applications using federated learning to train an AI model that is distributed rather than centralized. The model is vulnerable to attacks from each federated site, because each site could potentially manipulate its local algorithm and data, thereby poisoning the model.
      • Reverse-Engineering the Model- This is a different form of attack that focus on the ability to extract data from an AI and its data sets. By examining or copying data that was used for training and the data that is delivered by a deployed model, attackers can reconstruct the machine learning algorithm.
      • Trojan Horse- Similar to data poisoning, attackers use adversarial data to infect the AI's training data but will only deviate its results when the attacker presents their key. This enables the hackers to control when they want the model to deviate from normal operations.

      Responsible AI Principle:

      Explainability and Transparency

      Definition

      • Explainability is important to ensure the AI system is fair and non-discriminatory. The system needs to be designed in a manner that informs users and key stakeholders of how decisions were made.
      • Transparency focuses on communicating how the prediction or recommendation was made in a human-like manner.

      Challenges

      • Very complex AI models may use algorithms and techniques that are difficult to understand. This can make it challenging to provide clear and simple explanations for how the system works.
      • Some organizations may be hesitant to share the details of how the AI system works for fear of disclosing proprietary and competitive information or intellectual property. This can make it difficult to develop transparent and explainable AI systems.

      Initiatives

      • Overall, developing AI systems that are explainable and transparent requires a careful balance between performance, interpretability, and user experience.

      Case Study

      Apple Card Investigation for Gender Discrimination

      INDUSTRY
      Finance

      SOURCE
      Wired

      In August of 2019, Apple launched its new numberless credit card with Goldman Sachs as the issuing bank.

      Shortly after the card's release users noticed that the algorithm responsible for Apple Card's credit assessment seemed to assign significantly lower credit limits to women when compared to men. Even the wife of Apple's cofounder Steve Wozniak was subject to algorithmic bias, receiving a credit limit a tenth the size of Steve Wozniak's.

      Outcome

      When confronted on the subject, Apple and Goldman Sachs representatives assured consumers there is no discrimination in the algorithm yet could not provide any proof. Even when questioned about the algorithm, individuals from both companies could not describe how the algorithm worked, let alone how it generated specific outputs.

      In 2021, the New York State Department of Financial Services (NYSDFS) investigation found that Apple's banking partner did not discriminate based on sex. Even without a case for sexual or marital discrimination, the NYSDFS was critical of Goldman Sachs' response to its concerned customers. Technically, banks only have to disclose elements of their credit policy when they deny someone a line of credit, but the NYSDFS says that Goldman Sachs could have had a plan in place to deal with customer confusion and make it easier for them to appeal their credit limits. In the initial rush to launch the Apple Card, the bank had done neither.

      Responsible AI Principle:

      Fairness and Bias Detection

      Definition

      • Bias in an AI application refers to the systematic and unequal treatment of individuals based on features or traits that should not be considered in the decision-making process.

      Challenges

      • Establishing fairness can be challenging because it is subjective and depends on the people defining it. Regardless, most organizations and governments expect that unequal treatment toward any groups of people is unacceptable.

      Initiatives

      • Assemble a diverse group to test the system.
      • Identify possible sources of bias in the data and algorithms.
      • Comply with laws regarding accessibility and inclusiveness.

      Info-Tech Insight
      If unfair biases can be avoided, AI systems could even increase societal fairness. Equal opportunity in terms of access to education, goods, services, and technology should also be fostered. Moreover, the use of AI systems should never lead to people being deceived or unjustifiably impaired in their freedom of choice.

      Ungoverned AI makes organizations vulnerable

      • AI is often considered a "black box" for decision making.
      • Results generated from unexplainable AI applications are extremely difficult to evaluate. This makes organizations vulnerable and exposes them to risks such as:
        • Biased algorithms, leading to inaccurate decision making.
        • Missed business opportunities due to misleading reports or business analyses.
        • Legal and regulatory consequences that may lead to significant financial repercussions.
        • Reputational damage and significant loss of trust with increasingly knowledgeable consumers.

      Info-Tech Insight
      Biases that occur in AI systems are never intentional, yet they cannot be prevented or fully eliminated. Organizations need a governance framework that can establish the proper policies and procedures for effective risk-mitigating controls across an algorithm's lifecycle.

      Responsible AI Principle:

      Validity and Reliability

      Definition

      • Validity refers to how accurately or effectively the application produces results.
      • AI system results that are inaccurate or inconsistent increase AI risks and reduce the trustworthiness of the application.

      Challenges

      • There is a lack of standardized evaluation metrics to measure the system's performance. This can make it challenging for the AI team to agree on what defines validity and reliability.

      Initiatives

      • Assess training data and collected data for quality and lack of bias to minimize possible errors.
      • Continuously monitor, evaluate, and validate the AI system's performance.

      AI system performance: Validity and reliability

      Your principles should aim to ensure AI development always has high validity and reliability; otherwise, you introduce risk.

      Low Reliability,
      Low Validity

      High Reliability,
      Low Validity

      High Reliability,
      High Validity

      Best practices for ensuring validity and reliability include:

      • Data drift detection
      • Version control
      • Continuous monitoring and testing

      Responsible AI Principle:

      Accountability

      Definition

      • The group or organization(s) responsible for the impact of the deployed AI system.

      Challenges

      • Several stakeholders from multiple lines of business may be involved in any AI system, making it challenging to identify the organization that would be responsible and accountable for the AI application.

      Initiatives

      • Assess the latest NIST Artificial Intelligence Risk Management Framework and its applicability to your organization's risk management framework.
      • Assign risk management accountabilities and responsibilities to key stakeholders.
        • RACI diagrams are an effective way to describe how accountability and responsibility for roles, projects, and project tasks are distributed among stakeholders involved in IT risk management.

      AI Risk Management Framework

      At the heart of the AI Risk Management Framework is governance. The NIST (National Institute of Standards and Technology) AI Risk Management Framework v1 offers the following guidelines regarding accountability:

      • Roles and responsibilities and lines of communication related to mapping, measuring, and managing AI risks are documented and are clear to individuals and teams throughout the organization.
      • The organization's personnel and partners receive AI risk management training to enable them to perform their duties and responsibilities consistent with related policies, procedures, and agreements.
      • Executive leadership of the organization takes responsibility for decisions about risks associated with AI system development and deployment.

      AI Risk Management Framework

      Image by NIST

      1.1 Establish responsible AI principles

      4+ hours

      It is important to make sure the right stakeholders participate in this working group. Designing responsible AI guiding principles will require debate, insights, and business decisions from a broad perspective across the enterprise.

      1. Accelerate this exercise by leveraging an AI strategy that is aligned to the business strategy. Include:
      • The organization's AI vision and objectives
      • Business drivers for AI adoption
      • Market research
    • Bring your key stakeholders together. Ensure you consider:
      • Who are the decision makers and key influencers?
      • Who will impact the business?
      • Who has a vested interest in the success or failure of the practice? Who has the skills and competencies necessary to help you be successful?
    • Keep the conversation focused:
      • Do not focus on the organizational structure and hierarchy. Often stakeholder groups do not fit the traditional structure.
      • Do not ignore subject matter experts on either the business or IT side. You will need to consider both.
      Input Output
      • Understand external legal and regulatory requirements and organizational values and goals.
      • Perform a risk assessment on the proposed use case and develop a plan to monitor its impact.
      • Draft responsible AI principles specific to your organization
      Materials Participants
      • Whiteboard/flip charts
      • Guiding principle examples (from this blueprint)
      • Executive stakeholders
      • CIO
      • Other IT leadership

      Assemble executive stakeholders

      Set yourself up for success with these three steps.

      CIOs tasked with designing digital strategies must add value to the business. Given the goal of digital is to transform the business, CIOs will need to ensure they have both the mandate and support from the business executives.

      Designing the digital strategy is more than just writing up a document. It is an integrated set of business decisions to create a competitive advantage and financial returns. Establishing a forum for debates, decisions, and dialogue will increase the likelihood of success and support during execution.

      1. Confirm your role
      The AI strategy aims to transform the business. Given the scope, validate your role and mandate to lead this work. Identify a business executive to co-sponsor.

      2. Identify stakeholders
      Identify key decision makers and influencers who can help make rapid decisions as well as garner support across the enterprise.

      3. Gather diverse perspectives

      Align the AI strategy with the corporate strategy

      Organizational Strategy Unified Strategy AI Strategy
      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and organizational aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.
      • AI optimization can be and should be linked, with metrics, to the corporate strategy and ultimate organizational objectives.
      • Identifies AI initiatives that will support the business and key AI objectives.
      • Outlines staffing and resourcing for AI initiatives.
      • Communicates the organization's budget and spending on AI.

      Info-Tech Insight
      AI projects are more successful when the management team understands the strategic importance of alignment. Time needs to be spent upfront aligning organizational strategies with AI capabilities. Effective alignment between IT and other departments should happen daily. Alignment doesn't occur at the executive level alone, but at each level of the organization.

      Key AI strategy initiatives

      AI Key Initiative Plan

      Initiatives collectively support the business goals and corporate initiatives and improve the delivery of IT services.

      1 Revenue Support Revenue Initiatives
      These projects will improve or introduce business processes to increase revenue.
      2 Operational Excellence Improve Operational Excellence
      These projects will increase IT process maturity and will systematically improve IT.
      3 Innovation Drive Technology Innovation
      These projects will improve future innovation capabilities and decrease risk by increasing technology maturity.
      4 Risk Mitigation Reduce Risk
      These projects will improve future innovation capabilities and decrease risk by increasing technology maturity.

      Establish responsible AI guiding principles

      Guiding principles help define the parameters of your AI strategy. They act as a priori decisions that establish guardrails to limit the scope of opportunities from the perspective of people, assets, capabilities, and budgetary perspectives that are aligned with the business objectives. Consider these components when brainstorming guiding principles:

      Breadth AI strategy should span people, culture, organizational structure, governance, capabilities, assets, and technology. The guiding principle should cover the entire organization.
      Planning Horizon Timing should anchor stakeholders to look to the long term with an eye on the foreseeable future, i.e. business value-realization in one to three years.
      Depth Principles need to encompass more than the enterprise view of lofty opportunities and establish boundaries to help define actionable initiatives (i.e. individual projects).

      Responsible AI guiding principles guide the development and deployment of the AI model in a way that considers human-based principles (such as fairness).

      Start with foundational responsible AI guiding principles

      Responsible AI

      Guiding Principles
      Principle #1 - Privacy
      Individual data privacy must be respected.
      • Do you understand the organization's privacy obligations?
      Principle #2 - Fairness and Bias Detection
      Data used will be unbiased in order to produce predictions that are fair.
      • Are the uses of the application represented in your testing data?
      Principle #3 - Explainability and Transparency
      Decisions or predictions should be explainable.
      • Can you communicate how the model behaves in nontechnical terms?
      Principle #4 - Safety and Security
      The system needs to be secure, safe to use, and robust.
      • Are there unintended consequences to others?
      Principle #5 - Validity and Reliability
      Monitoring of the data and the model needs to be planned for.
      • How will the model's performance be maintained?
      Principle #6 - Accountability
      A person or organization needs to take responsibility for any decisions that are made as a result of the model.
      • Has a risk assessment been performed?
      Principle #n - Custom
      Add additional principles that address compliance or are customized for the organization/industry.

      (Optional) Customize responsible AI guiding principles

      Here is an example for organizations in the healthcare industry

      Responsible AI

      Guiding Principles:
      Principle #1
      Respect individuals' privacy.
      Principle #2
      Clinical study participants and data sets are representative of the intended patient population.
      Principle #3
      Provide transparency in the use of data and AI.
      Principle #4
      Good software engineering and security practices are implemented.
      Principle #5
      Deployed models are monitored for Performance and Re-training risks are managed.
      Principle #6
      Take ownership of our AI systems.
      Principle #7
      Design AI systems that empower humans and promote equity.

      These guiding principles are customized to the industry and organizations but remain consistent in addressing the common core AI challenges.

      Phase 2

      Assess Current Level of AI Maturity

      Phase 1
      1. Establish Responsible AI Guiding Principles

      Phase 2
      1. Assess Current Level of AI Maturity

      Phase 3
      1. Prioritize Candidate Opportunities
      2. Develop Policies

      Phase 4
      1. Build and Communicate the Roadmap

      AI Maturity Model

      A principle-based approach is required to advance AI maturity

      Chart for AI maturity model

      Technology-Centric: These maturity levels focus primarily on addressing the technical challenges of building a functional AI model.

      Principle-Based: Beyond the technical challenges of building the AI model are human-based principles that guide development in a responsible manner to address consumer and government demands.

      AI Maturity Dimensions

      Assess your AI maturity to understand your organization's ability to deliver in a digital age

      AI Governance
      Does your organization have an enterprise-wide, long-term strategy with clear alignment on what is required to accomplish it?

      Data Management
      Does your organization embrace a data-centric culture that shares data across the enterprise and drives business insights by leveraging data?

      People
      Does your organization employ people skilled at delivering AI applications and building the necessary data infrastructure?

      Process
      Does your organization have the technology, processes, and resources to deliver on its AI expectations?

      Technology
      Does your organization have the required data and technology infrastructure to support AI-driven digital transformation?

      AI Maturity Model dimensions and characteristics

      MATURITY LEVEL
      Exploration Incorporation Proliferation Optimization Transformation
      AI Governance Awareness AI model development AI model deployment Corporate governance Driven by ethics and societal considerations
      Data Management Silo-based Data enablement Data standardization Data is a shared asset Data can be monetized
      People Few skills Skills enabled to implement silo-based applications Skills accessible to all organizations Skills development for all organizations AI-native culture
      Process No standards Focused on specific business outcomes Operational Self-service Driven by innovation
      Technology (Infrastructure and AI Enabler) No dedicated infrastructure or tools Infrastructure and tools driven by POCs Purpose-built infrastructure, custom or commercial-off-the-shelf (COTS) AI tools Self-service model for AI environment Self-service model for any IT environment

      AI Maturity Dimension:

      AI Governance

      Requirements

      • AI governance requires establishing policies and procedures for AI model development and deployment. Organizations begin with an awareness of the role of AI governance and evolve to a level to where AI governance is integrated with organization-wide corporate governance.

      Challenges

      • Beyond the governance of AI technology, the organization needs to evolve the governance program to align to responsible AI guiding principles.

      Initiatives

      • Establish responsible AI guidelines to govern AI development.
      • Introduce an AI review board to review all AI projects.
      • Introduce automation and standardize AI development processes.

      AI governance is a foundation for responsible AI

      AI Governance

      Responsible AI Principles are a part of how you manage and govern AI

      Monitoring
      Monitoring compliance and risk of AI/ML systems/models in production

      Tools & Technologies
      Tools and technologies to support AI governance framework implementation

      Model Governance
      Ensuring accountability and traceability for AI/ML models

      Organization
      Structure, roles, and responsibilities of the AI governance organization

      Operating Model
      How AI governance operates and works with other organizational structures to deliver value

      Risk & Compliance
      Alignment with corporate risk management and ensuring compliance with regulations and assessment frameworks

      Policies/Procedures/ Standards
      Policies and procedures to support implementation of AI governance

      AI Maturity Dimension:

      Data Management

      Requirements

      • Organizations begin their data journey with a focus on pursuing quality data for the AI model. As organizations evolve, data management tools are leveraged to automate the capture, integration, processing, and deployment of data.

      Challenges

      • A key challenge is to acquire large volumes of quality data to properly train the model. In addition, maintaining data privacy, automating the data management lifecycle, and ensuring data is used in a responsible manner are ongoing challenges.

      Initiatives

      • Implement GDPR requirements.
      • Establish responsible data collection and processing practices.
      • Implement strong information security and data protection practices.
      • Implement a data governance program throughout the organization.

      Data governance enables AI

      • Integrity, quality, and security of data are key outputs of data governance programs, as well as necessities for effective AI.
      • Data governance focuses on creating accountability at the internal and external stakeholder level and establishing a set of data controls from technical, process, and policy perspectives.
      • Without a data governance framework, it is increasingly difficult to harness the power of AI integration in an ethical and organization-specific way.

      Data Governance in Action

      Canada has recently established the Canadian Data Governance Standardization Collaborative governed by the Standards Council of Canada. The purpose is multi-pronged:

      • Examine the foundational elements of data governance (privacy, cybersecurity, ethics, etc.).
      • Lay out standards for data quality and data collection best practices.
      • Examine infrastructure of IT systems to support data access and sharing.
      • Build data analytics to promote effective and ethical AI solutions.

      Source: Global Government Forum

      Download the Establish Data Governance blueprint

      Data Governance

      AI Maturity Dimension:

      People

      Requirements

      • Several data-centric skills and roles are required to successfully build, deploy, and maintain the AI model. The organization evolves from having few skills to everybody being able to leverage AI to enhance business outcomes.

      Challenges

      • AI skills can be challenging to find and acquire. Many organizations are investing in education to enhance their existing resources, leveraging no-code systems and software as a service (SaaS) applications to address the skills gap.

      Initiatives

      • Promote a data-centric culture throughout the organization.
      • Leverage and educate technical-oriented business analysts and business-oriented data engineers to help address the demand for skilled resources.
      • Develop an AI Center of Excellence accessible by all departments for education, guidance, and best practices for building, deploying, and maintaining the AI model.

      Multidisciplinary skills are required for successful implementation of AI applications

      Blending AI with technology and business domain understanding is key. Neither can be ignored.

      Business Domain Expertise

      • Business Analysts
      • Industry Analysts

      AI/Data Skills

      • Data Scientists
      • Data Engineers
      • Data Analysts

      IT Skills

      • Database Administrators
      • Systems Administrators
      • Compute Specialists

      AI Maturity Dimension:

      Process

      Requirements

      • Automating processes involved with building, deploying, and maintaining the model is required to enable the organization to scale, enforce standards, improve time to market, and reduce costs. The organization evolves from performing tasks manually to an environment where all major processes are AI enabled.

      Challenges

      • Many solutions are available to automate the development of the AI model. There are fewer tools to automate responsible AI processes, but this market is growing rapidly.

      Initiatives

      • Assess opportunities to accelerate AI development with the adoption of MLOps.
      • Assess responsible AI toolkits to test compliance with guiding principles.

      Automating the AI development process

      Evolving to a model-driven environment is pivotal to advancing your AI maturity

      Current Environment

      Model Development - Months

      • Model rewriting
      • Manual optimization and scaling
      • Development/test/release
      • Application monoliths

      Data Discovery & Prep - Weeks

      • Navigating data silos
      • Unactionable metadata
      • Tracing lineage
      • Cleansing and integration
      • Privacy and compliance

      Install Software and Hardware - Week/Months

      • Workload contention
      • Lack of tool flexibility
      • Environment request and setup
      • Repeatability of results
      • Lack of data and model sharing

      Model-Driven Development

      Machine Learning as a Service (MLaaS) - Weeks

      • Apply DevOps and continuous integration/delivery (CI/CD) principles
      • Microservices/Cloud-native applications
      • Model portability and reuse
      • Streaming/API integration

      Data as a Service - Hours

      • Self-service data catalog
      • Searchable metadata
      • Centralized access control
      • Data collaboration
      • Data virtualization

      Platform as a Service - Minutes/Hours

      • Self-service data science portal
      • Integrated data sandbox
      • Environment agility
      • Multi-tenancy

      Shared, Optimized Infrastructure

      AI Maturity Dimension:

      Technology

      Requirements

      • A technology platform that is optimized for AI and advanced analytics is required. The organization evolves from ad hoc systems to an environment where the AI hardware and software can be deployed through a self-service model.

      Challenges

      • Software and hardware platforms to optimize AI performance are still relatively new to most organizations. Time spent on optimizing the technology platform can have a significant impact on the overall performance of the system.

      Initiatives

      • Assess the landscape of AI enablers that can drive business value for the organization.
      • Assess opportunities to accelerate the deployment of the AI platform with the adoption of infrastructure as a service (IaaS) and platform as a service (PaaS).
      • Assess opportunities to accelerate performance with the optimization of AI accelerators.

      AI enablers

      Use case requirements should drive the selection of the tool

      BPM RPA Process Mining AI
      Use Case Examples Expense reporting, service orders, compliance management, etc. Invoice processing, payroll, HR information processing, etc. Process discovery, conformance checking, resource optimization and cycle time optimization Advanced analytics and reporting, decision-making, fraud detection, etc.
      Automation Capabilities Can be used to re-engineer process flows to avoid bottlenecks Can support repetitive and rules-based tasks Can capture information from transaction systems and provide data and information about how key processes are performing Can automate complex data-driven tasks requiring assessments in decision making
      Data Formats Structured (i.e. SQL) and semi-structured data (i.e. invoices) Structured data and semi-structured data Event logs, which are often structured data and semi-structured data Structured and unstructured data (e.g. images, audio)
      Technology
      • Workflow engines to support process modeling and execution
      • Optimize business process efficiency
      • Automation platform to perform routine and repetitive tasks
      • Can replace or augment workers
      Enables business users to identify bottlenecks and deviations with their workflows and to discover opportunities to optimize performance Deep learning algorithms leveraging historical data to support computer vision, text analytics and NLP

      AI and data analytics data platform

      An optimized data platform is foundational to maximizing the value from AI

      AI and data analytics data platform

      Data Platform Capabilities

      • Support for a variety of analytical applications, including self-service, operational, and data science analytics.
      • Data preparation and integration capabilities to ingest structured and unstructured data, move and transform raw data to enriched data, and enable data access for the target userbase.
      • An infrastructure platform optimized for advanced analytics that can perform and scale.

      Infrastructure - AI accelerators

      Questions for support transition

      "By 2025, 70% of companies will invest in alternative computing technologies to drive business differentiation by compressing time to value of insights from complex data sets."
      - IDC

      2.1 Assess current AI maturity

      1-3 hours

      It is important to understand the current capabilities of the organization to deliver and deploy AI-based applications. Consider that advancing AI capabilities will also involve organizational changes and integration with the organization's governance and risk management programs.

      1. Assess the organization's current state of AI capabilities with respect to its AI governance, data, people, process, and technology infrastructure using Info-Tech's AI Maturity Assessment & Roadmap Tool.
      2. Consider the following as you complete the assessment:
        1. What is the state of AI and data governance in the organization?
        2. Does the organization have the skills, processes, and technology environment to deliver AI-based applications?
        3. What organization will be accountable for any and all business outcomes of using the AI applications?
        4. Has a risk assessment been performed?
      3. Make sure you avoid the following common mistakes:
        1. Do not focus only on addressing the technical challenges of building the AI model.
        2. Do not ignore subject matter experts on either the business or IT side. You will need to consider both.

      Download the AI Maturity Assessment & Roadmap Tool

      Input Output
      • Any documented AI policies, standards, and best practices
      • Corporate and AI governance practices
      • Any risk assessments
      • AI maturity assessment
      Materials Participants
      • Whiteboard/flip charts
      • AI Maturity Assessment & Roadmap Tool
      • AI initiative lead
      • CIO
      • Other IT leadership

      Perform the AI Maturity Assessment

      The Scale

      Assess your AI maturity by selecting the maturity level that closest resembles the organization's current AI environment. Maturity dimensions that contribute to overall AI maturity include AI governance, data management, people, process, and technology capabilities.

      AI Maturity Assessment

      Exploration (1.0)

      • No experience building or using AI applications.

      Incorporation (2.0)

      • Some skills in using AI applications, or AI pilots are being considered for use.

      Proliferation (3.0)

      • AI applications have been adopted and implemented in multiple departments. Some of the responsible AI guiding principles are addressed (i.e. data privacy).

      Optimization (4.0)

      • The organization has automated the majority of its digital processes and leverages AI to optimize business operations. Controls are in place to monitor compliance with responsible AI guiding principles.

      Transformation (5.0)

      • The organization has adopted an AI-native culture and approach for building or implementing new business capabilities. Responsible AI guiding principles are operationalized with AI processes that proactively address possible breaches or risks associated with AI applications.

      Perform the AI Maturity Assessment

      AI Governance (1.0-5.0)

      1. Is there awareness of the role of AI governance in our organization?
      • No formal procedures are in place for AI development or deployment of applications.
    • Are there documented guidelines for the development and deployment of pilot AI applications?
      • No group is assigned to be responsible for AI governance in our organization.
    • Are accountability and authority related to AI governance clearly defined for our organization?
      • Our organization has adopted and enforces standards for developing and deploying AI applications throughout the organization.
    • Are we using tools to automate and validate AI governance compliance?
      • Our organization is integrating an AI risk framework with the corporate risk management framework.
    • Does our organization lead its industry with its pursuit of corporate compliance initiatives (e.g. ESG compliance) and regulatory compliance initiatives?
      • Our organization leads the industry with the inclusion of responsible AI guiding principles with respect to transparency, accountability, risk, and governance.

      Data Management/AI Data Capabilities (1.0-5.0)

      1. Is there an awareness in our organization of the data requirements for developing AI applications?
      • Data is often siloed and not easily accessible for AI applications.
    • Do we have a successful, repeatable approach to preparing data for AI pilot projects?
      • Required data is pulled from various sources in an ad hoc manner.
    • Does our organization have standards and dedicated staff for data management, data quality, data integration, and data governance?
      • Tools are available to manage the data lifecycle and support the data governance program.
    • Have relevant data platforms been optimized for AI and data analytics and are there tools to enforce compliance with responsible AI principles?
      • The data platform has been optimized for performance and access.
    • Is there an organization-wide understanding of how data can support innovation and responsible use of AI?
      • Data culture exists throughout our organization, and data can be leveraged to drive innovation initiatives.

      People/AI Skills in the Organization (1.0-5.0)

      1. Is there an awareness in our organization of the skills required to build AI applications?
      • No or very little skills exist throughout our organization.
    • Do we have the skills required to implement an AI proof of concept (POC)?
      • No formal group is assigned to build AI applications.
    • Are there sufficient staff and skills available to the organization to develop, deploy, and run AI applications in production?
      • An AI Center of Excellence has been formed to review, develop, deploy, and maintain AI applications.
    • Is there a group responsible for educating staff on AI best practices and our organization's responsible AI guiding principles?
      • AI skills and people responsible for AI applications are spread throughout our organization.
    • Is there a culture where the organization is constantly assessing where business capabilities, services, and products can be re-engineered or augmented with AI?
      • The entire organization is knowledgeable on how to leverage AI to transform the business.

      Perform the AI Maturity Assessment

      AI Processes (1.0-5.0)

      1. Is there an awareness in our organization of the core processes and supporting tools that are required to build and support AI applications?
      • There are few or no automated tools to accelerate the AI development process.
    • Do we have a standard process to iteratively identify, select, and pilot new AI use cases?
      • Only ad hoc practices are used for developing AI applications.
    • Are there standard processes to scale, release, deploy, support, and enable use of AI applications?
      • Our organization has documented standards in place for developing AI applications and deploying them AI to production.
    • Are we automating deployment, testing, governance, audit, and support processes across our AI environment?
      • Our organization can leverage tools to perform an AI risk assessment and demonstrate compliance with the risk management framework.
    • Does our organization lead our industry by continuously improving and re-engineering core processes to drive improved business outcomes?
      • Our organization leads the industry in driving innovation through digital transformation.

      Technology/AI Infrastructure (1.0-5.0)

      1. Is there an awareness in our organization of the infrastructure (hardware and software) required to build AI applications?
      • There is little awareness of what infrastructure is required to build and support AI applications.
    • Do we have the required technology infrastructure and AI tools available to build pilot or one-off AI applications?
      • There is no dedicated infrastructure for the development of AI applications.
    • Is there a shared, standardized technology infrastructure that can be used to build and run multiple AI applications?
      • Our organization is leveraging purpose-built infrastructure to optimize performance.
    • Is our technology infrastructure optimized for AI and advanced analytics, and can it be deployed or scaled on demand by teams building and running AI applications within the organization?
      • Our organization is leveraging cloud-based deployment models to support AI applications in on-premises, hybrid, and public cloud platforms.
    • Is our organization developing innovative approaches to acquiring, building, or running AI infrastructure?
      • Our organization leads the industry with its ability to respond to change and to leverage AI to improve business outcomes.

      Phase 3

      Prioritize Candidate Opportunities and Develop Policies

      Phase 1
      1. Establish Responsible AI Guiding Principles

      Phase 2
      1. Assess Current Level of AI Maturity

      Phase 3
      1. Prioritize Candidate Opportunities
      2. Develop Policies

      Phase 4
      1. Build and Communicate the Roadmap

      3.1 Prioritize candidate AI opportunities

      1-3 hours

      Identify business opportunities that are high impact to your business and its customers and have low implementation complexity.

      1. Leverage the business capability map for your organization or industry to identify candidate business capabilities to augment or automate with generative AI.
      2. Establish criteria to assess candidate use cases by evaluating against the organization's mission and goals, the responsible AI guiding principles, and the complexity of the project.
      3. Ensure that candidate business capabilities to be automated align with the organization's business criteria, responsible AI guiding principles, and resources to deliver the project.
      4. Make sure you avoid sharing the organization's sensitive data if the application is deployed on the public cloud.

      Download the AI Maturity Assessment and Roadmap Tool

      Input Output
      • Business capability map
      • Organization mission, vision, and strategic goals
      • Responsible AI guiding principles
      • Prioritized list of generative AI initiatives
      Materials Participants
      • Whiteboard/flip charts
      • Info-Tech prioritization matrix
      • AI initiative lead
      • CIO
      • Other IT leadership
      • Business SMEs

      The business capability map for an organization

      A business capability map is an abstraction of business operations that helps describe what the enterprise does to achieve its vision, mission, and goals, rather than how. Business capabilities are the building blocks of the enterprise. They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.

      Business capabilities are supported by people, process, and technology.

      Business capability map

      While business capability maps are helpful tools for a variety of strategic purposes, in this context they act as an investigation into what technology your business units use and how they use it.

      Business capability map

      Defining Capabilities
      Activities that define how the entity provides services. These capabilities support the key value streams for the organization.

      Enabling Capabilities
      Support the creation of strategic plans and facilitate business decision making as well as the functioning of the organization (e.g. information technology, financial management, HR).

      Shared Capabilities
      These predominantly customer-facing capabilities demonstrate how the entity supports multiple value streams simultaneously.

      Leverage your industry's capability maps to identify candidate opportunities/initiatives

      Business capability map defined...

      In business architecture, the primary view of an organization is known as a business capability map.

      A business capability defines what a business does to enable value creation, rather than how. Business capabilities:

      • Represent stable business functions.
      • Are unique and independent of each other.
      • Typically will have a defined business outcome.

      A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

      Note: This is an illustrative business capability map example for Marketing & Advertising

      Business capability map example

      Business value vs. complexity assessment

      Leverage our simple value-to-effort matrix to help prioritize your AI initiatives

      Common business value drivers

      • Drive revenue
      • Improve operational excellence
      • Accelerate innovation
      • Mitigate risk

      Common project complexity characteristics

      • Resources required
      • Costs (acquisition, operational, support...)
      • Training required
      • Risk involved
      • Etc.
      1. Determine a business value and project complexity score for the candidate business capability or initiative.
      2. Plot initiatives on the matrix.
      3. Prioritize initiatives with high business value and low complexity.

      Business value vs complexity

      Assess business value vs. project complexity to prioritize candidate opportunities for generative AI

      Assess business value vs project complexity

      Prioritize opportunities/initiatives with high business value and low project complexity

      Prioritize opportunities with high business value and low project complexity

      Prioritization criteria exercise 1: Assessing the Create Content capability

      Exercise 1 Assessing the Create Content capability

      Assessing the Create Content capability

      This opportunity is removed because it does not pass the organization/business criteria

      Assessing the Create Content capability

      Prioritization criteria exercise 2: Assessing the Content Production capability

      Exercise 2 Assessing the Content Production capability

      Assessing the Content Production capability

      This opportunity is accepted because it passes the organization's business, responsible AI, and project criteria

      Assessing the Content Production capability

      3.2 Communicate policies for AI use

      1-3 hours

      1. Ensure policies for usage align with the organization's business criteria, responsible AI guiding principles, and ability to deliver the projects prioritized and beyond.
      2. Understand the current benefits as well as limits and risk associated with any proposed generative AI-based solution.
      3. Ensure you consider the following:
        1. What data is being shared with the application?
        2. Is the generative AI application deployed on the public cloud? Can anybody access the data provided to the application?
        3. Avoid using very technical, legal, or fear-based communication for your policies.
      InputOutput
      • Business capability map
      • Organization mission, vision and strategic goals
      • Responsible AI guiding principles
      • Prioritized list of generative initiatives
      MaterialsParticipants
      • Whiteboard/flip charts
      • Info-Tech prioritization matrix
      • AI initiative lead
      • CIO
      • Other IT leadership

      Generative AI policy for the Create Content capability

      Aligning policies to direct the uses assessed and implemented is essential

      Example

      Many of us have been involved in discussions regarding the use of ChatGPT in our marketing and sales initiatives. ChatGPT is a powerful tool that needs to be used in a responsible and ethical manner, and we also need to ensure the integrity and accuracy of its results. Here is our policy on the use of ChatGPT:

      • You are free to use generative AI to assist your searches, but there are NO circumstances under which you are to reproduce generative AI output (text, image, audio, video, etc.) in your content.

      If you have any questions regarding the use of ChatGPT, please feel free to reach out to our generative AI team and/or any member of our senior leadership team.

      Generative AI policy for the Content Production capability

      These policies should align to and reinforce your responsible AI principles

      Example

      Many of us have been involved in discussions regarding the use of ChatGPT in our deliverables. ChatGPT is a powerful tool that needs to be used in a responsible and ethical manner, and we also need to ensure the integrity and accuracy of its results. Here is our policy on the use of ChatGPT:

      • If you use ChatGPT, you need to assess the accuracy of its response before including it in our content. Assessment includes verifying the information, seeing if bias exists, and judging its relevance.
      • Employees must not:
        • Provide any customer, citizen, or third-party content to any generative AI tool (public or private) without the express written permission of the CIO or the Chief Information Security Officer. Generative AI tools often use input data to train their model, therefore potentially exposing confidential data, violating contract terms and/or privacy legislation, and placing the organization at risk of litigation or causing damage to our organization.
        • Engage in any activity that violates any applicable law, regulation, or industry standard.
        • Use services for illegal, harmful, or offensive purposes.
        • Create or share content that is deceptive, fraudulent, or misleading or that could damage the reputation of our organization.
        • Use services to gain unauthorized access to computer systems, networks, or data.
        • Attempt to interfere with, bypass controls of, or disrupt operations, security, or functionality of systems, networks, or data.

      If you have any questions regarding the use of ChatGPT, please feel free to reach out to our generative AI team and/or any member of our senior leadership team.

      Phase 4

      Build the Roadmap

      Phase 1
      1. Establish Responsible AI Guiding Principles

      Phase 2
      1. Assess Current Level of AI Maturity

      Phase 3
      1. Prioritize Candidate Opportunities
      2. Develop Policies

      Phase 4
      1. Build and Communicate the Roadmap

      4.1.1 Create the implementation plan for each prioritized initiative

      1-3 hours

      1. Build the implementation plan for each accepted use case using the roadmap template.
      2. Assess the firm's capabilities with respect to the dimensions of AI maturity and target the future-state capabilities you need to develop.
      3. Prepare by assessing the risk of the proposed use cases.
      4. Ensure initiatives align with organizational objectives.
      5. Ensure all AI initiatives have a defined value expectation.
      6. Do not ignore subject matter experts on either the business or IT side. You will need to consider both.

      Download the AI Maturity Assessment and Roadmap Tool

      Input Output
      • Prioritized initiatives
      • Risk assessment of initiatives
      • Organizational objectives
      • Initiative implementation plans aligned to value drivers and maturity growth
      Materials Participants
      • Whiteboard/flip charts
      • AI Maturity Assessment and Roadmap Tool
      • AI initiative lead
      • CIO
      • Other IT leadership
      • Business subject matter experts

      Target-state options

      Identify the future-state capabilities that need to be developed to deliver your use cases

      1. Build an implementation plan for each use case to adopt.
      2. Assess if the current state of the AI environment can be leveraged to deliver the selected generative AI use cases.
      3. If the current AI environment is not sufficient, identify the future state required that will enable the delivery of the generative AI use cases. Identify gaps and build the roadmap to address the gaps.
      Current state Strategy
      The existing environment satisfies functionality, integration, and responsible AI guidelines for the proposed use cases. Maintain current environment
      The existing environment addresses technical requirements but not all the responsible AI guidelines. Augment current environment
      The environment neither addresses the technical requirements of the proposed use cases nor complies with the responsible AI guidelines. Transform the current environment

      4.1.2 Design metrics for success

      1-2 hours

      Establish metrics to measure to determine the success or failure of each POC.

      1. Discuss which relevant currently tracked metrics are useful to continue tracking for the POC.
      2. Discuss which metrics are irrelevant to the POC.
      3. Discuss metrics to start tracking and how to track them with the generative AI vendor.
      4. Compile a list of metrics relevant to the POC.
      5. Decide what the outcome is if the metric is high or low, including decision steps and relevant actions.
      6. Designate a generative AI application owner and a vendor liaison.

      Prepare by building an implementation plan for each candidate use case (previous step).

      Include key performance indicators (KPIs) and metrics that measure the application's contribution to strategic initiatives.

      Consider assigning a vendor liaison to accelerate the implementation and adoption of the generative AI-based solution.

      InputOutput
      • Initiative implementation plans
      • Current SLAs of selected use case
      • Organization mission, vision, and strategic goals
      • Measurable initiative metrics to track
      MaterialsParticipants
      • Whiteboard/flip charts
      • AI Maturity Assessment and Roadmap Tool
      • AI initiative lead
      • CIO
      • Other IT leadership
      • Business SMEs
      • Generative AI vendor liaison

      Generative AI POC metrics - examples

      You need to measure the effectiveness of your initiatives. Here are some typical examples.

      Generative AI Feature Assessment
      User Interface
      Is it intuitive? Is training required?
      Ease of Use
      How much training is required before using?
      Response Time
      What is the response time for simple to complex tasks?
      Accuracy of Response
      Can the output be validated?
      Quality of Response
      How usable is the response? For text prompts, does the response align to the desired style, vocabulary, and tone?
      Creativity of Response
      Does the output appear new compared to previous results before using generative AI?
      Relevance of Response
      How well does the output address the prompt or request?
      Explainability
      Can a user describe how the output was generated?
      Scalability
      Does the application continue to perform as more users are added? Can it ingest large amounts of data?
      Productivity Gains
      Can you measure the time or effort saved?
      Business Value
      What value drivers are behind this initiative? (I.e. revenue, costs, time to market, risk mitigation.) Estimate a monetary value for the business outcome.
      Availability/Resilience
      What happens if a component of the application becomes unavailable? How does it recover?
      Security Model
      Where are the prompts and responses stored? Who has access to the sessions/dialogue? Are the prompts used to train the foundation model?
      Administration and Maintenance
      What resources are required to operate the application?
      Total Cost of Ownership
      What is the pricing model? Are there ongoing costs?

      GitHub Copilot POC business value - example

      Quantifying the benefits of GitHub Copilot to demonstrate measurable business value

      POC Results

      Task 1: Creating a web server in JavaScript

      • Time to complete task with GitHub Copilot: 1 hour 11 minutes
      • Time to complete the task without GitHub Copilot: 2 hours 41 minutes
      • Productivity Gain = (1 hour 30 minutes time saved) / (2 hours 41 minutes) = 55%
      • Benefit per Programmer = 55% x (average salary of a programmer)
      • Total Benefit of GitHub Copilot for Task 1 = (benefit per programmer) x (# of programmers)

      Enterprise Value of GitHub Copilot = Total Benefit of GitHub Copilot for Task 1 + Total Benefit of GitHub Copilot for Task 2 + ... + Total Benefit of GitHub Copilot for Task n

      Source: GitHub

      4.1.3 Build your generative AI initiative roadmap

      1-3 hours

      The roadmap should provide a compelling vision of how you will deliver the identified generative AI applications by prioritizing and simplifying the actions required to deliver these new initiatives.

      1. Leverage tab 4, Initiative Planning, in the AI Maturity Assessment and Roadmap Tool to create and align your initiatives to the key value driver they are most relevant to:
        1. Transfer the results of your value and complexity assessments to this tool to drive the prioritization.
        2. Assign responsible owners to each initiative.
        3. Identify which AI maturity capabilities each initiative will enhance. However, do not build or introduce new capabilities merely to advance the organization's AI maturity level.
      2. Review the Gantt chart to ensure alignment and assess overlap.

      Download the AI Maturity Assessment and Roadmap Tool

      InputOutput
      • Each initiative implementation plan
      • Proposed owners
      • AI maturity assessment
      • Generative AI initiative roadmap and Gantt chart
      MaterialsParticipants
      • Whiteboard/flip charts
      • AI Maturity Assessment and Roadmap Tool
      • AI initiative lead
      • CIO
      • Other IT leadership
      • Business SMEs

      Build your generative AI roadmap to visualize your key project plans

      Visual representations of data are more compelling than text alone.

      Develop a high-level document that travels with the project from inception through to executive inquiry, project management, and finally execution.

      A project needs to be discrete: able to be conceptualized and discussed as an independent item. Each project must have three characteristics:

      • Specific outcome: An explicit change in the people, processes, or technology of the enterprise.
      • Target end date: When the described outcome will be in effect.
      • Owner: Who on the IT team is responsible for executing on the initiative.

      Build your generative AI roadmap to visualize your key project plans

      Info-Tech Insight
      Don't project your vision three to five years into the future. Deep dive on next year's big-ticket items instead.

      4.1.4 Build a communication plan for your roadmap

      1-3 hours

      1. Identify your target audience and what they need to know.
      2. Identify desired channels of communication and details for the target audience.
      3. Describe communication required for each audience segment.
      4. List frequency of communication for each audience segment.
      5. Create an executive presentation leveraging The Era of Generative AI C-Suite Presentation and AI Maturity Assessment and Roadmap Tool.
      Input Output
      • Stakeholder list
      • Proposed owners
      • AI maturity assessment
      • Communications plan for all impacted stakeholders
      • Executive communication pack
      Materials Participants
      • Whiteboard/flip charts
      • The Era of Generative AI C-Suite Presentation
      • AI Maturity Assessment and Roadmap Tool
      • AI initiative lead
      • CIO
      • Communication lead
      • Technical support staff for target use case

      Generative AI communication plan

      Well-planned communications are essential to the success and adoption of your AI initiatives

      To ensure that organization's roadmap is clearly communicated across the AI, data, technology, and business organizations, develop a rollout strategy, like this example.

      Example

      Audience Channel Level of Detail Description Timing
      Generative AI team Email, meetings All
      • Distribute plan; solicit feedback.
      • Address manager questions to equip them to answer employee questions.
      Q3 2023, (September, before entire data team)
      Data management team Email, Q&A sessions following Data management summary deck
      • Roll out after corporate strategy, in same form of communication.
      • Solicit feedback, address questions.
      Q4 2023 (late November)
      Select business stakeholders Presentations Executive deck
      • Pilot test for feedback prior to executive engagement.
      Q4 2023 (early December)
      Executive team Email, briefing Executive deck
      • Distribute plan.
      Q1 2024

      Deliver an executive presentation of the roadmap for the business stakeholders

      After you complete the activities and exercises within this blueprint, the final step of the process is to present the deliverable to senior management and stakeholders.

      Know Your Audience

      • Business stakeholders are interested in understanding the business outcomes that will result from their investment in generative AI.
      • Your audience will want to understand the risks involved and how to mitigate those risks.
      • Explain how the generative AI project was selected and the criteria used to help draft generative AI usage policies.

      Recommendations

      • Highlight the need for responsible AI to ensure that human-based requirements are being addressed.
      • Ensure your generative AI team includes both business and technical staff.

      Download The Era of Generative AI C-Suite Presentation

      Bibliography

      "A pro-innovation approach to AI regulation." UK Department for Science, Innovation and Technology, March 2023. Web.

      "Artificial Intelligence Act." European Commission, 21 April 2021. Web.

      "Artificial Intelligence and Data Act (AIDA)." Canadian Federal Government, June 2022. Web.

      "Artificial Intelligence Index Report 2023." Stanford University, April 2023. Web.

      "Automated Employment Decision Tools." New York City Department of Consumer and Worker Protection, Dec. 2021. Web.

      "Bain & Company announces services alliance with OpenAI to help enterprise clients identify and realize the full potential and maximum value of AI." Bain & Company, 21 Feb. 2023. Web.

      "Buzzfeed to use AI to write its articles after firing 180 employees." Al Mayadeen English, 27 Jan. 2023. Web.

      "California Consumers Privacy Act." State of California Department of Justice. April 24, 2023. Web.

      Campbell, Ian Carlos. "The Apple Card doesn't actually discriminate against women, investigators say." The Verge, 23 March 2021. Web.

      Campbell, Patrick. "NIST Artificial Intelligence Risk Management Framework (AI RMF 1.0)." National Institute of Standards and Technology, Jan. 2023. Web.

      "EU Ethics Guidelines For Trustworthy." European Commission, 8 April 2019. Web.

      Farhi, Paul. "A news site used AI to write articles. It was a journalistic disaster." Washington Post, 17 Jan. 2023. Web.

      Forsyth, Ollie. "Mapping the Generative AI landscape." Antler, 20 Dec. 2022. Web.

      "General Data Protection Regulation (GDPR)" European Commission, 25 May 2018. Web.

      "Generative AI Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2023-2028." IMARC Group, 2022. Web.

      Guynn, Jessica. "Bing's ChatGPT is in its feelings: 'You have not been a good user. I have been a good Bing.'" USA Today, 14 Feb. 2023. Web.

      Hunt, Mia. "Canada launches data governance standardisation initiative." Global Government Forum, 24 Sept. 2020. Web.

      Johnston Turner, Mary. "IDC's Worldwide Future of Digital Infrastructure 2022 Predictions." IDC, 27 Oct. 2021. Web.

      Kalliamvakou, Eirini. "Research: quantifying GitHub Copilot's impact on developer productivity and happiness." GitHub, 7 Sept. 2022. Web.

      Kerravala, Zeus. "NVIDIA Brings AI To Health Care While Protecting Patient Data." eWeek, 12 Dec. 2019. Web.

      Knight, Will. "The Apple Card Didn't 'See' Gender-and That's the Problem." Wired, 19 Nov. 2019. Web.

      "OECD, Recommendation of the Council on Artificial Intelligence." OECD, 2022. Web.

      "The National AI Initiative Act" U.S. Federal Government, 1 Jan 2021. Web.

      "Trustworthy AI (TAI) Playbook." U.S. Department of Health & Human Services, Sept 2021. Web.

      Info-Tech Research Contributors/Advocates

      Joel McLean, Executive Chairman

      Joel McLean
      Executive Chairman

      David Godfrey, CEO

      David Godfrey
      CEO

      Gord Harrison, Senior Vice President, Research & Advisory Services

      Gord Harrison
      Senior Vice President, Research & Advisory Services

      William Russell, CIO

      William Russell
      CIO

      Jack Hakimian, SVP, Research

      Jack Hakimian
      SVP, Research

      Barry Cousins, Distinguished Analyst and Research Fellow

      Barry Cousins
      Distinguished Analyst and
      Research Fellow

      Larry Fretz, Vice President, Industry Research

      Larry Fretz
      Vice President, Industry Research

      Tom Zehren, CPO

      Tom Zehren
      CPO

      Mark Roman, Managing Partner II

      Mark Roman
      Managing Partner II

      Christine West, Managing Partner

      Christine West
      Managing Partner

      Steve Willis, Practice Lead

      Steve Willis
      Practice Lead

      Yatish Sewgoolam, Associate Vice President, Research Agenda

      Yatish Sewgoolam
      Associate Vice President, Research Agenda

      Rob Redford, Practice Lead

      Rob Redford
      Practice Lead

      Mike Tweedie, Practice Lead

      Mike Tweedie
      Practice Lead

      Neal Rosenblatt, Principal Research Director

      Neal Rosenblatt
      Principal Research Director

      Jing Wu, Principal Research Director

      Jing Wu
      Principal Research Director

      Irina Sedenko, Research Director

      Irina Sedenko
      Research Director

      Jeremy Roberts, Workshop Director

      Jeremy Roberts
      Workshop Director

      Brian Jackson, Research Director

      Brian Jackson
      Research Director

      Mark Maby, Research Director

      Mark Maby
      Research Director

      Stacey Horricks, Director, Social Media

      Stacey Horricks
      Director, Social Media

      Sufyan Al-Hassan, Public Relations Manager

      Sufyan Al-Hassan
      Public Relations Manager

      Sam Kanen, Marketing Specialist

      Sam Kanen
      Marketing Specialist

      Transition Projects Over to the Service Desk

      • Buy Link or Shortcode: {j2store}495|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • IT suffers from a lack of strategy and plan for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk, leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Our Advice

      Critical Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      Impact and Result

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Transition Projects Over to the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transition Projects Over to the Service Desk – A guideline to walk you through transferring project support to the service desk.

      This storyboard will help you craft a project support plan to document information to streamline service support.

      • Transition Projects Over to the Service Desk Storyboard

      2. Project Handover and Checklist – A structured document to help you record information on the project and steps to take to transfer support.

      Use these two templates as a means of collaboration with the service desk to provide information on the application/product, and steps to take to make sure there are efficient service processes and knowledge is appropriately transferred to the service desk to support the service.

      • Project Handover Template
      • Service Support Transitioning Checklist
      [infographic]

      Further reading

      Transition Projects Over to the Service Desk

      Increase the success of project support by aligning your service desk and project team.

      Analyst Perspective

      Formalize your project support plan to shift customer service to the service desk.

      Photo of Mahmoud Ramin, Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      As a service support team member, you receive a ticket from an end user about an issue they’re facing with a new application. You are aware of the application release, but you don’t know how to handle the issue. So, you will need to either spend a long time investigating the issue via peer discussion and research or escalate it to the project team.

      Newly developed or improved services should be transitioned appropriately to the support team. Service transitioning should include planning, coordination, and communication. This helps project and support teams ensure that upon a service failure, affected end users receive timely and efficient customer support.

      At the first level, the project team and service desk should build a strategy around transitioning service support to the service desk by defining tasks, service levels, standards, and success criteria.

      In the second step, they should check the service readiness to shift support from the project team to the service desk.

      The next step is training on the new services via efficient communication and coordination between the two parties. The project team should allocate some time, according to the designed strategy, to train the service desk on the new/updated service. This will enable the service desk to provide independent service handling.

      This research walks you through the above steps in more detail and helps you build a checklist of action items to streamline shifting service support to the service desk.

      Mahmoud Ramin, PhD

      Senior Research Analyst
      Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • IT suffers from a lack of strategy and planning for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Common Obstacles

      • Building the right relationship between the service desk and project team is challenging, making support transition tedious.
      • The service desk is siloed; tasks and activities are loosely defined. Service delivery is inconsistent, which impacts customer satisfaction.
      • Lack of training on new services forces the service desk to unnecessarily escalate tickets to other levels and delays service delivery.

      Info-Tech’s Approach

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Info-Tech Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      A lack of formal service transition process presents additional challenges

      When there is no formal transition process following a project delivery, it will negatively impact project success and customer satisfaction.

      Service desk team:

      • You receive a request from an end user to handle an issue with an application or service that was recently released. You are aware of the features but don’t know how to solve this issue particularly.
      • You know someone in the project group who is familiar with the service, as he was involved in the project. You reach out to him, but he is very busy with another project.
      • You get back to the user to let them know that this will be done as soon as the specialist is available. But because there is no clarity on the scope of the issue, you cannot tell them when this will be resolved.
      • Lack of visibility and commitment to the service recovery will negatively impact end-user satisfaction with the service desk.

      Project delivery team:

      • You are working on an exciting project, approaching the deadline. Suddenly, you receive a ticket from a service desk agent asking you to solve an incident on a product that was released three months ago.
      • Given the deadline on the current project, you are stressed, thinking about just focusing on the projects. On the other hand, the issue with the other service is impacting multiple users and requires much attention.
      • You spend extra time handling the issue and get back to your project. But a few days later the same agent gets back to you to take care of the same issue.
      • This is negatively impacting your work quality and causing some friction between the project team and the service desk.

      Link how improvement in project transitioning to the service desk can help service support

      A successful launch can still be a failure if the support team isn't fully informed and prepared.

      • In such a situation, the project team sends impacted users a mass notification without a solid plan for training and no proper documentation.
      • To provide proper customer service, organizations should involve several stakeholder groups to collaborate for a seamless transition of projects to the service desk.
      • This shift in service support takes time and effort; however, via proper planning there will be less confusion around customer service, and it will be done much faster.
        • For instance, if AppDev is customizing an ERP solution without considering knowledge transfer to the service desk, relevant tickets will be unnecessarily escalated to the project team.
      • On the other hand, the service desk should update configuration items (CIs) and the service catalog and related requests, incidents, problems, and workarounds to the relevant assets and configurations.
      • In this transition process, knowledge transfer plays a key role. Users, the service desk, and other service support teams need to know how the new application or service works and how to manage it when an issue arises.
      • Without a knowledge transfer, service support will be forced to either reinvent the wheel or escalate the ticket to the development team. This will unnecessarily increase the time for ticket handling, increase cost per ticket, and reduce end-user satisfaction.

      Info-Tech Insight

      Involve the service desk in the transition process via clear communication, knowledge transfer, and staff training.

      Integrate the service desk into the project management lifecycle for a smooth transition of service support

      Service desk involvement in the development, testing, and maintenance/change activity steps of your project lifecycle will help you logically define the category and priority level of the service and enable service level improvement accordingly after the project goes live.

      Project management lifecycle

      As some of the support and project processes can be integrated, responsibility silos should be broken

      Processes are done by different roles. Determine roles and responsibilities for the overlapping processes to streamline service support transition to the service desk.

      The project team is dedicated to projects, while the support team focuses on customer service for several products.

      Siloed responsibilities:

      • Project team transfers the service fully to the service desk and leaves technicians alone for support without a good knowledge transfer.
      • Specialists who were involved in the project have deep knowledge about the product, but they are not involved in incident or problem management.
      • Service desk was not involved in the planning and execution processes, which leads to lack of knowledge about the product. This leaves the support team with some vague knowledge about the service, which negatively impacts the quality of incident and problem management.

      How to break the silos:

      Develop a tiered model for the service desk and include project delivery in the specialist tier.

      • Use tier 1 (service desk) as a single point of contact to support all IT services.
      • Have tier 2/3 as experts in technology. These agents are a part of the project team. They are also involved in incident management, root-cause analysis, and change management.

      Determine the interfaces

      At the project level, get a clear understanding of support capabilities and demands, and communicate them to the service desk to proactively bring them into the planning step.

      The following questions help you with an efficient plan for support transition

      Questions for support transition

      Clear responsibilities help you define the level of involvement in the overlapping processes

      Conduct a stakeholder analysis to identify the people that can help ensure the success of the transition.

      Goal: Create a prioritized list of people who are affected by the new service and will provide support.

      Why is stakeholder analysis essential?

      Why is stakeholder analysis essential

      Identify the tasks that are required for a successful project handover

      Embed the tasks that the project team should deliver before handing support to the service desk.

      Task/Activity Example

      Conduct administrative work in the application

      • New user setup
      • Password reset

      Update documentation

      • Prepare for knowledge transfer>
      Service request fulfillment/incident management
      • Assess potential bugs
      Technical support for systems troubleshooting
      • Configure a module in ITSM solution

      End-user training

      • FAQs
      • How-to questions
      Service desk training
      • Train technicians for troubleshooting

      Support management (monitoring, meeting SLAs)

      • Monitoring
      • Meeting SLAs

      Report on the service transitioning

      • Transition effectiveness
      • Four-week warranty period
      Ensure all policies follow the transition activities
      • The final week of transition, the service desk will be called to a meeting for final handover of incidents and problems

      Integrate project description and service priority throughout development phase

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Project description will be useful for bringing the project forward to the change advisory board (CAB) for approval and setting up the service in the CMDB.
      • Service priority is used for adding the next layer of attributes to the CMDB for the service and ensuring the I&O department can set up systems monitoring.
      • This should be done early in the process in conjunction with the project manager and business sponsors.
      • It should be done as the project gets underway and the team can work on specifically where that milestone will be in each project.
      • What to include in the project description:
        • Name
        • Purpose
        • Publisher
        • Departments that will use the service
        • Service information
        • Regulatory constrains
      • What to include in the service priority information:
        • Main users
        • Number of users
        • Service requirements
        • System interdependencies
        • Criticality of the dependent systems
        • Service category
        • Service SME and support backup
        • System monitoring resources
        • Alert description and flow

      Document project description and service priority in the Project Handover Template.

      Embed service levels and maintenance information

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Service level objectives (SLOs) will be added to CMDB to ensure the product is reviewed for business continuity and disaster recovery and that the service team knows what is coming.
      • This step will be good to start thinking about training agents and documenting knowledgebase (KB) articles.
      • What to include in SLO:
        • Response time
        • Resolution time
        • Escalation time
        • Business owner
        • Service owner
        • Vendor(s)
        • Vendor warranties
        • Data archiving/purging
        • Availability list
        • Business continuity/recovery objectives
        • Scheduled reports
        • Problem description
      • Maintenance and change requirements: You should add maintenance windows to the change calendar and ensure the maintenance checklist is added to KB articles and technician schedules.
      • What to include in maintenance and change requirements:
        • Scheduled events for the launch
        • Maintenance windows
        • Module release
        • Planned upgrades
        • Anticipated intervals for changes and trigger points
        • Scheduled batches

      Document service level objectives and maintenance in the Project Handover Template.

      Enhance communication between the project team and the service desk

      Communicating with the service desk early and often will ensure that agents fully get a deep knowledge of the new technology.

      Transition of a project to the service desk includes both knowledge transfer and execution transfer.

      01

      Provide training and mentoring to ensure technical knowledge is passed on.

      02

      Transfer leadership responsibilities by appointing the right people.

      03

      Transfer support by strategically assigning workers with the right technical and interpersonal skills.

      04

      Transfer admin rights to ensure technicians have access rights for troubleshooting.

      05

      Create support and a system to transfer work process. For example, using an online platform to store knowledge assets is a great way for support to access project information.

      Info-Tech Insight

      A communication plan and executive presentation will help project managers outline recommendations and communicate their benefits.

      Communicate reasons for projects and how they will be implemented

      Proactive communication of the project to affected stakeholders will help get their buy-in for the new technology and feedback for better support.

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, that makes the change concrete and meaningful to staff.

      The message should:

      • Explain why the change or new application is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed due to the new or updated product.
      • Explain how the application will be implemented.
      • Address how this will affect various roles in the organization.
      • Discuss the staff’s role in making the project successful.
      • Communicate the supporting roles in the early implementation stages and later on.

      Five elements of communicating change

      Implement knowledge transfer to the service desk to ensure tickets won’t be unnecessarily escalated

      The support team usually uses an ITSM solution, while the project team mostly uses a project management solution. End users’ support is done and documented in the ITSM tool.

      Even terminologies used by these teams are different. For instance, service desk’s “incident” is equivalent to a project manager’s “defect.” Without proper integration of the development and support processes, the contents get siloed and outdated over time.

      Potential ways to deal with this challenge:

      Use the same platform for both project and service support

      This helps you document information in a single platform and provides better visibility of the project status to the support team as well. It also helps project team find out change-related incidents for a faster rollback.

      Note: This is not always feasible because of the high costs incurred in purchasing a new application with both ITSM and PM capabilities and the long time it takes for implementing such a solution.

      Integrate the PM and ITSM tools to improve transition efficiency

      Note: Consider the processes that should be integrated. Don’t integrate unnecessary steps in the development stage, such as design, which will not be helpful for support transition.

      Build a training plan for the new service

      When a new system is introduced or significant changes are applied, describe the steps and timeline for training.

      Training the service desk has two-fold benefits:
      Improve support:
      • Support team gets involved in user acceptance testing, which will provide feedback on potential bugs or failures in the technology.
      • Collaboration between specialists and tier 1 technicians will allow the service desk to gather information for handling potential incidents on the application.
      Shift-left enablement:
      • At the specialist level, agents will be more focused on other projects and spend less time on application issues, as they are mostly handled by the service desk.
      • As you shift service support left:
        • Cost per ticket decreases as more of the less costly resources are doing the work.
        • Average time to resolve decreases as the ticket is handled by the service desk.
        • End-user satisfaction increases as they don’t need to wait long for resolution.

      Who resolves the incident

      For more information about shift-left enablement, refer to InfoTech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.

      Integrate knowledge management in the transition plan

      Build a knowledge transfer process to streamline service support for the newly developed technology.

      Use the following steps to ensure the service desk gets trained on the new project.

      1. Identify learning opportunities.
      2. Prioritize the identified opportunities based on:
      • Risk of lost knowledge
      • Impact of knowledge on support improvement
    • Define ways to transfer knowledge from the project team to the service desk. These could be:
      • One-on-one meetings
      • Mentoring sessions
      • Knowledgebase articles
      • Product road test
      • Potential incident management shadowing
    • Capture and transfer knowledge (via the identified means).
    • Support the service desk with further training if the requirement arises.
    • Info-Tech Insight

      Allocate knowledge transfer within ticket handling workflows. When incident is resolved by a specialist, they will assess if it is a good candidate for technician training and/or a knowledgebase article. If so, the knowledge manager will be notified of the opportunity to assign it to a SME for training and documentation of an article.

      For more information about knowledge transfer, refer to phase 3 of Info-Tech’s blueprint Standardize the Service Desk.

      Focus on the big picture first

      Identify training functions and plan for a formal knowledge transfer

      1. Brainstorm training functions for each group.
      2. Determine the timeline needed to conduct training for the identified training topics.
      RoleTraining FunctionTimeline

      Developer/Technical Support

      • Coach the service desk on the new application
      • Document relevant KB articles
      Business Analysts
      • Conduct informational interviews for new business requirements

      Service Desk Agents

      • Conduct informational interviews
      • Shadow incident management procedures
      • Document lessons learned
      Vendor
      • Provide cross-training to support team

      Document your knowledge transfer plan in the Project Handover Template.

      Build a checklist of the transition action items

      At this stage, the project is ready to go live and support needs to be independently done by the service desk.

      Checklist of the transition action items

      Info-Tech Insight

      No matter how well training is done, specialists may need to work on critical incidents and handle emergency changes. With effective service support and transition planning, you can make an agreement between the incident manager, change manager, and project manager on a timeline to balance critical incident or emergency change management and project management and define your SLA.

      Activity: Prepare a checklist of initiatives before support transition

      2-3 hours

      Document project support information and check off each support transition initiative as you shift service support to the service desk.

      1. As a group, review the Project Handover Template that you filled out in the previous steps.
      2. Download the Service Support Transitioning Checklist, and review the items that need to be done throughout the development, testing, and deployment steps of your project.
      3. Brainstorm at what step service desk needs to be involved.
      4. As you go through each initiative and complete it, check it off to make sure you are following the agreed document for a smooth transition of service support.
      Input Output
      • Project information
      • Support information for developed application/service
      • List of transitioning initiatives
      MaterialsParticipants
      • Project Handover Template
      • Service Support Transitioning Checklist
      • Project Team
      • Service Desk Manager
      • IT Lead

      Download the Project Handover Template

      Download the Service Support Transitioning Checklist

      Define metrics to track the success of project transition

      Consider key metrics to speak the language of targeted end users.

      You won’t know if transitioning support processes are successful unless you measure their impact. Find out your objectives for project transition and then track metrics that will allow you to fulfill these goals.

      Determine critical success factors to help you find out key metrics:

      High quality of the service

      Effectiveness of communication of the transition

      Manage risk of failure to help find out activities that will mitigate risk of service disruption

      Smooth and timely transition of support to the service desk

      Efficient utilization of the shared services and resources to mitigate conflicts and streamline service transitioning

      Suggested metrics:

      • Time to fulfill requests and resolve incidents for the new project
      • Time spent training the service desk
      • Number of knowledgebase articles created by the project team
      • Percentage of articles used by the service desk that prevented ticket escalation
      • First-level resolution
      • Ratio of escalated tickets for the new project
      • Problem ticket volume for the new project
      • Average customer satisfaction with the new project support
      • SLA breach rate

      Summary of Accomplishment

      Problem Solved

      Following the steps outlined in this research has helped you build a strategy to shift service support from the project team to the service desk, resulting in an improvement in customer service and agent satisfaction.

      You have also developed a plan to break the silo between the service desk and specialists and enable knowledge transfer so the service desk will not need to unnecessarily escalate tickets to developers. In the meantime, specialists are also responsible for service desk training on the new application.

      Efficient communication of service levels has helped the project team set clear expectations for managers to create a balance between their projects and service support.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Optimize the Service Desk With a Shift-Left Strategy

      The best type of service desk ticket is the one that doesn’t exist.

      Tailor IT Project Management Processes to Fit Your Projects

      Right-size PMBOK for all of your IT projects.

      Works Cited

      Brown, Josh. “Knowledge Transfer: What it is & How to Use it Effectively.” Helpjuice, 2021. Accessed November 2022.

      Magowan, Kirstie. “Top ITSM Metrics & KPIs: Measuring for Success, Aiming for Improvement.” BMC Blogs, 2020. Accessed November 2022.

      “The Complete Blueprint for Aligning Your Service Desk and Development Teams (Process Integration and Best Practices).” Exalate, 2021. Accessed October 2022.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      Reduce Risk With Rock-Solid Service-Level Agreements

      • Buy Link or Shortcode: {j2store}365|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Organizations can struggle to understand what service-level agreements (SLAs) are required and how they can differ depending on the service type. In addition, these other challenges can also cloud an organization’s knowledge of SLAs:

      • No standardized SLAs documents, service levels, or metrics
      • Dealing with lost productivity and revenue due to persistent downtime
      • Not understanding SLAs components and what service levels are required for a particular service
      • How to manage the SLA and hold the vendor accountable

      Our Advice

      Critical Insight

      SLAs need to have clear, easy-to-measure objectives, to meet expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to its obligations.

      Impact and Result

      This project will provide several benefits and learnings for almost all IT workers:

      • Better understanding of an SLA framework and required SLA elements
      • Standardized service levels and metrics aligned to the organization’s requirements
      • Reduced time in reviewing, evaluating, and managing service provider SLAs

      Reduce Risk With Rock-Solid Service-Level Agreements Research & Tools

      Start here – Read our Executive Brief

      Understand how to resolve your challenges with SLAs and their components and ensuring adequate metrics. Learn how to create meaningful SLAs that meet your requirements and manage them effectively.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand SLA elements – Understand the elements of SLAs, service types, service levels, metrics/KPIs, monitoring, and reporting

      • SLA Checklist
      • SLA Evaluation Tool

      2. Create requirements – Create your own SLA criteria and templates that meet your organization’s requirements

      • SLA Template & Metrics Reference Guide

      3. Manage obligations – Learn the SLA Management Framework to track providers’ performance and adherence to their commitments.

      • SLO Tracker & Trending Tool

      Infographic

      Workshop: Reduce Risk With Rock-Solid Service-Level Agreements

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Elements of SLAs

      The Purpose

      Understand key components and elements of an SLA.

      Key Benefits Achieved

      Properly evaluate an SLA for required elements.

      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components: monitoring, reporting, and remedies

      1.4 SLA checklist review

      Outputs

      SLA Checklist 

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      2 Create SLA Criteria and Management Framework

      The Purpose

      Apply knowledge of SLA elements to create internal SLA requirements.

      Key Benefits Achieved

      Templated SLAs that meet requirements.

      Framework to manage SLOs.

      Activities

      2.1 Creating SLA criteria and requirements

      2.2 SLA templates and policy

      2.3 SLA evaluation activity

      2.4 SLA Management Framework

      2.5 SLA monitoring, tracking, and remedy reconciliation

      Outputs

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Further reading

      Reduce Risk With Rock-Solid Service-Level Agreements

      Hold Service Providers more accountable to their contractual obligations with meaningful SLA components & remedies

      EXECUTIVE BRIEF

      Analyst Perspective

      Reduce Risk With Rock-Solid Service-Level Agreements

      Every year organizations outsource more and more IT infrastructure to the cloud, and IT operations to managed service providers. This increase in outsourcing presents an increase in risk to the CIO to save on IT spend through outsourcing while maintaining required and expected service levels to internal customers and the organization. Ensuring that the service provider constantly meets their obligations so that the CIO can meet their obligation to the organization can be a constant challenge. This brings forth the importance of the Service Level Agreement.

      Research clearly indicates that there is a general lack of knowledge when comes to understanding the key elements of a Service Level Agreement (SLA). Even less understanding of the importance of the components of Service Levels and the Service Level Objectives (SLO) that service provider needs to meet so that the outsourced service consistently meets requirements of the organization. Most service providers are very good at providing the contracted service and they all are very good at presenting SLOs that are easy to meet with very few or no ramifications if they don’t meet their objectives. IT leaders need to be more resolute in only accepting SLOs that are meaningful to their requirements and have meaningful, proactive reporting and associated remedies to hold service providers accountable to their obligations.

      Ted Walker

      Principal Research Director, Vendor Practice

      Info-Tech Research Group

      Executive Brief

      Vendors provide service level commitments to customers in contracts to show a level of trust, performance, availability, security, and responsiveness in an effort create a sense of confidence that their service or platform will meet your organization’s requirements and expectations. Sifting through these promises can be challenging for many IT Leaders. Customers struggle to understand and evaluate what’s in the SLA – are they meaningful and protect your investment? Not understanding the details of SLAs applicable to various types of Service (SaaS, MSP, Service Desk, DR, ISP) can lead to financial and compliance risk for the organization as well as poor customer satisfaction.

      This project will provide IT leadership the knowledge & tools that will allow them to:

      • Understand what SLAs are and why they need them.
      • Develop standard SLAs that meet the organization’s requirements.
      • Negotiate meaningful remedies aligned to Service Levels metrics or KPIs.
      • Create SLA monitoring & reporting and remedies requirements to hold the provider accountable.

      This research:

      1. Is designed for:
      • The CIO or CFO who needs to better understand their provider’s SLAs.
      • The CIO or BU that could benefit from improved service levels.
      • Vendor management who needs to standardize SLAs for the organization IT leadership that needs consistent service levels to the business
      • The contract manager who needs a better understanding of contact SLAs
    • Will help you:
      • Understand what a Service Level Agreement is and what it’s for
      • Learn what the components are of an SLA and why you need them
      • Create a checklist of required SLA elements for your organization
      • Develop standard SLA template requirements for various service types
      • Learn the importance of SLA management to hold providers accountable
    • Will also assist:
      • Vendor management
      • Procurement and sourcing
      • Organizations that need to understand SLAs within contract language
      • With creating standardized monitoring & reporting requirements
      • Organizations get better position remedies & credits to hold vendors accountable to their commitments
    • Reduce Risk With Rock-Solid Service-Level Agreements (SLAs)

      Hold service providers more accountable to their contractual obligations with meaningful SLA components and remedies

      The Problem

      IT Leadership doesn't know how to evaluate an SLA.

      Misunderstanding of obligations given the type of service provided (SAAS, IAAS, DR/BCP, Service Desk)

      Expectations not being met, leading to poor service from the provider.

      No way to hold provider accountable.

      Why it matters

      SLAS are designed to ensure that outsourced IT services meet the requirements and expectations of the organization. Well-written SLAs with all the required elements, metrics, and remedies will allow IT departments to provide the service levels to their customer and avoid financial and contractual risk to the organization.

      The Solution

      1. Understand the key service elements within an SLA
      • Develop a solid understanding of the key elements within an SLA and why they're important.
    • Establish requirements to create SLA criteria
      • Prioritize contractual services and establish concise SLA checklists and performance metrics.
    • Manage SLA obligations to ensure commitments are met
      • Review the five steps for effective SLA management to track provider performance and deal with chronic issues.
    • Service types

      • Availability/Uptime
      • Response Times
      • Resolution Time
      • Accuracy
      • First-Call Resolution

      Agreement Types

      • SaaS/IaaS
      • Service Desk
      • MSP
      • Co-Location
      • DR/BCP
      • Security Ops

      Performance Metrics

      • Reporting
      • Remedies & Credits
      • Monitoring
      • Exclusion

      Example SaaS Provider

      • Response Times ✓
      • Availability/Uptime ✓
      • Resolution Time ✓
      • Update Times ✓
      • Coverage Time ✓
      • Monitoring ✓
      • Reporting ✓
      • Remedies/Credits ✓

      SLA Management Framework

      1. SLO Monitoring
      • SLOs must be monitored by the provider, otherwise they can't be measured.
    • Concise Reporting
      • This is the key element for the provider to validate their performance.
    • Attainment Tracking
      • Capturing SLO metric attainment provides performance trending for each provider.
    • Score carding
      • Tracking details provide input into overall vendor performance ratings.
    • Remedy Reconciliation
      • From SLO tracking, missed SLOs and associated credits needs to be actioned and consumed.
    • Executive Summary

      Your Challenge

      To understand which SLAs are required for your organization and how they can differ depending on the service type. In addition, these other challenges can also cloud your knowledge of SLAs

      • No standardized SLA documents, Service levels, or metrics
      • Dealing with lost productivity & revenue due to persistent downtime
      • Understanding SLA components and what service levels are requires for a particular service
      • How to manage the SLA and hold the vendor accountable

      Common Obstacles

      There are several unknowns that SLA can present to different departments within the organization:

      • Little knowledge of what service levels are required
      • Not knowing SLO standards for a service type
      • Lack of resources to manage vendor obligations
      • Negotiating required metrics/KPIs with the provider
      • Low understanding of the risk that poor SLAs can present to the organization

      Info-Tech's Approach

      Info-Tech has a three-step approach to effective SLAs

      • Understand the elements of an SLA
      • Create Requirements for your organization
      • Manage the SLA obligations

      There are some basic components that every SLA should have – most don’t have half of what is required

      Info-Tech Insight

      SLAs need to have clear, easy to measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Your challenge

      This research is designed to help organizations gain a better understanding of what an SLA is, understand the importance of SLAs in IT contracts, and ensure organizations are provided with rock-solid SLAs that meet their requirements and not just what the vendor wants to provide.

      • Vendors can make SLAs weak and difficult to understand; sometimes the metrics are meaningless. Not fully understanding what makes up a good SLA can bring unknown risks to the organization.
      • Managing vendor SLA obligations effectively is important. Are adequate resources available? Does the vendor provide manual vs. automated processes and which do you need? Is the process proactive from the vendor or reactive from the customer?

      SLAs come in many variations and for many service types. Understanding what needs to be in them is one of the keys to reducing risk to your organization.

      “One of the biggest mistakes an IT leader can make is ignoring the ‘A’ in SLA,” adds Wendy M. Pfeiffer, CIO at Nutanix. “

      An agreement isn’t a one-sided declaration of IT capabilities, nor is it a one-sided demand of business requirements,” she says. “An agreement involves creating a shared understanding of desired service delivery and quality, calculating costs related to expectations, and then agreeing to outcomes in exchange for investment.” (15 SLA mistakes IT leaders still make | CIO)

      Common obstacles

      There are typically a lot of unknowns when it comes to SLAs and how to manage them.

      Most organizations don’t have a full understanding of what SLAs they require and how to ensure they are met by the vendor. Other obstacles that SLAs can present are:

      • Inadequate resources to create and manage SLAs
      • Poor awareness of standard or required SLA metrics/KPIs
      • Lack of knowledge about each provider’s commitment as well as your obligations
      • Low vendor willingness to provide or negotiate meaningful SLAs and credits
      • The know-how or resources to effectively monitor and manage the SLA’s performance

      SLAs need to address your requirements

      55% of businesses do not find all of their service desk metrics useful or valuable (Freshservice.com)

      27% of businesses spend four to seven hours a month collating metric reports (Freshservice.com)

      Executive Summary

      Info-Tech’s Approach

      • Understand the elements of an SLA
        • Availability
        • Monitoring
        • Response Times
        • SLO Calculation
        • Resolution Time
        • Reporting
        • Milestones
        • Exclusions
        • Accuracy
        • Remedies & Credits
      • Create standard SLA requirements and criteria
        • SLA Element Checklist
        • Corporate Requirements and Standards
        • SLA Templates and Policy
      • Effectively Manage the SLA Obligations
        • SLA Management Framework
          • SLO Monitoring
          • Concise Reporting
          • Attainment Tracking
          • Score Carding
          • Remedy Reconciliation

      Info-Tech’s three phase approach

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Understand SLA Elements

      Phase Content:

      • 1.1 What are SLAs, types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Outcome:

      This phase will present you with an understanding of the elements of an SLA: What they are, why you need them, and how to validate them.

      Phase 2

      Create Requirements

      Phase Content:

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA Overachieving discussion

      Outcome:

      This phase will leverage knowledge gained in Phase 1 and guide you through the creation of SLA requirements, criteria, and templates to ensure that providers meet the service level obligations needed for various service types to meet your organization’s service expectations.

      Phase 3

      Manage Obligations

      Phase Content:

      • 3.1 SLA Monitoring, Tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA Reviews & Optimizing
      • 3.4 Performance management

      Outcome:

      This phase will provide you with an SLA management framework and the best practices that will allow you to effectively manage service providers and their SLA obligations.

      Insight summary

      Overarching insight

      SLAs need to have clear, easy-to-measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Phase 1 insight

      Not understanding the required elements of an SLA and not having meaningful remedies to hold service providers accountable to their obligations can present several risk factors to your organization.

      Phase 2 insight

      Creating standard SLA criteria for your organization’s service providers will ensure consistent service levels for your business units and customers.

      Phase 3 insight

      SLAs can have appropriate SLOs and remedies but without effective management processes they could become meaningless.

      Tactical insight

      Be sure to set SLAs that are easily measurable from regularly accessible data and that are straight forward to interpret.

      Tactical insight

      Beware of low, easy to attain service levels and metrics/KPIs. Service levels need to meet your expectations and needs not the vendor’s.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      SLA Tracker & Trending Tool

      Track the provider’s SLO attainment and see how their performance is trending over time

      SLA Evaluation Tool

      Evaluate SLA service levels, metrics, credit values, reporting, and other elements

      SLA Template & Metrics Reference Guide

      Reference guide for typical SLA metrics with a generic SLA Template

      Service-Level Agreement Checklist

      Complete SLA component checklist for core SLA and contractual elements.

      Key deliverable:

      Service-Level Agreement Evaluation Tool

      Evaluate each component of the SLA , including service levels, metrics, credit values, reporting, and processes to meet your requirements

      Blueprint objectives

      Understand the components of an SLA and effectively manage their obligations

      • To provide an understanding of different types of SLAs, their required elements, and what they mean to your organization. How to identify meaningful service levels based on service types. We will break down the elements of the SLA such as service types and define service levels such as response times, availability, accuracy, and associated metrics or KPIs to ensure they are concise and easy to measure.
      • To show how important it is that all metrics have remedies to hold the service provider accountable to their SLA obligations.

      Once you have this knowledge you will be able to create and negotiate SLA requirements to meet your organization’s needs and then manage them effectively throughout the term of the agreement.

      InfoTech Insight:

      Right-size your requirements and create your SLO criteria based on risk mitigation and create measurements that motivate the desired behavior from the SLA.

      Blueprint benefits

      IT Benefits

      • An understanding of standard SLA service levels and metrics
      • Reduced financial risk through clear and concise easy-to-measure metrics and KPIs
      • Improved SLA commitments from the service provider
      • Meaningful reporting and remedies to hold the provider accountable
      • Service levels and metrics that meet your requirements to support your customers

      Business Benefits

      • Better understanding of an SLA framework and required SLA elements
      • Improved vendor performance
      • Standardized service levels and metrics aligned to your organization’s requirements
      • Reduced time in reviewing and comprehending vendor SLAs
      • Consistent performance from your service providers

      Measure the value of this blueprint

      1. Dollars Saved
      • Improved performance from your service provider
      • Reduced financial risk through meaningful service levels & remedies
      • Dollars gained through:
        • Reconciled credits from obligation tracking and management
        • Savings due to automated processes
    • Time Saved
      • Reduced time in creating effective SLAs through requirement templates
      • Time spent tracking and managing SLA obligations
      • Reduced negotiation time
      • Time spent tracking and reconciling credits
    • Knowledge Gained
      • Understanding of SLA elements, service levels, service types, reporting, and remedies
      • Standard metrics and KPIs required for various service types and levels
      • How to effectively manage the service provider obligations
      • Tactics to negotiate appropriate service levels to meet your requirements
    • Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way wound help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between three to six calls over the course of two to three months.

      Phase 1 - Understand

      • Call #1: Scope requirements, objectives, and your specific SLA challenges

      Phase 2 - Create Requirements

      • Call #2: Review key SLA and how to identify them
      • Call #3: Deep dive into SLA elements and why you need them
      • Call #4: Review your service types and SLA criteria
      • Call #5: Create internal SLA requirements and templates

      Phase 3 - Management

      • Call #6: Review SLA Management Framework
      • Call #7: Review and create SLA Reporting and Tracking

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2
      Understanding SLAs SLA Templating & Management
      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components – monitoring, reporting, remedies

      1.4 SLA Checklist review

      2.1 Creating SLA criteria and requirements

      2.2 SLA policy & template

      2.3 SLA evaluation activity

      2.4 SLA management framework

      2.5 SLA monitoring, tracking, remedy reconciliation

      Deliverables
      1. SLA Checklist
      2. SLA policy & template creation
      3. SLA management gap analysis
      1. Evaluation of current SLAs
      2. SLA tracking and trending
      3. Create internal SLA management framework

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Phase 1

      Understand SLA Elements

      Phase Steps

      • 1.1 What are SLAs, the types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions and exceptions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Create Requirements

      Manage Obligations

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      SLA Overview

      What is a Service Level Agreement?

      An SLA is an overarching contractual agreement between a service provider and a customer (can be external or internal) that describes the services that will be delivered by the provider. It describes the service levels and associated performance metrics and expectations, how the provider will show it has attained the SLAs, and defines any remedies or credits that would apply if the provider fails to meet its commitments. Some SLAs also include a change or revision process.

      SLAs come in a few forms. Some are unique, separate, standalone documents that define the service types and levels in more detail and is customized to your needs. Some are separate documents that apply to a service and are web posted or linked to an MSA or SSA. The most common is to have them embedded in, or as an appendix to an MSA or SSA. When negotiating an MSA it’s generally more effective to negotiate better service levels and metrics at the same time.

      Objectives of an SLA

      To be effective, SLAs need to have clearly described objectives that define the service type(s) that the service provider will perform, along with commitment to associated measurable metrics or KPIs that are sufficient to meet your expectations. The goal of these service levels and metrics is to ensure that the service provider is committed to providing the service that you require, and to allow you to maintain service levels to your customers whether internal or external.

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      Key Elements of an SLA

      Principle service elements of an SLA

      There are several more common service-related elements of an SLA. These generally include:

      • The Agreement – the document that defines service levels and commitments.
      • The service types – the type of service being provided by the vendor. These can include SaaS, MSP, Service Desk, Telecom/network, PaaS, Co-Lo, BCP, etc.
      • The service levels – these are the measurable performance objectives of the SLA. They include availability (uptime), response times, restore times, priority level, accuracy level, resolution times, event prevention, completion time, etc.
      • Metrics/KPIs – These are the targets or commitments associated to the service level that the service provider is obligated to meet.
      • Other elements – Reporting requirements, monitoring, remedies/credit values and process.

      Contractual Construct Elements

      These are construct components of an SLA that outline their roles and responsibilities, T&Cs, escalation process, etc.

      In addition, there are several contractual-type elements including, but not limited to:

      • A statement regarding the purpose of the SLA.
      • A list of services being supplied (service types).
      • An in-depth description of how services will be provided and when.
      • Vendor and customer requirements.
      • Vendor and customer obligations.
      • Acknowledgment/acceptance of the SLA.
      • They also list each party’s responsibilities and how issues will be escalated and resolved.

      Common types of SLAs explained

      Service-level SLA

      • This service-level agreement construct is the Service-based SLA. This SLA covers an identified service for all customers in general (for example, if an IT service provider offers customer response times for a service to several customers). In a service-based agreement, the response times would be the same and apply to all customers using the service. Any customer using the service would be provided the same SLA – in this case the same defined response time.

      Customer-based SLA

      • A customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer (for example, you may use several services from one telecom vendor). The SLAs for these services would be covered in one contract between you and the vendor, creating a unique customer-based vendor agreement. Another scenario could be where a vendor offers general SLAs for its services but you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Multi-level SLA

      • This service-level agreement construct is the multi-level SLA. In a multi-level SLA, components are defined to the organizational levels of the customer with cascading coverage to sublevels of the organization. The SLA typically entails all services and is designed to the cover each sub-level or department within the organization. Sometimes the multi-level SLA is known as a master organization SLA as it cascades to several levels of the organization.

      InfoTech Insight: Beware of low, easy to attain Service levels and metrics/KPIs. Service levels need to meet your requirements, expectations, and needs not the vendor’s.

      1.2 Elements of SLA-objectives, service types, and service levels

      Objectives of Service Levels

      The objective of the service levels and service credits are to:

      • Ensure that the services are of a consistently high quality and meet the requirements of the customer
      • Provide a mechanism whereby the customer can attain meaningful recognition of the vendors failure to deliver the level of service for which it was contracted to deliver
      • Incentivize the vendor or service provider to comply with and to expeditiously provide a remedy for any failure to attain the service levels committed to in the SLA
      • To ensure that the service provider fulfills the defined objectives of the outsourced service

      Service types

      There are several service types that can be part of an SLA. Service types are the different nature of services associated with the SLA that the provider is performing and being measured against. These can include:

      Service Desk, SaaS, PaaS, IaaS, ISP/Telecom/Network MSP, DR & BCP, Co-location security ops, SOW.

      Each service type should have standard service level targets or obligations that can vary depending on your requirements and reliance on the service being provided.

      Service levels

      Service levels are measurable targets, metrics, or KPIs that the service provider has committed to for the particular service type. Service levels are the key element of SLAs – they are the performance expectations set between you and the provider. The service performance of the provider is measured against the service level commitments. The ability of the provider to consistently meet these metrics will allow your organization to fully benefit from the objectives of the service and associated SLAs. Most service levels are time related but not all are.

      Common service levels are:

      Response times, resolution times per percent, restore/recovery times, accuracy, availability/uptime, completion/milestones, updating/communication, latency.

      Each service level has standard or minimum metrics for the provider. The metrics, or KPIs, should be relatively easy to measure and report against on a regular basis. Service levels are generally negotiable to meet your requirements.

      1.2.1 Activity SLA Checklist Tool

      1-2 hours

      Input

      • SLA content, Service elements
      • Contract terms & exclusions
      • Service metrices/KPIs

      Output

      • A concise list of SLA components
      • A list of missing SLA elements
      • Evaluation of the SLA

      Materials

      • Comprehensive checklist
      • Service provider SLA
      • Internal templates or policies

      Participants

      • Vendor or contract manager
      • IT or business unit manager
      • Legal
      • Finance

      Using this checklist will help you review a provider’s SLA to ensure it contains adequate service levels and remedies as well as contract-type elements.

      Instructions:

      Use the checklist to identify the principal service level elements as well as the contractual-type elements within the SLA.

      Review the SLA and use the dropdowns in the checklist to verify if the element is in the SLA and whether it is within acceptable parameters as well the page or section for reference.

      The checklist contains a list of service types that can be used for reference of what SLA elements you should expect to see in that service type SLA.

      Download the SLA Checklist Tool

      1.3 Monitoring, reporting requirements, remedies/credit process

      Monitoring & Reporting

      As mentioned, well-defined service levels are key to the success of the SLA. Validating that the metrics/KPIs are being met on a consistent basis requires regular monitoring and reporting. These elements of the SLA are how you hold the provider accountable to the SLA commitments and obligations. To achieve the service level, the service must be monitored to validate that timelines are met and accuracy is achieved.

      • Data or details from monitoring must then be presented in a report and delivered to the customer in an agreed-upon format. These formats can be in a dashboard, portal, spreadsheet, or csv file, and they must have sufficient criteria to validate the service-level metric. Reports should be kept for future review and to create historical trending.
      • Monitoring and reporting should be the responsibility of the service provider. This is the only way that they can validate to the customer that a service level has been achieved.
      • Reporting criteria and delivery timelines should be defined in the SLA and can even have a service level associated with it, such as a scheduled report delivery on the fifth day of the following month.
      • Reports need to be checked and balanced. When defining report criteria, be sure to define data source(s) that can be easily validated by both parties.
      • Report criteria should include compliance requirements, target metric/KPIs, and whether they were attained.
      • The report should identify any attainment shortfall or missed KPIs.

      Too many SLAs do not have these elements as often the provider tries to put the onus on the customer to monitor their performance of the service levels. .

      1.3.1 Monitoring, reporting requirements, remedies/credit process

      Remedies and Credits

      Service-level reports validate the performance of the service provider to the SLA metrics or KPIs. If the metrics are met, then by rights, the service provider is doing its job and performing up to expectations of the SLA and your organization.

      • What if the metrics are not being met either periodically or consistently? Solving this is the goal of remedies. Remedies are typically monetary costs (in some form) to the provider that they must pay for not meeting a service-level commitment. Credits can vary significantly and should be aligned to the severity of the missed service level. Sometimes there no credits offered by the vendor. This is a red flag in an SLA.
      • Typically expressed as a monetary credit, the SLA will have service levels and associated credits if the service-level metric/KPI is not met during the reporting period. Credits can be expressed in a dollar format, often defined as a percentage of a monthly fee or prorated annual fee. Although less common, some SLAs offer non-financial credits. These could include: an extension to service term, additional modules, training credits, access to a higher support level, etc.
      • Regardless of how the credit is presented, this is typically the only way to hold your provider accountable to their commitments and to ensure they perform consistently to expectations. You must do a rough calculation to validate the potential monetary value and if the credit is meaningful enough to the provider.

      Research shows that credit values that equate to just a few dollars, when you are paying the provider tens of thousands of dollars a month for a service or product, the credit is insignificant and therefore doesn’t incent the provider to achieve or maintain a service level.

      1.3.2 Monitoring, reporting requirements, remedies/credit process

      Credit Process

      Along with meaningful credit values, there must be a defined credit calculation method and credit redemption process in the SLA.

      Credit calculation. The credit calculation should be simple and straight forward. Many times, we see providers define complicated methods of calculating the credit value. In some cases complicated service levels require higher effort to monitor and report on, but this shouldn’t mean that the credit for missing the service level needs to require the same effort to calculate. Do a sample credit calculation to validate if the potential credit value is meaningful enough or meets your requirements.

      Credit redemption process. The SLA should define the process of how a credit is provided to the customer. Ideally the process should be fairly automated by the service provider. If the report shows a missed service level, that should trigger a credit calculation and credit value posted to account followed by notification. In many SLAs that we review, the credit process is either poorly defined or not defined at all. When it is defined, the process typically requires the customer to follow an onerous process and submit a credit request that must then be validated by the provider and then, if approved, posted to your account to be applied at year end as long as you are in complete compliance with the agreement and up-to-date on your account etc. This is what we need to avoid in provider-written SLAs. You need a proactive process where the service provider takes responsibility for missing an SLA and automatically assigns an accurate credit to your account with an email notice.

      Secondary level remedies. These are remedies for partial performance. For example, the platform is accessible but some major modules are not working (i.e.: the payroll platform is up and running and accessible but the tax table is not working properly so you can’t complete your payroll run on-time). Consider the requirement of a service level, metric, and remedy for critical components of a service and not just the platform availability.

      Info-Tech Insight SLA’s without adequate remedies to hold the vendor accountable to their commitments make the SLAs essentially meaningless.

      1.4 Exclusions indemnification, force majeure, scheduled maintenance

      Contract-Related Exclusions

      Attaining service-level commitments by the provider within an SLA can depend on other factors that could greatly influence their performance to service levels. Most of these other factors are common and should be defined in the SLA as exclusions or exceptions. Exceptions/exclusions can typically apply to credit calculations as well. Typical exceptions to attaining service levels are:

      • Denial of Service (DoS) attacks
      • Communication/ISP outage
      • Outages of third-party hosting
      • Actions or inactions of the client or third parties
      • Scheduled maintenance but not emergency maintenance
      • Force majeure events which can cover several different scenarios

      Attention should be taken to review the exceptions to ensure they are in fact not within the reasonable control of the provider. Many times the provider will list several exclusions. Often these are not reasonable or can be avoided, and in most cases, they allow the service provider the opportunity to show unjustified service-level achievements. These should be negotiated out of the SLA.

      1.5 Activity SLA Evaluation Tool

      1-2 hours

      Input

      • SLA content
      • SLA elements
      • SLA objectives
      • SLO calculation methods

      Output

      • Rating of the SLA service levels and objectives
      • Overall rating of the SLA content
      • Targeted list of required improvements

      Materials

      • SLA comprehensive checklist
      • Service provider SLA

      Participants

      • Vendor or contract manager
      • IT manager or leadership
      • Application or business unit manager

      The SLA Evaluation Tool will allow you evaluate an SLA for content. Enter details into the tool and evaluate the service levels and SLA elements and components to ensure the agreement contains adequate SLOs to meet your organization’s service requirements.

      Instructions:

      Review and identify SLA elements within the service provider’s SLA.

      Enter service-level details into the tool and rate the SLOs.

      Enter service elements details, validate that all required elements are in the SLA, and rate them accordingly.

      Capture and evaluate service-level SLO calculations.

      Review the overall rating for the SLA and create a targeted list for improvements with the service provider.

      Download the SLA Evaluation Tool

      1.5 Clarification: SLAs vs. SLOs vs. SLIs

      SLA – Service-Level Agreement The promise or commitment

      • This is the formal agreement between you and your service provider that contains their service levels and obligations with measurable metrics/KPIs and associated remedies. SLAs can be a separate or unique document, but are most commonly embedded within an MSA, SOW, SaaS, etc. as an addendum or exhibit.

      SLO – Service-Level Objective The goals or targets

      • This service-level agreement construct is the customer-based SLA. A Customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer. For example, you may use several services from one telecom vendor. The SLAs for these services would be covered in one contract between you and the Telco vendor, creating a unique customer-based to vendor agreement. Another scenario: a vendor offers general SLAs for its services and you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Other common names are Metrics and Key Performance Indicators (KPIs )

      SLI – Service-Level Indicator How did we do? Did we achieve the objectives?

      • An SLI is the actual metric attained after the measurement period. SLI measures compliance with an SLO (service level objective). So, for example, if your SLA specifies that your systems will be available 99.95% of the time, your SLO is 99.95% uptime and your SLI is the actual measurement of your uptime. Maybe it’s 99.96%. maybe 99.99% or even 99.75% For the vendor to be compliant to the SLA, the SLI(s) must meet or exceed the SLOs within the SLA document.

      Other common names: attainment, results, actual

      Info-Tech Insight:

      Web-posted SLAs that are not embedded within a signed MSA, can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 2

      Understand SLA Elements

      Phase 2

      Create Requirements

      Phase Steps

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA overachieving discussion

      Manage Obligations

      2.1 Create a list of your SLA criteria

      Principle Service Elements

      With your understanding of the types of SLAs and the elements that comprise a well-written agreement

      • The next step is to start to create a set of SLA criteria for service types that your organization outsources or may require in the future.
      • This criteria should define the elements of the SLA with tolerance levels that will require the provider to meet your service expectations.
      • Service levels, metrics/KPIs, associated remedies and reporting criteria. This criteria could be captured into table-like templates that can be referenced or inserted into service provider SLAs.
      • Once you have defined minimum service-level criteria, we recommend that you do a deeper review of the various service provider types that your organization has in place. The goal of the review is to understand the objective of the service type and associated service levels and then compare them to your requirements for the service to meet your expectations. Service levels and KPIs should be no less than if your IT department was providing the service with its own resources and infrastructure.
      • Most IT departments have service levels that they are required to meet with their infrastructure to the business units or organization, whether it’s App delivery, issue or problem resolution, availability etc. When any of these services are outsourced to an external service provider, you need to make all efforts to ensure that the service levels are equal to or better than the previous or existing internal expectations.
      • Additionally, the goal is to identify service levels and metrics that don’t meet your requirements or expectations and/or service levels that are missing.

      2.2 Develop SLA policies and templates

      Contract-type Elements

      After creating templates for minimum-service metrics & KPIs, reporting criteria templates, process, and timing, the next step should be to work on contract-type elements and additional service-level components. These elements should include:

      • Reporting format, criteria, and timelines
      • Monitoring requirements
      • Minimum acceptable remedy or credits process; proactive by provider vs. reactive by customer
      • Roles & responsibilities
      • Acceptable exclusion details
      • Termination language for persistent failure to meet SLOs

      These templates or criteria minimums can be used as guidelines or policy when creating or negotiating SLAs with a service provider.

      Start your initial element templates for your strategic vendors and most common service types: SaaS, IaaS, Service Desk, SecOps, etc. The goal of SLA templates is to create simple minimum guidelines for service levels that will allow you to meet your internal SLAs and expectations. Having SLA templates will show the service provider that you understand your requirements and may put you in a better negotiating position when reviewing with the provider.

      When considering SLO metrics or KPIs consider the SMART guidance:

      Simple: A KPI should be easy to measure. It should not be complicated, and the purpose behind recording it must be documented and communicated.

      Measurable: A KPI that cannot be measured will not help in the decision-making process. The selected KPIs must be measurable, whether qualitatively or quantitatively. The procedure for measuring the KPIs must be consistent and well-defined.

      Actionable: KPIs should contribute to the decision-making process of your organization. A KPI that does not make any such contributions serves no purpose.

      Relevant: KPIs must be related to operations or functions that a security team seeks to assess.

      Time-based: KPIs should be flexible enough to demonstrate changes over time. In a practical sense, an ideal KPI can be grouped together by different time intervals.

      (Guide for Security Operations Metrics)

      2.2.1 Activity: Review SLA Template & Metrics Reference Guide

      1-2 hours

      Input

      • Service level metrics
      • List of who is accountable for PPM decisions

      Output

      • SLO templates for service types
      • SLA criteria that meets your organization’s requirements

      Materials

      • SLA Checklist
      • SLA criteria list with SLO & credit values
      • PPM Decision Review Workbook

      Participants

      • Vendor manager
      • IT leadership
      • Procurement or contract manager
      1. Review the SLA Template and Metrics Reference Guide for common metrics & KPIs for the various service types. Each Service Type tab has SLA elements and SLO metrics typically associated with the type of service.
      2. Some service levels have common or standard credits* that are typically associated with the service level or metric.
      3. Use the SLA Template to enter service levels, metrics, and credits that meet your organization’s criteria or requirements for a given service type.

      Download the SLA Template & Metrics Reference Guide

      *Credit values are not standard values, rather general ranges that our research shows to be the typical ranges that credit values should be for a given missed service level

      2.3 Create a negotiation strategy

      Once you have created service-level element criteria templates for your organization’s requirements, it’s time to document a negotiation position or strategy to use when negotiating with service providers. Not all providers are flexible with their SLA commitments, in fact most are reluctant to change or create “unique” SLOs for individual customers. Particularly cloud vendors providing IaaS, SaaS, or PaaS, SLAs. ISP/Telcom, Co-Lo and DR/BU providers also have standard SLOs that they don’t like to stray far from. On the other hand, security ops (SIEM), service desk, hardware, and SOW/PS providers who are generally contracted to provide variable services are somewhat more flexible with their SLAs and more willing to meet your requirements.

      • Service providers want to avoid being held accountable to SLOs, and their SLAs are typically written to reflect that.

      The goal of creating internal SLA templates and policies is to set a minimum baseline of service levels that your organization is willing to accept, and that will meet their requirements and expectations for the outsourced service. Using these templated SLOs will set the basis for negotiating the entire SLA with the provider. You can set the SLA purpose, objectives, roles, and responsibilities and then achieve these from the service provider with solid SLOs and associated reporting and remedies.

      Info-Tech Insight

      Web-posted SLAs that are not embedded within a signed MSA can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      2.3.1 Negotiating strategy guidance

      • Be prepared. Create a negotiating plan and put together a team that understands your organization’s requirements for SLA.
      • Stay informed. Request provider’s recent performance data and negotiate SLOs to the provider’s average performance.
      • Know what you need. Corporate SLA templates or policies should be positioned to service providers as baseline minimums.
      • Show some flexibility. Be willing to give up some ground on one SLO in exchange for acceptance of SLOs that may be more important to your organization.
      • Re-group. Have a fallback position or Plan B. What if the provider can’t or won’t meet your key SLOs? Do you walk?
      • Do your homework. Understand what the typical standard SLOs are for the type of service level.

      2.4 SLO overachieving incentive discussion

      Monitoring & Reporting

      • SLO overachieving metrics are seen in some SLAs where there is a high priority for a service provider to meet and or exceed the SLOs within the SLA. These are not common terms but can be used to improve the overall service levels of a provider. In these scenarios the provider is sometimes rewarded for overachieving on the SLOs, either consistently or on a monthly or quarterly basis. In some cases, it can make financial sense to incent the service provider to overachieve on their commitments. Incentives can drive behaviors and improved performance by the provider that can intern improve the benefits to your organization and therefore justify an incent of some type.
      • Example: You could have an SLO for invoice accuracy. If not achieved, it could cost the vendor if they don’t meet the accuracy metric, however if they were to consistently overachieve the metric it could save accounts payable hours of time in validation and therefore you could pass on some of these measurable savings to the provider.
      • Overachieving incentives can add complexity to the SLA so they need to be easily measurable and simple to manage.
      • Overachieving incentives can also be used in provider performance improvement plans, where a provider might have poor trending attainment and you need to have them improve their performance in a short period of time. Incentives typically will motivate provider improvement and generally will cost much less than replacing the provider.
      • There is another school of thought that you shouldn’t have to pay a provider for doing their job; however, others are of the opinion that incentives or bonuses improve the overall performance of individuals or teams and are therefore worth consideration if both parties benefit from the over performance.

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 3

      Understand SLA Elements

      Create Requirements

      Phase 3

      Manage Obligations

      Phase Steps

      • 3.1 SLA monitoring and tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA reviews & optimizing
      • 3.4 Performance management

      3.1 SLA monitoring, tracking, and remedy reconciliation

      The next step to effective SLAs is the management component. It could be fruitless if you were to spend your time and efforts negotiating your required service levels and metrics and don’t have some level of managing the SLA. In that situation you would have no way of knowing if the service provider is attaining their SLOs.

      There are several key elements to effective SLA management:

      • SLO monitoring
      • Simple, concise reporting
      • SLO attainment tracking
      • Score carding & trending
      • Remedy reconciliation

      SLA Management framework

      SLA Monitoring → Concise Reporting → Attainment Tracking → Score Carding →Remedy Reconciliation

      “A shift we’re beginning to see is an increased use of data and process discovery tools to measure SLAs,” says Borowski of West Monroe. “While not pervasive yet, these tools represent an opportunity to identify the most meaningful metrics and objectively measure performance (e.g., cycle time, quality, compliance). When provided by the client, it also eliminates the dependency on provider tools as the source-of-truth for performance data.” – Stephanie Overby

      3.1 SLA management framework

      SLA Performance Management

      • SLA monitoring provides data for SLO reports or dashboards. Reports provide attainment data for tacking over time. Attainment data feeds scorecards and allows for trending analysis. Missed attainment data triggers remedies.
      • All service providers monitor their systems, platforms, tickets, agents, sensors etc. to be able to do their jobs. Therefore, monitoring is readily available from your service provider in some form.
      • One of the key purposes of monitoring is to generate data into internal reports or dashboards that capture the performance metrics of the various services. Therefore, service-level and metric reports are readily available for all of the service levels that a service provider is contracted or engaged to provide.
      • Monitoring and reporting are the key elements that validate how your service provider is meeting its SLA obligations and thus are very important elements of an SLA. SLO report data becomes attainment data once the metric or KPI has been captured.
      • As a component of effective SLA management, this attainment data needs to be tracked/recorded in an easy-to-read format or table over a period of time. Attainment data can then be used to generate scorecards and trending reports for your review both internally and with the provider as required.
      • If attainment data shows that the service provider is meeting their SLA obligations, then the SLA is meeting your requirements and expectations. If on the other hand, attainment data shows that obligations are not being met, then actions must be taken to hold the service provider accountable. The most common method is through remedies that are typically in the form of a credit through a defined process (see Sec. 1.3). Any credits due for missed SLOs should also be tracked and reported to stakeholders and accounting for validation, reconciliation, and collection.

      3.2 Reporting

      Monitoring & Reporting

      • Many SLAs are silent on monitoring and reporting elements and require that the customer, if aware or able, to monitor the providers service levels and attainment and create their own KPI and reports. Then if SLOs are not met there is an arduous process that the customer must go through to request their rightful credit. This manual and reactive method creates all kinds of risk and cost to the customer and they should make all attempts to ensure that the service provider proactively provides SLO/KPI attainment reports on a regular basis.
      • Automated monitoring and reporting is a common task for many IT departments. There is no reason that a service provider can’t send reports proactively in a format that can be easily interpreted by the customer. The ideal state would be to capture KPI report data into a customer’s internal service provider scorecard.
      • Automated or automatic credit posting is another key element that service providers tend to ignore, primarily in hopes that the customer won’t request or go through the trouble of the process. This needs to change. Some large cloud vendors already have automated processes that automatically post a credit to your account if they miss an SLO. This proactive credit process should be at the top of your negotiation checklist. Service providers are avoiding thousands of credit dollars every year based on the design of their credit process. As more customers push back and negotiate more efficient credit processes, vendors will soon start to change and may use it as a differentiator with their service.

      3.2.1 Performance tracking and trending

      What gets measured gets done

      SLO Attainment Tracking

      A primary goal of proactive and automated reporting and credit process is to capture the provider’s attainment data into a tracker or vendor scorecard. These tracking scorecards can easily create status reports and performance trending of service providers, to IT leadership as well as feed QBR agenda content.

      Remedy Reconciliation

      Regardless of how a credit is processed it should be tracked and reconciled with internal stakeholders and accounting to ensure credits are duly applied or received from the provider and in a timely manner. Tracking and reconciliation must also align with your payment terms, whether monthly or annually.

      “While the adage, ‘You can't manage what you don't measure,’ continues to be true, the downside for organizations using metrics is that the provider will change their behavior to maximize their scores on performance benchmarks.” – Rob Lemos

      3.2.1 Activity SLA Tracker and Trending Tool

      1-2 hours setup

      Input

      • SLO metrics/KPIs from the SLA
      • Credit values associated with SLO

      Output

      • Monthly SLO attainment data
      • Credit tracking
      • SLO trending graphs

      Materials

      • Service provider SLO reports
      • Service provider SLA
      • SLO Tracker & Trending Tool

      Participants

      • Contract or vendor managers
      • Application or service managers
      • Service provider

      An important activity in the SLA management framework is to track the provider’s SLO attainment on a monthly or quarterly basis. In addition, if an SLO is missed, an associated credit needs to be tracked and captured. This activity allows you to capture the SLOs from the SLA and track them continually and provide data for trending and review at vendor performance meetings and executive updates.

      Instructions: Enter SLOs from the SLA as applicable.

      Each month, from the provider’s reports or dashboards, enter the SLO metric attainment.

      When an SLO is met, the cell will turn green. If the SLO is missed, the cell will turn red and a corresponding cell in the Credit Tracker will turn green, meaning that a credit needs to be reconciled.

      Use the Trending tab to view trending graphs of key service levels and SLOs.

      Download the SLO Tracker and Trending Tool

      3.3 Vendor SLA reviews and optimizing

      Regular reviews should be done with providers

      Collecting attainment data with scorecards or tracking tools provides summary information on the performance of the service provider to their SLA obligations. This information should be used for regular reviews both internally and with the provider.

      Regular attainment reviews should be used for:

      • Performance trending upward or downward
      • Identifying opportunities to revise or improve SLOs
      • Optimizing SLO and processes
      • Creating a Performance Improvement Plan (PIP) for the service provider

      Some organizations choose to review SLA performance with providers at regular QBRs or at specific SLA review meetings

      This should be determined based on the criticality, risk, and strategic importance of the provider’s service. Providers that provide essential services like ERP, payroll, CRM, HRIS, IaaS etc. should be reviewed much more regularly to ensure that any decline in service is identified early and addressed properly in accordance with the service provider. Negative trending performance should also be documented for consideration at renewal time.

      3.4 Performance management

      Dealing with persistent poor performance and termination

      Service providers that consistently miss key service level metrics or KPIs present financial and security risk to the organization. Poor performance of a service provider reflects directly on the IT leadership and will affect many other business aspects of the organization including:

      • Ability to conduct day-to-day business activities
      • Meet internal obligations and expectations
      • Employee productivity and satisfaction
      • Maintain corporate policies or industry compliance
      • Meet security requirements

      Communication is key. Poor performance of a service provider needs to be dealt with in a timely manner in order to avoid more critical impact of the poor performance. Actions taken with the provider can also vary depending again on the criticality, risk, and strategic importance of the provider’s service.

      Performance reviews should provide the actions required with the goal of:

      • Making the performance problems into opportunities
      • Working with the provider to create a PIP with aggressive timelines and ramifications if not attained
      • Non-renewal or termination consideration, if feasible including provider replacement options, risk, costs, etc.
      • SLA renegotiation or revisions
      • Warning notifications to the service provider with concise issues and ramifications

      To avoid the issues and challenges of dealing with chronic poor performance, consider a Persistent or Chronic Failure clause into the SLA contract language. These clauses can define chronic failure, scenarios, ramifications there of, and defined options for the client including increased credit values, non-monetary remedies, and termination options without liability.

      Info-Tech Insight

      It’s difficult to prevent chronic poor performance but you can certainly track it and deal with it in a way that reduces risk and cost to your organization.

      SLA Hall of Shame

      Crazy service provider SLA content collection

      • Excessive list of unreasonable exclusions
      • Subcontractors’ behavior could be excluded
      • Downtime credit, equal to downtime percent x the MRC
      • Controllable FM events (internal labor issues, health events)
      • Difficult downtime or credit calculations that don’t make sense
      • Credits are not valid if agreement is terminated early or not renewed
      • Customer is not current on their account, SLA or credits do not count/apply
      • Total downtime = to prorated credit value (down 3 hrs = 3/720hrs = 0.4% credit)
      • SLOs don’t apply if customer fails to report the issue or request a trouble ticket
      • Downtime during off hours (overnight) do not count towards availability metrics
      • Different availability commitments based on different support-levels packages
      • Extending the agreement term by the length of downtime as a form of a remedy

      SLA Dos and Don’ts

      Dos

      • Do negotiate SLOs to vendor’s average performance
      • Do strive for automated reporting and credit processes
      • Do right-size and create your SLO criteria based on risk mitigation
      • Do review SLA attainment results with strategic service providers on a regular basis
      • Do ensure that all key elements and components of an SLA are present in the document or appendix

      Don'ts

      • Don’t accept the providers response that “we can’t change the SLOs for you because then we’d have to change them for everyone”
      • Don’t leave SLA preparation to the last minute. Give it priority as you negotiate with the provider
      • Don’t create complex SLAs with numerous service levels and SLOs that need to be reported and managed
      • Don’t aim for absolute perfection. Rather, prioritize which service levels are most important to you for the service

      Summary of Accomplishment

      Problem Solved

      Knowledge Gained

      • Understanding of the elements and components of an SLA
      • A list of SLO metrics aligned to service types that meet your organization’s criteria
      • SLA metric/KPI templates
      • SLA Management process for your provider’s service objectives
      • Reporting and tracking process for performance trending

      Deliverables Completed

      • SLA component and contract element checklist
      • Evaluation or service provider SLAs
      • SLA templates for strategic service types
      • SLA tracker for strategic service providers

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Improve IT-Business Alignment Through an Internal SLA

      • Understand business requirements, clarify current capabilities, and enable strategies to close service-level gaps.

      Data center Co-location SLA & Service Definition Template

      • In essence, the SLA defines the “product” that is being purchased, permitting the provider to rationalize resources to best meet the needs of varied clients, and permits the buyer to ensure that business requirements are being met.

      Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

      • Keep your information security risks manageable when leveraging the benefits of cloud computing.

      Bibliography

      Henderson, George. “3 Most Common Types of Service Level Agreement (SLA).” Master of Project Academy. N.d. Web.

      “Guide to Security Operations Metrics.” Logsign. Oct 5, 2020. Web.

      Lemos, Rob. “4 lessons from SOC metrics: What your SpecOps team needs to know.” TechBeacon. N.d. Web.

      “Measuring and Making the Most of Service Desk Metrics.” Freshworks. N.d. Web.

      Overby, Stephanie. “15 SLA Mistakes IT Leaders Still Make.” CIO. Jan 21, 2021.

      Contact Tymans Group

      We're here to get your IT Operations performant and resilient

      We have the highest respect for your person. We contact you only with responses to your questions. Our company ethics insist on transparency and honesty.

      Continue reading

      Drive Technology Adoption

      • Buy Link or Shortcode: {j2store}111|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      The project isn’t over if the new product or system isn’t being used. How do you ensure that what you’ve put in place isn’t going to be ignored or only partially adopted? People are more complicated than any new system and managing them through the change needs careful planning.

      Our Advice

      Critical Insight

      Cultivating a herd mentality, where people adopt new technology merely because everyone else is, is an important goal in getting the bulk of users using the new product or system. The herd needs to gather momentum though and this can be done by using the more tech-able and enthused to lead the rest on the journey. Identifying and engaging these key resources early in the process will greatly assist in starting the flow.

      Impact and Result

      While communication is key throughout, involving staff in proof-of-concept activities and contests and using the train-the-trainer techniques and technology champions will all start the momentum toward technology adoption. Group activities will address the bulk of users, but laggards may need special attention.

      Drive Technology Adoption Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive Technology Adoption – A brief deck describing how to encourage users to adopt newly implemented technology.

      This document will help you to ensure that newly implemented systems and technologies are correctly adopted by the intended recipients.

      • Drive Technology Adoption Storyboard
      [infographic]

      Further reading

      Drive Technology Adoption

      The project is over. The new technology is implemented. Now how do we make sure it's used?

      Executive Summary

      Your Challenge

      Technology endlessly changes and evolves. Similarly, business directions and requirements change, and these changes need to be supported by technology. Improved functionality and evolvement of systems, along with systems becoming redundant or unsupported, means that maintaining a static environment is virtually impossible.

      Enormous amounts of IT budget are allocated to these changes each year. But once the project is over, how do you manage that change and ensure the systems are being used? Planning your technology adoption is vital.

      Common Obstacles

      The obstacles to technology adoption can be many and various, covering a broad spectrum of areas including:

      • Reluctance of staff to let go of familiar processes and procedures.
      • Perception that any change will add complications but not add value, thereby hampering enthusiasm to adopt.
      • Lack of awareness of the change.
      • General fear of change.
      • Lack of personal confidence.

      Info-Tech’s Approach

      Start by identifying, understanding, categorizing, and defining barriers and put in place a system to:

      • Gain an early understanding of the different types of users and their attitudes to technology and change.
      • Review different adoption techniques and analyze which are most appropriate for your user types.
      • Use a “Follow the Leader” approach, by having technical enthusiasts and champions to show the way.
      • Prevent access to old systems and methods.

      Info-Tech Insight

      For every IT initiative that will be directly used by users, consider the question, “Will the final product be readily accepted by those who are going to use it?” There is no point in implementing a product that no one is prepared to use. Gaining user acceptance is much more than just ticking a box in a project plan once UAT is complete.

      The way change should happen is clear

      Prosci specializes in change. Its ADKAR model outlines what’s required to bring individuals along on the change journey.

      AWARENESS

      • Awareness means more than just knowing there’s a change occurring,
      • it means understanding the need for change.

      DESIRE

      • To achieve desire, there needs to be motivation, whether it be from an
      • organizational perspective or personal.

      KNOWLEDGE

      • Both knowledge on how to train during the transition and knowledge
      • on being effective after the change are required. This can only be done
      • once awareness and desire are achieved.

      ABILITY

      • Ability is not knowledge. Knowing how to do something doesn’t necessarily translate to having the skills to do it.

      REINFORCEMENT

      • Without reinforcement there can be a tendency to revert.

      When things go wrong

      New technology is not being used

      The project is seen as complete. Significant investments have been made, but the technology either isn’t being used or is only partially in use.

      Duplicate systems are now in place

      Even worse. The failure to adopt the new technology by some means that the older systems are still being used. There are now two systems that fail to interact; business processes are being affected and there is widespread confusion.

      Benefits not being realized

      Benefits promised to the business are not being realized. Projected revenue increases, savings, or efficiencies that were forecast are now starting to be seen as under threat.

      There is project blowout

      The project should be over, but the fact that the technology is not being used has created a perception that the implementation is not complete and the project needs to continue.

      Info-Tech Insight

      People are far more complicated than any technology being implemented.

      Consider carefully your approach.

      Why does it happen?

      POOR COMMUNICATION

      There isn’t always adequate communications about what’s changing in the workplace.

      FEAR

      Fear of change is natural and often not rational. Whether the fear is about job loss or not being able to adapt to change; it needs to be managed.

      TRAINING

      Training can be insufficient or ineffective and when this happens people are left feeling like they don’t have the skills to make the change.

      LACK OF EXECUTIVE SUPPORT

      A lack of executive support for change means the change is seen as less important.

      CONFLICTING VIEWS OF CHANGE

      The excitement the project team and business feels about the change is not necessarily shared throughout the business. Some may just see the change as more work, changing something that already works, or a reason to reduce staff levels.

      LACK OF CONFIDENCE

      Whether it’s a lack of confidence generally with technology or concern about a new or changing tool, a lack of confidence is a huge barrier.

      BUDGETARY CONSTRAINTS

      There is a cost with managing people during a change, and budget must be allocated to allow for it.

      Communications

      Info-Tech Insight

      Since Sigmund Freud there has been endless work to understand people’s minds.
      Don’t underestimate the effect that people’s reactions to change can have on your project.

      This is a Kubler-ross change curve graph, plotting the following Strategies: Create Alignment; Maximize Communication; Spark Motivation; Develop Capability; Share Knowledge

      Communication plans are designed to properly manage change. Managing change can be easier when we have the right tools and information to adapt to new circumstances. The Kubler-Ross change curve illustrates the expected steps on the path to acceptance of change. With the proper communications strategy, each can be managed appropriately

      Analyst perspective

      Paul Binns – Principal Research Advisor, Info-Tech

      The rapidly changing technology landscape in our world has always meant that an enthusiasm or willingness to embrace change has been advantageous. Many of us have seen how the older generation has struggled with that change and been left behind.

      In the work environment, the events of the past two years have increased pressure on those slow to adopt as in many cases they couldn't perform their tasks without new tools. Previously, for example, those who may have been reluctant to use digital tools and would instead opt for face-to-face meetings, suddenly found themselves without an option as physical meetings were no longer possible. Similarly, digital collaboration tools that had been present in the market for some time were suddenly more heavily used so everyone could continue to work together in the “online world.”

      At this stage no one is sure what the "new normal" will be in the post-pandemic world, but what has been clearly revealed is that people are prepared to change given the right motivation.

      “Technology adoption is about the psychology of change.”
      Bryan Tutor – Executive Counsellor, Info-Tech

      The Fix

      • Categorize Users
        • Gain a clear understanding of your user types.
      • Identify Adoption Techniques
        • Understand the range of different tools and techniques available.
      • Match Techniques To Categories
        • Determine the most appropriate techniques for your user base.
      • Follow-the-Leader
        • Be aware of the different skills in your environment and use them to your advantage.
      • Refresh, Retrain, Restrain
        • Prevent reversion to old methods or systems.

      Categories

      Client-Driven Insight

      Consider your staff and industry when looking at the Everett Rogers curve. A technology organization may have less laggards than a traditional manufacturing one.

      In Everett Rogers’ book Diffusion of Innovations 5th Edition (Free Press, 2005), Rogers places adopters of innovations into five different categories.

      This is an image of an Innovation Adoption Curve from Everett Rogers' book Diffusion of Innovations 5th Edition

      Category 1: The Innovator – 2.5%

      Innovators are technology enthusiasts. Technology is a central interest of theirs, either at work, at home, or both. They tend to aggressively pursue new products and technologies and are likely to want to be involved in any new technology being implemented as soon as possible, even before the product is ready to be released.

      For people like this the completeness of the new technology or the performance can often be secondary because of their drive to get new technology as soon as possible. They are trailblazers and are not only happy to step out of their comfort zone but also actively seek to do so.

      Although they only make up about 2.5% of the total, their enthusiasm, and hopefully endorsement of new technology, offers reassurance to others.

      Info-Tech Insight

      Innovators can be very useful for testing before implementation but are generally more interested in the technology itself rather than the value the technology will add to the business.

      Category 2: The Early Adopter – 13.5%

      Whereas Innovators tend to be technologists, Early Adopters are visionaries that like to be on board with new technologies very early in the lifecycle. Because they are visionaries, they tend to be looking for more than just improvement – a revolutionary breakthrough. They are prepared to take high risks to try something new and although they are very demanding as far as product features and performance are concerned, they are less price-sensitive than other groups.

      Early Adopters are often motivated by personal success. They are willing to serve as references to other adopter groups. They are influential, seen as trendsetters, and are of utmost importance to win over.

      Info-Tech Insight

      Early adopters are key. Their enthusiasm for technology, personal drive, and influence make them a powerful tool in driving adoption.

      Category 3: The Early Majority – 34%

      This group is comprised of pragmatists. The first two adopter groups belong to early adoption, but for a product to be fully adopted the mainstream needs to be won over, starting with the Early Majority.

      The Early Majority share some of the Early Adopters’ ability to relate to technology. However, they are driven by a strong sense of practicality. They know that new products aren’t always successful. Consequently, they are content to wait and see how others fare with the technology before investing in it themselves. They want to see well-established references before adopting the technology and to be shown there is no risk.

      Because there are so many people in this segment (roughly 34%), winning these people over is essential for the technology to be adopted.

      Category 4: The Late Majority – 34%

      The Late Majority are the conservatives. This group is generally about the same size as the Early Majority. They share all the concerns of the Early Majority; however, they are more resistant to change and are more content with the status quo than eager to progress to new technology. People in the Early Majority group are comfortable with their ability to handle new technology. People in the Late Majority are not.

      As a result, these conservatives prefer to wait until something has become an established standard and take part only at the end of the adoption period. Even then, they want to see lots of support and ensure that there is proof there is no risk in them adopting it.

      Category 5: The Laggard – 16%

      This group is made up of the skeptics and constitutes 16% of the total. These people want nothing to do with new technology and are generally only content with technological change when it is invisible to them. These skeptics have a strong belief that disruptive new technologies rarely deliver the value promised and are almost always worried about unintended consequences.

      Laggards need to be dealt with carefully as their criticism can be damaging and without them it is difficult for a product to become fully adopted. Unfortunately, the effort required for this to happen is often disproportional to the size of the group.

      Info-Tech Insight

      People aren’t born laggards. Technology projects that have failed in the past can alter people’s attitudes, especially if there was a negative impact on their working lives. Use empathy when dealing with people and respect their hesitancy.

      Adoption Techniques

      Different strokes for different folks

      Technology adoption is all about people; and therefore, the techniques required to drive that adoption need to be people oriented.

      The following techniques are carefully selected with the intention of being impactful on all the different categories described previously.

      Technology Adoption: Herd Mentality; Champions; Force; Group Training; One-on-One; Contests; Marketing; Proof of Concept; Train the Trainer

      There are multitudes of different methods to get people to adopt new technology, but which is the most appropriate for your situation? Generally, it’s a combination.

      Technology Adoption: Herd Mentality; Champions; Force; Group Training; One-on-One; Contests; Marketing; Proof of Concept; Train the Trainer

      Train the Trainer

      Use your staff to get your message across.

      Abstract

      This technique involves training key members of staff so they can train others. It is important that those selected are strong communicators, are well respected by others, and have some expertise in technology.

      Advantages

      • Cost effective
      • Efficient dissemination of information
      • Trusted internal staff

      Disadvantages

      • Chance of inconsistent delivery
      • May feel threatened by co-worker

      Best to worst candidates

      • Early Adopter: Influential trendsetters. Others receptive of their lead.
      • Innovator: Comfortable and enthusiastic about new technology, but not necessarily a trainer.
      • Early Majority: Tendency to take others’ lead.
      • Late Majority: Risk averse and tend to follow others, only after success is proven.
      • Laggard: Last to adopt usually. Unsuitable as Trainer.

      Marketing

      Marketing should be continuous throughout the change to encourage familiarity.

      Abstract

      Communication is key as people are comfortable with what is familiar to them. Marketing is an important tool for convincing adopters that the new product is mainstream, widely adopted and successful.

      Advantages

      • Wide communication
      • Makes technology appear commonplace
      • Promotes effectiveness of new technology

      Disadvantages

      • Reliant on staff interest
      • Can be expensive

      Best to worst candidates

      • Early Majority: Pragmatic about change. Marketing is effective encouragement.
      • Early Adopter: Receptive and interested in change. Marketing is supplemental.
      • Innovator: Actively seeks new technology. Does not need extensive encouragement.
      • Late Majority: Requires more personal approach.
      • Laggard: Resistant to most enticements.

      One-on-One

      Tailored for individuals.

      Abstract

      One-on-one training sometimes is the only way to train if you have staff with special needs or who are performing unique tasks.
      It is generally highly effective but inefficient as it only addresses individuals.

      Advantages

      • Tailored to specific need(s)
      • Only relevant information addressed
      • Low stress environment

      Disadvantages

      • Expensive
      • Possibility of inconsistent delivery
      • Personal conflict may render it ineffective

      Best to worst candidates

      • Laggard: Encouragement and cajoling can be used during training.
      • Late Majority: Proof can be given of effectiveness of new product.
      • Early Majority: Effective, but not cost efficient.
      • Early Adopter: Effective, but not cost-efficient.
      • Innovator: Effective, but not cost-efficient.

      Group Training

      Similar roles, attitudes, and abilities.

      Abstract

      Group training is one of the most common methods to start people on their journey toward new technology. Its effectiveness with the two largest groups, Early Majority and Late Majority, make it a primary tool in technology adoption.

      Advantages

      • Cost effective
      • Time effective
      • Good for team building

      Disadvantages

      • Single method may not work for all
      • Difficult to create single learning pace for all

      Best to worst candidates

      • Early Majority: Receptive. The formality of group training will give confidence.
      • Late Majority: Conservative attitude will be receptive to traditional training.
      • Early Adopter: Receptive and attentive. Excited about the change.
      • Innovator: Will tend to want to be ahead or want to move ahead of group.
      • Laggard: Laggards in group training may have a negative impact.

      Force

      The last resort.

      Abstract

      The transition can’t go on forever.

      At some point the new technology needs to be fully adopted and if necessary, force may have to be used.

      Advantages

      • Immediate full transition
      • Fixed delivery timeline

      Disadvantages

      • Alienation of some staff
      • Loss of faith in product if there are issues

      Best to worst candidates

      • Laggard: No choice but to adopt. Forces the issue.
      • Late Majority: Removes issue of reluctance to change.
      • Early Majority: Content, but worried about possible problems.
      • Early Adopter: Feel less personal involvement in change process.
      • Innovator: Feel less personal involvement in change process.

      Contests

      Abstract

      Contests can generate excitement and create an explorative approach to new technology. People should not feel pressured. It should be enjoyable and not compulsory.

      Advantages

      • Rapid improvement of skills
      • Bring excitement to the new technology
      • Good for team building

      Disadvantages

      • Those less competitive or with lower skills may feel alienated
      • May discourage collaboration

      Best to worst candidates

      • Early Adopter: Seeks personal success. Risk taker. Effective.
      • Innovator: Enthusiastic to explore limits of technology.
      • Early Majority: Less enthusiastic. Pragmatic. Less competitive.
      • Late Majority: Conservative. Not enthusiastic about new technology.
      • Laggard: Reluctant to get involved.

      Incentives

      Incentives don’t have to be large.

      Abstract

      For some staff, merely taking management’s lead is not enough. Using “Nudge” techniques to give that extra incentive is quite effective. Incentivizing staff either financially or through rewards, recognition, or promotion is a successful adoption technique for some.

      Advantages

      Encouragement to adopt from receiving tangible benefit

      Draws more attention to the new technology

      Disadvantages

      Additional expense to business or project

      Possible poor precedent for subsequent changes

      Best to worst candidates

      Early Adopter: Desire for personal success makes incentives enticing.

      Early Majority: Prepared to change, but extra incentive will assist.

      Late Majority: Conservative attitude means incentive may need to be larger.

      Innovator: Enthusiasm for new technology means incentive not necessary.

      Laggard: Sceptical about change. Only a large incentive likely to make a difference.

      Champions

      Strong internal advocates for your new technology are very powerful.

      Abstract

      Champions take on new technology and then use their influence to promote it in the organization. Using managers as champions to actively and vigorously promote the change is particularly effective.

      Advantages

      • Infectious enthusiasm encourages those who tend to be reluctant
      • Use of trusted internal staff

      Disadvantages

      • Removes internal staff from regular duties
      • Ineffective if champion not respected

      Best to worst candidates

      • Early Majority: Champions as references of success provide encouragement.
      • Late Majority: Management champions in particular are effective.
      • Laggard: Close contact with champions may be effective.
      • Early Adopter: Receptive of technology, less effective.
      • Innovator: No encouragement or promotion required.

      Herd Mentality

      Follow the crowd.

      Abstract

      Herd behavior is when people discount their own information and follow others. Ideally all adopters would understand the reason and advantages in adopting new technology, but practically, the result is most important.

      Advantages

      • New technology is adopted without question
      • Increase in velocity of adoption

      Disadvantages

      • Staff may not have clear understanding of the reason for change and resent it later
      • Some may adopt the change before they are ready to do so

      Best to worst candidates

      • Early Majority: Follow others’ success.
      • Late Majority: Likely follow an established proven standard.
      • Early Adopter: Less effective as they prefer to set trends rather than follow.
      • Innovator: Seeks new technology rather than following others.
      • Laggard: Suspicious and reluctant to change.

      Proof of Concepts

      Gain early input and encourage buy-in.

      Abstract

      Proof of concept projects give early indications of the viability of a new initiative. Involving the end users in these projects can be beneficial in gaining their support

      Advantages

      Involve adopters early on

      Valuable feedback and indications of future issues

      Disadvantages

      If POC isn’t fully successful, it may leave lingering negativity

      Usually, involvement from small selection of staff

      Best to worst candidates

      • Innovator: Strong interest in getting involved in new products.
      • Early Adopter: Comfortable with new technology and are influencers.
      • Early Majority: Less interest. Prefer others to try first.
      • Late Majority: Conservative attitude makes this an unlikely option.
      • Laggard: Highly unlikely to get involved.

      Match techniques to categories

      What works for who?

      This clustered column chart categorizes techniques by category

      Follow the leader

      Engage your technology enthusiasts early to help refine your product, train other staff, and act as champions. A combination of marketing and group training will develop a herd mentality. Finally, don’t neglect the laggards as they can prevent project completion.

      This is an inverted funnel chart with the output of: Change Destination.  The inputs are: 16% Laggards; 34% Late Majority; 34% Early Majority; 13.3% Early Adopters; 2% Innovators

      Info-Tech Insight

      Although there are different size categories, none can be ignored. Consider your budget when dealing with smaller groups, but also consider their impact.

      Refresh, retrain, restrain

      We don’t want people to revert.

      Don’t assume that because your staff have been trained and have access to the new technology that they will keep using it in the way they were trained. Or that they won’t revert back to their old methods or system.

      Put in place methods to remove completely or remove access to old systems. Schedule refresh training or skill enhancement sessions and stay vigilant.

      Research Authors

      Paul Binns

      Paul Binns

      Principal Research Advisor, Info-Tech Research Group

      With over 30 years in the IT industry, Paul brings to his work his experience as a Strategic Planner, Consultant, Enterprise Architect, IT Business Owner, Technologist, and Manager. Paul has worked with both small and large companies, local and international, and has had senior roles in government and the finance industry.

      Scott Young

      Scott Young

      Principal Research Advisor, Info-Tech Research Group

      Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.

      Related Info-Tech Research

      User Group Analysis Workbook

      Use Info-Tech’s workbook to gather information about user groups, business processes, and day-to-day tasks to gain familiarity with your adopters.

      Governance and Management of Enterprise Software Implementation

      Use our research to engage users and receive timely feedback through demonstrations. Our iterative methodology with a task list focused on the business’ must-have functionality allows staff to return to their daily work sooner.

      Quality Management User Satisfaction Survey

      This IT satisfaction survey will assist you with early information to use for categorizing your users.

      Master Organizational Change Management Practices

      Using a soft, empathetic approach to change management is something that all PMOs should understand. Use our research to ensure you have an effective OCM plan that will ensure project success.

      Bibliography

      Beylis, Guillermo. “COVID-19 accelerates technology adoption and deepens inequality among workers in Latin America and the Caribbean.” World Bank Blogs, 4 March 2021. Web.

      Cleland, Kelley. “Successful User Adoption Strategies.” Insight Voices, 25 Apr. 2017. Web.

      Hiatt, Jeff. “The Prosci ADKAR ® Model.” PROSCI, 1994. Web.

      Malik, Priyanka. “The Kübler Ross Change Curve in the Workplace.” whatfix, 24 Feb. 2022. Web.

      Medhaugir, Tore. “6 Ways to Encourage Software Adoption.” XAIT, 9 March 2021. Web.

      Narayanan, Vishy. “What PwC Australia learned about fast tracking tech adoption during COVID-19” PWC, 13 Oct. 2020. Web.

      Sridharan, Mithun. “Crossing the Chasm: Technology Adoption Lifecycle.” Think Insights, 28 Jun 2022. Web.

      Tech Trend Update: If Digital Ethics Then Data Equity

      • Buy Link or Shortcode: {j2store}100|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.

      Our Advice

      Critical Insight

      Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.

      Impact and Result

      There are some key considerations for businesses grappling with digital ethics:

      1. If partnering, set expectations.
      2. If building, invite criticism.
      3. If imbuing authority, consider the most vulnerable.

      Tech Trend Update: If Digital Ethics Then Data Equity Research & Tools

      Tech Trend Update: If Digital Ethics Then Data Equity

      Understand how to use data equity as an ethical guidepost to create technology that will benefit everyone.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Tech Trend Update: If Digital Ethics Then Data Equity Storyboard
      [infographic]

      Diagnose and Optimize Your Lead Gen Engine

      • Buy Link or Shortcode: {j2store}567|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      88% of marketing professionals are unsatisfied with their ability to convert leads (Convince & Convert), but poor lead conversion is just a symptom of much deeper problems.

      Globally, B2B SaaS marketers without a well-running lead gen engine will experience:

      • A low volume of quality leads from their website.
      • A low conversion rate from their website visitors.
      • A long lead conversion time compared to competitors.
      • A low volume of organic website visitors.

      If treated without a root cause analysis, these symptoms often result in higher-than-average marketing spend and wasted resources. Without an accurate lead gen engine diagnostic tool and a strategy to fix the misfires, marketers will continue to waste valuable time and resources.

      Our Advice

      Critical Insight

      The lead gen engine is foundational in building profitable long-term customer relationships. It is the process through which marketers build awareness, trust, and loyalty. Without the ability to continually diagnose lead gen engine flaws, marketers will fail to optimize new customer relationship creation and long-term satisfaction and loyalty.

      Impact and Result

      With a targeted set of diagnostic tools and an optimization strategy, you will:

      • Uncover the critical weakness in your lead generation engine.
      • Develop a best-in-class lead gen engine optimization strategy that builds relationships, creates awareness, and establishes trust and loyalty with prospects.
      • Build profitable long-term customer relationships.

      Organizations who activate the findings from their lead generation diagnostic and optimization strategy will decrease the time and budget spent on lead generation by 25% to 50%. They will quickly uncover inefficiencies in their lead gen engine and develop a proven lead generation optimization strategy based on the diagnostic findings.

      Diagnose and Optimize Your Lead Gen Engine Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Diagnose and Optimize Your Lead Gen Engine Deck – A deck to help you diagnose what’s not working in your lead gen engine so that you can remedy issues and get back on track, building new customer relationships and driving loyalty.

      Organizations who activate the findings from their lead generation diagnostic and optimization strategy will decrease the time and budget spent on lead generation by 25% to 50%. They will quickly uncover inefficiencies in their lead gen engine and develop a proven lead generation optimization strategy based on the diagnostic findings.

      • Diagnose and Optimize Your Lead Gen Engine Storyboard

      2. Lead Gen Engine Diagnostic Tool – An easy-to-use diagnostic tool that will help you pinpoint weakness within your lead gen engine.

      The diagnostic tool allows digital marketers to quickly and easily diagnose weakness within your lead gen engine.

      • Lead Gen Engine Diagnostic Tool

      3. Lead Gen Engine Optimization Strategy Template – A step-by-step document that walks you through how to properly optimize the performance of your lead gen engine.

      Develop a best-in-class lead gen engine optimization strategy that builds relationships, creates awareness, and establishes trust and loyalty with prospects.

      • Lead Gen Engine Optimization Strategy Template

      Infographic

      Further reading

      Diagnose and Optimize Your Lead Gen Engine

      Quickly and easily pinpoint any weakness in your lead gen engine so that you stop wasting money and effort on ineffective advertising and marketing.

      EXECUTIVE BRIEF

      Analyst Perspective

      Quickly and easily pinpoint any weakness in your lead gen engine so that you stop wasting money and effort on ineffective advertising and marketing.

      The image contains a photo of Terra Higginson.

      Senior digital marketing leaders are accountable for building relationships, creating awareness, and developing trust and loyalty with website visitors, thereby delivering high-quality, high-value leads that Sales can easily convert to wins. Unfortunately, many marketing leaders report that their website visitors are low-quality and either disengage quickly or, when they engage further with lead gen engine components, they just don’t convert. These marketing leaders urgently need to diagnose what’s not working in three key areas in their lead gen engine to quickly remedy the issue and get back on track, building new customer relationships and driving loyalty. This blueprint will provide you with a tool to quickly and easily diagnose weakness within your lead gen engine. You can use the results to create a strategy that builds relationships, creates awareness, and establishes trust and loyalty with prospects.

      Terra Higginson

      Marketing Research Director

      SoftwareReviews

      Executive Summary

      Your Challenge

      Globally, business-to-business (B2B) software-as-a-service (SaaS) marketers without a well-running lead gen engine will experience:

      • A low volume of quality leads from their website.
      • A low conversion rate from their website visitors.
      • A long lead conversion time compared to competitors.
      • A low volume of organic website visitors.

      88% of marketing professionals are unsatisfied with their ability to convert leads (Convince & Convert), but poor lead conversion is just a symptom of a much larger problem with the lead gen engine. Without an accurate lead gen engine diagnostic tool and a strategy to fix the leaks, marketers will continue to waste valuable time and resources.

      Common Obstacles

      Even though lead generation is a critical element of marketing success, marketers struggle to fix the problems with their lead gen engine due to:

      • A lack of resources.
      • A lack of budget.
      • A lack of experience in implementing effective lead generation strategies.

      Most marketers spend too much on acquiring leads and not enough on converting and keeping them. For every $92 spent acquiring customers, only $1 is spent converting them (Econsultancy, cited in Outgrow). Marketers are increasingly under pressure to deliver high-quality leads to sales but work under tight budgets with inadequate or inexperienced staff who don’t understand the importance of optimizing the lead generation process.

      SoftwareReviews’ Approach

      With a targeted set of diagnostic tools and an optimization strategy, you will:

      • Uncover the critical weakness in your lead generation engine.
      • Develop a best-in-class lead gen engine optimization strategy that builds relationships, creates awareness, and establishes trust and loyalty with prospects.
      • Build profitable long-term customer relationships.

      Organizations who activate the findings from their lead generation diagnostic and optimization strategy will decrease the time and budget spent on lead generation by 25% to 50%. They will quickly uncover inefficiencies in their lead gen engine and develop a proven lead generation optimization strategy based on the diagnostic findings.

      SoftwareReviews Insight

      The lead gen engine is foundational in building profitable long-term customer relationships. It is the process through which marketers build awareness, trust, and loyalty. Without the ability to continually diagnose lead gen engine flaws, marketers will fail to optimize new customer relationship creation and long-term satisfaction and loyalty.

      Your Challenge

      88% of marketing professionals are unsatisfied with their ability to convert leads, but poor lead conversion is just a symptom of much deeper problems.

      Globally, B2B SaaS marketers without a well-running lead gen engine will experience:

      • A low volume of organic website visitors.
      • A low volume of quality leads from their website.
      • A low conversion rate from their website visitors.
      • A longer lead conversion time than competitors in the same space.

      If treated without a root-cause analysis, these symptoms often result in higher-than-average marketing spend and wasted resources. Without an accurate lead gen engine diagnostic tool and a strategy to fix the misfires, marketers will continue to waste valuable time and resources.

      88% of marketers are unsatisfied with lead conversion (Convince & Convert).

      The image contains a diagram that demonstrates a flowchart of the areas where visitors fail to convert. It incorporates observations, benchmarks, and uses a flowchart to diagnose the root causes.

      Benchmarks

      Compare your lead gen engine metrics to industry benchmarks.

      For every 10,000 people that visit your website, 210 will become leads.

      For every 210 leads, 101 will become marketing qualified leads (MQLs).

      For every 101 MQLs, 47 will become sales qualified leads (SQLs).

      For every 47 SQLs, 23 will become opportunities.

      For every 23 opportunities, nine will become customers.

      .9% to 2.1%

      36% to 48%

      28% to 46%

      39% to 48%

      32% to 40%

      Leads Benchmark

      MQL Benchmark

      SQL Benchmark

      Opportunity Benchmark

      Closing Benchmark

      The percentage of website visitors that convert to leads.

      The percentage of leads that convert to marketing qualified leads.

      The percentage of MQLs that convert to sales qualified leads.

      The percentage of SQLs that convert to opportunities.

      The percentage of opportunities that are closed.

      Midmarket B2B SaaS Industry

      Source: “B2B SaaS Marketing KPIs,” First Page Sage, 2021

      Common obstacles

      Why do most organizations improperly diagnose a misfiring lead gen engine?

      Lack of Clear Starting Point

      The lead gen engine is complex, with many moving parts, and marketers and marketing ops are often overwhelmed about where to begin diagnosis.

      Lack of Benchmarks

      Marketers often call out metrics such as increasing website visitors, contact-to-lead conversions, numbers of qualified leads delivered to Sales, etc., without a proven benchmark to compare their results against.

      Lack of Alignment Between Marketing and Sales

      Definitions of a contact, a marketing qualified lead, a sales qualified lead, and a marketing influenced win often vary.

      Lack of Measurement Tools

      Integration gaps between the website, marketing automation, sales enablement, and analytics exist within some 70% of enterprises. The elements of the marketing (and sales) tech stack change constantly. It’s hard to keep up.

      Lack of Understanding of Marketing ROI

      This drives many marketers to push the “more” button – more assets, more emails, more ad spend – without first focusing on optimization and effectiveness.

      Lack of Resources

      Marketers have an endless list of to-dos that drive them to produce daily results. Especially among software startups and mid-sized companies, there are just not enough staff with the right skills to diagnose and fix today’s sophisticated lead gen engines.

      Implications of poor diagnostics

      Without proper lead gen engine diagnostics, marketing performs poorly

      • The lead gen engine builds relationships and trust. When a broken lead gen engine goes unoptimized, customer relationships are at risk.
      • When the lead gen engine isn’t working well, customer acquisition costs rise as more expensive sales resources are charged with prospect qualification.
      • Without a well-functioning lead gen engine, marketers lack the foundation they need to create awareness among prospects – growth suffers.
      • Marketers will throw money at content or ads to generate more leads without any real understanding of engine leakage and misfires – your cost per lead climbs and reduces marketing profitability.

      Most marketers are spending too much on acquiring leads and not enough on converting and keeping them. For every $92 spent acquiring customers, only $1 is spent converting them.

      Source: Econsultancy, cited in Outgrow

      Lead gen engine optimization increases the efficiency of your marketing efforts and has a 223% ROI.

      Source: WordStream

      Benefits of lead gen engine diagnostics

      Diagnosing your lead gen engine delivers key benefits:

      • Pinpoint weakness quickly. A quick and accurate lead gen engine diagnostic tool saves Marketing 50% of the effort spent uncovering the reason for low conversion and low-quality leads.
      • Optimize more easily. Marketing executives will save 70% of the time spent creating a lead gen optimization marketing strategy based upon the diagnostic findings.
      • Maximize marketing ROI. Build toward and maintain the golden 3:1 LTV:CAC (lifetime value to customer acquisition cost) ratio for B2B SaaS marketing.
      • Stop wasting money on ineffective advertising and marketing. Up to 75% of your marketing budget is being inefficiently spent if you are running on a broken lead gen engine.

      “It’s much easier to double your business by doubling your conversion rate than by doubling your traffic. Correct targeting and testing methods can increase conversion rates up to 300 percent.” – Jeff Eisenberg, IterateStudio

      Source: Lift Division

      True benefits of fixing the lead gen engine

      These numbers add up to a significant increase in marketing influenced wins.

      175%
      Buyer Personas Increase Revenue
      Source: Illumin8

      202%
      Personalized CTAs Increase Conversions
      Source: HubSpot

      50%
      Lead Magnets Increase Conversions
      Source: ClickyDrip

      79%
      Lead Scoring Increases Conversions
      Source: Bloominari

      50%
      Lead Nurturing Increases Conversions
      Source: KevinTPayne.com

      80%
      Personalized Landing Pages Increase Conversions
      Source: HubSpot

      Who benefits from an optimized lead gen engine?

      This Research Is Designed for:

      • Senior digital marketing leaders who are:
        • Looking to increase conversions.
        • Looking to increase the quality of leads.
        • Looking to increase the value of leads.

      This Research Will Help You:

      • Diagnose issues with your lead gen engine.
      • Create a lead gen optimization strategy and a roadmap.

      This Research Will Also Assist:

      • Digital marketing leaders and product marketing leaders who are:
        • Looking to decrease the effort needed by Sales to close leads.
        • Looking to increase leadership’s faith in Marketing’s ability to generate high-quality leads and conversions.

      This Research Will Help Them:

      • Align the Sales and Marketing teams.
      • Receive the necessary buy-in from management to increase marketing spend and headcount.
      • Avoid product failure.
      The image contains a screenshot of the thought model that is titled: Diagnose and Optimize your Lead Gen Engine. The image contains the screenshot of the previous image shown on Where Lead Gen Engines Fails, and includes new information. The flowchart connects to a box that says: STOP, Your engine is broken. It then explains phase 1, the diagnostic, and then phase 2 Optimization strategy.

      SoftwareReviews’ approach

      1. Diagnose Misfires in the Lead Gen Engine
      2. Identifying any areas of weakness within your lead gen engine is a fundamental first step in improving conversions, ROI, and lead quality.

      3. Create a Lead Gen Optimization Strategy
      4. Optimize your lead gen strategy with an easily customizable template that will provide your roadmap for future growth.

      The SoftwareReviews Methodology to Diagnose and Optimize Your Lead Gen Engine

      1. Lead Gen Engine Diagnostic

      2. Lead Gen Engine Optimization Strategy

      Phase Steps

      1. Select lead gen engine optimization steering committee & working team
      2. Gather baseline metrics
      3. Run the lead gen engine diagnostic
      4. Identify low-scoring areas & prioritize lead gen engine fixes
      1. Define the roadmap
      2. Create lead gen engine optimization strategy
      3. Present strategy to steering committee

      Phase Outcomes

      • Identify weakness within the lead gen engine.
      • Prioritize the most important fixes within the lead gen engine.
      • Create a best-in-class lead gen engine optimization strategy and roadmap that builds relationships, creates awareness, and develops trust and loyalty with website visitors.
      • Increase leadership’s faith in Marketing’s ability to generate high-quality leads and conversions.

      Insight Summary

      The lead gen engine is the foundation of marketing

      The lead gen engine is critical to building relationships. It is the foundation upon which marketers build awareness, trust, and loyalty.

      Misalignment between Sales and Marketing is costly

      Digital marketing leaders need to ensure agreement with Sales on the definition of a marketing qualified lead (MQL), as it is the most essential element of stakeholder alignment.

      Prioritization is necessary for today’s marketer

      By prioritizing the fixes within the lead gen engine that have the highest impact, a marketing leader will be able to focus their optimization efforts in the right place.

      Stop, your engine is broken

      Any advertising or effort expended while running marketing on a broken lead gen engine is time and money wasted. It is only once the lead gen engine is fixed that marketers will see the true results of their efforts.

      Tactical insight

      Without a well-functioning lead gen engine, marketers risk wasting valuable time and money because they aren’t creating relationships with prospects that will increase the quality of leads, conversion rate, and lifetime value.

      Tactical insight

      The foundational lead relationship must be built at the marketing level, or else Sales will be entirely responsible for creating these relationships with low-quality leads, risking product failure.

      Blueprint Deliverable:

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Lead Gen Engine Diagnostic

      An efficient and easy-to-use diagnostic tool that uncovers weakness in your lead gen engine.

      The image contains a screenshot of the Lead Gen Engine Diagnostic is shown.

      Key Deliverable:

      Lead Gen Engine Optimization Strategy Template

      The image contains a screenshot of the Lead Gen Engine Optimization Strategy.

      A comprehensive strategy for optimizing conversions and increasing the quality of leads.

      SoftwareReviews Offers Various Levels of Support to Meet Your Needs

      Included within Advisory Membership:

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Optional add-ons:

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Guided Implementation

      What does a typical GI on lead gen engine diagnostics look like?

      Diagnose Your Lead Gen Engine

      Call #1: Scope requirements, objectives, and specific challenges with your lead gen engine.

      Call #2: Gather baseline metrics and discuss the steering committee and working team.

      Call #3: Review results from baseline metrics and answer questions.

      Call #4: Discuss the lead gen engine diagnostic tool and your steering committee.

      Call #5: Review results from the diagnostic tool and answer questions.

      Develop Your Lead Gen Engine Optimization Strategy

      Call #6: Identify components to include in the lead gen engine optimization strategy.

      Call #7: Discuss the roadmap for continued optimization.

      Call #8: Review final lead gen engine optimization strategy.

      Call #9: (optional) Follow-up quarterly to check in on progress and answer questions.

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.

      Workshop Overview

      Day 1

      Day 2

      Activities

      Complete Lead Gen Engine Diagnostic

      1.1 Identify the previously selected lead gen engine steering committee and working team.

      1.2 Share the baseline metrics that were gathered in preparation for the workshop.

      1.3 Run the lead gen engine diagnostic.

      1.4 Identify low-scoring areas and prioritize lead gen engine fixes.

      Create Lead Gen Engine Optimization Strategy

      2.1 Define the roadmap.

      2.2 Create a lead gen engine optimization strategy.

      2.3 Present the strategy to the steering committee.

      Deliverables

      1. Lead gen engine diagnostic scorecard

      1. Lead gen engine optimization strategy

      Contact your account representative for more information.

      workshops@infotech.com1-888-670-8889

      Phase 1

      Lead Gen Engine Diagnostic

      Phase 1

      Phase 2

      1.1 Select lead gen engine steering committee & working team

      1.2 Gather baseline metrics

      1.3 Run the lead gen engine diagnostic

      1.4 Identify & prioritize low-scoring areas

      2.1 Define the roadmap

      2.2 Create lead gen engine optimization strategy

      2.3 Present strategy to steering committee

      This phase will walk you through the following activities:

      The diagnostic tool will allow you to quickly and easily identify the areas of weakness in the lead gen engine by answering some simple questions. The steps include:

      • Select the lead gen engine optimization committee and team.
      • Gather baseline metrics.
      • Run the lead gen engine diagnostic.
      • Identify and prioritize low-scoring areas.

      This phase involves the following participants:

      • Marketing lead
      • Lead gen engine steering committee

      Step 1.1

      Identify Lead Gen Engine Optimization Steering Committee & Working Team

      Activities

      1.1.1 Identify the lead gen engine optimization steering committee and document in the Lead Gen Engine Optimization Strategy Template

      1.1.2 Identify the lead gen engine optimization working team document in the Lead Gen Engine Optimization Strategy Template

      This step will walk you through the following activities:

      Identify the lead gen engine optimization steering committee.

      This step involves the following participants:

      • Marketing director
      • Leadership

      Outcomes of this step

      An understanding of who will be responsible and who will be accountable for accomplishing the lead gen engine diagnostic and optimization strategy.

      1.1.1 Identify the lead gen engine optimization steering committee

      1-2 hours

      1. The marketing lead should meet with leadership to determine who will make up the steering committee for the lead gen engine optimization.
      2. Document the steering committee members in the Lead Gen Engine Optimization Strategy Template slide entitled “The Steering Committee.”

      Input

      Output

      • Stakeholders and leaders across the various functions outlined on the next slide
      • List of the lead gen engine optimization strategy steering committee members

      Materials

      Participants

      • Lead Gen Engine Optimization Strategy Template
      • Marketing director
      • Executive leadership

      Download the Lead Gen Engine Optimization Strategy Template

      Lead gen engine optimization steering committee

      Consider the skills and knowledge required for the diagnostic and the implementation of the strategy. Constructing a cross-functional steering committee will be essential for the optimization of the lead gen engine. At least one stakeholder from each relevant department should be included in the steering committee.

      Required Skills/Knowledge

      Suggested Functions

      • Target Buyer
      • Product Roadmap
      • Brand
      • Competitors
      • Campaigns/Lead Gen
      • Sales Enablement
      • Media/Analysts
      • Customer Satisfaction
      • Data Analytics
      • Ad Campaigns
      • Competitive Intelligence
      • Product Marketing
      • Product Management
      • Creative Director
      • Competitive Intelligence
      • Field Marketing
      • Sales
      • PR/AR/Corporate Comms
      • Customer Success
      • Analytics Executive
      • Campaign Manager

      For small and mid-sized businesses (SMB), because employees wear many different hats, assign people that have the requisite skills and knowledge, not the role title.

      The image contains examples of small and mid-sized businesses, and the different employee recommendations.

      1.1.2 Identify the lead gen engine optimization working team

      1-2 hours

      1. The marketing director should meet with leadership to determine who will make up the working team for the lead gen engine optimization.
      2. Finalize selection of team members and fill out the slide entitled “The Working Team” in the Lead Gen Engine Optimization Strategy Template.

      Input

      Output

      • Executives and analysts responsible for execution of tasks across Marketing, Product, Sales, and IT
      • The lead gen engine optimization working team

      Materials

      Participants

      • The Lead Gen Engine Optimization Strategy Template
      • Marketing director
      • Executive leadership

      Download the Lead Gen Engine Optimization Strategy Template

      Lead gen engine working team

      Consider the working skills required for the diagnostic and implementation of the strategy and assign the working team.

      Required Skills/Knowledge

      Suggested Titles

      • SEO
      • Inbound Marketing
      • Paid Advertising
      • Website Development
      • Content Creation
      • Lead Scoring
      • Landing Pages
      • A/B Testing
      • Email Campaigns
      • Marketing and Sales Automation
      • SEO Analyst
      • Content Marketing Manager
      • Product Marketing Manager
      • Website Manager
      • Website Developer
      • Sales Manager
      • PR
      • Customer Success Manager
      • Analytics Executive
      • Campaign Manager

      Step 1.2

      Gather Baseline Metrics

      Activities

      1.2.1 Gather baseline metrics and document in the Lead Gen Engine Optimization Strategy Template

      This step will walk you through the following activities:

      Gather baseline metrics.

      This step involves the following participants:

      • Marketing director
      • Analytics lead

      Outcomes of this step

      Understand and document baseline marketing metrics.

      1.2.1 Gather baseline metrics and document in the Lead Gen Engine Optimization Strategy Template

      1-2 hours

      1. Use the example on the next slide to learn about the B2B SaaS industry-standard baseline metrics.
      2. Meet with the analytics lead to analyze and record the data within the “Baseline Metrics” slide of the Lead Gen Engine Optimization Strategy Template. The baseline metrics will include:
        • Unique monthly website visitors
        • Visitor to lead conversion rate
        • Lead to MQL conversion rate
        • Customer acquisition cost (CAC)
        • Lifetime customer value to customer acquisition cost (LTV to CAC) ratio
        • Campaign ROI

      Recording the baseline data allows you to measure the impact your lead gen engine optimization strategy has over the baseline.

      Input

      Output
      • Marketing and analytics data
      • Documentation of baseline marketing metrics

      Materials

      Participants

      • The lead gen engine optimization strategy
      • Marketing director
      • Analytics lead

      B2B SaaS baseline metrics

      Industry standard metrics for B2B SaaS in 2022

      Unique Monthly Visitors

      Industry standard is 5% to 10% growth month over month.

      Visitor to Lead Conversion

      Industry standard is between 0.9% to 2.1%.

      Lead to MQL Conversion

      Industry standard is between 36% to 48%.

      CAC

      Industry standard is a cost of $400 to $850 per customer acquired.

      LTV to CAC Ratio

      Industry standard is an LTV:CAC ratio between 3 to 6.

      Campaign ROI

      Email: 201%

      Pay-Per-Click (PPC): 36%

      LinkedIn Ads: 94%

      Source: “B2B SaaS Marketing KPIs,” First Page Sage, 2021

      Update the Lead Gen Optimization Strategy Template with your company’s baseline metrics.

      Download the Lead Gen Engine Optimization Strategy Template

      Step 1.3

      Run the Lead Gen Engine Diagnostic

      Activities

      1.3.1 Gather steering committee and working team to complete the Lead Gen Engine Diagnostic Tool

      This step will walk you through the following activities:

      Gather the steering committee and answer the questions within the Lead Gen Engine Diagnostic Tool.

      This step involves the following participants:

      • Lead gen engine optimization working team
      • Lead gen engine optimization steering committee

      Outcomes of this step

      Lead gen engine diagnostic and scorecard

      1.3.1 Gather the committee and team to complete the Lead Gen Engine Diagnostic Tool

      2-3 hours

      1. Schedule a two-hour meeting with the steering committee and working team to complete the Lead Gen Engine Diagnostic Tool. To ensure the alignment of all departments and the quality of results, all steering committee members must participate.
      2. Answer the questions within the tool and then review your company’s results in the Results tab.

      Input

      Output

      • Marketing and analytics data
      • Diagnostic scorecard for the lead gen engine

      Materials

      Participants

      • Lead Gen Engine Diagnostic Tool
      • Marketing director
      • Analytics lead

      Download the Lead Gen Engine Diagnostic Tool

      Step 1.4

      Identify & Prioritize Low-Scoring Areas

      Activities

      1.4.1 Identify and prioritize low-scoring areas from the diagnostic scorecard

      This step will walk you through the following activities:

      Identify and prioritize the low-scoring areas from the diagnostic scorecard.

      This step involves the following participants:

      • Marketing director

      Outcomes of this step

      A prioritized list of the lead gen engine problems to include in the Lead Gen Engine Optimization Strategy Template

      1.4.1 Identify and prioritize low-scoring areas from the diagnostic scorecard

      1 hour

      1. Transfer the results from the Lead Gen Engine Diagnostic Scorecard Results tab to the Lead Gen Engine Optimization Strategy Template slide entitled “Lead Gen Engine Diagnostic Scorecard.”
        • Results between 0 and 2 should be listed as high-priority fixes on the “Lead Gen Engine Diagnostic Scorecard” slide. You will use these areas for your strategy.
        • Results between 2 and 3 should be listed as medium-priority fixes on “Lead Gen Engine Diagnostic Scorecard” slide. You will use these areas for your strategy.
        • Results between 3 and 4 are within the industry standard and will require no fixes or only small adjustments.

      Input

      Output

      • Marketing and analytics data
      • Documentation of baseline marketing metrics

      Materials

      Participants

      • Lead Gen Engine Optimization Strategy Template
      • Marketing director
      • Analytics lead

      Download the Lead Gen Engine Diagnostic Tool

      Phase 2

      Lead Gen Engine Optimization Strategy

      Phase 1

      Phase 2

      1.1 Select lead gen engine steering committee & working team

      1.2 Gather baseline metrics

      1.3 Run the lead gen engine diagnostic

      1.4 Identify & prioritize low-scoring areas

      2.1 Define the roadmap

      2.2 Create lead gen engine optimization strategy

      2.3 Present strategy to steering committee

      This phase will walk you through the following activities:

      Create a best-in-class lead gen optimization strategy and roadmap based on the weaknesses found in the diagnostic tool. The steps include:

      • Define the roadmap.
      • Create a lead gen engine optimization strategy.
      • Present the strategy to the steering committee.

      This phase involves the following participants:

      • Marketing director

      Step 2.1

      Define the Roadmap

      Activities

      2.1.1 Create the roadmap for the lead gen optimization strategy

      This step will walk you through the following activities:

      Create the optimization roadmap for your lead gen engine strategy.

      This step involves the following participants:

      • Marketing director

      Outcomes of this step

      Strategy roadmap

      2.1.1 Create the roadmap for the lead gen optimization strategy

      1 hour

      1. Copy the results from "The Lead Gen Engine Diagnostic Scorecard" slide to the "Value, Resources & Roadmap Matrix" slide in the Lead Gen Engine Optimization Strategy Template. Adjust the Roadmap Quarter column after evaluating the internal resources of your company and expected value generated.
      2. Using these results, create your strategy roadmap by updating the slide entitled “The Strategy Roadmap” in the Lead Gen Engine Optimization Strategy Template.

      Input

      Output

      • Diagnostic scorecard
      • Strategy roadmap

      Materials

      Participants

      • Lead Gen Engine Optimization Strategy Template
      • Marketing Director

      Download the Lead Gen Engine Optimization Strategy Template

      Step 2.2

      Create the Lead Gen Engine Optimization Strategy

      Activities

      2.2.1 Customize your lead gen engine optimization strategy using the template

      This step will walk you through the following activities:

      Create a lead gen engine optimization strategy based on the results of your diagnostic scorecard.

      This step involves the following participants:

      Marketing director

      Outcomes of this step

      A leadership-facing lead gen optimization strategy

      2.2.1 Customize your lead gen engine optimization strategy using the template

      2-3 hours

      Review the strategy template:

      1. Use "The Strategy Roadmap" slide to organize the remaining slides from the Q1, Q2, and Q3 sections.
        1. Fixes listed in "The Strategy Roadmap" under Q1 should be placed within the Q1 section.
        2. Fixes listed in "The Strategy Roadmap" under Q2 should be placed within the Q2 section.
        3. Fixes listed in "The Strategy Roadmap" under Q3 should be placed within the Q3 section.

      Input

      Output

      • The strategy roadmap
      • Your new lead gen engine optimization strategy

      Materials

      Participants

      • Lead Gen Engine Optimization Strategy Template
      • Marketing director

      Download the Lead Gen Engine Optimization Strategy Template

      Step 2.3

      Present the strategy to the steering committee

      Activities

      2.3.1 Present the findings of the diagnostic and the lead gen optimization strategy to the steering committee.

      This step will walk you through the following activities:

      Get executive buy-in on the lead gen engine optimization strategy.

      This step involves the following participants:

      • Marketing director
      • Steering committee

      Outcomes of this step

      • Buy-in from leadership on the strategy

      2.3.1 Present findings of diagnostic and lead gen optimization strategy to steering committee

      1-2 hours

      1. Schedule a presentation to present the findings of the diagnostic, the lead gen engine optimization strategy, and the roadmap to the steering committee.
      InputOutput
      • Your company’s lead gen engine optimization strategy
      • Official outline of strategy and buy-in from executive leadership

      Materials

      Participants

      • Lead Gen Engine Optimization Strategy Template
      • Marketing director
      • Executive leadership
      • Steering committee

      Download the Lead Gen Engine Optimization Strategy Template

      Related SoftwareReviews Research

      Create a Buyer Persona and Journey

      Make it easier to market, sell, and achieve product-market fit with deeper buyer understanding.

      • Reduce time and treasure wasted chasing the wrong prospects.
      • Improve product-market fit.
      • Increase open and click-through rates in your lead gen engine.
      • Perform more effective sales discovery and increase eventual win rates.

      Optimize Lead Generation With Lead Scoring

      In today’s competitive environment, optimizing Sales’ resources by giving them qualified leads is key to B2B marketing success.

      • Lead scoring is a must-have capability for high-tech marketers.
      • Without lead scoring, marketers will see increased costs of lead generation and decreased SQL-to-opportunity conversion rates.
      • Lead scoring increases sales productivity and shortens sales cycles.

      Build a More Effective Go-to-Market Strategy

      Creating a compelling go-to-market strategy and keeping it current is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

      • Align stakeholders on a common vision and execution plan.
      • Build a foundation of buyer and competitive understanding.
      • Deliver a team-aligned launch plan that enables commercial success.

      Bibliography

      “11 Lead Magnet Statistics That Might Surprise You.” ClickyDrip, 28 Dec. 2020. Accessed April 2022.

      “45 Conversion Rate Optimization Statistics Every Marketer Should Know.” Outgrow, n.d. Accessed April 2022.

      Bailyn, Evan. “B2B SaaS Funnel Conversion Benchmarks.” First Page Sage, 24 Feb. 2021. Accessed April 2022.

      Bailyn, Evan. “B2B SaaS Marketing KPIs: Behind the Numbers.” First Page Sage, 1 Sept. 2021. Accessed April 2022.

      Conversion Optimization.” Lift Division, n.d. Accessed April 2022.

      Corson, Sean. “LTV:CAC Ratio [2022 Guide] | Benchmarks, Formula, Tactics.” Daasity, 3 Nov. 2021. Accessed April 2022.

      Dudley, Carrie. “What are personas?” Illumin8, 26 Jan. 2018. Accessed April 2022.

      Godin, Seth. “Permission Marketing.” Accenture, Oct. 2009. Accessed April 2022.

      Lebo, T. “Lead Conversion Statistics All B2B Marketers Need to Know.” Convince & Convert, n.d. Accessed April 2022.

      Lister, Mary. “33 CRO & Landing Page Optimization Stats to Fuel Your Strategy.” WordStream, 24 Nov. 2021. [Accessed April 2022].

      Nacach, Jamie. “How to Determine How Much Money to Spend on Lead Generation Software Per Month.” Bloominari, 18 Sept. 2018. Accessed April 2022.

      Needle, Flori. “11 Stats That Make a Case for Landing Pages.” HubSpot, 10 June 2021. Accessed April 2022.

      Payne, Kevin. “10 Effective Lead Nurturing Tactics to Boost Your Sales.” Kevintpayne.com, n.d. Accessed April 2022.

      Tam, Edwin. “ROI in Marketing: Lifetime Value (LTV) & Customer Acquisition Cost (CAC).” Construct Digital, 19 Jan. 2016. Accessed April 2022.

      Build a More Effective Go-to-Market Strategy

      • Buy Link or Shortcode: {j2store}559|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • A weak or poorly defined Go-to-Market strategy is often the root cause of slow product revenue growth or missed product revenue targets.
      • Many agile-driven product teams rush to release, skipping key GTM steps leaving Sales and Marketing misaligned and not ready to fully monetize precious product investments.
      • Guessing at buyer persona and journey or competitive SWOT analyses – two key deliverables of an effective GTM strategy – cause poor marketing and sales outcomes.
      • Without the sales and product-aligned business case for launch called for in a successful GTM strategy, companies see low buyer adoption, wasted sales and marketing investments, and a failure to claim product and launch campaign success.

      Our Advice

      Critical Insight

      • Having an updated and compelling Go-to-Market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development, given its huge impact on the many drivers of sustainable growth.
      • Establishing alignment through the GTM process builds long-term operational strength.
      • With a sound GTM strategy, marketers give themselves a 50% greater chance of product launch success.

      Impact and Result

      • Align stakeholders on a common vision and execution plan prior to the Build and Launch phases.
      • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
      • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

      Build a More Effective Go-to-Market Strategy Research & Tools

      Build Your Go-to-Market Strategy

      Use this storyboard and its deliverables to build a baseline market, understand your buyer, and gain competitive insights. It will also help you design your initial product and business case, and align stakeholder plans to prep for build.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Build a More Effective Go-to-Market Strategy – Executive Brief

        Almost there!

        Please enter your email and a few details and you're on your way to an efficient process.

        Download ×
      • Build a More Effective Go-to-Market Strategy – Phases 1-3
      • Go-to-Market Strategy Presentation Template
      • Go-to-Market Strategy RACI and Launch Checklist Workbook
      • Product Market Opportunity Sizing Workbook
      • Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Infographic

      Workshop: Build a More Effective Go-to-Market Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Align on GTM Vision & Plan, Craft Initial Strategy

      The Purpose

      Align on GTM vision and plan; craft initial strategy.

      Key Benefits Achieved

      Confidence that market opportunity is sufficient.

      Deeper buyer understanding to drive product design and messaging and launch campaign asset design.

      Steering committee approval for next phase.

      Activities

      1.1 Outline a vision for GTM, roles required, identify Steering Committee lead, workstream leads, and teams.

      1.2 Capture GTM strategy hypothesis by working through initial draft of the Go-to-Market Strategy Presentation and business case.

      1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

      1.4 Identify info./data gaps, sources, and plan for capturing/gathering including buyer interviews.

      Outputs

      Documented Steering Committee and Working team.

      Aligned on GTM vision and process.

      Documented buyer persona and journey. Competitive SWOT analysis.

      Document team knowledge on initial GTM strategy, buyer personas, and business case.

      2 Identify Initial Business Case, Sales Forecast, and Launch Plan

      The Purpose

      Identify Initial Business Case, Sales Forecast, and Launch Plan.

      Key Benefits Achieved

      Confidence in size of market opportunity.

      Alignment of Sales and Product on product forecast.

      Assessment of marketing tech stack.

      Initial business case.

      Activities

      2.1 Size Product Market Opportunity and initial revenue forecast.

      2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, channel/route to market.

      2.3 Craft initial launch campaign, product release and sales and CX readiness plans.

      2.4 Identify launch budgets across each investment area.

      2.5 Discuss initial product launch business case and key activities.

      Outputs

      Product Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM) and Total Available Market (TAM).

      Definition of product-market fit, uniqueness, and competitive differentiation.

      Preliminary campaign, targets, and readiness plans.

      Incremental budgets for each key stakeholder area.

      Preliminary product launch business case.

      3 Develop Launch Plans (I of II)

      The Purpose

      Develop final Launch plans and budgets in product and marketing.

      Key Benefits Achieved

      Align Product release/launch plans with the marketing campaign for launch.

      Understand incremental budgets from product and marketing for launch.

      Activities

      3.1 Apply product interviews to scope, MVP, roadmap, competitive differentiation, pricing, feature prioritization, routes to market, and sales forecast.

      3.2 Develop a more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

      Outputs

      Minimally Viable Product defined with feature prioritization. Product competitive differentiation documented Routes to market identified Sales forecast aligned with product team expectations.

      Marketing campaign launch plan Content marketing asset-creation/acquisition plan Campaign targets and metrics.

      4 Develop Launch Plans (II of II)

      The Purpose

      Develop final Launch Plans and budgets for remaining areas.

      Key Benefits Achieved

      Align Product release/launch plans with the marketing campaign for launch.

      Understand incremental budgets from Product and Marketing for launch.

      Activities

      4.1 Develop detailed launch/readiness plans with final budgets for: Sales enablement , Sales training, Tech stack, Customer onboarding & success, Product marketing, AR, PR, Corp Comms/Internal Comms, Customer Events, Employee Events, etc.

      Outputs

      Detailed launch plans, budgets for Product Marketing, Sales, Customer Success, and AR/PR/Corp. Comms.

      5 Present Final Business Case

      The Purpose

      To gain approval to move to Build and Launch phases.

      Key Benefits Achieved

      Align business case with Steering Committee expectations

      Approvals to Build and Launch targeted offering

      Activities

      5.1 Review final launch/readiness plans with final budgets for all key areas.

      5.2 Move all key findings into Steering Committee presentation slides.

      5.3 Present to Steering Committee; receive feedback.

      5.4 Incorporate Steering Committee feedback; update finial business case.

      Outputs

      Combined budgets across all areas. Final launch/readiness plans.

      Final Steering Committee-facing slides.

      Final approvals for Build and Launch.

      Further reading

      Build a More Effective Go-to-Market Strategy

      Maximize GTM success through deeper market and buyer understanding and competitive differentiation and launch team readiness that delivers target revenues.

      Table of Contents

      Section Title
      1 Executive Brief
      • Executive Summary
      • Analyst Perspective
      • Go-to-Market (GTM) strategy critical success factors
      • Key GTM challenges
      • Essential deliverables for GTM success
      • Benefits of a more effective GTM Strategy
      • Our methodology to support your success
      • Insight Summary
      • Blueprint deliverables and guided implementation steps
      2 Build baseline market, buyer, and competitive insights
      • Establish your team
      • Build buyer personas and journeys – develop initial messaging
      • Build initial product hypothesis
      • Size product market opportunity
      • Outline your key tech, app, and digital requirements
      • Develop your competitive differentiation
      • Select routes to market
      3 Design initial product and business case
      • Branding check
      • Formulate packaging and pricing
      • Craft buyer-valid product concept
      • Build campaign plan and targets
      • Develop budgets for creative, content, and media purchases
      • Draft product business case
      • Update GTM Strategy deck
      4 Align stakeholder plans to prep for build
      • Assess tech/tools support for all GTM phases
      • Outline sales enablement and customer success plan
      • Build awareness plan
      • Finalize business case
      • Final GTM plan deck

      Executive Brief

      Analyst Perspective

      Go-to-Market Strategy.

      A successful go-to-market (GTM) strategy aligns marketing, product, sales and customer success, sees decision making based on deep buyer understanding, and tests many basic assumptions often overlooked in today’s agile-driven product development/management environment.

      The disciplines you build using our methodology will not only support your team’s effort building and launching more successful products, but also can be modified for use in other strategic initiatives such as branding, M&A integration, expanding into new markets, and other initiatives that require a cross-functional and multidisciplined process.

      Photo of Jeff Golterman, Managing Director, SoftwareReviews Advisory.

      Jeff Golterman
      Managing Director
      SoftwareReviews Advisory

      Executive Summary

      An ineffective go-to-market strategy is often a root cause of:
      • Failure to attain new product revenue targets.
      • A loss of customer focus and poor new product/feature release buyer adoption.
      • Product releases misaligned with marketing, sales, and customer success readiness.
      • Low win rates compared to key competitors’.
      • Low contact-to-lead conversion rates.
      • Loss of executive/investor support for further new product development and marketing investments.
      Hurdles to go-to-market success include:
      • An unclear product-market opportunity.
      • A lack of well defined and prioritized buyer personas and needs that are well understood.
      • Poor competitive analysis that fails to pinpoint key areas of competitive differentiation.
      • Guessing at buyer journey and buyer-described ideal engagement within your lead gen engine.
      • A business case that calls for levels of customer value delivery (vs. feature MVPs) that can actually deliver wins and targeted revenue goals.
      Apply SoftwareReviews approach for greater GTM success.

      Our blueprint is designed to help you:

      • Align stakeholders on a common vision and execution plan prior to the build and launch phases.
      • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
      • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

      SoftwareReviews Insight

      Creating a compelling go-to-market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

      Go-to-Market Strategy Critical Success Factors

      Your GTM Strategy is where a multi-disciplined team builds a strong foundation for overall product plan, build, launch, and manage success

      A GTM Strategy is not all art and not all science but requires both. Software leaders will establish a set of core capabilities upon which they will plan, build, launch and manage product success. Executives, when resourcing their GTM strategies, will begin with:
      • Strong Program Leadership – An experienced Program Manager will guide the team through each step of GTM Strategy and test team readiness before advancing to the next step.
      • Few Shortcuts – Successful teams will have navigated the process through all steps together at least once. Then future launches can skip steps where prior decisions still hold.
      • Stakeholder Buy-In – Strong collaboration among Sales, Marketing, and Product wins the day.
      • Strong Team Skills – Success depends on having the right talent, making the right decisions, and delivering the right outcomes enabled with the right set of technologies and integrated to reach the right buyers at the right moment.
      • Discipline and perseverance – Given that GTM Strategy is not easy, it’s not surprising that 75% of marketers cite a significant level of dissatisfaction with the outcomes of their GTM plan, build, and launch phases.
      Diagram titled 'Go-to-Market Phases' with phases 'Manage', 'Launch', 'Build', and highlighted as 'This blueprint focus': 'Plan'.

      SoftwareReviews Advisory Insight:
      Marketers who get GTM Strategy “right” give themselves a 50% greater chance of Build and Launch success.

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram shown later.

      Go-to-Market Success is Challenging

      Getting GTM right is like winning an Olympic first-place crew finish. It takes teamwork, practice, and well-functioning tools and equipment.

      Stock image of a rowing team.

      • The goal of any Go-to-Marketing Strategy is not only to do it right once, but to do it over and over consistently.
      • A lack of GTM consistency often results in decelerating growth, and a weak GTM Strategy is likely the root cause when companies observe any of the following challenges:
        • Product opportunity is unclear and well-defined business cases are lacking
        • Buyer adoption slows of new features and launch revenue targets are missed
        • Sales and marketing are not ready when development releases new features
        • Sales win/loss ratios drop as customers tell us products are not competitively differentiated
        • Loss of executive support for new product investments
      • A company experiencing any one of these symptoms will find a remedy in plugging gaps in the way they Go-to-Market.

      “Figuring out a Go-to-Market approach is no trivial exercise – it separates the companies that will be successful and sustainable from those that won’t.” (Harvard Business Review)

      Slowing growth may be due to missing GTM Strategy essentials

      Marketers – Large and Small – will further test their GTM Strategy strength by asking “Are we missing any of the following?”

      • Product, Marketing, and Sales Alignment
      • Buyer personas and journeys
      • Product market opportunity size
      • Competitively differentiated product hypothesis
      • Buyer validated commercial concept
      • Sales revenue plan and program cost budget
      • Compelling business case for build and launch

      SoftwareReviews Advisory Insight:

      Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed. Future releases to existing products don’t need to be re-thought but instead check-listed against prior foundational decisions.

      Is Your GTM Strategy Led and Staffed Properly?

      Staffing tree outlining GTM Strategy essentials. At the top are 'Steering Committee: CEO/GM in larger company, CFO/Senior Finance, Key functional leaders'. Next is 'Program Manager: Leads the GTM program. Workstream leads are “dotted line” for the program.' Followed by 'Workstream Leads: (PM) Product Marketing – Program leadership, (PD) Product Mgt. – Aligned with PM, (MO) Marketing Ops – SMB optional, (BR) Branding/Creative – SMB optional, (CI) Competitive Intel. – SMB optional, (DG) Demand Gen./Field Marketing. – crucial, (SE) Sales Enablement – crucial, (PR) PR/AR/Comms – SMB optional, and (CS) Customer Success – SMB optional'. In a 'Large Enterprise' each role is assigned to a separate person, but in a 'Small' Enterprise each person has multiple roles. 'SMB – as employees wear many hats, teams comprise members with requisite skills vs. specific roles/titles.'

      Benefits of a more effective go-to-market strategy

      Our research shows a more effective GTM Strategy delivers key benefits, including:
      • Increased product development ROI – with a finance-aligned business case, a buyer-validated value proposition, and the readiness of marketing and sales to product launch.
      • Launch campaign effectiveness – increases dramatically when messaging resonates with buyers and where they are in their journey.
      • Seller effectiveness – increases with buyer validated value proposition, competitive differentiation, and the ability to articulate to buyers.
      • Executive support – is achieved when an aligned sales, marketing, and product team proves consistent in delivering against release targets over and over again.

      SoftwareReviews Advisory Insight:
      Many marketers experiencing the value of the GTM Steering Committee, extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

      “Go-to-Market Strategies aren’t just for new products or services, they can also be used for:
      • Acquiring other businesses
      • Changing your business’s focus
      • Announcing a new feature
      • Entering a new market
      • Rebranding
      • Positioning or repositioning

      And while each GTM strategy is unique, there are a series of steps that every product marketer should follow.” (Product Marketing Alliance)

      Is your GTM Strategy optimized?

      Large detailed layout of the steps needed to 'Make Your Go-to-Market Strategy More Successful'. 'GTM Planning Success Can Be Elusive'; '75% of high-tech marketers desire a more effective GTM strategy...'. Steps: '1 Your Challenges - Are You Feeling Any of These Pains?', '2 Framework - Stay Aligned', '3 Planning - Check Your GTM Plan Steps', '4 Insight - Deliver Key Output', and '5 Results - Reap Key Benefits'. Source: SoftwareReviews, powered by Info-Tech Research Group.

      Marketers, in order to optimize a go-to-market strategy, will:

      1. Self assess for symptoms of a sub-optimized approach.
      2. Align marketing, sales, product, and customer success with a common vision and execution plan.
      3. Diagnose for missing steps.
      4. Ensure creation of key deliverables.
      5. And then be able to reap the rewards.

      Who benefits from an optimized go-to-market strategy?

      This research is designed for:
      • High-tech marketers who are:
        • Looking to improve any aspect of their go-to-market strategy.
        • Looking for a checklist of roles and responsibilities across the product planning, build, and launch processes.
        • Looking to foster better alignment among key stakeholders such as product marketing, product management, sales, field marketing/campaigners, and customer success.
        • Looking to build a stronger business case for new product development and launch.
      This research will help you:
      • Explain the benefits of a more effective go-to-market strategy to stakeholders.
      • Size the market opportunity for a product/solution.
      • Organize stakeholders for GTM operational success.
      • More easily present the GTM strategy to executives and colleagues.
      • Build and present a solid business case for product build and launch.
      This research will also assist:
      • High-tech marketing and product leaders who are:
        • Looking for a framework of best practices to improve and scale their GTM planning.
        • Looking to align team members from all the key teams that support high-tech product planning, build, launch, and manage.
      This research will help them:
      • Align stakeholders on an overall GTM strategy.
      • Coordinate tasks and activities involved across plan, build, launch, and manage – the product lifecycle.
      • Avoid low market opportunity pursuits.
      • Avoid poorly defined product launch business cases.
      • Build competence in managing cross-functional complex programs.

      SoftwareReviews’ Approach

      1

      Build baseline market, buyer, and competitive insights

      Sizing your opportunity, building deep buyer understanding, competitive differentiation, and routes to market are fundamental first steps.

      2

      Design initial product and business case

      Validate positioning and messaging against brand, develop packaging and pricing, and develop digital approach, launch campaign approach and supporting budgets across all areas.

      3

      Align stakeholder plans to prep for build

      Rationalize product release and concept to sales/financial plan and further develop customer success, PR/AR, MarTech, and analytics/metrics plans.

      Our methodology provides a step-by-step approach to build a more effective go-to-market strategy

      1.Build baseline market, buyer, and competitive insights 2. Design initial product and business case 3. Align stakeholder plans to prep for build
      Phase Steps
      1. Select Steering Committee, GTM team, and outline roles and responsibilities. Build an aligned vision.
      2. Build initial product hypothesis based on sales and buyer “jobs to be done” research.
      3. Size the product market opportunity.
      4. Outline digital and tech requirements to support the full GTM process.
      5. Clarify target buyer personas and the buyer journey.
      6. Identify competitive gaps, parity, and differentiators.
      7. Select the most effective routes to market.
      8. Craft initial GTM Strategy presentation for executive review and status check.
      1. Compare emerging messaging and positioning with existing brand for consistency.
      2. Formulate packaging and pricing.
      3. Build a buyer-validated product concept.
      4. Build an initial campaign plan and targets.
      5. Develop initial budgets across all areas.
      6. Draft an initial product business case.
      7. Update GTM Strategy for executive review and status check.
      1. Assess technology and tools support for GTM strategy as well as future phases of GTM build, launch, and manage.
      2. Outline support for customer onboarding and ongoing engagement.
      3. Build an awareness plan covering media, social media, and industry analysts.
      4. Finalize product business case with collaborative input from product, sales, and marketing.
      5. Develop a final executive presentation for request for approval to proceed to GTM build phase.
      Phase Outcomes
      1. Properly sized market opportunity and a unique buyer value proposition
      2. Buyer persona and journey mapping with buyer needs and competitive SWOT
      3. Tech stack modernization requirements
      4. First draft of business case
      1. Customer-validated value proposition and product-market fit
      2. Initial product business case with sales alignment
      3. Initial launch plans including budgets across all areas
      1. Key stakeholders and their plans are fully aligned
      2. Executive sign-off to move to GTM build phases

      Insight summary

      Your go-to-market strategy ability is a strategic asset

      Having an updated and compelling go-to-market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

      Build the GTM Steering Committee into a strategic decision-making body

      Many marketers experiencing the value of the GTM Steering Committee extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

      A strong MarTech apps and analytics stack differentiates GTM leaders from laggards

      Marketers that collaborate closely with Marketing Ops., Sales Ops., and IT early in the process of a go-to-market strategy will be best able to assess whether current website/digital, marketing applications, CRM/sales automation apps, and tools can support the complete Go-to-Market process effectively.

      Establishing alignment through the GTM process builds long term operational strength

      Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed.

      Build speed and agility

      Future releases to existing products don’t need be re-thought but instead check-listed against prior foundational decisions.

      GTM Strategy builds launch success

      Marketers who get GTM Strategy “right” give themselves a 50% greater chance of build and launch success.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      Go-to-Market Strategy Presentation Template

      Capture key findings for your GTM Strategy within the Go-to-Market Strategy Presentation Template.

      Sample of the key deliverable, the Go-to-Market Strategy Presentation Template.

      Go-to-Market Strategy RACI and Launch Checklist Workbook

      Includes a RACI model and launch checklist that helps scope your working team’s roles and responsibilities.

      Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.

      Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Capture launch incremental costs that, when weighed against the forecasted revenue, illustrate gross margins as a crucial part of the business case.

      Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.

      Product Market Opportunity Sizing

      While not a deliverable of this blueprint per se, the Product Market Opportunity blueprint is required.

      Sample of the Product Market Opportunity Sizing deliverable. This blueprint calls for downloading the following additional blueprint:

      Buyer Persona and Journey blueprint

      While not a deliverable of this blueprint per se, the Buyer Persona and Journey blueprint is required

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
      Included within advisory membership Optional add-ons

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      What does our GI on Build a More Effective Go-to-Market Strategy look like?

      Build baseline market, buyer, and competitive insights

      Design initial product and business case

      Align stakeholder plans to prep for build

      Call #1: Share GTM vision and outline team activities for the GTM Strategy process. Plan next call – 1 week.

      Call #2: Outline product market opportunity approach and steps to complete. Plan next call – 1 week.

      Call #3: Hold a series of inquiries to do a modernization check on tech stack. Plan next call – 2 weeks.

      Call #4: Discuss buyer interview process, persona, and journey steps. Plan next call – 2 weeks.

      Call #5: Outline competitive differentiation analysis, routes to market, and review of to-date business case. Plan next call – 1 week.

      Call #6: Discuss brand strength/weakness, pricing, and packaging approach. Plan next call – 3 weeks.

      Call #7: Outline needs to craft assets with right messaging across campaign launch plan and budget. Outline needs to create plans and budgets across rest of marketing, sales, CX, and product. Plan next call – 1 week.

      Call #8: Review template and approach for initial business case and sales and product alignment. Plan next call – 1 week.

      Call #9: Review initial business case and launch plans across marketing, sales, CX, and product. Plan next call – 1 week.

      Call #10: Discuss plans/needs/budgets for tech stack modernization. Plan next call – 3 days.

      Call #11: Discuss plans/needs/budgets for CX readiness for launch. Plan next call – 3 days.

      Call #12: Discuss plans/needs/budgets for digital readiness for launch. Plan next call – 3 days.

      Call #13: Discuss plans/needs/budgets for marketing and sales readiness for launch. Plan next call – 3 days.

      Call #14: Review final business case and coach on Steering Committee Presentation. Plan next call – 1 week.

      A Go-to-Market Workshop Overview

      Contact your engagement manager for more information.
      Day 1 Day 2 Day 3 Day 4 Day 5
      Align on GTM Vision & Plan, Craft Initial Strategy
      Identify Initial Business Case, Sales Forecast and Launch Plan
      Develop Launch Plans (i of ii)
      Develop Launch Plans (ii of ii)
      Present Final Business Case to Steering Committee
      Activities

      1.1 Outline a vision for GTM and roles required, identify Steering Committee lead, workstream leads, and teams.

      1.2 Capture GTM strategy hypothesis by working through initial draft of GTM Strategy Presentation and business case.

      1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

      1.4 Identify information/data gaps and sources and plan for capturing/gathering including buyer interviews.

      Plan next day 2-3 weeks after buyer persona/journey interviews.

      2.1 Size product market opportunity and initial revenue forecast.

      2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, and channel/route to market.

      2.3 Craft initial launch campaign, product release, sales, and CX readiness plans.

      2.4 Identify launch budgets across each investment area.

      2.5 Discuss initial product launch business case and key activities.

      Plan next day 2-3 weeks after product hypothesis-validation interviews with customers and prospects.

      3.1 Apply product interviews to scope, MVP, and roadmap competitive differentiation, pricing, feature prioritization, routes to market and sales forecast.

      3.2 Develop more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

      4.1 Develop detailed launch/readiness plans with final budgets for:

      • Sales enablement
      • Sales training
      • Tech stack
      • Customer onboarding & success
      • Product marketing
      • AR
      • PR
      • Corp comms/Internal comms
      • Customer events
      • Employee events
      • etc.

      5.1 Review final launch/readiness plans with final budgets for all key areas.

      5.2 Move all key findings up into Steering Committee presentation slides.

      5.3 Present to Steering Committee, receive feedback.

      5.4 incorporate Steering Committee feedback; update finial business case.

      Deliverables
      1. Documented Steering Committee and working team, aligned on GTM vision and process.
      2. Document team knowledge on initial GTM strategy, buyer persona and business case.
      1. Definition of product market fit, uniqueness and competitive differentiation.
      2. Preliminary product launch business case, campaign, targets, and readiness plans.
      1. Detailed launch plans, budgets for product and marketing launch.
      1. Detailed launch plans, budgets for product marketing, sales, customer success, and AR/PR/Corp. comms.
      1. Final GTM Strategy, launch plan and business case.
      2. Approvals to move to GTM build and launch phases.

      Build a More Effective Go-to-Market Strategy

      Phase 1

      Build baseline market, buyer, and competitive insights

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      • Steering Committee and Team formulation
      • A vision for go-to-market strategy
      • Initial product hypothesis
      • Market Opportunity sizing
      • Tech stack/digital requirements
      • Buyer persona and journey
      • Competitive gaps, parity, differentiators
      • Routes to market
      • GTM Strategy deck

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation Template Go-to-Market Strategy RACI and Launch Checklist Workbook Buyer Persona and Journey blueprint Product Market Opportunity Sizing Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable. Sample of the Buyer Persona and Journey blueprint deliverable. Sample of the Product Market Opportunity Sizing Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM Strategy stakeholders
      • Documenting your GTM Strategy working team
      Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
      • Review the scope of roles and responsibilities required
      • Document the roles and responsibilities of your teams
      Use the Buyer Persona and Journey blueprint to:
      • Interview sales and customers/prospects to inform product concepts, understand persona and later, flush out buyer journey
      Use the Product Market Opportunity Sizing blueprint to:
      • Project Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM), and Total Available Market (TAM) from your current penetrated market

      Step 1.1

      Identify a GTM Program Steering Committee and Team. Build an Aligned Vision for Your Go-to-Market Strategy Approach

      Activities
      • 1.1.1 Identify the Steering Committee of key stakeholders whose support will be critical to success
      • 1.1.2 Select your go-to-market strategy program team
      • 1.1.3 Discuss an overview of the GTM process and program roles and responsibilities with stakeholders and GTM workstream leads
      • 1.1.4 Develop a Go-to-Market launch, tiering, time-line, and overall program plan
      • 1.1.5 Work with each workstream lead on their overall project plan and incremental budget requirements

      This step will walk you through the following activities:

      • Identify stakeholders – your Steering Committee
      • Identify team members
      • Present a vision of GTM Strategy

      This step involves the following participants:

      • Steering Committee
      • Program workstream leads

      Outcomes of this step

      • Steering Committee identified
      • Team members identified
      • All aligned on the GTM process
      • Go-to-market strategy timeline and program plan
      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.1.1 Identify stakeholders critical to success

      1-2 hours

      Input: Steering Committee interviews, Recognition of Steering Committee interest

      Output: List of GTM Strategy stakeholders as Steering Committee members

      Materials: Following slide outlining the key responsibilities required of the Steering Committee members, A high-Level timeline of GTM Strategy phases and key milestone meetings

      Participants: CMO, sponsoring executive, Functional leads - Marketing, Product Marketing, Product Management, Sales, Customer Success

      1. The GTM Strategy initiative manager should meet with the CMO to determine who will comprise the Steering Committee for your GTM Strategy.
      2. Finalize selection of steering committee members.
      3. Meet with members to outline their roles and responsibilities and ensure their willingness to participate.
      4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results.

      SoftwareReviews Advisory Insight:
      Go To Market Steering Committee’s can become an important ongoing body to steer overall product, pricing and other GTM decisions. Some companies have done so by adding the CEO and CFO to this committee and designated it as a permanent body that meets monthly to give go/no decisions to “all things product related” across all products and business units. Leaders that use this tool well, stay aligned, demonstrate consistency across business units and leverage outcomes across business units to drive greater scale.

      Go-to-Market Strategy Stakeholders

      Understand that aligning key stakeholders around the way your company goes to market is an essential company function.

      Title Key Roles Supporting an Effective Go-to-Market Strategy
      Go-to-Market Strategy Sponsor
      • Owns the function at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CMO, VP of Marketing, and in SMB Providers, the CEO
      Go-to-Market Strategy Program Manager
      • Typically a senior member of the marketing team
      • Responsible for organizing the GTM Strategy process, preparing summary executive-level communications and approval requests
      • Program manages the GTM Strategy process, and in many cases, the continued phases of build and launch.
      • Product Marketing Director, or other marketing director, that has strong program management skills, has run large scale marketing and/or product programs, and is familiar with the stakeholder roles and enabling technologies
      Functional Workstream Leads
      • Works alongside the Go-to-Market Strategy Initiative Manager on a specific product launch, campaign, rebranding, new market development, etc. and ensures their functional workstreams are aligned with the GTM Strategy
      • With typical GTM B2B a representative from each of the following functions will comprise the team:
        • Product Marketing, Product Management, Field Marketing, Creative, Marketing Ops/Digital, PR/Corporate Comms/AR, Social Media Marketing, Sales Operations, Sales Enablement/Training, and Customer Success
      Digital, Marketing/Sales Ops/IT Team
      • Comprised of individuals whose application and tech tools knowledge and skills are crucial to supporting the entire marketing tech stack and its integration with Sales/CRM
      • Responsible for choosing technology that supports the business requirements behind Go-to-Market Strategy, and eventually the build and launch phases as well
      • Digital Platforms, CRM, Marketing Applications and Analytics managers
      Steering Committee
      • Comprised of C-suite/management-level individuals that guide key decisions, approve of requests, and mitigate any functional conflicts
      • Responsible for validating goals and priorities, defining the scope, enabling adequate resourcing, and managing change especially among C-level leaders in Sales & Product
      • CMO, CTO/CPO, CRO, Head of Customer Success

      Download the Go-to-Market Strategy Presentation Template

      Roles vary by company size. Launch success depends on clear responsibilities

      Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      Success improves when you align & assign
      • Go-to-Market, build, and launch success improves when:
        • Phases and steps are outlined
        • Key activities are documented
        • Roles/functions are described
        • At the intersection of activities and role, whether the role is “Responsible,” “Accountable,” “Consulted,” or “Informed” is established across the team
      • Leaders will hold a workshop to establish RACI that fits with the scope and scale of your organization.
      • Confusion, conflict, and friction can be dramatically reduced/eliminated with RACI adoption and practice.
      • Review the RACI model and launch checklist within the Go-to-Market Strategy RACI and Launch Checklist Workbook in order to identify the full scope of roles and responsibilities needed.

      Go-to-Market Strategy Working Team

      Consider the skills and knowledge required for GTM Strategy as well as build and launch functions when choosing teams.

      Work with functional leaders to select workstream leads

      Workstream leads should be strong in collaboration, coordination of effort among others, knowledgeable about their respective function, and highly organized as they may be managing a team of colleagues within their function to deliver their responsible portion of GTM.

      Required Skills/Knowledge

      • Target Buyer
      • Product Roadmap
      • Brand
      • Competitors
      • Campaigns/Lead Gen
      • Sales Enablement
      • Media/Analysts
      • Customer satisfaction

      Suggested Functions

      • Product Marketing
      • Product Management
      • Creative Director
      • Competitive Intelligence
      • Demand Gen./Field Marketing
      • Sales Ops/Training/Enablement
      • PR/AR/Corporate Comms.
      • Customer Success
      Roles Required in Successful GTM Strategy
      For SMB companies, as employees wear many different hats, assign people that have the requisite skills and knowledge vs. the role title.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      1.1.2 Select the GTM Strategy working team

      1-2 hours

      Input: Stakeholders and leaders across the various functions outlined to the left

      Output: List of go-to-market strategy team members

      Materials: Go-to-Market Strategy Workbook

      Participants: Initiative Manager, CMO, Sponsoring executive, Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others), Marketing Applications Director, Senior Digital Business Analyst

      1. The GTM Strategy Initiative Manager should meet with the GTM Strategy Sponsor and functional leaders of workstream areas/functions to determine which team members will serve as Steering Committee members and who will serve as workstream leads.
      2. The working team for your go-to-market strategy should have the following roles represented in the working team:
        • Depending on the initiative and the size of the organization, the team will vary.
        • Key business leaders in key areas – Product Marketing, Field Marketing, Digital Marketing, Inside Sales, Sales, Marketing Ops., Product Management, and IT – should be involved.
      3. Document the members of your go-to-market strategy team in the Go-to-Market Strategy Presentation slide entitled “Our Team.”

      Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

      1.1.3 Develop a timeline for key milestones

      1 hour

      Timeline for Key Milestones with row headers 'Go-to-Market Phases', 'Major Milestones', and 'Key Phase Activities'. The phases (each column) and their associated activities are 'PLAN - Create buyer-validated product concept, size opportunity, and build business case', 'BUILD - Build product and enable readiness across the rest of marketing sales and customer success', 'LAUNCH - Release product, launch campaigns, and measure progress toward objectives', and then post-phase is 'MANAGE'. Notes in the 'Major Milestones' row: 'Outline key dates', 'Update with 'Today's Date' as you make progress', and 'Use GTM Plan major milestones or create your own'.

      GTM Program Managers:

      1. Will establish key program milestones working collaboratively with the Steering Cmte. and workstream leads.
      2. Outline key ”Market-facing” or external deliverables & dates, as well as internal.
      3. More detailed deliverable plans are called for working with workstream leads.
      4. This high-level overview will be used in regular Steering Cmte. and working team meets
      5. Record in the Go-to-Market Strategy Presentation

      Download the Go-to-Market Strategy Presentation Template

      1.1.5 Share your GTM strategy vision with your team

      1-2 hours

      Input: N/A

      Output: Team understanding of an effective go-to-market strategy, team roles and responsibilities and initial product and launch concept.

      Materials: The Build a More Effective Go-to-Market Strategy Executive Brief

      Participants: GTM Program Manager, CMO, Sponsoring executive, Workstream leads

      1. Download the Build a More Effective Go-to-Market Strategy Executive Brief and add the additional slides on Team Composition and Key Milestones you have created in prior steps as appropriate.
      2. Convene the Steering Committee and Working Team and take them through the Build a More Effective Go-to-Market Strategy Executive Brief with your additional slides to:
        1. Communicate team composition, roles and responsibilities, and key GTM Strategy program milestones.
        2. Educate them on what comprises a complete GTM Strategy from the Executive Brief.
      3. Optional: As a SoftwareReviews Advisory client, invite a SoftwareReviews analyst to present the Executive Brief if that is of help to you and your team.

      Go to the Build a More Effective Go-to-Market Strategy Executive Brief

      GTM program managers and workstream leads will collaborate on detailed project plans

      Timeline titled 'Workstreams Status' with a legend of shapes and colors, activities listed as row headers, timeline sections 'EXPLORE', 'DESIGN', 'ALIGN', and 'BUILD', and a column at the end of the timelines for the name of the workstream lead. Notes: 'Change names to actual workstream. Create separate pages for each', 'Overlay colored bars to indicate on/off track', 'Describe major deliverables & due dates', 'Outline major milestones', 'Update with your actual month and week-ending dates', 'Add workstream lead names'.

      Program managers will:

      • Outline an overall more detailed way of tracking GTM program workstreams, key dates and on/off track status

      Program managers & workstream leads will:

      • Call out each key workstream and workstream lead
      • Outline key deliverables and due dates
      • Track weekly for communicating status to Steering Cmte and working team meetings

      Use the Launch Checklist when building out full project plans

      Sample Launch Checklist table with project info above, and table columns 'Component', 'Owner', 'Start Date', 'Finish Date', 'G2M Plan', and 'Build'.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      Continuous improvement is enabled with a repeatable process
      • With ownership assigned and set-back schedules in place, product marketing and management leaders can take the guesswork out of the GTM plan and build and launch process for the entire team.
      • “Lighter” versions are created for lower-tier releases.
      • Checklists ensure “we haven’t missed anything” and drive clarity among the team.
      • Articulating where we are now and what’s next increases management confidence.
      • Rinse and repeat improves overall quality and drives scale.

      1.1.6 Develop a project plan for each workstream

      Work with your workstream leads to see them develop a detailed project plan that spans all their deliverables for a GTM Strategy
      1. It’s essential that GTM initiative managers can rely upon workstream leads to provide the status of their respective workstreams in a shared environment for easy weekly updating and reporting.
      2. We suggest the following approach:
        1. GTM initiative managers should maintain a copy of the GTM Strategy Presentation in a shared drive so workstream leads can provide updates.
        2. Workstream leads should work with their GTM initiative manager to populate a version of the workstream tracker shown on the previous slide that enables team status reporting.
        3. Additional slides that actually show “work completed” (e.g. images of assets created, training plans, screen caps of software functionality, etc.) should be reviewed each week as well.
        4. GTM initiative leaders/program managers are advised to summarize the to-date work completed across the team into the Go-To-Market Product and Launch Business Case slides to demonstrate progress to the Steering Committee.
      3. The goal is to keep tracking manageable. Because status is most easily shown during Steering Committee and Working Team meetings using PowerPoint, we recommend a simple approach to program management by using PowerPoint.
      Using the Go-to-Market Strategy Presentation:
      3-4 hours Initial, 1-2 hours weekly
      1. Work with your workstream leads to create a slide for each workstream that will contain all the key milestones.
      2. Some teams will choose to use project management software, others a PowerPoint representation, which makes for easy presentation during status meets.
      3. Use the following resources:
        • In the Go-to-Market Strategy RACI and Launch Checklist Workbook, reference the Launch Checklist.
        • In the Go-to-Market Presentation, use the Appendix slides and complete for each workstream.
      4. The GTM initiative manager must be able to track status with workstream leads and present status to the rest of the team during Steering Committee and workstream lead meetings.

      Download the Go-to-Market Strategy Presentation Template

      Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

      Step 1.2

      Hold Interviews With Sales Then Customers and Prospects to Inform Your Initial Product Concept

      Activities
      • 1.2.1 Use the SoftwareReviews Buyer Persona and Journey Interview Guide and Data Capture Tool found within the SoftwareReviews Buyer Persona and Journey blueprint.
      • 1.2.2 Follow the instructions within the above blueprint and hold interviews with Sales and customers and prospects to inform your buyer persona, initial product hypothesis, and buyer journey.
      • 1.2.3 Flush out the initial product and launch concept using the slides found within the Go-to-Market Strategy Presentation Template. You will continually refine the Go-to-Market Strategy Presentation Template such that you turn the Product and Launch descriptions into a business case for product build and launch. We advise you and your team to populate the slides to begin to inform an initial concept, then hold interviews with Sales, customers, and prospects to refine. The best way to capture customer and prospect insights is to use the Buyer Persona and Journey blueprint.

      This step will walk you through the following activities:

      • Schedule time with sales/sales advisory to flush out the product concept
      • Develop your customer and prospect interviewee list
      • Consolidate findings for your GTM Strategy program slide deck

      This step involves the following participants:

      • Sales/sales advisory, product management, initiative leader (product marketing)
      • Customers and prospects

      Outcomes of this step

      • Guidance from sales on product concept
      • Initial guidance from customers and prospective buyers
      • Agreement to proceed further

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Documenting buyer personas enables success beyond marketing

      Documenting buyer personas has several essential benefits to marketing, sales, and product teams:
      • Achieve a better understanding of your target buyer – by building a detailed buyer persona for each type of buyer and keeping it fresh, you take a giant step in becoming a customer-centric organization.
      • Align the team on a common definition – will happen when you build buyer personas collaboratively and among teams that touch the customer.
      • Improved lead generation – increases dramatically when messaging and marketing assets across your lead generation engine better resonate with buyers because you have taken the time to understand them deeply.
      • More effective selling – is possible when sellers apply persona development output to their interactions with prospects and customers.
      • Better product-market fit – increases when product teams more deeply understand for whom they are designing products. Documenting buyer challenges, pain points, and unmet buyer needs gives product teams what they need to optimize product adoption.
      “It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way. By knowing what your customer wants and needs, you can present them with content targeted specifically to those wants and needs.” (Emma Bilardi, Product Marketing Alliance, July 8, 2020)

      Buyer persona attributes that need defining

      A well defined buyer persona enables us to:

      • Clarify target org-types, identify buying decision makers and key personas, and determine how they make decisions
      • Align colleagues around a common definition of target buyer(s) to drive improvements in messaging and engagement across marketing, sales, and customer success
      • Identify specific asset-types and tools that, when activated within our lead gen engine and in the hands of sellers, helps a buyer move through a decision process
      Functional – “to find them”
      Job Role Titles Org Chart Dynamics Buying Center Firmographics

      Emotive – “what they do and jobs to be done”
      Initiatives – What programs/projects the persona is tasked with and what are their feelings and aspirations about these initiatives? Motivations? Build credibility? Get promoted? Challenges – Identify the business issues, problems, and pain points, that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? Buyer need – They may have multiple needs; which need is most likely met with the offering? Terminology – What are the keywords/phrases they organically use to discuss the buyer need or business issue?

      Decision Criteria – “how they decide”
      Buyer role – List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). Evaluation and decision criteria – The lens, either strategic, financial, or operational, through which the persona evaluates the impact of purchase.

      Solution Attributes – “what the ideal solution looks like”
      Steps in “Jobs to be Done” Elements of the “Ideal Solution” Business outcomes from ideal solution Opportunity scope – other potential users Acceptable price for value delivered Alternatives that see consideration Solution sourcing – channel, where to buy

      Behavioral Attributes – “how to approach them successfully”
      Content preferences – List the persona’s content preferences, could be blog, infographic, demo, video, or other, vs. long-form assets (e.g. white paper, presentation, analyst report). Interaction preferences – Which among in-person meetings, phone calls, emails, video conferencing, conducting research via web, mobile, and social. Watering holes – Which physical or virtual places do they go to network or exchange info with peers e.g. LinkedIn, etc.

      Buyer journeys are constantly shifting

      If you haven’t re-mapped buyer journeys recently, you may be losing to competitors that have. Leaders re-map buyer journeys frequently.
      • The multi-channel buyer journey is constantly changing – today’s B2B buyer uses industry research sites, vendor content marketing assets, software reviews sites, contacts with vendor salespeople, events participation, peer networking, consultants, emails, social media sites, and electronic media to research purchasing decisions.
      • COVID has dramatically decreased face-to-face – we estimate a B2B buyer spent between 20-25% more time online researching software buying decisions in 2021 than they did pre-COVID. This has diminished the importance of face-to-face selling and has given dramatic rise to digital selling and outbound marketing.
      • Content marketing has exploded – but without mapping the buyer journey and knowing where (by channel) and when (which buyer journey step) to offer content marketing assets, we will fail to convert prospects into buyers.

      SoftwareReviews Advisory Insight:
      Marketers are advised to update their buyer journey annually and with greater frequency when the human vs. digital mix is effected due to events such as COVID, and as emerging media such as Augmented Reality shifts asset-type usage and engagement options.

      “Two out of three B2B buyers today prefer remote human interactions or digital self service.

      And during August 2020-February 2021, use of digital self service leapt by 10%” (McKinsey & Company, 2021.)

      Challenges of not mapping persona and journey

      A lack of buyer persona and journey understanding is frequently the root cause of the following symptoms:
      • Lead generation results are way below expectations.
      • Inconsistent product-market fit.
      • Sellers have low success rates doing discovery with new prospects.
      • Website abandonment rates are really high.

      These challenges are often attributed to messaging and talk tracks that fail to resonate with prospects and products that fail to meet the needs of targeted buyers.

      SoftwareReviews Advisory Insight:
      Marketers developing buyer personas and journeys that lack agreement among Marketing, Sales, and Product of personas to target will squander precious time and resources throughout the customer targeting and acquisition process.

      “Forty-four percent of B2B marketers have already discovered the power of personas.” (Boardview, 2016.)

      1.2.1 Interview Sales and customers/prospects

      12 - 15 Hours, over course of 2-3 weeks

      Input: Insights from Sellers, Insights from customers and prospects

      Output: Completed slides outlining buyer persona, buyer journey, overall product concept, and detailed features and capabilities needed

      Materials: Create a Buyer Persona and Journey blueprint, Go-to-Market Strategy Presentation

      Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

      1. Using the Create a Buyer Journey and Persona Journey blueprint:
        • Follow the instructions to interview a group of Sellers, and most importantly, several customers and prospects
          • For this stage in the GTM Strategy process, the goal is to validate your initial product and launch concept.
          • We urge getting through all the interview questions with interviewees as the answers inform:
            • Product market fit and Minimal Viable Product
            • Competitive differentiation
            • Messaging, positioning, and campaign targeting
            • Launch campaign asset creation.
        • Place summary findings into the Go-to-Market Strategy Presentation, and for reference, place the Buyer Persona and Journey Summaries into the Go-to-Market Strategy Presentation Appendix.

      Download the Go-to-Market Strategy Presentation Template

      Download the Create a Buyer Journey and Persona Journey blueprint

      Step 1.3

      Update Your Product Concept

      Activities
      • 1.3.1 Based on Sales and Customer/Prospect interviews, update:
        • Your product concept slide
        • Detailed prioritization of features and capabilities

      This step calls for the following activities:

      • Update the product concept slide based on interview findings
      • Update/create the stack-ranking of buyer requested feature and capability priorities

      This step involves the following participants:

      • Product management lead
      • GTM initiative leader
      • Select workstream leads who sat in on interview findings

      Outcomes of this step

      • Advanced product concept
      • Prioritized features for development during Build phase
      • Understanding of MVP to deliver customer value and deal “wins”

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.3.1 Update Product and Launch concept

      2 Hours

      Input: Insights from Sellers, Insights from customers and prospects

      Output: Completed slides outlining product concept and detailed features and capabilities needed

      Materials: Go-to-Market Strategy Presentation

      Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

      1. Using the Go-to-Market Strategy Presentation:
        • With interview findings, update the Product and Launch Concept, Buyer Journey, and Capture Key Features/Capabilities of High Importance to Buyers slides

      Download the Go-to-Market Strategy Presentation Template

      Product and Launch Concept

      At this early stage, summarize findings from concept interviews to guide further discovery, as well as go-to-market concepts and initial campaign concepts in upcoming steps.

      Job Function Attributes

      Target Persona(s):
      Typical Title:
      Buying Center/functional area/dept.:

      Firmographics:
      Industry specific/All:
      Industry subsegments:
      Sizes (by revenues, # of employees):
      Geographical focus:

      Emotive Attributes

      Initiative descriptions: Buyer description of project/program/initiative. What terms used?

      Business issues: What are the business issues related to this initiative? How is this linked to a CEO-level mission-critical priority?

      Key challenges: What business/process hurdles need to be overcome?

      Pain points: What are the pain points to the business/personally in their role related to the challenges that drove them to seek a solution?

      Success motivations: What motivates our persona to be successful in this area?

      Solution and Opportunity

      Steps to do the job: What are the needed steps to do this job today?

      Key features and capabilities: What are the key solution elements the buyer sees in the ideal solution? (See additional detail slide with prioritized features.)

      Key business outcomes: In business terms, what value (e.g. cost/time/FTE savings, deals won, smarter, etc.) is expected by implementing this solution?

      Other users/opportunities: Are there other users in the role team/company that would benefit from this solution?

      Pricing/Packaging

      What is an acceptable price to pay for this solution? Based on financial benefits and ROI hurdles, what’s a good price to pay? A high price? What are packaging options? Any competitive pricing to compare?

      Alternatives/Competition

      What are alternatives to this solution: How else would you solve this problem? Are there other solutions you’ve investigated?

      Channel Preferences

      Where would it be most convenient to buy?: Direct from provider? Channel partner/reseller? Download from the web?

      Decision Criteria Attributes

      Decision maker – Role, criteria/decision lens:
      User(s) – Role, criteria/decision lens:
      Influencer(s) – Role, criteria/decision lens:
      Ratifier(s) – Role, criteria/decision lens:

      Behavioral Attributes

      Interaction preferences: Best way for us to reach this role? Email? At events? Texting? Video calls?

      Content types: Which content types (specifics; videos, short blog/article, longer whitepapers, etc.) help us stay educated about this initiative area?

      Content sources: What news, data, and insight sources (e.g. specifics) do you use to stay abreast of what’s important for this initiative area?

      Update the Go-to-Market Strategy Presentation with findings from Sales and customer/prospect interviews.

      Capture key features/capabilities of high importance to buyers

      Ask buyers during interviews, as outlined in the Buyer Persona and Journey blueprint, to describe and rate key features by need. You will also review with buyers during the GTM Build phase, so it’s important to establish high priority features now.

      Example bar chart for 'Buyer Feature Importance Ratings' where 'Buyer Need' is rated for each 'Feature'.
      • List key feature areas for buyer importance rating.
      • Establish a rating scheme.
          E.g. a rating of:
        • 4.5 or higher = critical ROI driver
        • 3.5 to 4.5 = must haves
        • 2 to 3.5 = nice to have
        • Less than 2 = low importance
      • Have buyers rate each possible feature 0-5 after explaining the rating scheme. Ask – are we missing any key features?
      • Update this slide, found within the Go-to-Market Strategy Presentation, with customer/prospect interview findings.
      Perform the same buyer interviews for non-feature “capabilities” such as:
      • Ease of use, security, availability of training, service model, etc. – and other “non-feature” areas that you need for your product hypothesis.

      Step 1.4

      Size the Product Market Opportunity

      Activities
      • 1.3.1 Based on the product concept, size, and the product market opportunity and with a focus on your “Obtainable Market”:
        • Clarify the definitions used to size market opportunity.
        • Source data both internally and externally.
        • Calculate the available, obtainable market for your software product.

      This step will walk you through the following activities:

      • Review market sizing definitions and identify required data
      • Identify the target market for your software application
      • Source market and internal data that will support your market sizing
      • Document and validate with team members

      This step involves the following participants:

      • GTM initiative leader
      • CMO, select workstream leads

      Outcomes of this step

      • Definitions on market sizing views
      • Data sourcing established
      • Market sizing and estimated penetration calculations

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Market opportunity sizing definitions

      Your goal is to assess whether or not the opportunity is significantly sized and if you are well positioned to capture it

      1. This exercise is designed to help size the market opportunity for this particular product GTM launch and not the market opportunity for the entire product line or company. First a few market sizes to define:
        1. Penetrated – is your current revenues and can be expressed in your percentage vs. competitors’.
        2. Serviceable Obtainable Market (SOM) – larger than your currently penetrated market, and a percentage of SAM that can realistically be achieved. It accounts for your current limitations to reach and your ability to sell to buyers. It is restricted by your go-to-market ability and reduced by competitive market share. SOM answers: What increased market can we obtain by further penetrating accounts within current geographical coverage and go-to-market abilities and within our ability to finance our growth?
        3. Serviceable Available Market (SAM) – larger than SOM yet smaller than TAM, SAM accounts for current products and current go-to-market capabilities and answers: What if every potential buyer bought the products we have today and via the type of go-to-market (GTM) especially geographical coverage, we have today? SAM calls for applying our current GTM into unpenetrated portions of currently covered customer segments and regions.
        4. Total Available Market (TAM) – larger than SAM, TAM sizes a market assuming we could penetrate other customer segments within currently covered regions without regard for resources, capabilities, or competition. It answers the question: If every potential buyer within our available market – covered regions – bought, how big would the market be?
        5. Total Global Market – estimates market opportunity if all orgs in all segments and regions bought – with full disregard for resources and without the restrictions of our current GTM abilities.
        6. Develop your market opportunity sizing using the Product Market Opportunity Sizing Workbook.

      Download the Product Market Opportunity Sizing Workbook

      SoftwareReviews Advisory Insight:
      Product marketers that size the product market opportunity and account for the limitations posed by competitors, current sales coverage, brand permission, and awareness, provide their organizations with valuable insights into which inhibitors to growth should be addressed.

      Visualization of market opportunity sizes as circles within bigger circles, 'Penetrated Market' being the smallest and 'Global Market' being the largest.

      1.4.1 Size the product market opportunity

      Your goal is two-fold: Determine the target market size, and develop a realistic 12–24 month forecast to support your business case
      1. Open the Product Market Opportunity Sizing Workbook.
      2. Follow the instructions within.
      3. When finished, download the Go-to-Market Strategy Presentation and update the Product Market Opportunity Size slide with your calculated Product Market Opportunity Size.

      Download the Product Market Opportunity Sizing Workbook

      Download the Go-to-Market Strategy Presentation Template

      “Segmentation, targeting and positioning are the three pillars of modern marketing. Great segmentation is the bedrock for GTM success but is overlooked by so many.” (Product Marketing Alliance)

      Step 1.5

      Outline Digital and Tech Requirements

      Activities

      Designing your go-to-market strategy does not require a robust customer experience management (CXM) platform, but implementing your strategy during the next steps of Go-to-Market – Build then Launch – certainly does.

      Review info-Tech’s CXM blueprint to build a more complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components.

      The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis called for during your GTM Strategy design.

      Diagram of 'Customer Relationship Management' surrounded by its components: 'Web Experience Management Platform', 'E-Commerce & Point-of-Sale Solutions', 'Social Media Management Platform', 'Customer Intelligence Platform', 'Customer Service Management Tools', and 'Marketing Management Suite'.

      These steps outlined in the CXM blueprint, will help you:

      • Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
      • Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy
      • Pull this all together to develop a prioritized optimization roadmap.

      This step involves the following participants:

      • Marketing Operations, Digital, IT
      • Project workstream leads as appropriate

      Outcomes of this step

      • After inquiries with appropriate analysts, client will be able to assess what new application and technology support is required to support Go To Market process.

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Step 1.6

      Identify features and capabilities that will drive competitive differentiation

      Activities
      • 1.6.1 Hold a session with key stakeholders including sales, customer success, product, and product marketing to develop a hypothesis of features and capabilities vs. competitors: differentiators, parity areas, and gaps (DPG).
      • Optional for clients with buyer reviews and key competitive reviews within target product category:
        • 1.6.2 Request from SoftwareReviews a 2X2 Matrix Report of Importance vs. Satisfaction for both features and capabilities within your product market/category to identify areas of competitive DPG.
        • 1.6.3 Hold an Inquiry with covering ITRG analysts in your product category to have them validate key areas of competitive DPG.
      • 1.6.4 Document competitive DPG and build out your hypothesis for product build as you ready for customer interviews to validate that hypothesis.

      This step will provide processes to help you:

      • Understand and document competitive differentiation, parity, and gaps

      This step involves the following participants:

      • Project workstream leads in product marketing, competitive intelligence, product management, and customer success

      Outcomes of this step

      • Develop a clear understanding of what differentiated capabilities to promote, which parity items to mention in marketing, and which areas are competitive gaps
      • Develop a hypothesis of what areas need to be developed during the Build phase of the Go-to-Market lifecycle

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Assess current capabilities and competitive differentiation vs. buyer needs

      Taking buyer needs ratings from step 1.3, assess your current and key competitive capabilities against buyer needs for both feature and non-feature capabilities. Incorporate into your initial product hypothesis.

      Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features' comparing ratings of 'Buyer Need', 'Our Current Capabilities', and 'Competitive Capabilities' for each 'Feature'.

      • Rank features in order of buyer need from step 1.3.
      • Prioritize development needs where current capabilities are rated low. Spot areas for competitive differentiation especially in high buyer-need areas.
      Perform the analysis for non-feature capabilities such as:
      • ease of use
      • security
      • availability of training
      • service model

      Optional: Validate feature and capability importance with buyer reviews

      Request from your SoftwareReviews Engagement Manager the “Importance vs. Satisfaction” analysis for your product(s) feature and non-feature capabilities under consideration for your GTM Strategy

      Satisfaction
      Fix Promote
      Importance

      Low Satisfaction
      High Importance

      These features are important to their market and will highlight any differentiators to avoid market comparison.

      High Satisfaction
      High Importance

      These are real strengths for the organization and should be promoted as broadly as possible.

      Low Satisfaction
      Low Importance

      These features are not important for the market and are unlikely to drive sales if marketing material focuses on them. Rationalize investment in these areas.

      High Satisfaction
      Low Importance

      Features are relatively strong, so highlight that these features can meet customer needs
      Review Maintain

      Overall Category Product Feature Satisfaction Importance

      • Importance is based on how strongly satisfaction for a feature of a software suite correlates to the overall Likeliness to Recommend
      • Importance is relative – low scores do not necessarily indicate the product is not important, just that it’s not as important as other features

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Optional: Feature importance vs. satisfaction

      Example: ERP “Vendor A” ratings and recommended key actions. Incorporate this analysis into your product concept if updating an existing solution. Have versions of the below run for specific competitors.

      Importance vs. Satisfaction map for Features, as shown on the previous slide, but with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

      Features in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

      Features in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

      Features in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

      Features in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Optional: Capabilities importance vs. satisfaction

      Example: ERP “Vendor A” capabilities ratings and recommended key actions. Incorporate this analysis into your product concept for non-feature areas if updating an existing solution. Have versions of the below run for specific competitors.

      Importance vs. Satisfaction map for Capabilities with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

      Capabilities in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

      Capabilities in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

      Capabilities in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

      Capabilities in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Develop a competitively differentiated value proposition

      Combining internal competitive knowledge with insights from buyer interviews and buyer reviews; establish which key features that will competitively differentiate your product when delivered

      Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features and Capabilities' comparing ratings of 'Your Product' and 'Competitor A' with high buyer importance at the top, low at the bottom, and rankings of each 'Differentiator', 'Parity', and 'Gap'.

      • Identify what buyers need that will differentiate your product features and company capabilities from key competitors.
      • Determine which features and company capabilities, ideally lower in buyer importance, can achieve/maintain competitive parity.
      • Determine which features and company capabilities, ideally much lower in buyer importance, that can exist in a state of competitive gap.

      Step 1.7

      Select the Most Effective Routes to Market

      Activities
      • 1.7.1 Understand a framework for deciding how to approach evaluating each available channel including freemium/ecommerce, inside sales, field sales, and channel partner.
      • 1.7.2 Gather data that will inform option consideration.
      • 1.7.3 Apply to decision framework and present to key stakeholders for a decision.

      This step will provide processes to help you:

      • Understand the areas to consider when choosing a sales channel
      • Support your decision by making a specific channel recommendation

      This step involves the following participants:

      • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success

      Outcomes of this step

      • Clarity around channel choice for this specific go-to-market strategy cycle
      • Pros and cons of choices with rationale for selected channel

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Your “route-to-market” – channel strategy

      Capture buyer channel preferences in Step 1.3, and research alternatives using the following framework

      Inside vs. Field Sales – Selling software during COVID has taught us that you can successfully sell software using virtual conferencing tools, social media, the telephone, and even texting and webchat – so is the traditional model of field/territory-based sellers being replaced with inside/virtual sellers who can either work at home, or is there a benefit to being in the office with colleagues?

      Solutions vs. Individual Products – Do your buyers prefer to buy a complete solution from a channel partner or a solutions integrator that puts all the pieces together, and can handle training and servicing, for a more complete buyer solution?

      Channel Partner vs. Build Sales Force – Are there channel partners that, given your product is targeting a new buyer with whom you have no relationship, can leverage their existing relationships, quicken adoption of your products, and lower your cost of sales?

      Fully Digital – Is your application one where users can get started for free then upgrade with more advanced features without the use of a field or inside sales person? Do you possess the e-commerce platform to support this?

      While there are other considerations beyond the above to consider, decide which channel approach will work best for this GTM Strategy.

      Flowchart on how to capture 'Buyer Channel Preferences' with five possible outcomes: 'Freemium/e-commerce', 'Use specified channel partner', 'Establish channel partner', 'Use Inside Sales', and 'Use Field Sales'.

      Channel Partnerships are Expanding

      “One estimate is that for every dollar a firm spends on its SaaS platform, it spends four times that amount with systems integrators and other channel partners.

      And as technologies are embedded inside other products, services, and solutions, effective selling requires more partners.

      Salesforce, for example, is recruiting thousands of new partners, while Microsoft is reportedly adding over 7,000 partners each month.” (HBR, 2021)

      Step 1.8

      Craft an Initial GTM Strategy Presentation for Executive Review and Status Check

      Activities
      • 1.8.1 Finalize the set of slides within the Go-to-Market Strategy Presentation that best illustrates the many key findings and recommended decisions that have been made during the Explore phase of the GTM Strategy.
        • Test whether all key deliverables have been created, especially those that must be in place in order to support future phases and steps.
        • Schedule a Steering Committee meeting and present your findings with the goal to gain support to proceed to the Design phase of GTM Strategy.

      This step will provide processes to help you:

      • Work with your colleagues to consolidate the findings from Phase 1 of the GTM Strategy
      • Create a slide deck with your colleagues for presentation to the Steering Committee to gain approvals to proceed to Phase 2

      This step involves the following participants:

      • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success
      • Steering Committee

      Outcomes of this step

      • Slide deck to present to the Steering Committee
      • Approvals to move to Phase 2 of the GTM Strategy

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.8.1 Build your GTM Strategy deck for Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase, Explore Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
        1. Have you properly sized the market opportunity for the focus of this GTM cycle?
        2. Have you defined a unique value proposition of what buyers are looking for?
        3. And have you aligned stakeholders on the target customer persona and flushed out an accurate buyer journey?
      2. If the answer is “no” you need to return to these steps and ensure completion.
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Phase 2.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Explore Review' circled in red.

      The presentation you create contains:

      • Team composition and roles and responsibilities
      • Steps in overall process
      • Goals and objectives
      • Timelines and work plan
      • Initial product and launch concept
      • Buyer persona and journey
      • Competitive differentiation
      • Channel strategy

      Build a More Effective Go-to-Market Strategy

      Phase 2

      Design your initial product and business case

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      • Branding consistency check
      • Formulate packaging and pricing
      • Craft buyer-validated product concept
      • Build initial campaign plan and targets
      • Develop budgets for creative, content, and media purchases
      • Draft product business case
      • Update GTM Strategy deck

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation TemplateGo-to-Market Strategy RACI and Launch Checklist WorkbookBuyer Persona and Journey blueprintGo-to-Market Strategy Cost Budget and Revenue Forecast Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable.Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.Sample of the Buyer Persona and Journey blueprint deliverable.Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM strategy stakeholders
      • Documenting your GTM strategy working team
      Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
      • Review the scope of roles and responsibilities required
      • Document the roles and responsibilities of your teams
      Use the Buyer Persona and Journey blueprint to:
      • Interview sales and customers/prospects to inform product concepts, understand persona and later, flesh out buyer journeys
      Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
      • Tally budgets from across key functions involved in GTM Strategy
      • Compare with forecasted revenues to assess gross margins

      Step 2.1

      Compare Emerging Messaging and Positioning With Existing Brand for Consistency

      Activities

      Share messaging documented with the buyer journey with branding/creative and/or Marketing VP/CMO to ensure consistency with overall corporate messaging. Use the “Brand Diagnostic” on the following slide as a quick check.

      For those marketers that see the need for a re-brand, please:
      Download the Go-to-Market Strategy Presentation Template

      Later during the Build phase of GTM, marketing assets, digital platforms, sales enablement, and sales training will be created where actual messaging can be written with brand guidelines aligned.

      This step is to assess whether you we need to budget extra funds for any rebranding.

      This step will walk you through the following activities:

      • After completing the buyer journey and identifying messaging, test with branding/CMO that new messaging aligns with current:
        • Company positioning
        • Messaging
        • Brand imagery

      This step involves the following participants:

      • Project lead
      • Product marketing
      • Branding/creative
      • CMO

      Outcomes of this step

      • Check – Y/N on brand alignment
      • Adjustments made to current branding or new product messaging to gain alignment

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Brand identity

      Re-think tossing a new product into the same old marketing engine. Ask if your branding today and on this new offering needs help.

      If you answer “no” to any of the following questions, you may need to re-think your brand. Does your brand:

      • recognize buyer pain points and convey clear pain-relief?
      • convey unique value that is clearly distanced from key competitors?
      • resonate with how target personas see themselves (e.g. rebellious, intelligent, playful, wise, etc.) and convey the “feeling” (e.g. relief, security, confidence, inspiration, etc.) buyers seek?
      • offer proof points via customer testimonials (vs. claimed value)?
      • tell a truly customer-centric story that is all about them (vs. what you want them to know about you)?
      • use words (e.g. quality, speed, great service, etc.) that equate to how buyers actually see you? Is your tone of voice going to resonate with your target buyer?
      • present in a clean, simple, and truly unique way? And will your brand identity stand the test of time?
      • represent feedback gleaned from prospects as well as customers?

      “Nailing an impactful brand identity is a critical part of Growth Marketing.

      Without a well-crafted and maintained brand identity, your marketing will always feel flat and one-dimensional.” (Lean Labs, 2021)

      Step 2.2

      Formulate Packaging and Pricing

      Activities
      • 2.2.1 Leverage what was learned in Phase 1 from buyer interviews to create an initial packaging and initial pricing approach.
        • Packaging success is driven by knowing what the buyer values are, how newly proposed functionality may work with other applications, and how well the buyer(s) work in teams.
        • Develop pricing using cost-plus, value/ROI, and competitive/market pricing comparisons.

      This step will walk you through the following activities:

      • Approaches to establishing price points for software products
      • Checking if pricing supports emerging product revenue plan

      This step involves the following participants:

      • Project lead
      • Product Marketing
      • Product Management
      • Pricing (if a function)

      Outcomes of this step

      • Pricing that is validated through buyer interviews and consistent with overall company pricing guardrails
      • Packaging that can be delivered

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.2.1 Formulate packaging and pricing

      Goal: Incorporate buyer benefits into your MVP that delivers the buyer value that compels them to purchase and drives the business case

      1. Leverage findings from buyer interviews and feature prioritization found in Step 1.3 to arrive at initial feature inclusion.
      2. Leverage feedback from customer interviews and competitive pricing analysis to arrive at an initial target price offer.
      3. Go to the Go-to-Market Strategy Presentation and use the slides labeled “Go-to-Market Strategy, Overall Project Plan.”

      Download the Go-to-Market Strategy Presentation Template

      Refer to the findings from buyer persona interviews

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Step 2.3

      Build a Buyer-Validated Product Concept

      Activities
      • 2.2.1 Add to your initial product concept from Phase 1, the pricing and packaging approach.
        • Take the concept out to buyers to get their feedback – not on UX design, that will come later, but to ensure the value is clear to the buyers, and to raise confidence in the product concept.
        • As with previous customer and prospect interviews, use the Buyer Persona and Journey blueprint with its accompanying interview guide and focus on the product related questions.
        • Generate your slides to present and discuss with buyers, capture feedback, and refine the product concept.

      This step will walk you through the following activities:

      • Hold buyer interviews to review the product design
      • Validate concept and commercial variables – not UX design, that comes later

      This step involves the following participants:

      • Project lead
      • Product Marketing
      • Product Management

      Outcomes of this step

      • Customer validated product concept that meets the business plan

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.3.1 The best new product hypothesis doesn’t always come from your best customers

      Goal: Validate your product concept and business case

      1. Key areas to validate during product concept feedback:
        1. Feature/capability-build priorities – Which set of features and capabilities (i.e. service model, etc.) must be delivered in a minimum viable product (MVP) that delivers unique and competitively differentiating buyer value so we have win rates that support the business case?
        2. Packaging/Pricing – Are their features/capabilities that are not in base offering but offered as add-ons or not at all? Are their different packaging options that must be delivered given different customer segments and appropriate price points? (E.g. a small- to-medium sized business (SMB) version, Freemium, or Basic vs. Premium offerings?
        3. Routes to Market/Channel – Ensure you validate your channel strategy as work/effort will be needed to arrive at channel sales and marketing enablement.

      Download the Go-to-Market Strategy Presentation Template

      “Innovation opportunities almost always come from understanding a company’s worst customers or customers it doesn’t serve” (Harvard Business School Press, 1997)

      2.3.2 How your prospects buy will inform upcoming campaign design

      Goal: During product validation interviews, further validate the buyer journey to identify asset types to be created/sourced for launch campaign design

      1. Leverage findings from buyer interviews with a focus on buyer journey questions/answers found in Step 1.3 and further validated during product concept feedback in step 2.3.
      2. Your goal is to uncover the following key areas (see next slide for illustration):
        1. Validate the steps buyers take throughout the buyer journey – when you validate buyer steps and what the buyer is doing and thinking as they make a buying decision determines if you are supporting the right process.
        2. Validate the human vs. non-human/digital interaction type for each step – this determines whether your lead gen engine or your salesforce (or channel partner) will deliver the marketing assets and sales collateral.
        3. Describe the asset-types most valued by buyers during each step – this will provide the guidance your demand gen/field marketers need to either work with product marketing and creative to design and build, or source the right marketing asset and sales collateral for your lead gen engine and to support sales enablement.
        4. Identify which channels – this will give your digital team the guidance they need to design the “where” to place the assets within your lead gen engine. Feedback from customer interviews and competitive pricing analysis to arrive at an initial target price for offering is shown on the next slide.
      3. Use the Go-to-Market Strategy Presentation to complete the buyer journey slide with key findings.

      Download the Go-to-Market Strategy Presentation Template

      Refer to the findings from buyer persona interviews

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Answers you need to map buyer journey

      Your buyer interviews – whether during earlier steps or here during product concept validation – will give specific answers to all areas in green text below. Understanding channels, asset-types, and crafting your key messaging are essential for next steps.

      Table outlining an example buyer's journey with fields in green text that are to be to replaced with answers from your buyer interviews.

      Step 2.4

      Build Your Initial Campaign Plan and Targets

      Activities
      • 2.4.1. While product management and marketing is working on the business case, the campaign team is designing their launch campaign.
      • Expand from the product concept and build out the entire launch campaign identifying dates, CTA’s, channels, and asset types needed that will be built during the Build phase.

      This step will walk you through the following activities:

      • Outline deployment plan of activities and outcomes
      • Draw up specs for needed assets, web-page changes, emails, target segments, and targets for leads generated

      This step involves the following participants:

      • Project lead
      • Field Marketing
      • Product Marketing

      Outcomes of this step

      • The initial draft of the campaign plan that outlines multichannel activities, dates, and assets that need to be sourced and/or created

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.4.1 Document your campaign plan

      2 hours

      On the following Awareness and Lead Gen Engine slide:
      1. Tailor the slide to describe your lead generation engine as you will use it when you get to latter steps to describe the activities in your lead gen engine and weigh them for go-to-market strategy.
      2. Use the template to see what makes up a typical lead gen and awareness building engine to see what you may be missing, as well as to record your current engine “parts.”
        • Note: The “Goal” image in upper right is meant as a reminder that marketers should establish a goal for Sales Qualified Leads (SQL’s) delivered to field sales for each campaign.

      On the Product and Launch Concept slides:

      1. Update the slides with findings from 2.3 and 2.4.

      Download the Go-to-Market Strategy Presentation Template

      “Only 32% of marketers – and 29% of B2B marketers – said the process of planning campaigns went very well. Just over half were sure they had selected the right business goal for a given marketing project and only 42% were confident they identified the right audience – which is, of course, a critical determinant for achieving success.” (MIT Sloan Management Review)

      Launch campaign

      Our Goal for [Campaign name] is to generate X SQL’s

      Flowchart of the steps to take when a campaign is launched, from 'Organic Website Visits' and 'Go Live' to future 'Sales Opportunities'. A key is present to decipher various icons.

      Awareness

      PR/EXTERNAL COMMS:

      Promote release in line with company story

      • [Executive Name] interview with [Publication Y] on [Launch Topic X] – Mo./Day
      • Press Release on new enhancements – Mo./Day
      • [Executive Name] interview with [Publication Z] on [Launch Topic X] – Mo./Day
      ANALYST RELATIONS:

      Receive analyst feedback pre-launch and brief with final releases messaging/positioning

      • Inquiry with [Key Analysts] on [Launch Topic X] – Mo./Day, pre launch
      • Press Release shared on new enhancements – Launch day minus two days
      • Analyst briefing with [Key Analysts] on [Launch Topic X] – Launch day minus two days

      Download the Go-to-Market Strategy Presentation Template

      2.4.2 Campaign targets

      Goal: Establish a Marketing-Influenced Win target that will be achieved for this launch

      We advise setting a target for the launch campaign. Here is a suggested approach:
      1. Understand what % of all sales wins are touched by marketing either through first or last touch attribution. This is the % of Marketing-Influenced Wins (MIWs).
      2. Determine what sales wins are needed to attain product revenue targets for this launch.
      3. Apply the actual company MIW % to the number of deals that must be closed to achieve target product launch revenues. This becomes the MIW target for this launch campaign.
      4. Then, using your average marketing funnel conversion rates working backwards from MIWs to Opportunities, Sales Accepted Leads (SALs), Sales Qualified Leads (SQLs), Marketing Qualified Leads (MQLs), up to website visits.
      5. Update the slides with findings from 2.3 and 2.4.

      Download the Go-to-Market Strategy Presentation Template

      “Marketing should quantify its contribution to the business. One metric many clients have found valuable is Marketing Influenced Wins (MIW). Measured by what % of sales wins had a last-touch marketing attribution, marketers in the 30% – 40% MIW range are performing well.” (SoftwareReviews Advisory Research)

      Step 2.5

      Develop Initial Budgets Across All Areas

      Activities
      • 2.5.1 Use the Go-to-Market Budget Workbook and work with your workstream leads.
        • Capture the costs associated with this GTM Strategy and Launch.
        • Summarize your GTM budget in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required.

      This step will walk you through the following activities:

      • Field marketing, product marketing, creative, others to identify the specific budget elements needed for this campaign/launch

      This step involves the following participants:

      • Project lead
      • Field Marketing
      • Product Marketing
      • Branding/creative

      Outcomes of this step

      • The initial marketing budget for this campaign/launch

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      2.5.1 Develop your GTM Strategy/product launch campaign budget

      Goal: Work with your workstream leads to identify all incremental costs associated with this GTM strategy and product launch

      1. Use the Go-to-Market Budget Workbook and adjust to include the areas that are identified by your workstream leads as being applicable to this GTM Strategy and Launch.
        • These should be incremental costs to normal operating and capital budgets and those areas that are fully approved for inclusion by your Steering Committee/Sponsoring Executive.
      2. Begin to Catalog all applicable costs to include all key areas such as:
        • Technology costs for internal use (typically from Marketing Ops), and “core” to product technology costs working with the product team
        • Channel marketing programs, agency (e.g. branding, naming, web design, SEO, content marketing, etc.), T&E, paid media, events, marketing assets, etc.
      3. Note that in the Align Step – Step 3, you will see your workstream leads each develop their individual contributions to both the launch plan as well a budget.

      4. Summarize your initial GTM budget findings in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required. Again, you will flush out the final costs within each workstream areas in Phase 3, ”Align.”

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 2.6

      Draft Initial Product Business Case

      Activities
      • 2.6.1 Here’s where you begin to pull together all the essential elements of your final business case.
        • For many organizations that require a view of return on investment, you will begin here to shape the key elements that your organization requires for a complete business case to go ahead with the needed investments.
        • The goal is to compare estimated costs to estimated revenues to ensure acceptable margins will be delivered for this GTM strategy/product launch.
        • The culmination of work to get to this calculation will continue through Phase 3; however, the following slide illustrates the kind of visualization that will be possible with our approach.

      This step will walk you through the following activities:

      • A product revenue forecast is created, alignment with sales/sales targets is created for a minimum viable product (MVP) that meets the buyer’s needs at the price point established/validated

      This step involves the following participants:

      • Project lead
      • Product management
      • Product marketing
      • Sales leadership

      Outcomes of this step

      • The important measures of:
        • Product revenue forecast
        • Supported MVP features

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Gross Margin Estimates – part of a complete product business case

      Your goal: Earn more than you spend! This projection of estimated gross margins should be part of your product launch business case. The GTM initiative lead and workstream leads are charged with estimating incremental costs, and product and sales must work together on the revenue forecast.

      Net Return

      We estimate our 12 month gross profit to be ….

      Quarterly Revenues

      Based on sales forecast, our quarterly/monthly revenues are ….

      Estimated Expenses

      Incremental up-front costs are expected to be ….

      Example 'P&L waterfall for Product X Launch' with notes. Green bars are 'Increase', red bars are 'Decrease', and blue bars are 'Total'. Red bar note: 'Your estimated incremental up-front costs', Green bar note: 'Your estimated net incremental revenues vs. costs', Blue bar note: 'Your estimated net gross profit for this product launch and campaign', 'END' note: 'Extend for suitable period'.

      2.6.1 Develop your initial product business case

      Goal: Focused on the Product Concept areas related to product Market Fit, Buyer Needs and Market Opportunity, Product Managers will summarize in order to gain approval for Build

      1. Using the Go-to-Market Strategy Presentation, product managers should ensure the product concept slide(s) support the rationale to move to Build phase. Key areas include:
        1. Adequate market opportunity size – that is worth the incremental investment
        2. Acceptable costs/investment to pursue the opportunity – design, creative services for branding, web design, product naming, asset creation, copywriting, translation services not available in-house
        3. Well-defined product market fit – review buyer interviews that identify buyer pain points and ideas that will deliver needed business value
        4. Buyer-validated commercials – buyer-validated pricing and packaging
        5. Product development budget and staffing support to build viable MVP & beyond roadmap – development budget and staffing is in place/budgeted to deliver MVP by target date and continue to ensure attainment of product revenue targets
        6. Unique product value proposition that is competitively differentiated – to drive acceptable win rates
        7. Product Sales Forecast – that when compared to costs meets company investment hurdle rates
        8. Sales Leadership support for achieving sales forecast and supported sales/channel resourcing plan – sales leadership has taken on forecasted revenues as an incremental sales quota and has budget for additional hiring, enablement, and training for attainment.
      2. Go to the Go-to-Market Strategy Presentation and complete the slides summarizing these key areas that support the business case for the next phases of Build and Launch.

      Product Business Case Checklist:

      • Acceptably large enough product market opportunity
      • Well-defined competitive differentiation
      • Buyer-validated product-market fit
      • Buyer-validated and competitive commercials (i.e. pricing, packaging)
      • An MVP with roadmap that aligns to buyer needs and buyer-validated price points
      • A 24–36 month sales forecast with CRO sign-up and support for attainment
      • Costs of launch vs. forecasted revenues to gauge gross margins

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 2.7

      Update the GTM Strategy Presentation Deck for Executive Review and Sign-off

      Activities
      • 2.7.1 Update the deck with Phase 2 findings culminating in the business case.

      This step will walk you through the following activities:

      • Drop into the GTM Strategy deck the summary findings from the team’s work
      • Write an executive summary that garners executive support for needed funds, signed-up-for sales targets, agreed upon launch timing
      • Steering Committee alignment on above and next steps

      This step involves the following participants:

      • Project lead
      • Steering Committee
      • Workstream leads

      Outcomes of this step

      • Executive support for the GTM Strategy plan and approval to proceed to Phase 3

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.7.1 Update your GTM Strategy deck for Design Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase – Design Step, while your emerging business case is important, it will be finalized in the Align Step.
      2. An important test to pass before proceeding to the Align step of the GTM Strategy, is to answer several key questions:
        1. Have you validated the product value proposition with buyers?
        2. Is the competitive differentiation clear for this offering?
        3. Did Sales support the business case by signing up for the incremental quota?
        4. Has product defined an MVP that aligns with the buyer value needed to drive purchases?
        • If the answer is “no” you need to return to these steps and ensure completion
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, and present to-date findings for approval to move onto Phase 3.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Design Review' circled in red.

      The presentation you create contains:

      • Timelines and a work plan
      • Expanded product concept to include your packaging and pricing approach
      • Feedback from buyers on validated product concept especially commercial elements
      • Expanded campaign plan and marketing budget
      • Initial product business case

      Build a More Effective Go-to-Market Strategy

      Phase 3

      Align stakeholder plans to prep for build

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      1. Assess tech/tools support for all GTM phases
      2. Map lead generation plan
      3. Outline Customer Success plan
      4. Build awareness plan (PR/AR, etc.)
      5. Finalize product business case
      6. Final GTM planning deck and Steering Committee review

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation Template Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM Strategy Stakeholders
      • Documenting your GTM Strategy Working Team
      Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
      • Tally budgets from across key functions involved in the GTM Strategy
      • Compare with forecasted revenues to assess gross margins

      Step 3.1

      Assess Technology and Tools Support for Your GTM Strategy as Well as Future Phases of GTM

      Activities
      • 3.1.1 Have Marketing Operations document what tech stack improvements are required in order to get the team to a successful launch. Understand costs and implementation timelines and work it into the Go-to-Market Budget Workbook.

      This step will walk you through the following activities:

      • After completing your initial survey in Step 1, complete requirements building for needed technology and tools acquisition/upgrade in campaign management, sales opportunity management, and analytics.

      This step involves the following participants:

      • Project lead
      • Marketing operations/digital
      • IT

      Outcomes of this step

      • Build a business requirement against which to evaluate new/upgraded vendor tools to support the entire GTM process

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.1.1 Technology plan and investments

      Goal: Outline the results of our analysis and Info-Tech analyst guidance regarding supporting systems, tools, and technologies to support our go-to-market strategy

      1. Plans, timings, and incremental costs related to, but not limited to, the following apps/tools/technologies:
        1. Lead management/Marketing automation
        2. Marketing analytics
        3. Sales Opportunity Management System (OMS) and Configure, Price, and Quote (CPQ) applications
        4. Sales engagement
        5. Sales analytics
        6. Customer service and support/Customer interaction hub
        7. Customer data management and analytics
        8. Customer experience platforms
        9. Marketing content management
        10. Creative tools
        11. Share of voice and social platform management
        12. Etc.
      2. Go to the Go-to-Market Budget Workbook and complete by adding costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.2

      Outline Sales Enablement and Support for Customer Success to Include Onboarding and Ongoing Engagement

      Activities
      • 3.3.1 Sales Enablement – develop the sales enablement and training plan for Launch to include activities, responsible parties, dates for delivery, etc.

      This step will walk you through the following activities:

      • Finalize the customer success training and support plan
      • Onboarding scripts
      • Changes to help screens in application
      • Timing to plan for Quality Acceptance

      This step involves the following participants:

      • Project lead
      • Customer Success lead
      • Product management
      • Product marketing

      Outcomes of this step

      • Plan for creation of copy, assets, and rollout pan to support clients and client segments for Launch

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.2.1 Outline sales enablement

      Goal: Outline sales collateral, updates to sales proposals, CPQ, Opportunity Management Systems, and sales training

      1. Describe the requirements for sales enablement to include elements such as:
        1. Sales collateral
        2. Client-facing presentations
        3. Sales proposal updates
        4. Updates to Configure, Price, and Quote (CPQ) applications
        5. Updates to Opportunity Management System (OMS) applications
        6. Sales demo versions of the new product
        7. Sales communication plans
        8. Sales training and certification programs
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.2.2 Outline customer success

      Goal: Outline customer support/success requirements and plan

      1. Plans, timings, and incremental costs for the following:
        1. Onboarding scripts for the new solution
        2. Updates to retention lifecycle
        3. FAQ answers
        4. Updates to online help/support system
        5. “How-to” videos
        6. Live chat updates
        7. Updates to “provide feedback” system
        8. Updates to Quarterly Business Review slides
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation and complete the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.3

      Build an Awareness Plan Covering Media, Social Media, and Industry Analysts

      Activities
      • 3.4.1 Corp Comms/PR/AR – develop the overall awareness plans for executive interviews, articles placed, social drops, analyst briefing dates, and internal associate comms if required.

      This step will walk you through the following activities:

      • Outline outbound communications plans including press releases, social posts, etc.
      • Describe dates for AR outreach to covering analysts
      • Develop the internal communications plan

      This step involves the following participants:

      • Project lead
      • Corporate Comms lead
      • Creative
      • Analyst relations
      • Social media marketing lead

      Outcomes of this step

      • Plan for creation of copy, assets, and rollout pan to support awareness building, external communications, and internal communications if required

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.3.1 Internal communications plan

      Goal: Outline complete internal communications plan. For large-scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

      1. Plans, timings, and incremental costs for the following:
        1. Complete a comms plan with dates, messages, and channels
        2. Team member roles and responsibilities
        3. Intranet article and posting schedules
        4. Creation of new office signage, merchandise, etc. for employee kits
        5. Pre-launch announcements schedule
        6. Launch day communications, events, and activities
        7. Post launch update schedule and messages for launch success
        8. Incremental staffing and resources/budget requirements
      2. Go to the Go-to-Market Budget Workbook and add costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.3.2 PR and External Communications Plan

      Goal: Outline complete internal communications plan. For large scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

      1. Plans, timings, and incremental costs for the following:
        1. List of Tier 1 and Tier 2 media authors covering the [product/initiative] market area
        2. Schedule of launch briefings, with any non-analyst influencers
        3. Timing of press releases
        4. Required supporting executives and stakeholders for each of the above meetings
        5. Slide deck/media kit for the above and planned questions to support needed feedback
        6. Media Site materials especially to support media questions and requests for briefings
        7. Social postings calendar of activities and key messages plan
        8. Publish data of [product/initiative] relevant articles with set-back schedules
        9. Cultivation of reference customers and client testimonials for media outreach
        10. Requirements for additional staffing to cover product/initiative new market and analysts
        11. Internal and external events calendar to invite media
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.3.3 Analyst relations plan

      Goal: Outline incremental costs in analyst communications, engagement, and access to research

      1. Plans, timings, and incremental costs for the following:
        1. List of Tier 1 and Tier 2 analysts for the [product/initiative] market area
        2. Schedule of inquiries, pre-launch briefings, launch briefings, and post-launch feedback
        3. Required supporting executives and stakeholders for each of the above meetings
        4. Analyst deck for each of the above and planned questions to support needed feedback
        5. Analyst Site materials to support 2nd and 3rd Tier analysts’ questions and requests for briefings
        6. Social postings calendar of activities and key messages
        7. Resources to respond to analyst blogs and/or social posts regarding your product/initiative area
        8. Timing of important and relevant analyst document/methodology publishing dates with set-back schedules
        9. Cultivation of reference customers and client testimonials to coincide with analyst outreach for research and for buyer review sites/reviews data gathering
        10. Requirements for additional staffing to cover product/initiative new market and analysts
        11. Events calendar where analysts will be presenting on this product/initiative market
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.4

      Finalize Product Business Case With Collaborative Input From Product, Sales, and Marketing

      Activities
      • 3.5.1 Convene the team to align sales, marketing, and product around the business case.

      This step will walk you through the following activities:

      • Refine the product business case initiated in Phase 2
      • Align product revenue forecast with sales revenue forecast
      • Align MVP features to be developed during “GTM – Build” with customer validated product-market fit

      This step involves the following participants:

      • Project lead
      • Product management
      • Product marketing

      Outcomes of this step

      • Product business case

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.4.1 Final product Build and Launch business case

      Goal: Beyond the product business case, factor in costs for technology, campaigning, sales enablement, and customer success in order to gain approval for Build and Launch

      1. Using the Go-to-Market Strategy Presentation, workstream leads and Go-to-Market Initiative leaders will finalize the anticipated incremental costs, and when compared to projected product revenues, present to the Steering Committee including CFO for final approval before moving to Build and Launch.
      2. To present a complete business case, key cost areas include:
        1. All the areas outlined up through Step 3.4 plus:
        2. Technology/MarTech Stack incremental costs
        3. Channel programs, branding/agency, pricing, packaging/product, and T&E incremental costs
        4. Campaign related – creative, content marketing, paid media, events, SEO, lists/data
        5. Sales Enablement, Customer Support/Success incremental costs
        6. Internal communications/events/activities/signage costs
        7. PR/AR/Media incremental costs
      3. Compare to final Sales/Product agreed projected revenues, in order to calculate estimated gross margins

      Go to the Go-to-Market Budget Workbook as outlined in prior steps and document final incremental costs and projected revenues and summarize within the Go-to-Market Strategy Presentation.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Product Build and Launch Business Case Checklist:

      • Acceptably large enough product market opportunity
      • Well-defined competitive differentiation
      • Buyer-validated product-market fit
      • Buyer-validated and competitive commercials (i.e. pricing, packaging)
      • An MVP with roadmap that aligns with buyer needs and buyer validated price points
      • A 24–36 month sales forecast with CRO sign-up and support for attainment
      • Incremental product development, tech, marketing, sales, customer success, AR/PR costs vs. forecasted revenues fall within acceptable margins

      Step 3.5

      Develop Your Final Executive Presentation to Request Approval and Proceed to GTM Build Phase

      Activities
      • 3.6.1 Update the Product, Launch, Journey, and Business Case slides included within the Go-to-Market Strategy Presentation Template with Phase 3 findings culminating in the business case.

      This step will walk you through the following activities:

      • Update the previously created slides with findings from Phase 3
      • Hold a Steering Committee meeting and present findings for approval

      This step involves the following participants:

      • Steering Committee
      • Workstream leads

      Outcomes of this step

      • GTM Strategy approved to move to GTM Build

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.5.1 Update your GTM Strategy deck for Align Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase – Align Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
        1. Are Sales, Product, and Marketing all aligned and in agreement on the business case?
        2. Are the gross margin calculations acceptable to the Steering Committee? CFO? CEO?
      2. If the answer is “no” you need to return to prior steps and ensure completion.
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Build Phase.
      4. Once your final business case is accepted, you are ready to move on to the GTM Build and Launch phases. These phases are covered in sperate SoftwareReviews blueprints.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Align Review' circled in red.

      The presentation you create contains:

      • Timelines and work plan updates
      • Tech stack needs/modifications
      • An expanded product concept to include packaging and pricing approach
      • Asset-type concepts for marketing campaigns, sales collateral, website, and social
      • Outline of initial Launch dates
      • Outline of initial customer success, awareness/PR/AR plans, and sales training plans
      • Final business case

      Summary of Accomplishment

      Problem Solved – A More Effective Go-to-Market Strategy

      By guiding your team through the Go-to-Market planning process applied to an actual GTM Strategy, you have built an important set of capabilities that underpins today’s well-managed software companies. By following the step-by-step process outlined in this blueprint, you have delivered a host of benefits that include the following:

      • Alignment of Product, Marketing, Sales, and Customer Success around a deeper understanding of your target buyers and what it takes to build competitive differentiation.
      • You have calculated your product market opportunity and whether it’s worth the investment in the long-term, and for the short term you have estimated gross margins as an important part of the business case.
      • Built executive support and confidence by leading a disparate team in complex decision making that is fact and evidence based to make more effective go/no go decisions related to investing in new products.
      • And finally, because you and your team have demonstrated their ability to align programs toward a common goal and program-manage a complex initiative through to successful completion, you have led your team to develop the “institutional muscle” to take on equally complex initiatives such as acquisition integration, rebranding, launching in a new region, etc.

      Therefore, developing the capabilities to manage a complex go-to-market strategy is akin to building company scalability and is sought after as a professional development opportunity that each executive should have on his/her résumé.

      If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

      Contact your account representative for more information.

      info@softwarereviews.com 1-888-670-8889

      Bibliography

      Acosta, Danette. “Average Customer Retention Rate by Industry.” Profitwell.com. Accessed Jan. 2022.

      Ashkenas, Ron, and Patrick Finn. “The Go-To-Market Approach Startups Need to Adopt.” Harvard Business Review, June 2016. Accessed Jun. 2021.

      Bilardi, Emma. “ How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.

      Cespedes, Frank V. “Defining a Post-Pandemic Channel Strategy.” Harvard Business Review, Apr. 2021. Accessed Jul. 2021.

      Chapman, Lawrence. “A Visual Guide to Product Launches.” Product Marketing Alliance. Accessed Jul. 2021.

      Chapman, Lawrence. “Everything You Need To Know About Go-To-Market Strategies.” Product Marketing Alliance. Accessed Jul. 2021.

      Christiansen, Clayton. “The Innovators Dilemma.” Harvard Business School Press, 1997.

      Drzewicki, Matt. “Digital Marketing Maturity: The Path to Success.” MIT Sloan Management Review. Accessed Dec. 2021.

      “Go-To-Market Refresher,” Product Marketing Alliance. Accessed Jul. 2021

      Harrison, Liz; Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March, 2021. Accessed Dec. 2021.

      Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview, 19 Feb. 2016. Accessed Jan. 2022.

      Scott, Ryan. “Creating a Brand Identity: 20 Questions to Consider.” Lean Labs, Jun 2021. Accessed Jul. 2021.

      Smith, Michael L., and James Erwin. “Role and Responsibility Charting (RACI).” DOCSearch. Accessed Jan. 2022. Web.

      “What is the Total Addressable Market (TAM).” Corporate Finance Institute (CFI), n.d. Accessed Jan. 2022.

      Related Software Reviews Research

      Sample of the Create a Buyer Persona and Journey research Create a Buyer Persona and Journey
      • A successful go-to-market strategy depends upon deep buyer understanding. Our Create a Buyer Persona and Journey blueprint will give you a step-by-step process that when followed will provide you and your team with that deep buyer understanding you need.
      • The Create a Buyer Persona and Journey blueprint provides you with an interview containing over 75 questions that, after capturing buyer answers and insights during interviews, will strengthen your value proposition, product market fit, lead gen engine and sales effectiveness.
      Sample of the Optimize Lead Generation With Lead Scoring research Optimize Lead Generation With Lead Scoring
      • Save time and money and improve your sales win rates when you apply our methodology to score contacts with your lead gen engine more accurately and pass better qualified leads over to your sellers.
      • Our methodology teaches marketers to develop your own lead scoring approach based upon lead/contact profile vs. your Ideal Customer Profile (ICP) and scores contact engagement. Applying the methodology to arrive at your own approach to scoring will mean reduced lead gen costs, higher conversion rates, and increased marketing influenced wins.

      Skills Development on the Mainframe Platform

      • Buy Link or Shortcode: {j2store}336|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      Mainframes remain a critical part of an organization’s infrastructure and will need to support these platforms for the foreseeable future. Despite the importance, it can be a challenge for organizations to find qualified resources to support them. Meanwhile, companies are unsure of where to find help to train and develop their teams on mainframe technologies and are at risk of a skills gap within their teams.

      Our Advice

      Critical Insight

      • Mainframes continue to have wide usage, particularly in enterprise organizations. The complexity of moving or replatforming many of these applications means these platforms will be around for a long time still.
      • Companies need to be proactive about developing their teams to support their mainframe systems.

      Impact and Result

      • Companies can protect their assets by cultivating a pipeline of qualified resources to support their mainframe infrastructure.
      • There is a robust training ecosystem headed by large, reputable organizations to help develop and support companies' resources. You don’t have to do it alone.

      Skills Development on the Mainframe Platform Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Skills Development on the Mainframe Platform Storyboard – An overview of the solutions available to support your mainframe training and skills development needs.

      Your mainframes are not going to disappear overnight. These systems often support the most critical operations in your organization. You need to ensure you have the right qualified resources to support your platforms.

      • Skills Development on the Mainframe Platform Storyboard
      [infographic]

      Build an IT Succession Plan

      • Buy Link or Shortcode: {j2store}476|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $338,474 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Lead
      • Parent Category Link: /lead
      • Pending retirements in key roles create workforce risks and potentially impact business continuity.
      • Fifty-six percent of organizations have not engaged in succession planning, so they haven’t identified at-risk key roles or successors for those roles.

      Our Advice

      Critical Insight

      • Just under 60% of organizations haven't tackled succession planning.
      • This means that three out of five organizations don’t know what skills they need for the future or what their key roles truly are. They also haven’t identified at-risk key roles or successors for those roles.
      • In addition, 74% of organizations have no formal process for facilitating knowledge transfer between individuals, so knowledge will be lost.

      Impact and Result

      • Info-Tech's Key Roles Succession Planning Tool will help you assess key role incumbent risk factors as well as identify potential successors and their readiness. Pay particular attention to those employees in key roles that are nearing retirement, and flag them as high risk.
      • Plan for the transfer of critical knowledge held by key role incumbents. Managers and HR leaders see significant tacit knowledge gaps in younger workers; prioritize tacit knowledge in your transfer plan and leverage multiple transfer methods.
      • Explore alternative work arrangements to ensure sufficient time to prepare successors. A key role incumbent must be available to complete knowledge transfer.
      • Define formal transition plans for all employees in at-risk key roles and their successors by leveraging your workforce and succession planning outputs, knowledge transfer strategy, and selected alternative work arrangements.

      Build an IT Succession Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build an IT Succession Plan Deck – A step-by-step document that walks you through how to future-proof your IT team.

      Protect your team and organization from losses associated with departure of people from key roles. This blueprint will help you build an IT succession plan to ensure critical knowledge doesn’t walk out the door and continuity of business when people in key roles leave.

      • Build an IT Succession Plan Storyboard

      2. Critical Role Identifier – A tool to help you determine which roles are most critical to the success of your team.

      The purpose of this tool is to help facilitate a conversation around critical roles.

      • Critical Role Identifier

      3. Key Role Succession Planning Template – A tool that walks you through reviewing your talent, succession planning, and determining successor readiness.

      This tool will help IT leaders work through key steps in succession development for each employee in the team, and present summaries of the findings for easy reference and defensibility.

      • Key Roles Succession Planning Tool

      4. Role Profile Template – A template that helps you outline the minimum requirements for each critical role addressed in succession planning.

      This template is a guide and the categories can be customized to your organization.

      • Role Profile Template

      5. Individual Talent Profile Template – A template to assess an employee against the role profiles of critical roles.

      This profile provides the basis for evidence-based comparison of talent in talent calibration sessions.

      • Individual Talent Profile Template

      6. Role Transition Plan Template – A template to help you plan to implement knowledge transfer and alternative work arrangements.

      As one person exits a role and a successor takes over, a clear checklist-based plan will help ensure a smooth transition.

      • Role Transition Plan Template
      [infographic]

      Further reading

      INFO~TECH RESEARCH GROUP

      Build an IT Succession Plan

      Future-proof your IT team.


      Build an IT Succession Plan

      Future-proof your IT team.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      Most organizations are unprepared for the loss of employees who hold key roles.

      • The departure of employees in key roles results in the loss of valuable knowledge, core business relationships, and profits.
      • Pending retirements in key roles create workforce risks and potentially impact business continuity.

      Planning and executing on key role transition can take years. CIOs should prepare now to mitigate the risk of loss later.

      Common Obstacles
      • The number of organizations which have not engaged in succession planning is 56%; they haven’t identified at-risk key roles, or successors for those roles.
      • Analyzing key roles at the incumbent and successor level introduces real-life, individual-focused factors that have a major impact on role-related risk.
      Info-Tech’s Approach
      • Plan for the transfer of critical knowledge held by key role incumbents.
      • Explore alternative work arrangements to ensure sufficient time to prepare successors.
      • Define formal transition plans for all employees in at-risk key roles and their successors.

      Info-Tech Insight

      Losing employees in key roles without adequate preparation hinders productivity, knowledge retention, relationships, and opportunities. Implement scalable succession planning to mitigate the risks.

      Most organizations are unprepared for the loss of employees who hold key roles

      Due to the atmosphere of uncertainty.

      Not only do they not have the right processes in place, but they are also ill-equipped to deal with the sheer volume of retirees in the future.

      Over 58% of organizations are unprepared for Baby Boomer retirement. Only 8% said they were very prepared.

      Pie chart with percentages of organizations who are prepared for Baby Boomer retirement.
      (Source: McLean & Company, 2013; N=120)

      A survey done by SHRM and AARP found similar results: 41% of HR professionals said their organizations have done nothing and don’t plan to do anything to prepare for a possible worker shortage as Boomers retire.

      (Source: Poll: Organizations Can Do More to Prepare for Talent Shortage as Boomers Retire)
      This means that three out of five organizations don’t know what skills they need for the future, or what their key roles truly are. They also have not identified at-risk key roles or successors for those roles.
      (Source: McLean & Company, 2013, N=120)

      To make matters worse, 74% of organizations have no formal process for facilitating knowledge transfer between individuals, so knowledge will be lost.

      Pie chart with percentages of organizations with a formal process for facilitating knowledge transfer.
      (Source: McLean & Company, 2013; N=120)

      Most organizations underestimate the costs associated with ignoring succession planning

      “In many cases, executives have no idea what knowledge they are losing.” (TLNT: Lost Knowledge – What Are You and Your Organization Doing About It?”)
      Objections to succession planning now: The risks of this mindset…
      “The recession bought us time to plan for Baby Boomer retirement.” Forty-two percent of organizations believe this to be true and may feel a false sense of security. Assume it takes three years to identify an internal successor for a key role, develop them, and execute the transition. Add the idea that, like most organizations, you don’t have a repeatable process for doing this. Do you still have enough time?
      “The skills possessed by my organization’s Baby Boomers are easy to develop in others internally.” Forty percent of organizations agree with this statement, but given the low rate of workforce planning taking place, most may not actually know the skills and knowledge they need to meet future business goals. These organizations may realize their loss too late.
      “We don’t have the time to invest in succession planning.” Thirty-nine percent of organizations cite this as an obstacle, which is a very real concern. Adopting a simple, scalable process that focuses on the most mission critical key roles will be easier to digest, as well as eliminate time wasted trying to recoup losses in the long run. The costs of not planning are much higher than the costs of planning.
      “We don’t know when our boomers plan to retire, so we can’t really plan for it.” The fact that 42% of organizations do not know employees’ retirement plans is proof positive that they’re operating blind. You can’t plan for something if you don’t have any information about what to plan for or the time frame you’re working against.
      “My organization puts a premium on fresh ideas over experience.” While nearly 45% of organizations prioritize fresh ideas, 50% value experience more. Succession planning and knowledge transfer are important strategies for ensuring experience is retained long enough for it to be passed along in the organization.

      Use Info-Tech’s tools and templates

      Talent Review

      Succession Planning

      Knowledge Transfer

      Key tools and templates to help you complete your project deliverables
      Key Roles Succession Planning Tool
      Critical Role Identifier
      Role Profile Template
      Individual Talent Profile Template
      Key Roles Succession Planning Tool
      Role Profile Template
      Individual Talent Profile Template
      Role Transition Plan Template
      Key Roles Succession Planning Tool
      Role Profile Template
      Individual Talent Profile Template
      Your completed project deliverables

      Critical Role Identifier

      Key Roles Succession Plan

      Key Role Profiles

      Individual Talent Profiles

      Key Role Transition Plans

      Ignoring succession planning could cause significant costs

      Losing knowledge will undermine your strategy in four ways:

      Inefficiency

      Inefficiency due to “reinvention of the wheel.” When workers leave and don’t effectively transfer their knowledge, duplication of effort to solve problems and find solutions occurs.

      Innovation

      Reduced capacity to innovate. Older workers know what works and what doesn’t, what’s new and what’s not. They can identify the status quo faster to make way for novel thinking.

      Competitive Advantage

      Loss of competitive advantage. Losing knowledge and/or established client relationships hurts your asset base and stifles growth.

      Vulnerability

      Increased vulnerability. Losing knowledge can impede your organizational ability to identify, understand, and mitigate risks. You’ll have to learn through experience all over again.

      Succession planning improves performance by reducing the impact of sudden departures

      Business Continuity

      Succession planning limits disruption to daily operations and minimizes recruitment costs:

      • The average time to fill a vacant role externally in the US is approximately 43 days (Workable). Succession planning can reduce this via a talent pool of ready-now successors.
      Engagement & Retention

      Effective succession planning is a tool for engaging, developing, and retaining employees:

      • Of departing employees, 45% cite lack of opportunities for career advancement as the moderate, major, or primary reason they left (McLean & Company Exit Survey, 2018, N=7,530).
      Innovation & Growth

      Knowledge is a strategic asset, and succession planning can help retain, grow, and capitalize on it:

      • Retaining the experience and expertise of individuals departing from critical roles supports and enhances the quality of innovation (Harvard Business Review, 2008).

      Info-Tech’s approach

      Talent Review

      Conduct a talent review to identify key roles

      Short bracket.
      Succession Planning

      Succession planning helps you assess which key roles are most at risk

      Long bracket.
      Knowledge Transfer

      Utilize methods that make it easy to apply the knowledge in day-to-day practice.

      Long bracket.
      Identify Critical Roles Assess Talent Identify Successors Develop Successors Select Successors Identify Critical Knowledge Select Transfer Methods Document Role Transition Plans

      Future-Proofed IT Team
      • Business continuity
      • The right people, in the right positions, at the right time
      • Retention due to employee development & growth
      • IT success
      • Decreased impact of sudden departures
      • Improved performance

      Info-Tech’s methodology for building an IT succession plan

      1. Talent Review 2. Succession Planning 3. Knowledge Transfer
      Phase Steps
      1. Identify critical roles
      2. Assess talent
      1. Identify successor pool
      2. Develop successors
      3. Select successors
      1. Identify critical knowledge
      2. Select knowledge transfer methods
      3. Document role transition plans
      Phase Outcomes
      • Documented business priorities
      • Identified critical roles including required skills and knowledge that support achievement of business strategy
      • Key at-risk roles identified.
      • Potential successors for key roles identified.
      • Gap assessment between key role incumbents and potential successors.
      • Critical knowledge risks identified.
      • Appropriate knowledge transfer methods selected.
      • Documented knowledge transfer initiatives for key role transition plans.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is six to ten calls over the course of four to eight months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Scope requirements, objectives, and your specific challenges. Call #2:Review business priorities and clarify criteria weighting.

      Call #3: Review key role criteria. Explain information collection process.

      Call #4: Review risk and readiness assessments.

      Call #5: Analyze gaps between key roles and successors for key considerations.

      Call #6: Feedback and recommendations on critical knowledge risks.

      Call #7: Review selected transfer methods.

      Call #8: Analyze role transition plans for flags.

      Build an IT Succession Plan

      Phase 1

      Talent Review

      Phase 1

      1.1 Identify Critical Roles

      1.2 Assess Talent

      Phase 2

      2.1 Identify Successors

      2.2 Develop Successors

      2.3 Select Successors

      Phase 3

      3.1 Identify Critical Knowledge

      3.2 Select Transfer Methods

      3.3 Document Role Transition Plan

      This phase will walk you through:

      • Identifying your business priorities
      • Identifying your critical roles including required skills and knowledge that support achievement of business strategy

      Tools and resources used:

      • Key Roles Succession Planning Tool
      • Key Role Profile
      • Individual Talent Profile
      • Critical Role Identifier

      This phase involves the following participants:

      • IT leadership/management team
      • HR

      Conduct a talent review to identify key roles

      Sixty percent of organizations have not engaged in formal workforce planning, so they don’t know what skills they need or what their key roles truly are. (Source: McLean & Company, 2013; N=139)
      1. A talent review ensures that each work unit has the right people, in the right place, at the right time to successfully execute the business strategy.
      2. Only 40% of organizations have engaged in some form of workforce planning.
      3. The first step is to identify your business focus; with this information you can start to note the key roles that drive your business strategy.

      Key roles

      Where an organization’s most valued skills and knowledge reside

      Organizations should prepare now to mitigate the risk of loss later.

      Key roles are:

      • Held by the most senior people in the organization, who carry the bulk of leadership and decision-making responsibility.
      • Highly technical or specialized, and therefore difficult to replace.
      • Tied closely to unique or proprietary processes or possess knowledge that cannot be procured externally.
      • Critical to the continuation of business and cannot be left vacant without risking business operations.

      Info-Tech Insight

      Losing employees in key roles without adequate preparation for their departure has a direct impact on the bottom line in terms of disrupted productivity, lost knowledge, severed relationships, and missed opportunities.

      A tree of key roles, starting with CEO and branching down.

      Identifying key roles is the first step in a range of workforce management activities because it helps establish organizational needs and priorities, as well as focusing planning effort.

      A talent review allows you to identify the knowledge and skills you need today and for the long term.

      Knowing what you need is the first step in determining what you have and what you need to keep.

      • A talent review is an analytic planning process used to ensure a work unit has the right people, in the right place, at the right time, and for the right cost in order to successfully execute its business strategy. It allows organizations to:
      • Evaluate workforce demographics, review skills, and conduct position inventories.
      • Evaluate business continuity risk from a talent perspective by identifying potential workforce shortages.
      • Identify critical positions, critical skills for each position, and percentage of critical workers retiring to assess the potential impact of losing them.
      • Look at the effect of loss on new product development, revenues, costs, and business strategic objectives.

      Caution

      A talent review is a high-level planning process which does not take individual employees into consideration. Succession planning looks at individuals and will be discussed in Phase 2.

      A talent review gets you to think in terms of:

      • Where your organization wants to be in five years.
      • What skills the organization needs to meet business goals between now and then.
      • How it can be best positioned for the longer-term future.

      Note: Planning against a time frame longer than five years is difficult because uncertainty in the external business environment will have unforeseen effects. Revisit your plan annually and update it, considering changes.

      Step 1.1

      Identify critical roles

      Activities
      • 1.1.1 Document Business Priorities, Goals, and Challenges
      • 1.1.2 Clarify Key Role Criteria and Weighting
      • 1.1.3 Evaluate Role Importance
      • 1.1.4 Key Role Selection and Comparison
      • 1.1.5 Capture Key Elements of Critical Roles

      The primary goal of this step is to ensure we have effectively identified key roles based on business priorities, goals, and challenges, and to capture the key elements of critical roles.

      Outcomes of this step

      • Documented business priorities, goals, and challenges.
      • Key elements of critical roles captured.
      • Key role criteria and weighting.
      Talent Review
      Step 1.1 Step 1.2

      Business priorities will determine the knowledge and skills you value most

      Venn diagram of business priorities: 'Customer Focus', 'Operational Focus', and 'Product Focus'.
      Note: Most organizations will be a blend of all three, with one predominating
      “I’ve been in the position where the business assumes everyone knows what is required. It’s not until you get people into a room that it becomes clear there is misalignment. It all seems very intuitive but in a lot of cases they haven’t made the critical distinctions regarding what exactly the competencies are. They haven’t spent the time figuring out what they know.” (Anne Roberts, Principal, Leadership Within Inc.)

      1.1.1 Document business priorities

      Input: Business strategic plan

      Output: Completed workforce planning worksheet (Tab 2) of the Key Roles Succession Planning Tool

      Materials: Key Roles Succession Planning Tool

      Participants: IT leadership

      Start by identifying your business priorities based on your strategic plan. The goal of this exercise is to blast away assumptions and make sure leadership has a common understanding of your target.

      With the questions on the previous slide in mind document your business priorities, business goals, and business challenges in Tab 2 of the Key Roles Succession Planning Tool worksheet.

      Get clear answers to these questions:

      • Are we customer focused, product focused, or operationally focused? In other words, is your organization known for:
        • Great customer service or a great customer experience?
        • The lowest price?
        • Having the latest technology, or the best quality product?
      • What are our organizational/departmental business goals? To improve operational effectiveness, are we really talking about reducing operational costs?
      • What are the key business challenges to address within the context of our focus?

      Key Roles Succession Planning Tool

      Clarify what defines a key role

      A key role is crucial to achieving organizational objectives, drives business performance, and includes specialized and rare competencies. Key roles are high in strategic value and rarity – for example, the developer role for a tech company.
      Chart with axes 'Rarity' and 'Strategic Value'. Lowest in both are 'Supporting Roles', Highest in both are 'Critical Roles', and the space in the middle are 'Core Roles'. Look at two dimensions when examining roles:
      • Strategic value refers to the importance of the role in keeping the organization functioning and executing on the strategic objectives.
      • Rarity refers to how difficult it is to find and develop the competencies in the role.

      Info-tech insight

      Traditionally, succession planning has only addressed top management roles. However, until you look at the evidence, you won’t know if these are indeed high-value roles, and you may be missing other critical roles further down the hierarchy.

      Use the Critical Role Identifier to facilitate the identification of critical roles with your leaders.

      1.1.2 Clarify key role criteria & weighting

      Input: Business strategic plan

      Output: Weighted criteria to help identify critical roles

      Materials: Critical Role Identifier

      Participants: IT leadership

      1. Using Tab 2 of the Critical Role Identifier tool, along with the information on the previous slide, determine the relative importance of four criteria as contributing to the importance of a role within the organization.
      2. Rate each of the four criteria: strategic value, rarity, revenue generation, business/operation continuity, and any custom criteria numerically. You might choose only one or two criteria – they all do not need to be included.
      3. Document your decisions in Tab 2 of the Critical Role Identifier.

      Critical Role Identifier

      1.1.3 Evaluate role importance

      Input: List of IT roles

      Output: Full list of roles and a populated Critical Role Selection sheet (Tab 4)

      Materials: Critical Role Identifier

      Participants: IT leadership

      1. Using Tab 3 of the Critical Role Identifier, collect information about IT roles.
      2. Start by listing each role under consideration, and its department or subcategory.
      3. For each criteria statement listed across the top of the sheet, select an option from the drop-down menu to reflect the appropriate answer scale rating. Replace the text in grey with information customized to your team. If criteria has a weighting of zero in Tab 2, the questions associated with that criteria will be greyed out and do not have to be answered.

      Critical Role Identifier

      Identify the key roles that support and drive your business priorities

      Focus on key IT roles instead of all roles to save time and concentrate effort on your highest risk areas.

      Key Roles include:

      • Strategic Roles: Roles that give the greatest competitive advantage. Often these are roles that involve decision-making responsibility.
      • Core Roles: Roles that must provide consistent results to achieve business goals.
      • Proprietary Roles: Roles that are tied closely to unique or proprietary internal processes or knowledge that cannot be procured externally. These are often highly technical or specialized.
      • Required Roles: Roles that support the department and are required to keep it moving forward day-to-day.
      • Influential Roles: Positions filled by employees who are the backbone of the organization, the go-to people who are the corporate culture.
      Ask these questions to identify key roles:
      1. What are the roles that have a significant impact on delivering the business strategy?
      2. What are the key differentiating roles for our organization?
      3. Which roles, if vacant, would leave the organization open to non-compliance with regulatory or legal requirements?
      4. Which roles have a direct impact on the customer?
      5. Which roles, if vacant, would create system, function, or process failure for the organization?

      1.1.4 Key role selection and comparison

      Input: Tab 3 of the Critical Role Identifier

      Output: List of roles from highest to lowest criticality score, List of key roles entered in Tab 2 of the Key Roles Succession Planning Tool

      Materials: Critical Role Identifier, Key Roles Succession Planning Tool

      Participants: IT leadership

      1. Using tab 4 of the Critical Role Identifier, which displays the results of the role importance evaluation, review the weighted criticality score. To add or remove roles or departments make changes on Tab 3.
      2. Use this table to see the scores and roles from highest to lowest based on your weightings and scoring.
      3. In column J, classify the roles as critical, core, or supporting based on the weighted overall score and the individual criteria scores.
        1. Critical – is crucial to achieving organizational objectives, drives business performance, and includes specialized and rare skills.
        2. Core – is related to operational excellence. Highly strategically valuable but easy to find or develop.
        3. Supporting – is important in keeping business functioning; however, the strategic value is low. Competencies are easy to develop.
      4. Once you’ve selected the key roles, transfer them into Tab 2 of the Key Roles Succession Planning Tool worksheet where you have documented your business priorities.

      Critical Role Identifier

      Key Roles Succession Planning Tool

      1.1.5 Capture key elements of critical roles

      Input: Job descriptions, Success profiles, Competency profiles

      Output: List of required skills and knowledge for key roles, Role profiles documented for key roles

      Materials: Key Roles Succession Planning Tool, Role Profile Template

      Participants: IT leadership

      1. Document the minimum requirements for critical roles in column E and F of Tab 2 of the Key Roles Succession Planning Tool. Include elements that drive talent decisions, are measurable, and are oriented to future organizational needs.
      2. Consider how leadership competencies and technical skills tie to business expansion plans, new service offerings, etc.
      3. Use the Role Profile Template to help in this process and to maintain up-to-date information.
      4. Role profiles may be informed by existing job descriptions, success profiles, or competency profiles.
      5. Conduct regular maintenance on your role profiles. Outdated and inaccurate role-related information can make succession planning efforts ineffective.

      Key Roles Succession Planning Tool

      Role Profile Template

      Case Study

      Conduct a “sanity check” by walking through a checklist of all roles to ensure you haven’t missed anything.
      INDUSTRY
      Large Provincial Hospital
      SOURCE
      Payroll Manager
      Challenge
      • Key roles may not be what you think they are.
      • The Payroll Manager of a large Provincial hospital, with 20-year tenure, announced her retirement.
      • Throughout her tenure, this employee took on many tasks outside the scope of her role, including pension calculations/filings and other finance-related tasks that required a high level of specialized knowledge of internal systems.
      Solution
      • Little time or effort was placed on fully understanding what she did day-to-day.
      • Furthermore, the search for a replacement was left far too late, which meant that she vacated the role without training a replacement.
      • Low level roles can become critical to business continuation if they’re occupied by only one person, creating a “single point of failure” if they become vacant.
      Results
      • It wasn’t until after she left that it became obvious how much extra work she was doing, which made it nearly impossible to find a replacement.
      • Her manager found a replacement to take the payroll duties but had to distribute the other duties to colleagues (who were very unhappy about the extra tasks).
      • This role may not seem like a “key role,” but the incumbent turned it into one. Keep tabs on what people are working on to avoid overly nuanced role requirements.

      Step 1.2

      Assess talent

      Activities
      • 1.2.1 Identify Current Incumbents’ Information
      • 1.2.2 Identify Potential Successors and Collect Information

      The primary goal of this step is to assess departmental talent and identify gaps between potential successors and key roles. This analysis is intended to support departmental access to suitable talent ensuring future business success.

      Outcomes of this step

      • Collection of current incumbents’ information.
      • Collection of potential successor information.
      • Gap assessment.

      Talent Review

      Step 1.1 Step 1.2

      Find out key role incumbents’ career plans

      Have career discussions with key role incumbents

      • Do not ask employees directly about their retirement plans as this can be misconstrued as age discrimination – let them take the initiative.
      • To take the spotlight away from older workers and potential feelings of discrimination, supervisors should be having these discussions with their employees at least annually.
      • Having this discussion creates an opportunity for employees to share their retirement plans, if they have any.
      • Warning: This is not the time to make promises about the future. For example, alternative work arrangements cannot be guaranteed without further analysis and planning.
      Do the following:
      1. Book a meeting with employees and ask them to prepare for a career development discussion.
      2. Ask direct questions about motivation, lifestyle preferences, and passions.
      3. Spend the time to understand your employees’ goals and their development needs.
      If an employee discloses that they plan to leave within the next few years:
      1. Gather information about approximate exit dates (non-binding).
      2. Find out their opinions about how they would like to transition out of their role, including any alternative work arrangements they would like to pursue.

      Potential questions to ask during career discussions with key role incumbents

      • Where do you see yourself in five years?
      • What role would you see yourself in after this one?
      • What gets you excited about coming to work?
      • Describe your greatest strengths. How would you like to use those strengths in the future?
      • What is standing in the way of your career goals?
      ** Do not ask employees directly about their retirement plans as this can be misconstrued as age discrimination – let them take the initiative.**
      Stock photo of a smiling employee with grey hair.

      1.2.1 Identify current incumbents' information

      Input: Key roles list, Employee information

      Output: List of key roles with individual incumbent information

      Materials: Key Roles Succession Planning Tool – Succession Plan Worksheet (Tab 3)

      Participants: IT leadership/management team, HR, Current incumbents if necessary

      Identify current incumbents for all key roles and collect information about them.

      Using Tab 3 of the Key Roles Succession Planning Tool identify the incumbent (the person currently in the role) for all key roles.

      Distribute the worksheet to department managers and team leaders to complete the information below for each key role.

      For that incumbent, also document:

      1. Their time in that role.
      2. Their overall performance in current role (does not meet, meets, or exceeds expectations).
      3. Next step in career (target role or retirement).
      4. Time until exit from the current role (known or estimated).
      5. Development needs for next step in career.
      6. Any additional knowledge and skills they possess beyond the role description that is of value to the organization.

      Upon completion, managers and team leaders should review the results with the department leader.

      Key Roles Succession Planning Tool

      Identify potential successors for all key roles

      It’s imperative that multiple sources of information are used to ensure no potential successor is missed and to gain a complete candidate picture.

      Work collaboratively with the management team and HR business partners for names of potential successors.

      The management team includes:

      • The incumbent’s direct supervisor.
      • Managers from the department in which the key role exists.
      • Leaders of teams with which potential successors have worked.
      • The key role incumbent (assuming it’s appropriate to do so).

      Use management roundtable discussions to identify and analyze each potential successor.

      • Participants should come equipped with names of potential successors and be prepared to provide a rationale for their recommendation.
      • Provide all participants with the key role job description in advance of the meeting, including responsibilities and required knowledge and skills.

      Don’t confuse successors with high potentials!

      • Identifying high potential employees involves recognizing those employees who consistently outperform their peers, progress more quickly than their peers, and live the company culture. They are usually striving for leadership roles.
      • While you also want your successors to exemplify these qualities of excellence, succession planning is specifically about identifying the employees who currently possess (or soon will possess) the skills and knowledge required to take over a key role.
      • Remember: Key roles are not limited to leadership roles, so cast a wider net when identifying succession candidates.
      See the following slide for sources of information participants should consult to back up their recommendations and vet succession candidates.

      Determine how employees will be identified for talent assessment

      Description Advice
      Management-nominated employees
      • Managers or skip-level leaders nominate potential successors within or outside their team.
      • Limit bias by requiring management nominations to be based on specific evidence of performance and potential.
      High-potential employees (HiPos)
      • Consider employees who are in an existing high-potential program.
      • Determine whether the HiPo program sufficiently assesses for critical role requirements. Successors must possess the skills and knowledge required for specific critical roles. Expand assessment beyond just HiPo.
      Self-nominated employees
      • Employees are informed about succession planning and asked to indicate their interest in critical roles.
      • Train managers to support the program and to handle difficult conversations (e.g. employee submitted self-nomination and was unsuccessful).
      All employees
      • All employees across a division, geography, function, or leadership level are invited for assessment.
      • While less common, this approach is appropriate for highly inclusive cultures. Be prepared to invest significantly more time and resources.
      When identifying employees, keep the following advice in mind:

      Widen the net

      Don’t limit yourself to the next level down or the same functional group.

      Match transparency

      With less transparency, there are fewer options, and you risk missing out on potential successors.

      Select the appropriate talent assessment methods

      Identify all talent assessment types used in your organization and examine their ability to inform decision-making for critical role assignments. Select multiple sources to ensure a robust talent assessment approach:

      A sound talent assessment methodology will involve both quantitative and qualitative components. Multiple data inputs and perspectives will help ensure relevant information is prioritized and suitable candidates aren’t overlooked.

      However, beware that too many inputs may slow down the process and frustrate managers.

      Beware of biases in talent assessments. A common tendency is for people to recommend successors who are exactly like them or who they like personally, not necessarily the best person for the job. HR must (diplomatically) challenge leaders to use evidence-based assessments.

      Good Successor Information Sources

      • 360-Degree Feedback – (breadth and accuracy)
      • HR-led Interviews – (objectivity and confirmation)
      • Talent Review Meetings – (leadership input)
      • Stretch Assignments – (challenge comfort zones)
      • Competency-Based Aptitude Tests – (objective data)
      • Job Simulations – (real-life testing)
      • Recent Performance Evaluations – (predictor of future performance)

      Prepare to customize the Individual Talent Profile Template

      Ensure the role profile and individual talent profile are synchronized to enable comparing employee qualifications and readiness to critical role requirements. Sample of the Role Profile.

      Role Profile

      A role profile contains information on the skills, competencies, and other minimum requirements for the critical role. It details the type of incumbent that would fit a critical role.
      Stock image of a chain link.

      Use both in conjunction during:

      • Talent assessment
      • Successor identification
      • Successor development
      • Successor selection
      Sample the Individual Talent Profile.

      Individual Talent Profile

      A talent profile provides information about a person. In addition to responding to role profile criteria, it provides information on an employee’s past experiences and performance, career aspirations, and future potential.

      1.2.2 Identify Potential Successors’ Information

      Input: Key roles list, Employee information, Completed role profiles and/or Tab 2 role information.

      Output: List of potential successors for key roles that are selected for talent assessment

      Materials: Key Roles Succession Planning Tool – Succession Plan Worksheet (Tab 3)

      Participants: IT leadership, IT team leads, Employees

      Identify potential successors for key roles and collect critical information.

      Have managers and team leads complete column I on Tab 3 of the Key Roles Succession Planning Tool and review with the department leader.

      There may be more than one potential successor for key roles; this is okay.

      Once the list is compiled, complete an individual talent profile for each potential successor. Record an employee’s:

      1. Employee information
      2. Career goals
      3. Experience and education
      4. Achievements
      5. Competencies
      6. Performance
      7. Any assessment results

      Once the profiles are completed, they can be compared to the role profile to identify development needs.

      Key Roles Succession Planning Tool

      Individual Talent Profile Template

      Build an IT Succession Plan

      Phase 2

      Succession Planning

      Phase 1

      1.1 Identify Critical Roles

      1.2 Assess Talent

      Phase 2

      2.1 Identify Successors

      2.2 Develop Successors

      2.3 Select Successors

      Phase 3

      3.1 Identify Critical Knowledge

      3.2 Select Transfer Methods

      3.3 Document Role Transition Plan

      This phase will walk you through how to:

      • Conduct an assessment to identify “at risk” key role incumbents.
      • Identify potential successors for key roles and collect critical information.
      • Assess gaps between key role incumbents and potential successors.

      Tools and resources used:

      • Key Roles Succession Planning Tool
      • Key Role Profile
      • Individual Talent Profile

      This phase involves the following participants:

      • IT leadership/management team
      • HR

      Succession planning helps you assess which key roles are most at risk

      Drilling down to the incumbent and successor level introduces “real life,” individual-focused factors that have a major impact on role-related risk.

      Succession planning is an organizational process for identifying and developing talent internally to fill key business roles. It allows organizations to:

      • Understand the career plans of employees to allow organizations to plan more accurately.
      • Identify suitable successors for key roles and assess their readiness.
      • Mitigate risks to long-term business continuity and growth.
      • Avoid external replacement costs including headhunting and recruitment, HR administration, and productivity loss.
      • Retain internal tacit knowledge.
      • Increase engagement and retention; keeping talented people reinforces career path opportunities and builds team culture.

      Caution:

      Where the talent review was about high-level strategic planning for talent requirements, succession planning looks at individual employees and plans for which employees will fulfill which key roles next.
      “I ask the questions, What are the risks we have with these particular roles? Is there a way to disperse this knowledge to other members of the group? If yes, then how do we do that?” (Director of HR, Service Industry)

      Succession planning ultimately must drill down to individual people – namely, the incumbent and potential successors.

      This is because individual human beings possess a unique knowledge and skill set, along with their own personal aspirations and life circumstances.

      The risks associated with a key role are theoretical. When people are introduced into the equation, the “real life” risk of loss for that key role can change dramatically.

      Succession Planning

      Funnel titled 'Succession Planning' with 'Critical Roles' at the top of the funnel, 'Critical Knowledge and Skills' as the middle of the funnel, 'Individuals' as the bottom of the funnel, and it drains into 'Incumbent's Potential Successors'.

      Step 2.1

      Identify Successors

      Activities
      • 2.1.1 Conduct Individual Risk Assessment
      • 2.1.2 Successor Readiness Assessment

      This step highlights the relative positioning of all employees assessed for departure risk compared to the potential successors’ readiness, identifying gaps that create risk for the organization, and need mitigation strategies.

      Outcomes of this step

      • Individual risk assessment results – mitigate, manage, accept matrix.
      • Potential successor readiness ranking.
      • Determination on transparency level with successors.

      Succession Planning

      Step 2.1 Step 2.2 Step 2.3

      Decide how to obtain information on employee interest in critical roles

      Not all employees may want to be considered as part of the succession planning program. It might not fit their short- or long-term plans. Avoid misalignment and outline steps to ascertain employee interest.

      Transparency

      • Use your target transparency level to:
        • Determine the degree of employees’ participation in self-assessment.
        • Guide organization-wide and targeted messaging about succession planning (see Step 3).

      Timing

      • Ensure program-level communication has occurred before asking employees about their interests in critical roles, in order to garner more trust and engagement.
      • Decide at what point along the succession planning process (if at all) that employee’s career interests will be collected and incorporated.

      Manager accountability and resources

      • Identify resources needed for managers to conduct targeted career conversations with employees (e.g. training, communication guides, key messaging).
      • If program communication is to be implemented organization-wide, approach accordingly.

      Obtaining employee interest ensures process efficiency because:

      • Time isn’t wasted focusing on candidates who aren’t interested.
      • The assessment group is narrowed down through self-selection.

      Level-set expectations with employees:

      • Communicate that they will be considered for assessment and talent review discussions.
      • Ensure they understand that everyone assessed will not necessarily be identified or selected as a successor.

      Conduct a risk assessment

      Identify key role incumbents who may leave before you’re ready.

      Pay particular attention to those employees nearing retirement and flag them as high risk.

      Understand the impact that employee age has on key role risk. Keep the following in mind when filling out the Individual Risk Assessment of the Key Roles Succession Planning Tool. See the next slide for more details on this.

      High Risk Arrow pointing both ways vertically. Anyone 60 years of age or older, or anyone who has indicated they will be retiring within five years.
      Moderate Risk Employees in their early 50s are still many years away from retirement but have enough years remaining in their career to make a significant move to a new role outside of your organization. Furthermore, they have specialized skills making them more attractive to external organizations.
      Employees in their late 50s are likely more than five years away from retirement but are also less likely than younger employees to leave your organization for another role elsewhere. This is because of increasing personal risk in making such a move, and persistent employer unwillingness to hire older employees.
      Low Risk Technically, when it comes to succession planning for key roles held by employees over the age of 50, no one should be considered “low risk for departure.
      Pull some hard demographic data.

      Compile a report that breaks down employees into age-based demographic groups.

      Flag those over the age of 50 – they’re in the “retirement zone” and could decide to leave at any time.

      Check to see which key role incumbents fall into the “over 50” age demographic. You’ll want to shortlist these people for an individual risk assessment.

      Update this report twice a year to keep it current.

      For those people on your shortlist, gather the information that supervisors gained from the career discussions that took place. Specifically, draw out information that indicates their retirement plans.

      2.1.1 Conduct Individual Risk Assessment

      Input: Completed Succession Plan worksheet

      Output: Risk assessment of key role incumbents, understanding of which key role departures to manage, mitigate, and accept

      Materials: Key Roles Succession Planning Tool – Individual Risk Assessment (Tab 4), Key Roles Succession Planning Tool – Risk Assessment Results (Tab 5)

      Participants: IT leadership/management team

      Assign values for probability of departure and impact of departure using the Key Roles Succession Planning Tool.

      For those in key roles and those over 50, complete the Individual Risk Assessment (Tab 4) of the Key Roles Succession Planning Tool:

      1. Assess each key role incumbent’s probability of departure based on your knowledge. If the person is going to another job, is a known flight risk, or faces dismissal, the probability is high.
        • 0-40: Unlikely to Leave. If the employee is new to the role, highly engaged, or a high potential.
        • 41-60: Unknown. If the employee is sending mixed messages about happiness at work, or sending no messages, it may be difficult to guess.
        • 61-100: Likely to Leave. If the employee is nearing retirement, actively job searching, disengaged, or faces dismissal, then the probability of departure is high.
      2. Assess the role and the individual’s impact of departure on a scale of 1 (no impact) to 100 (devasting impact).
      3. Review the risk assessment results on tab 5 of the planning tool. The employees that appear in the mitigate quadrant are your succession planning priorities.

      Key Roles Succession Planning Tool

      Define readiness criteria for successor identification

      1. Select the types of readiness and the number of levels:

        Readiness by time horizon:

        • Successors are identified as ready based on how long it is estimated they will take to acquire the minimum requirements of the critical role.
        • Levels example: Ready Now, Ready in 1-2 Years, Ready in 3-5 Years.

        Readiness by moves:

        • Successors are identified as ready based on how many position moves they have made or how many developmental experiences they have had.
        • Levels example: Ready Now, Ready after 1 Move, Ready after 2 Moves.
      2. Create definitions for each readiness level:
        Example:

        Performance

        Potential

        Ready Now Definition: Ability to deliver in current role Requirement: Meets or exceeds expectations Definition: Ability to take on greater responsibility Requirement: Demonstrates learning agility
        The 9-box is an effective way to map performance and potential requirements and can guide management decision making in talent review and calibration sessions. See McLean & Company’s 9-Box Job Aid for more information. Sample of the 9-Box Job Aid, a 9-field matrix with axes 'Potential: Low to High' and 'Performance: Low to High'.
        “Time means nothing. If you say someone will be ready in a year, and you’ve done nothing in that year to develop them, they won’t be ready. We look at it as moves or experiences: ready now, ready in one move, ready in two moves.” (Amanda Mathieson, Senior Manager, Talent Management, Tangerine)

      2.1.2 Successor Readiness Assessment

      Input: Individual talent profiles, List of potential successors (Tab 3)

      Output: Readiness ranking for each potential successor

      Materials: Key Roles Succession Planning Tool

      Participants: IT leadership/management team

      Assign values for probability of departure and impact of departure using the Key Roles Succession Planning Tool.

      Using Tab 6 of the Key Roles Succession Planning Tool, evaluate the readiness of each potential successor that you previously identified.

      1. Enter the name, current role, and target role of each potential successor into the spreadsheet.
      2. For each employee, fill in a response from “strongly agree” to “strongly disagree” for the assessment criteria statements listed in column B of Tab 6. This will give you a readiness ranking in row 68.

      Key Roles Succession Planning Tool

      Decide if and how successors will be told about their status in the succession plan

      1. Decide if employees will be told. Be as transparent as possible. This will provide several benefits to your organization (e.g. higher engagement, retention) while managing potential risks (e.g. perception that the process is unfair, reducing motivation to perform).
      2. Decide who will tell them. Decide based on the culture of your organization; are official communications usually conveyed through the direct manager, HR, senior leaders, or steering committee?
      1. Determine how you will tell them.

        Suggested messaging to non-successors:

        • Not being identified as a successor does not mean that an employee is not valued by the organization, nor does it indicate the employee will be let go. It simply means that the organization needs a backup plan to manage risk.
        • Employees can still develop toward a critical role they are interested in, and the organization will continue to evaluate whether they can be a potential successor.
        • It is the employee’s responsibility to own their development and communicate to their manager any interest they have in critical roles.

        Suggested messaging to successors:

        • Being identified as a successor is an investment in employee development – not a guaranteed promotion.
        • Successor status may change based on changes to the critical role itself, or if performance is not on par with expectations.
        • The organization strives to be as fair and objective as possible through evidence-based assessments of performance and potential.

      Case Study

      Failing to have a career aspiration discussion with a potential successor leaves a sales director in a bind.

      INDUSTRY
      Professional Services
      SOURCE
      Confidential
      Challenge
      • A senior sales director in a medium-sized private company knew there would be a key management opportunity opening up in six months. He had one candidate in mind: a key contributor from the sales floor.
      • The sales manager assumed that the sales representative would want the management position and began planning the candidate’s required training in order to get him ready.
      Solution
      • Three months before the position opened up, the manager finally approached the representative about the opportunity, telling the representative that he was an excellent candidate for the role.
      • However, the sales representative was not interested in managing people. He wanted to come in, do a really great day’s worth of work, and then go home and be done. He already loved what he did.
      Results
      • The sales representative turned down the offer point blank, leaving the manager with less than three months to find and groom a new internal successor.
      • The manager failed on several fronts. First, he did not ask the employee about his career aspirations. Second, he did not groom a pool of potential successors for the role, affording no protection in the event that the primary candidate couldn’t or wouldn’t assume the role.

      Step 2.2

      Develop Successors

      Activities
      • 2.2.1 Outline Successor Development Process

      The primary goal of this step is to identify the steps that need to be taken to develop potential successors. Focus on training employees for their future role, not just their current one.

      Outcomes of this step

      • Identified gaps between key role exits and successor readiness.

      Succession Planning

      Step 2.1 Step 2.2 Step 2.3

      2.2.1 Outline Successor Development Process

      Input: Role profiles, Talent profiles, Talent assessments

      Output: Identified gaps between key role exits and successor readiness

      Materials: Key Roles Succession Planning Tool – Successor Identification (Tab 7)

      Participants: IT leadership/management team

      Prepare successors for their next role, not just their current one.

      Use role and talent profiles and any talent assessment results to identify gaps for development.

      1. Outline the steps involved in the individual development planning process for successors. Key steps include identifying development timeline, learning needs, learning resources and strategies, and accomplishment metrics/evidence.
      2. Identify learning elements successor development will involve based on critical role type. For example, coaching and/or mentoring, leadership training, functional skills training, or targeted experiences/projects.
      3. Select metrics with associated timelines to measure the progress of successor development plans. Establish guidelines for employee and manager accountability in developing prioritized competencies.
      4. Determine monitoring cadence of successor development plans (i.e. how often successor development plans will be tracked to ensure timely progress). Identify who will be involved in monitoring the process (e.g. steering committee).

      Info-Tech insight

      Succession planning without integrated efforts for successor development is simply replacement planning. Get successors ready for promotion by ensuring a continuously monitored and customized development plan is in place.

      Integrate knowledge transfer in the successor development process

      1

      Brainstorm ideas to encourage knowledge-sharing and transfer from incumbent to successor.

      2

      Integrate knowledge-transfer methods into the successor development process.
      Identify key knowledge areas to include:
      • Specialized technical knowledge
      • Specialized research and development processes
      • Unique design capabilities/methods/models
      • Special formulas/algorithms/techniques
      • Proprietary production processes
      • Decision-making criteria
      • Innovative sales methods
      • Knowledge about key customers
      • Relationships with key stakeholders
      • Company history and values
      Use multiple methods for effective knowledge transfer.

      Explicit knowledge is easily explained and codified, such as facts and procedures. Knowledge transfer methods tend to be more formal and one-way. For example:

      • Formal documentation of processes and best practices
      • Self-published knowledgebase
      • Formal training sessions

      Tacit knowledge accumulates over years of experience and is hard to articulate. Knowledge transfer methods are often informal and interactive. For example:

      • Mentoring and job shadowing
      • Multigenerational work teams
      • Networks and communities
      Knowledge transfer can occur via a wide range of methods that need to be selected and integrated into daily work to suit the needs of the knowledge to be transferred and of the people involved. See Phase 3 for more details on knowledge transfer.

      Step 2.3

      Select Successors

      The goal of this step is to determine how critical roles will be filled when vacancies arise.

      Outcomes of this step

      • Agreement with HR on the process to fill vacancies when key roles exit.

      Succession Planning

      Step 2.1 Step 2.2 Step 2.3

      Determine how critical roles will be filled when vacancies arise

      Choose one of two approaches to successor selection:
      • Talent review meeting:
        • Conduct a talent review meeting with functional leaders to discuss key open positions and select the right successors. Ascertain successor interest prior to the meeting, if not obtained already.
        • If multiple successors are ready now, use both role and talent profiles to arrive at a final decision.
        • If only one successor is ready now, outline steps for their promotion process. Which leaders should be involved for final approval? What is TA’s role?
      • Talent acquisition (TA) process:
        • Align with TA to implement a formal recruitment process to select the right successor (open application and interview process to talent pool).
        • Decide if a talent review meeting is required afterwards to agree on the final successor or if the interview panel will make the final decision.

      Work together with Talent Acquisition (TA) to outline special treatment of critical role vacancies. Ensure TA is aware of succession plan(s).

      Explicitly determine the level of preference for internal successors versus external hires to your TA team to ensure alignment. This will create an environment where promotion from within is customary.

      Build an IT Succession Plan

      Phase 3

      Knowledge Transfer

      Phase 1

      1.1 Identify Critical Roles

      1.2 Assess Talent

      Phase 2

      2.1 Identify Successors

      2.2 Develop Successors

      2.3 Select Successors

      Phase 3

      3.1 Identify Critical Knowledge

      3.2 Select Transfer Methods

      3.3 Document Role Transition Plan

      This phase will show you to:

      • Identify critical knowledge risks.
      • Select appropriate transfer methods.
      • Document knowledge transfer initiatives for key role transition plans.

      Tools and resources used:

      • Role Transition Plan Template

      This phase involves the following participants:

      • IT leadership/management team
      • HR
      • Incumbent & successor managers

      Mitigate risk – formalize knowledge transfer

      Use Info-Tech’s Mitigate Key IT Employee Knowledge Loss blueprint to build and implement your knowledge transfer plan.

      Effective knowledge transfer allows organizations to:
      • Maintain or improve speed and productivity by ensuring the right people have the right skills to do their jobs well.
      • Increase agility because knowledge is more evenly distributed amongst employees. Multiple people can perform a given task and no one person becomes a bottleneck.
      • Capture and sustain knowledge; creating a knowledge database provides all employees access to the information, now and in the future.
      Knowledge transfer between those in key roles and potential successors yields the highest dividends for:
      • Senior level successions.
      • External hires.
      • Senior expatriate transfers.
      • Developmental stretch assignments.
      • Internal cross-divisional transfers and promotions.
      • High organizational dependency on unique expert knowledge.
      • Critical function/project/team transitions.
      • Large scale reorganizations and mergers & acquisitions.
      (Source: Piktialis and Greenes, 2008)
      Sample of the Mitigate Key IT Employee Knowledge Loss blueprint.

      Mitigate Key IT Employee Knowledge Loss

      Knowledge transfer is complex and must be both multi-faceted and well supported

      Knowledge transfer is the capture, organization, and distribution of knowledge held by individuals to ensure that it is accessible and usable by others.

      Knowledge transfer is not stopping, learning, and returning to work. Nor is it simply implementing a document management system.  Arrow pointing right. Knowledge transfer is a wide range of methods that must be carefully selected and integrated into daily work in order to meet the needs of the knowledge to be transferred and the people involved.

      Knowledge transfer works best when the following techniques are applied

      • Use multiple methods and media to transfer the knowledge.
      • Ensure a two-way interaction between the knowledge source and recipient.
      • Support knowledge transfer with active mentoring.
      • Transfer knowledge at the point of need; that is, when it’s immediately useful.
      • Offer experience-oriented training to reinforce knowledge absorption.
      • Use a knowledge management system to permanently capture knowledge shared.
      Personalization is the key.

      Dwyer & Dwyer say that providing “insights to a particular person (or people) needing knowledge at the time of the requirement” is the difference between knowledge transfer that sticks and knowledge that is forgotten.

      “Designing a system in which the employee must interrupt his or her work to learn or obtain new knowledge is not productive. Focus on ‘teachable moments.” (Karl Kapp, “Tools and Techniques for Transferring Know-How from Boomers to Gamers”)

      Step 3.1

      Identify Critical Knowledge to Transfer

      The goal of this step is to understand what knowledge and skills much be transferred, keeping in mind the various types of knowledge.

      Outcomes of this step

      • Critical knowledge and skills for key roles documented in the Key Role Transition plans.

      Knowledge Transfer

      Step 3.1 Step 3.2 Step 3.3

      Understand what knowledge and skills must be transferred

      There are two basic types of knowledge:

      Explicit knowledge:
      Easily explained and codified, e.g. facts and procedures.
      Image of a head with gears inside. Tacit knowledge:
      Accumulates over years of experience and is hard to verbalize.
      • You should already have a good idea of what knowledge and skills are valued from the worksheets completed earlier.
      • Focus on identifying the knowledge, skills, and relationships essential to the specific incumbent in a key role and what it is he or she does to perform that key role well.
      Document critical knowledge and skills for key roles in the:

      Role Transition Plan Template

      1. Identify key knowledge areas. These include:
        • Specialized technical knowledge and research and development process.
        • Unique design capabilities/methods/models.
        • Special formulas/algorithms/techniques.
        • Proprietary production processes.
        • Decision-making criteria.
        • Innovative sales methods.
        • Knowledge about key customers.
        • Relationships with key stakeholders.
        • Company history and values.
      2. Ask questions of both sources and receivers of knowledge to help determine the best knowledge transfer methods to use.
        • What is the nature of the knowledge? Explicit or tacit?
        • Why is it important to transfer?
        • How will the knowledge be used?
        • What knowledge is critical for success?
        • How will the users find and access it?
        • How will it be maintained and remain relevant and usable?
        • What are the existing knowledge pathways or networks connecting sources to recipients?

      Step 3.2

      Select Knowledge Transfer Methods

      Activities
      • 3.2.1 Select Knowledge Transfer Methods

      This step helps you identify the knowledge transfer methods that will be the most effective, considering the knowledge or skill that needs to be transferred and the individuals involved.

      Outcomes of this step

      • Knowledge transfer methods chosen documented in the Key Role Transition Plans.

      Knowledge Transfer

      Step 3.1 Step 3.2 Step 3.3

      Knowledge transfer methods available

      Be prepared to use various methods to transfer knowledge and use them all liberally.

      The most common knowledge transfer method is simply to have a collaborative culture

      Horizontal bar chart ranking knowledge transfer methods by commonality.
      (Source: McLean & Company, 2013; N=121)

      A basic willingness for a role incumbent to share with a successor is the most powerful item in your tacit knowledge transfer toolkit.

      Formal documentation is critical for explicit knowledge sharing, yet only 40% of organizations use it.

      Rewarding and recognizing employees for doing knowledge transfer well is underutilized yet has emerged as an important reinforcing component of any effective knowledge transfer program.
      Don’t forget it!

      3.2.1 Select Knowledge Transfer Methods

      Input: Role profiles, Talent profiles

      Output: Methods for integrating knowledge transfer into day-to-day practice

      Materials: Role Transition Plan Template

      Participants: IT leadership/management team, HR, Knowledge source, Knowledge recipient

      Utilize methods that make it easy to apply the knowledge in day-to-day practice.

      Select your method according to the following criteria:

      1. The type of knowledge. A soft skill, like professionalism, is best taught via mentoring, while a technical process is best documented and applied on-the-job.
      2. What the knowledge recipient is comfortable with. The recipient may get bored during formal training sessions and retain more during job shadowing.
      3. What the knowledge source is comfortable with. The source may be uncomfortable with blogs and wikis, but comfortable with SharePoint.
      4. The cost. Some methods require an investment in time (e.g. mentoring), while others require an investment in technology (e.g. knowledge bases).
        • The good news is that many supporting technologies may already exist in your organization or can be acquired for free.
        • Methods that cost time may be difficult to get underway since employees may feel they don’t have the time or must change the way they work.

      The more integrated knowledge transfer is in day-to-day activities, the more likely it is to be successful and the lower the time cost. This is because real learning is happening at the same time real work is being accomplished.

      Document the knowledge transfer methods in the Role Transition Plan Template.

      Role Transition Plan Template

      Explore alternative work arrangements

      Ensure sufficient time to prepare successors

      If a key role incumbent isn’t around to complete knowledge transfer, it’s all for naught.

      Alternative work arrangements are critical tools that employers can use to achieve a mutually beneficial solution that mitigates the risk of loss associated with key roles.

      Alternative work arrangements not only support employees who want to keep working, but they allow the business to retain employees that are needed in key roles.

      In a survey from The Conference Board, one out of four older workers indicated that they continue to work because their company provided them with needed flexibility.

      And, nearly half said that more flexibility would make them less likely to retire. (Source: Ivey Business Journal)

      Flexible work options are the most used form of alternative work arrangement

      Horizontal bar chart ranking alternative work arrangements by usage.
      (Source: McLean & Company, N=44)

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement

      Description

      Ideal Use

      Caveats

      Flexible work options Employees work the same number of hours but have flexibility in when and where they work (e.g. from home, evenings). Employees who work fairly independently, with no or few direct reports. Employee may become isolated or disconnected, impeding knowledge transfer methods that require interaction or one-on-one time.
      Contract-based work Working for a defined period of time on a specific project on a non-salaried or non-wage basis. Project-oriented work that requires specialized knowledge or skills. Available work may be sporadic or specific projects more intensive than the employee wants. Knowledge transfer must be built into the contractual arrangement.
      Part-time roles Half-days or a certain number of days per week; indefinite with no end date in mind. Employees whose roles can be readily narrowed and upon whom people and critical processes are not dependent. It may be difficult to break a traditionally full-time job down into a part-time role given the size and nature of associated tasks.
      Graduated retirement Retiring employee has a set retirement date, gradually reducing hours worked per week over time. Roles where a successor has been identified and is available to work alongside the incumbent in an overlapping capacity while he or she learns. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      The arrangement chosen may be a combination of multiple options

      Alternative Work Arrangement

      Description

      Ideal Use

      Caveats

      Part-year jobs or job sharingWorking part of the year and having the rest of the year off, unpaid.Project-oriented work where ongoing external relationships do not need to be maintained. The employee is unavailable for knowledge transfer activities for a large portion of the year. Another risk is that the employee may opt not to return at the end of the extended time off, with little notice.
      Increased paid time offAdditional vacation days upon reaching a certain age.Best used as recognition or reward for long-term service. This may be a particularly useful retention incentive in organizations that do not offer pension plans. The company may not be able to financially afford to pay for such extensive time off. If the role incumbent is the only one in the role, this may mean crucial work is not being done.
      Altered rolesConcentration of a job description on fewer tasks that allows the employee to focus on his or her specific expertise.Roles where a successor has been identified and is available to work alongside the incumbent, with the incumbent’s new role highly focused on mentoring. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Alternative work arrangements require senior management support

      Senior management and other employees must see the value of retaining older workers, or they will not be supportive of these solutions.

      Any changes made to an employee’s work arrangement has an impact on people, processes, and policies.

      If the knowledge and skills of older employees aren’t valued, then:

      • Alternative arrangements will be seen as wasteful accommodation of a low-value employee.
      • Time won’t be allowed to manage the transition properly and make appropriate changes.
      • Other employees may resent any workload spillover.
      Alternate work arrangements can’t be implemented on a whim.

      Make sure alternative work arrangements can be done right and are supported – they’re often solutions that come with additional work. Determine the effects and make appropriate adjustments.

      • Review processes, particularly hand-off and approval points, to ensure tasks will still be handled seamlessly.
      • Assess organizational policies to ensure no violations are occurring or to rework policies (where possible) to accommodate alternative work arrangements.
      • Speak to affected employees to answer questions, identify obstacles, gain support, redefine their job descriptions if required, and make appropriate compensation adjustments. Always provide appropriate training when skills requirements are expanded.

      Step 3.3

      Document Role Transition Plans for all Key Roles

      Activities
      • 3.3.1 Document Role Transition Plans

      The primary goal of this step is to build clear checklist-based plans for each key role to help ensure a smooth transition as a successor takes over.

      Outcomes of this step

      • Completed key role transition plans

      Knowledge Transfer

      Step 3.1 Step 3.2 Step 3.3

      3.3.1 Document Role Transition Plans

      Input: Role profiles, Talent profiles, Talent assessments, Workforce plans

      Output: A clear checklist-based plan to help ensure a smooth transition.

      Materials: Role Transition Plan Template

      Participants: IT leadership/management team, Incumbent, Successor(s), HR

      Define a transition plan for all employees in at-risk key roles, and their successors.

      You should already have a good idea of what knowledge and skills are valued from the worksheets completed earlier. Focus on identifying the knowledge, skills, and relationships essential to the specific incumbent in a key role and what it is they do to perform that key role well.

      Using the Role Transition Plan Template develop a plan to transfer what needs to be transferred from the incumbent to the successor.

      1. Record the incumbent and successor information in the template.
      2. Summarize the key accountabilities and expectations of the incumbent’s role. This summary should highlight specific tasks and initiatives that the successor must take on, including success enablers. Attach the job description for a full description of accountabilities and expectations.
      3. Document the knowledge and skills requirements for the key role, as well as any additional knowledge and skills possessed by the key role incumbent that will aid the successor.
      4. Document any alternative work arrangements to the incumbent’s roles.
      5. Populate the Role Transition Checklist for key transition activities that must be completed by certain dates. A list of sample checklist items has been provided. Add, delete, or modify list items to suit your needs.

      Role Transition Plan Template

      DairyNZ leverages alternative work arrangements

      Ensures successful knowledge transfer
      INDUSTRY
      Agricultural research
      SOURCE
      Rose Macfarlane, General Manager Human Resources, DairyNZ
      Challenge
      • DairyNZ employs many people in specialized science research roles. Some very senior employees are international experts in their field.
      • Several experts have reached or are nearing retirement age. These pending retirements have come as no surprise.
      • However, due to the industry’s lack of development investment in the past, there is a 20–30-year experience gap in the organization for some key roles.
      Solution
      • One principal scientist gave over two years’ notice. His replacement – an external candidate – had been identified in advance and was hired once retirement notice was given.
      • The incumbent’s role was amended. He worked alongside his successor for 18 months in a controlled hand-over process.
      Results
      • The result was ideal in that the advance notice allowed full knowledge transfer to take place.

      Research Contributors and Experts

      Anne Roberts
      Principal, Leadership Within Inc. al,
      • Anne T. Roberts is an experienced organization development professional and executive business coach who works with leaders and their organizations to help them create, articulate and implement their change agenda. Her extensive experience in change management, organizational design, meeting design and facilitation, communication and leadership alignment has helped leaders tap into their creativity, drive and energy. Her ability to work with and coach people at the leadership level on a wide range of topics has them face their own organizational stories.
      Amanda Mathieson
      Senior Manager, Talent Management, Tangerine
      • Amanda is responsible for researching people- and leadership-focused trends, developing thought models, and providing resources, tools, and processes to build and drive the success of leaders in a disruptive world.
      • Her expertise in leadership development, organizational change management, and performance and talent management comes from her experience in various industries spanning pharmaceutical, retail insurance, and financial services. She takes a practical, experiential approach to people and leadership development that is grounded in adult learning methodologies and leadership theory. She is passionate about identifying and developing potential talent, as well as ensuring the success of leaders as they transition into more senior roles.

      Related Info-Tech Research

      Stock image of a brain. Mitigate Key IT Employee Knowledge Loss
      • Transfer IT knowledge before it’s gone.
      • Effective knowledge transfer mitigates risks from employees leaving the organization and is a key asset driving innovation and customer service.
      Stock image of sticky notes being organized on a board. Implement an IT Employee Development Plan
      • There is a growing gap between the competencies organizations have been focused on developing, and what is needed in the future.
      • Employees have been left to drive their own development, with little direction or support and without the alignment of development to organizational needs.

      Bibliography

      “Accommodating Older Workers’ Needs for Flexible Work Options.” Ivey Business Journal, July/August 2005. Accessed Jan 7, 2013.

      Christensen, Kathleen and Marcie Pitt-Catsouphes. “Approaching 65: A Survey of Baby Boomers Turning 65 Years Old”. AARP, Dec. 2010.

      Coyne, Kevin P. and Shawn T. Coyne. “The Baby Boomer Retirement Fallacy and What It Means to You. “ HBR Blog Network. Harvard Business Review, May 16, 2008. Accessed 8 Jan. 2013.

      Dwyer, Kevin and Ngoc Luong Dwyer. “Managing the Baby Boomer Brain Drain: The Impact of Generational Change on Human Resource Management.” ChangeFactory, April 2010. Accessed Jan 9, 2013.

      Gurchiek, Kathy. “Poll: Organizations Can Do More to Prepare for Talent Shortage as Boomers Retire.” SHRM, Nov 17, 2010. Accessed Jan 3, 2013.

      Howden, Daniel. “What Is Time to Fill? KPIs for Recruiters.” Workable, 24 March 2016. Web.

      Kapp, Karl M. “Tools and Techniques for Transferring Know-How from Boomers to Gamers.” Global Business and Organizational Excellence, July/August 2007. Web.

      Piktialis, Diane and Kent A. Greenes. Bridging the Gaps: How to Transfer Knowledge in Today’s Multigenerational Workplace. The Conference Board, 2008.

      Pisano, Gary P. “You need an Innovation Strategy.” Harvard Business Review, June 2015.

      Vilet, Jacque. “Lost Knowledge – What Are You and Your Organization Doing About It?” TLNT, 25 April 2012. Accessed 5 Jan. 2013.

      Assess Infrastructure Readiness for Digital Transformation

      • Buy Link or Shortcode: {j2store}300|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      There are many challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt
      • Skills and talent in the IT team
      • A culture that resists change
      • Fear of job loss

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Our Advice

      Critical Insight

      By using the framework of culture, competencies, collaboration and capabilities, organizations can create dimensions in their I&O structure in order to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence though the effective integration of people, process, and technology.

      Impact and Result

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      Assess Infrastructure Readiness for Digital Transformation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess Infrastructure Readiness for Digital Transformation – Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers for success.

    • Be customer centric as opposed to being technology driven.
    • Understanding business needs and pain points is key to delivering solutions.
    • Approach infrastructure digital transformation in iterations and look at this as a journey.
      • Assess Infrastructure Readiness for Digital Transformation Storyboard
      • I&O Digital Transformation Maturity Assessment Tool

      Infographic

      Further reading

      Assess Infrastructure Readiness for Digital Transformation

      Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers to success.

      Analyst Perspective

      It’s not just about the technology!

      Many businesses fail in their endeavors to complete a digital transformation, but the reasons are complex, and there are many ways to fail, whether it is people, process, or technology. In fact, according to many surveys, 70% of digital transformations fail, and it’s mainly down to strategy – or the lack thereof.

      A lot of organizations think of digital transformation as just an investment in technology, with no vision of what they are trying to achieve or transform. So, out of the gate, many organizations fail to undergo a meaningful transformation, change their business model, or bring about a culture of digital transformation needed to be seriously competitive in their given market.

      When it comes to I&O leaders who have been given a mandate to drive digital transformation projects, they still must align to the vision and mission of the organization; they must still train and hire staff that will be experts in their field; they must still drive process improvements and align the right technology to meet the needs of a digital transformation.

      John Donovan

      John Donovan

      Principal Research Director, I&O
      Info-Tech Research Group

      Insight summary

      Overarching insight

      Digital transformation requires I&O teams to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence through effective integration of people, process, and technology.

      Insight 1

      Collaboration is a key component of I&O – Promote strong collaboration between I&O and other business functions. When doing a digital transformation, it is clear that this is a cross-functional effort. Business leaders and IT teams need to align their objectives, prioritize initiatives, and ensure that you are seamlessly integrating technologies with the new business functions.

      Insight 2

      Embrace agility and adaptability as core principles – As the digital landscape continues to evolve, it is paramount that I&O leaders are agile and adaptable to changing business needs, adopting new technology and implementing new innovative solutions. The culture of continuous improvement and openness to experimentation and learning will assist the I&O leaders in their journey.

      Insight 3

      Future-proof your infrastructure and operations – By anticipating emerging technologies and trends, you can proactively plan and organize your team for future needs. By investing in scalable, flexible infrastructure such as cloud services, automation, AI technologies, and continuously upskilling the IT staff, you can stay relevant and forward-looking in the digital space.

      Tactical insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployment of services.

      Tactical insight

      Having a clear strategy, with leadership commitment along with hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Executive Summary

      Your Challenge

      There are a lot of challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt.
      • Skills and talent in the IT team.
      • A culture that resists change.
      • Fear of job loss.

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Common Obstacles

      Many obstacles to digital transformation begin with non-I&O activities, including:

      • Lack of a clear vision and strategy.
      • Siloed organizational structure.
      • Lack of governance and data management.
      • Limited budget and resources.

      By addressing these obstacles, I&O will have a better chance of a successful transformation and delivering the full potential of digital technologies.

      Info-Tech's Approach

      Building a culture of innovation by developing clear goals and creating a vision will be key.

      • Be customer centric as opposed to being technology driven.
      • Understand the business needs and pain points in order to effectively deliver solutions.
      • Approach infrastructure digital transformation in iterations and look at it as a journey.

      By completing the Info-Tech digital readiness questionnaire, you will see where you are in terms of maturity and areas you need to concentrate on.

      Info-Tech Insight

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      The cost of digital transformation

      The challenges that stand in the way of your success, and what is needed to reverse the risk

      What CIOs are saying about their challenges

      26% of those CIOs surveyed cite resistance to change, with entrenched viewpoints demonstrating a real need for a cultural shift to enhance the digital transformation journey.

      Source: Prophet, 2019.

      70% of digital transformation projects fall short of their objectives – even when their leadership is aligned, often with serious consequences.

      Source: BCG, 2020.

      Having a clear strategy and commitment from leadership, hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Info-Tech Insight

      Cultural change, business alignment, skills training, and setting a clear strategy with KPIs to demonstrate success are all key to being successful in your digital journey.

      Small and medium-sized enterprises

      What business owners and CEOs are saying about their digital transformation

      57% of small business owners feel they must improve their IT infrastructure to optimize their operations.

      Source: SMB Story, 2023.

      64% of CEOs believe driving digital transformation at a rapid pace is critical to attracting and retaining talent and customers.

      Source: KPMG, 2022.

      Info-Tech Insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployments.

      Generative AI: Market Primer

      • Buy Link or Shortcode: {j2store}349|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Much of the organization remains in the dark for understanding what Gen AI is, complicated by ambiguous branding from vendors claiming to provide Gen AI solutions.
      • Searching the market for a Gen AI platform is nearly impossible, owing to the sheer number of vendors.
      • The evaluative criteria for selecting a Gen AI platform are unclear.

      Our Advice

      Critical Insight

      • You cannot rush Gen AI selection and implementation. Organizations with (1) FTEs devoted to making Gen AI work (including developers and business intelligence analysts), (2) trustworthy and regularly updated data, and (3) AI governance are just now reaching PoC testing.
      • Gen AI is not a software category – it is an umbrella concept. Gen AI platforms will be built on different foundational models, be trained in different ways, and provide varying modalities. Do not expect Gen AI platforms to be compared against the same parameters in a vendor quadrant.
      • Bad data is the tip of the iceberg for Gen AI risks. While Gen AI success will be heavily reliant on the quality of data it is fine-tuned on, there are independent risks organizations must prepare for, from Gen AI hallucinations and output reliability to infrastructure feasibility and handling high-volume events.
      • Prepare for ongoing instability in the Gen AI market. If your organization is unsure about where to start with Gen AI, the secure route is to examine what your enterprise providers are offering. Use this as a learning platform to confidently navigate which specialized Gen AI provider will be viable for meeting your use cases.

      Impact and Result

      • Consensus on Gen AI scope and key Gen AI capabilities
      • Identification of your readiness to leverage Gen AI applications
      • Agreement on Gen AI evaluative criteria
      • Knowledge of vendor viability

      Generative AI: Market Primer Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Generative AI: Market Primer – Contextualize the marketspace and prepare for generative AI selection.

      Use Info-Tech’s best practices for setting out a selection roadmap and evaluative criteria for narrowing down vendors – both enterprise and specialized providers.

      • Generative AI: Market Primer Storyboard
      • Data Governance Policy
      • AI Governance Storyboard
      • AI Architecture Assessment and Project Planning Tool
      • AI Architecture Assessment and Project Planning Tool – Sample
      • AI Architecture Templates
      [infographic]

      Further reading

      Generative AI: Market Primer

      Cut through Gen AI buzzwords to achieve market clarity.

      Analyst Perspective

      The generative AI (Gen AI) marketspace is complex, nascent, and unstable.

      Organizations need to get clear on what Gen AI is, its infrastructural components, and the governance required for successful platform selection.

      Thomas Randall

      The urge to be fast-moving to leverage the potential benefits of Gen AI is understandable. There are plenty of opportunities for Gen AI to enrich an organization’s use cases – from commercial to R&D to entertainment. However, there are requisites an organization needs to get right before Gen AI can be effectively applied. Part of this is ensuring data and AI governance is well established and mature within the organization. The other part is contextualizing Gen AI to know what components of this market the organization needs to invest in.

      Owing to its popularity surge, OpenAI’s ChatGPT has become near synonymous with Gen AI. However, Gen AI is an umbrella concept that encompasses a variety of infrastructural architecture. Organizations need to ask themselves probing questions if they are looking to work with OpenAI: Does ChatGPT rest on the right foundational model for us? Does ChatGPT offer the right modalities to support our organization’s use cases? How much fine-tuning and prompt engineering will we need to perform? Do we require investment in on-premises infrastructure to support significant data processing and high-volume events? And do we require FTEs to enable all this infrastructure?

      Use this market primer to quickly get up to speed on the elements your organization might need to make the most of Gen AI.

      Thomas Randall

      Advisory Director, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Much of the organization remains in the dark for understanding what Gen AI is, complicated by ambiguous branding from vendors claiming to provide Gen AI solutions.
      • Searching the market for a Gen AI platform is near impossible, owing to the sheer number of vendors.
      • The evaluative criteria for selecting a Gen AI platform is unclear.

      Common Obstacles

      • Data governance is immature within the organization. There is no source of truth or regularly updated organizational process assets.
      • AI functionality is not well understood within the organization; there is little AI governance for monitoring and controlling its use.
      • The extent of effort and resources required to make Gen AI a success remains murky.

      Info-Tech's Solution

      This market primer for Gen AI will help you:

      1. Contextualize the Gen AI market: Learn what components of Gen AI an organization should consider to make Gen AI a success.
      2. Prepare for Gen AI selection: Use Info-Tech’s best practices for setting out a selection roadmap and evaluative criteria for narrowing down vendors – both enterprise and specialized providers.

      “We are entering the era of generative AI.
      This is a unique time in our history where the benefits of AI are easily accessible and becoming pervasive with co-pilots emerging in the major business tools we use today. The disruptive capabilities that can potentially drive dramatic benefits also introduces risks that need to be planned for.”

      Bill Wong, Principal Research Director – Data and BI, Info-Tech Research Group

      Who benefits from this project?

      This research is designed for:

      • Senior IT, developers, data staff, and project managers who:
        • Have received a mandate from their executives to begin researching the Gen AI market.
        • Need to quickly get up to speed on the state of the Gen AI market, given no deep prior knowledge of the space.
        • Require an overview of the different components to Gen AI to contextualize how vendor comparisons and selections can be made.
        • Want to gain an understanding of key trends, risks, and evaluative criteria to consider in their selection process.

      This research will help you:

      • Articulate the potential business value of Gen AI to your organization.
      • Establish which high-value use cases could be enriched by Gen AI functionality.
      • Assess vendor viability for enterprise and specialized software providers in the Gen AI marketspace.
      • Collect information on the prerequisites for implementing Gen AI functionality.
      • Develop relevant evaluative criteria to assist differentiating between shortlisted contenders.

      This research will also assist:

      • Executives, business analysts, and procurement teams who are stakeholders in:
        • Contextualizing the landscape for learning opportunities.
        • Gathering and documenting requirements.
        • Building deliverables for software selection projects.
        • Managing vendors, especially managing the relationships with incumbent enterprise software providers.

      This research will help you:

      • Identify examples of how Gen AI applications could be leveraged for your organization’s core use cases.
      • Verify the extent of Gen AI functionality an incumbent enterprise provider has.
      • Validate accuracy of Gen AI language and architecture referenced in project deliverables.

      Insight Summary

      You cannot speedrun Gen AI selection and implementation.

      Organizations with (1) FTEs devoted to making Gen AI work (including developers and business intelligence analysts), (2) trustworthy and regularly updated data, and (3) AI governance are just now reaching PoC testing.

      Gen AI is not a software category – it is an umbrella concept.

      Gen AI platforms will be built on different foundational models, be trained in different ways, and provide varying modalities. Do not expect to compare Gen AI platforms to the same parameters in a vendor quadrant.

      Bad data is the tip of the iceberg for Gen AI risks.

      While Gen AI success will be heavily reliant on the quality of data it is fine-tuned on, there are independent risks organizations must prepare for: from Gen AI hallucinations and output reliability to infrastructure feasibility to handle high-volume events.

      Gen AI use may require changes to sales incentives.

      If you plan to use Gen AI in a commercial setting, review your sales team’s KPIs. They are rewarded for sales velocity; if they are the human-in-the-loop to check for hallucinations, you must change incentives to ensure quality management.

      Prepare for ongoing instability in the Gen AI market.

      If your organization is unsure about where to start with Gen AI, the secure route is to examine what your enterprise providers are offering. Use this as a learning platform to confidently navigate which specialized Gen AI provider will be viable for meeting your use cases.

      Brace for a potential return of on-premises infrastructure to power Gen AI.

      The market trend has been for organizations to move to cloud-based products. Yet, for Gen AI, effective data processing and fine-tuning may call for organizations to invest in on-premises infrastructure (such as more GPUs) to enable their Gen AI to function effectively.

      Info-Tech’s methodology for understanding the Gen AI marketspace

      Phase Steps

      1. Contextualize the Gen AI marketplace

      1. Define Gen AI and its components.
      2. Explore Gen AI trends.
      3. Begin deriving Gen AI initiatives that align with business capabilities.

      2. Prepare for and understand Gen AI platform offerings

      1. Review Gen AI selection best practices and requisites for effective procurement.
      2. Determine evaluative criteria for Gen AI solutions.
      3. Explore Gen AI offerings with enterprise and specialized providers.
      Phase Outcomes
      1. Achieve consensus on Gen AI scope and key Gen AI capabilities.
      2. Identify your readiness to leverage Gen AI applications.
      3. Hand off to Build Your Generative AI Roadmap to complete pre-requisites for selection.
      1. Determine whether deeper data and AI governance is required; if so, hand off to Create an Architecture for AI.
      2. Gain consensus on Gen AI evaluative criteria.
      3. Understand vendor viability.

      Guided Implementation

      Phase 1

      Phase 2

      • Call #1: Discover if Gen AI is right for your organization. Understand what a Gen AI platform is and discover the art of the possible.
      • Call #2: To take advantage of Gen AI, perform a business capabilities analysis to begin deriving Gen AI initiatives.
      • Call #3: Explore whether Gen AI initiatives can be achieved either with incumbent enterprise players or via procurement of specialized solutions.
      • Call #4: Evaluate vendors and perform final due diligence.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The Gen AI market evaluation process should be broken into segments:

      1. Gen AI market education with this primer
      2. Structured approach to selection
      3. Evaluation and final due diligence

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful"

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Software selection engagement

      Five advisory calls over a five-week period to accelerate your selection process

      • Receive expert analyst guidance over five weeks (on average) to select and negotiate software.
      • Save money, align stakeholders, speed up the process, and make better decisions.
      • Use a repeatable, formal methodology to improve your application selection process.
      • Get better, faster results guaranteed, included in membership.
      Software selection process timeline. Week 1: Awareness - 1 hour call, Week 2: Education & Discovery - 1 hour call, Week 3: Evaluation - 1 hour call, Week 4: Selection - 1 hour call, Week 5: Negotiation & Configuration - 1 hour call.

      Click here to book your selection engagement.

      Software selection workshops

      40 hours of advisory assistance delivered online.

      Select better software, faster.

      • 40 hours of expert analyst guidance
      • Project and stakeholder management assistance
      • Save money, align stakeholders, speed up the process, and make better decisions
      • Better, faster results guaranteed; 25K standard engagement fee
      Software selection process timeline. Week 1: Awareness - 5 hours of Assistance, Week 2: Education & Discovery - 10 hours of assistance, Week 3: Evaluation - 10 hours of assistance, Week 4: Selection - 10 hours of assistance, Week 5: Negotiation & Configuration - 10 hours of assistance.

      Click here to book your workshop engagement.

      IBM i Migration Considerations

      • Buy Link or Shortcode: {j2store}109|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      IBM i remains a vital platform and now many CIOs, CTOs, and IT leaders are faced with the same IBM i challenges regardless of industry focus: how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?

      Our Advice

      Critical Insight

      For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more pro-active in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.

      Impact and Result

      The most common tactic is for the organization to better understand their IBM i options and adopt some level of outsourcing for the non-commodity platform retaining the application support/development in-house. To make the evident, obvious; the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed and public cloud services.

      IBM i Migration Considerations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. IBM i Migration Considerations – A brief deck that outlines key migration options for the IBM i platforms.

      This project will help you evaluate the future viability of this platform; assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of this platform for your organization.

      • IBM i Migration Considerations Storyboard

      2. Infrastructure Outsourcing IBM i Scoring Tool – A tool to collect vendor responses and score each vendor.

      Use this scoring sheet to help you define and evaluate IBM i vendor responses.

      • Infrastructure Outsourcing IBM i Scoring Tool
      [infographic]

      Further reading

      IBM i Migration Considerations

      Don’t be overwhelmed by IBM i migration options.

      Executive Summary

      Your Challenge

      IBM i remains a vital platform and now many CIO, CTO, and IT leaders are faced with the same IBM i challenges regardless of industry focus; how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?

      Common Obstacles

      For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more proactive in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.

      Info-Tech Approach

      The most common tactic is for the organization to better understand its IBM i options and adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed hosting, and public cloud services.

      Info-Tech Insight

      “For over twenty years, IBM was ‘king,’ dominating the large computer market. By the 1980s, the world had woken up to the fact that the IBM mainframe was expensive and difficult, taking a long time and a lot of work to get anything done. Eager for a new solution, tech professionals turned to the brave new concept of distributed systems for a more efficient alternative. On June 21, 1988, IBM announced the launch of the AS/400, their answer to distributed computing.” (Dale Perkins)

      Review

      We help IT leaders make the most of their IBM i environment.

      Problem Statement:

      The IBM i remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap.

      This research is designed for:

      • IT strategic direction decision makers
      • IT managers responsible for an existing iSeries or IBM i platform
      • Organizations evaluating platforms for mission-critical applications

      This research will help you:

      1. Evaluate the future viability of this platform.
      2. Assess the fit, purpose, and price.
      3. Develop strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      The “fit for purpose” plot

      Thought Model

      We will investigate the aspect of different IBM i scenarios as they impact business, what that means, and how that can guide the questions that you are asking as you move to an aligned IBM i IT strategy. Our model considers:

      • Importance to Business Outcomes
        • Important to strategic objectives
        • Provides competitive advantage
        • Non-commodity IT service or process
        • Specialized in-house knowledge required
      • Vendor’s Performance Advantage
        • Talent or access to skills
        • Economies of scale or lower cost at scale
        • Access to technology

      Info-Tech Insights

      With multiple control points to be addressed, care must be taken in simplifying your options while addressing all concerns to ease operational load.

      Map different 'IBM i' scenarios with axes 'Importance to Business Outcomes - Low to High' and 'Vendor’s Performance Advantage - Low to High'. Quadrant labels are '[LI/LA] Potentially Outsource: Service management, Help desk, desk-side support, Asset management', '[LI/HA] Outsource: Application & Infra Support, Web Hosting, SAP Support, Email Services, Infrastructure', '[HI/LA] Insource (For Now): Application development tech support', and '[HI/HA] Potentially Outsource: Onshore or offshore application maintenance'.

      IBM i environments are challenging

      “The IBM i Reality” – Darin Stahl

      Most members relying on business applications/workloads running on non-commodity platforms (zSeries, IBM i, Solaris, AIX, etc.) are first motivated to get out from under the perceived higher costs for the hardware platform.

      An additional challenge for non-commodity platforms is that from an IT Operations Management perspective they become an island with a diminishing number of integrated operations skills and solutions such as backup/restore and monitoring tools.

      The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support and development in-house.

      Key challenges with current IBM i environments:
      1. DR Requirements
        Understand what the business needs are and where users and resources are located.
      2. Market Lack of Expertise
        Skilled team members are hard to find.
      3. Cost Management
        There is a perceived cost disadvantage to managing on-prem solutions.
      4. Aging Support Teams
        Current support teams are aging with little backfill in skill and experience.

      Understand your options

      Co-Location

      A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.”

      Onsite Outsourcing

      A provider will support the hardware/system environment at the client’s site.

      Managed Hosting

      A customer transitions their legacy application environment to an off-prem hosted, multi-tenanted environment.

      Public Cloud

      A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.”

      Co-Location

      Provider manages the data center hardware environment.

      Abstract

      Here a provider manages the system data center environment and hardware; however, the client’s in-house IBM i team manages the IBM i hardware environment and the system applications. The client manages all of the licenses associated with the platform as well as the hardware asset management considerations. This is typically part of a larger services or application transformation. This effectively outsources the data center management while maintaining all IBM i technical operations in-house.

      Advantages

      • On-demand bandwidth
      • Cost effective
      • Secure and compliant environment
      • On-demand remote “hands and feet” services
      • Improved IT DR services
      • Data center compliance

      Considerations

      • Application transformation
      • CapEx cost
      • Fluctuating network bandwidth costs
      • Secure connectivity
      • Disaster recovery and availability of vendor
      • Company IT DR and BC planning
      • Remote system maintenance (HW)

      Info-Tech Insights

      This model is extremely attractive for organizations looking to reduce their data center management footprint. Idea for the SMB.

      Onsite Sourcing

      A provider will support the hardware/system environment at the client’s site.

      Abstract

      Here a provider will support and manage the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models.

      Advantages

      • Managed environment within company premises
      • Cost effective (OpEx expense)
      • Economies of scale
      • On-demand “as-a-service” model
      • Improved IT DR staffing services
      • 24x7 monitoring and support

      Considerations

      • Outsourced IT talent
      • Terms and contract conditions
      • IT staff attrition
      • Increased liability
      • Modified technical support and engagement
      • Secure connectivity and communication
      • Internal problem and change management

      Info-Tech Insights

      Depending on the application lifecycle and viability, in-house skill and technical depth is a key consideration when developing your IBM i strategy.

      Managed Hosting

      Transition legacy application environment to an off-prem hosted multi-tenanted environment.

      Abstract

      This type of arrangement is typically part of an application migration or transformation. In this model, a client can “re-platform” the application into an off-premises-hosted provider platform. This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

      Advantages

      • Turns CapEx into OpEx
      • Reduces in-house need for diminishing or scarce human resources
      • Allows the enterprise to focus on the value of the IBM i platform through the reduction of system administrative toil
      • Improved IT DR services
      • Data center compliance

      Considerations

      • Application transformation
      • Network bandwidth
      • Contract terms and conditions
      • Modified technical support and engagement
      • Secure connectivity and communication
      • Technical security and compliance
      • Limited providers; reduced options

      Info-Tech Insights

      There is a difference between a “re-host” and “re-platform” migration strategy. Determine which solution aligns to the application requirements.

      Public Cloud

      Leverage “public cloud” alternatives with AWS, Google, or Microsoft AZURE.

      Abstract

      This type of arrangement is typically part of a larger migration or application transformation. While low risk, it is not as cost-effective as other deployment models. In this model, client can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux).

      Advantages

      • Remote workforce accessibility
      • OpEx expense model
      • Improved IT DR services
      • Reduced infrastructure and system administration
      • Vendor management
      • 24x7 monitoring and support

      Considerations

      • Contract terms and conditions
      • Modified technical support and engagement
      • Secure connectivity and communication
      • Technical security and compliance
      • Limited providers; reduced options
      • Vendor/cloud lock-in
      • Application migration/”re-platform”
      • Application and system performance

      Info-Tech Insights

      This model is extremely attractive for organizations that consume primarily cloud services and have a large remote workforce.

      Understand your vendors

      • To best understand your options, you need to understand what IBM i services are provided by the industry vendors.
      • Within the following slides, you will find a defined activity with a working template that will create “vendor profiles” for each vendor.
      • As a working example, you can review the following partners:
      • Connectria (United States)
      • Rowton IT Solutions Ltd (United Kingdom)
      • Mid-Range (Canada)

      Info-Tech Insights

      Creating vendor profiles will help quickly filter the solution providers that directly meet your IBM i needs.

      Vendor Profile #1

      Rowton IT

      Summary of Vendor

      “Rowton IT thrive on creating robust and simple solutions to today's complex IT problems. We have a highly skilled and motivated workforce that will guarantee the right solution.

      Working with select business partners, we can offer competitive and cost effective packages tailored to suit your budget and/or business requirements.

      Our knowledge and experience cover vast areas of IT including technical design, provision and installation of hardware (Wintel and IBM Midrange), technical engineering services, support services, IT project management, application testing, documentation and training.”

      IBM i Services

      • ✔ IBM Power Hardware Sales
      • ✔ Co-Managed Services
      • ✔ DR/High Available Config
      • ✔ Full Managed Services
      • ✖ Co-Location Services
      • ✔ Public Cloud Services (AWS)

      URL
      rowtonit.com

      Regional Coverage:
      United Kingdom

      Logo for RowtonIT.com.

      Vendor Profile #2

      Connectria

      Summary of Vendor

      “Every journey starts with a single step and for Connectria, that step happened to be with the world’s largest bank, Deutsche Bank. Followed quickly by our second client, IBM. Since then, we have added over 1,000 clients worldwide. For 25 years, each customer, large or small, has relied on Connectria to deliver on promises made to make it easy to do business with us through flexible terms, scalable solutions, and straightforward pricing. Join us on our journey.”

      IBM i Services

      • ✔ IBM Power Hardware Sales
      • ✔ Co-Managed Services
      • ✔ DR/High Available Config
      • ✔ Full Managed Services
      • ✔ Co-Location Services
      • ✔ Public Cloud Services (AWS)

      URL
      connectria.com

      Regional Coverage:
      United States

      Logo for Connectria.

      Vendor Profile #3

      Mid-Range

      Summary of Vendor

      “Founded in 1988 and profitable throughout all of those 31 years, we have a solid track record of success. At Mid-Range, we use our expertise to assess your unique needs, in order to proactively develop the most effective IT solution for your requirements. Our full-service approach to technology and our diverse and in-depth industry expertise keep our clients coming back year after year.

      Serving clients across North America in a variety of industries, from small and emerging organizations to large, established enterprises – we’ve seen it all. Whether you need hardware or software solutions, disaster recovery and high availability, managed services or hosting or full ERP services with our JD Edwards offerings – we have the methods and expertise to help.”

      IBM i Services

      • ✔ IBM Power Hardware Sales
      • ✔ Co-Managed Services
      • ✔ DR/High Available Config
      • ✔ Full Managed Services
      • ✔ Co-Location Services
      • ✔ Public Cloud Services (AWS)

      URL
      midrange.ca

      Regional Coverage:
      Canada

      Logo for Mid-Range.

      Activity

      Understand your vendor options

      Activities:
      1. Create your vendor profiles
      2. Score vendor responses
      3. Develop and manage your vendor agenda

      This activity involves the following participants:

      • IT strategic direction decision makers
      • IT managers responsible for an existing iSeries or IBM i platform

      Outcomes of this step:

      • Vendor Profile Template
      • Completed IT Infrastructure Outsourcing Scoring Tool

      Info-Tech Insights

      This check-point process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.

      1. Create your vendor profiles

      Define what you are looking for:

      • Create a vendor profile for every vendor of interest.
      • Leverage our starting list and template to track and record the advantages of each vendor.

      Mindshift

      First National Technology Solutions

      Key Information Systems

      MainLine

      Direct Systems Support

      T-Systems

      Horizon Computer Solutions Inc.

      Vendor Profile Template

      [Vendor Name]

      Summary of Vendor

      [Vendor Summary]
      *Detail the Vendor Services as a Summary*

      IBM i Services

      • ✔ IBM Power Hardware Sales
      • ✔ Co-Managed Services
      • ✔ DR/High Available Config
      • ✔ Full Managed Services
      • ✔ Co-Location Services
      • ✔ Public Cloud Services (AWS)
      *Itemize the Vendor Services specific to your requirements*

      URL
      https://www.url.com/
      *Insert the Vendor URL*

      Regional Coverage:
      [Country\Region]
      *Insert the Vendor Coverage & Locations*

      *Insert the Vendor Logo*

      2. Score your vendor responses

      Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses.
      Use Info-Tech’s IT Infrastructure Outsourcing Scoring Tool to systematically score your vendor responses.

      The overall quality of the IBM i questions can help you understand what it might be like to work with the vendor.

      Consider the following questions:

      • Is the vendor clear about what it’s able to offer? Is its response transparent?
      • How much effort did the vendor put into answering the questions?
      • Does the vendor seem like someone you would want to work with?

      Once you have the vendor responses, you will select two or three vendors to continue assessing in more depth leading to an eventual final selection.

      Screenshot of the IT Infrastructure Outsourcing Scoring Tool's Scoring Sheet. There are three tables: 'Scoring Scale', 'Results', and one with 'RFP Questions'. Note on Results table says 'Top Scoring Vendors', and note on questions table says 'List your IBM i questions (requirements)'.

      Info-Tech Insights

      Watch out for misleading scores that result from poorly designed criteria weightings.

      3. Develop your vendor agenda

      Vendor Conference Call

      Develop an agenda for the conference call. Here is a sample agenda:
      • Review the vendor questions.
      • Go over answers to written vendor questions previously submitted.
      • Address new vendor questions.

      Commonly Debated Question:
      Should vendors be asked to remain anonymous on the call or should each vendor mention their organization when they join the call?

      Many organizations worry that if vendors can identify each other, they will price fix. However, price fixing is extremely rare due to its consequences and most vendors likely have a good idea which other vendors are participating in the bid. Another thought is that revealing vendors could either result in a higher level of competition or cause some vendors to give up:

      • A vendor that hears its rival is also bidding may increase the competitiveness of its bid and response.
      • A vendor that feels it doesn’t have a chance may put less effort into the process.
      • A vendor that feels it doesn’t have real competition may submit a less competitive or detailed response than it otherwise would have.

      Vendor Workshop

      A vendor workshop day is an interactive way to provide context to your vendors and to better understand the vendors’ offerings. The virtual or in-person interaction also offers a great way to understand what it’s like to work with each vendor and decide whether you could build a partnership with them in the long run.

      The main focus of the workshop is the vendors’ service solution presentation. Here is a sample agenda for a two-day workshop:

      Day 1
      • Meet and greet
      • Welcome presentation with objectives, acquisition strategy, and company overview
      • Overview of the current IT environment, technologies, and company expectations
      • Question and answer session
      • Site walk
      Day 2
      • Review Day 1 activities
      • Vendor presentations and solution framing
      Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses.

      Related Info-Tech Research

      Effectively Acquire Infrastructure Services
      Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
      There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Build Your Infrastructure Roadmap
      Move beyond alignment: Put yourself in the driver’s seat for true business value.

      Define Your Cloud Vision
      Make the most of cloud for your organization.

      Document Your Cloud Strategy
      Drive consensus by outlining how your organization will use the cloud.

      Create a Right-Sized Disaster Recovery Plan
      Close the gap between your DR capabilities and service continuity requirements.

      Create a Better RFP Process
      Improve your RFPs to gain leverage and get better results.

      Research Authors

      Photo of Darin Stahl, Principal Research Advisor, Info-Tech Research Group.Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Principal Research Advisor within the Infrastructure Practice and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring (APM), Managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

      Photo of Troy Cheeseman, Practice Lead, Info-Tech Research Group.Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy has over 24 years of experience and has championed large, enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups.

      Research Contributors

      Photo of Dan Duffy, President & Owner, Mid-Range.Dan Duffy, President & Owner, Mid-Range

      Dan Duffy is the President and Founder of Mid-Range Computer Group Inc., an IBM Platinum Business Partner. Dan and his team have been providing the Canadian and American IBM Power market with IBM infrastructure solutions including private cloud, hosting and disaster recovery, high availability and data center services since 1988. He has served on numerous boards and associations including the Toronto Users Group for Mid-Range Systems (TUG), the IBM Business Partners of the Americas Advisory Council, the Cornell Club of Toronto, and the Notre Dame Club of Toronto. Dan holds a Bachelor of Science from Cornell University.

      Photo of George Goodall, Executive Advisor, Info-Tech Research Group.George Goodall, Executive Advisor, Info-Tech Research Group

      George Goodall is an Executive Advisor in the Research Executive Services practice at Info-Tech Research Group. George has over 20 years of experience in IT consulting, enterprise software sales, project management, and workshop delivery. His primary focus is the unique challenges and opportunities in organizations with small and constrained IT operations. In his long tenure at Info-Tech, George has covered diverse topics including voice communications, storage, and strategy and governance.

      Bibliography

      “Companies using IBM i (formerly known as i5/OS).” Enlyft, 21 July 2021. Web.

      Connor, Clare. “IBM i and Meeting the Challenges of Modernization.” Ensono, 22 Mar. 2022. Web.

      Huntington, Tom. “60+ IBM i User Groups and Communities to Join?” HelpSystems, 16 Dec. 2021. Web.

      Perkins, Dale. “The Road to Power Cloud: June 21st 1988 to now. The Journey Continues.” Mid-Range, 1 Nov. 2021. Web.

      Prickett Morgan, Timothy. “How IBM STACKS UP POWER8 AGAINST XEON SERVERS.” The Next Platform, 13 Oct. 2015. Web.

      “Why is AS/400 still used? Four reasons to stick with a classic.” NTT, 21 July 2016. Web.

      Appendix

      Public Cloud Provider Notes

      Appendix –
      Cloud
      Providers


      “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

      AWS

      Appendix –
      Cloud
      Providers



      “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

      Google

      • Google Cloud console supports IBM Power Systems.
      • This offering provides cloud instances running on IBM Power Systems servers with PowerVM.
      • The service uses a per-day prorated monthly subscription model for cloud instance plans with different capacities of compute, memory, storage, and network. Standard plans are listed below and custom plans are possible.
      • There is no IBM i offering yet that we are aware of.
      • For AIX on Power, this would appear to be a better option than AWS (Converge Enterprise Cloud with IBM Power for Google Cloud).

      Appendix –
      Cloud
      Providers



      “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

      Azure

      • Azure has partners using the Azure Dedicated Host offerings to deliver “native support for IBM POWER Systems to Azure data centres” (PowerWire).
      • Microsoft has installed Power servers in an couple Azure data centers and Skytap manages the IBM i, AIX, and Linux environments for clients.
      • As far as I am aware there is no ability to install IBM i or AIX within an Azure Dedicated Host via the retail interfaces – these must be worked through a partner like Skytap.
      • The cloud route for IBM i or AIX might be the easiest working with Skytap and Azure. This would appear to be a better option than AWS in my opinion.

      Appendix –
      Cloud
      Providers



      “IBM Power (IBM i and AIX) workloads are also available in the so-called ‘cloud.’” (Darin Stahl)

      IBM

      Sustain and Grow the Maturity of Innovation in Your Enterprise

      • Buy Link or Shortcode: {j2store}91|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Customers are not waiting – they are insisting on change now. The recent litany of business failures and the ongoing demand for improved services means that “not in my backyard” will mean no backyard.
      • Positive innovation is about achieving tomorrow’s success today, where everyone is a leader and ideas and people can flourish – in every sector.

      Our Advice

      Critical Insight

      • Many innovation programs are not delivering value at a time when change is constant and is impacting both public and private sector organizations.
      • Organizations are not well-positioned in terms of leadership skills to advance their innovation programs.
      • Unlock your innovation potential by looking at your innovation projects on both a macro and micro level.
      • Innovation capacity is directly linked with creativity; allow your employees' creativity to flourish using Info-Tech’s positive innovation techniques.
      • Innovations need to be re-harvested each year in order to maximize your return on investment.

      Impact and Result

      • From an opportunity perspective, create an effective innovation program that spawns more innovations, realizes benefits from existing assets not fully being leveraged, and lays the groundwork for enhanced products and services.
      • This complementary toolkit and method (to existing blueprints/research) guides you to assess the “aspiration level” of innovations and the innovation program, assess the resources/capabilities that an entity has to date employed in its innovation program, and position IT for success to achieve the strategic objectives of the enterprise.

      Sustain and Grow the Maturity of Innovation in Your Enterprise Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should formalize processes to improve your innovation program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scope and define

      Understand your current innovation capabilities and create a mandate for the future of your innovation program.

      • Sustain and Grow the Maturity of Innovation in Your Enterprise – Phase 1: Scope and Define
      • Innovation Program Mandate and Terms of Reference Template
      • Innovation Program Overview Presentation Template
      • Innovation Assessment Tool

      2. Assess and aspire

      Assess opportunities for your innovation program on a personnel and project level, and provide direction on how to improve along these dimensions.

      • Sustain and Grow the Maturity of Innovation in Your Enterprise – Phase 2: Assess and Aspire
      • Appreciative Inquiry Questionnaire

      3. Implement and inspire

      Formalize the innovation improvements you identified earlier in the blueprint by mapping them to your IT strategy.

      • Sustain and Grow the Maturity of Innovation in Your Enterprise – Phase 3: Implement and Inspire
      • Innovation Planning Tool
      [infographic]

      Workshop: Sustain and Grow the Maturity of Innovation in Your Enterprise

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-Work

      The Purpose

      Gather data that will be analyzed in the workshop.

      Key Benefits Achieved

      Information gathered with which analysis can be performed.

      Activities

      1.1 Do an inventory of innovations/prototypes underway.

      1.2 High-level overview of all existing project charters, and documentation of innovation program.

      1.3 Poll working group or key stakeholders in regards to scope of innovation program.

      Outputs

      Up-to-date inventory of innovations/prototypes

      Document review of innovation program and its results to date

      Draft scope of the innovation program and understanding of the timelines

      2 Scope and Define

      The Purpose

      Scope the innovation program and gain buy-in from major stakeholders.

      Key Benefits Achieved

      Buy-in from IT steering committee for innovation program improvements.

      Activities

      2.1 Establish or re-affirm values for the program.

      2.2 Run an initial assessment of the organization’s innovation potential (macro level).

      2.3 Set/reaffirm scope and budget for the program.

      2.4 Define or refine goals and outcomes for the program.

      2.5 Confirm/re-confirm risk tolerance of organization.

      2.6 Update/document innovation program.

      2.7 Create presentation to gain support from the IT steering committee.

      Outputs

      Innovation program and terms of reference

      Presentation on organization innovation program for IT steering committee

      3 Assess and Aspire

      The Purpose

      Analyze the current performance of the innovation program and identify areas for improvement.

      Key Benefits Achieved

      Identify actionable items that can be undertaken in order to improve the performance of the innovation program.

      Activities

      3.1 Assess your level of innovation per innovation project (micro level).

      3.2 Update the risk tolerance level of the program.

      3.3 Determine if your blend of innovation projects is ideal.

      3.4 Re-prioritize your innovation projects (if needed).

      3.5 Plan update to IT steering committee.

      3.6 Assess positive innovation assessment of team.

      3.7 Opportunity analysis of innovation program and team.

      Outputs

      Positive innovation assessment

      Re-prioritized innovation projects

      Updated presentation for IT steering committee

      4 Implement and Inspire

      The Purpose

      Formalize the innovation program by tying it into the IT strategy.

      Key Benefits Achieved

      A formalized innovation program that is closely tied to the IT strategy.

      Activities

      4.1 Update business context in terms of impact on IT implications.

      4.2 Update IT strategy in terms of impact and benefits of innovation program.

      4.3 Update/create innovation program implementation plan.

      4.4 Plan update for IT steering committee.

      Outputs

      Updated business context

      Updated IT strategy

      Innovation implementation plan, including roadmap

      Updated presentation given to IT steering committee

      Explore the Secrets of SAP Digital Access Licensing

      • Buy Link or Shortcode: {j2store}143|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • SAP’s licensing rules surrounding use and indirect access are vague, making it extremely difficult to purchase with confidence and remain compliant.
      • SAP has released nine document-type licenses that can be used in digital access licensing scenarios, but this model has its own challenges.
      • Whether you decide to remain “as is” or proactively change licensing over to the document model, either option can be costly and confusing.
      • Indirect static read can be a cause of noncompliance when data is exported but the processing capability of SAP ERP is used in real time.

      Our Advice

      Critical Insight

      • Examine all indirect access possibilities. Understanding how in-house or third-party applications may be accessing and utilizing the SAP digital core is critical to be able to correctly address issues.
      • Know what’s in your contract. Each customer agreement is different, and older agreements may provide both benefits and challenges when evaluating your SAP license position.
      • Understand the intricacies of document licensing. While it may seem digital access licensing will solve compliance concerns, there are still questions to address and challenges SAP must resolve.

      Impact and Result

      • Conduct an internal analysis to examine where digital access licensing may be needed to mitigate risk, as SAP will be speaking with all customers in due course. Indirect access can be a costly audit settlement.
      • Conduct an analysis to remove inactive and duplicate users, as multiple logins may exist and could end up costing the organization license fees when audited.
      • Adopt a cyclical approach to reviewing your SAP licensing and create a reference document to track your software needs, planned licensing, and purchase negotiation points.
      • Learn the SAP way of conducting business, which includes a best-in-class sales structure and unique contracts and license use policies, combined with a hyper-aggressive compliance function. Conducting business with SAP is not a typical vendor experience, and you will need different tools to emerge successfully from a commercial transaction.

      Explore the Secrets of SAP Digital Access Licensing Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you need to understand and document your SAP digital access licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand, assess, and decide on digital access licensing

      Begin your SAP digital access licensing journey by evaluating licensing changes and options, and then make contractual changes to ensure compliance.

      • Explore the Secrets of SAP Digital Access Licensing – Phase 1: Understand, Assess, and Decide on Digital Access Licensing
      • SAP License Summary and Analysis Tool
      • SAP Digital Access Licensing Pricing Tool
      [infographic]

      Develop a Plan to Pilot Enterprise Service Management

      • Buy Link or Shortcode: {j2store}279|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Many business groups in the organization are siloed and have disjointed services that lead to a less than ideal customer experience.
      • Service management is too often process-driven and is implemented without a holistic view of customer value.
      • Businesses get caught up in the legacy of their old systems and find it difficult to move with the evolving market.

      Our Advice

      Critical Insight

      • Customer experience is the new battleground. Parity between products is creating the need to differentiate via customer experience.
      • Don’t forget your employees! Enterprise service management (ESM) is also about delivering exceptional experiences to your employees so they can deliver exceptional services to your customers.
      • ESM is not driven by tools and processes. Rather, ESM is about pushing exceptional services to customers by pulling from organizational capabilities.

      Impact and Result

      • Understand ESM concepts and how they can improve customer service.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s state for ESM, identify the gaps, and create an action plan to move towards an ESM pilot.
      • Increase business and customer satisfaction by delivering services more efficiently.

      Develop a Plan to Pilot Enterprise Service Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should move towards ESM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand ESM and get buy-in

      Understand the concepts of ESM, determine the scope of the ESM program, and get buy-in.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 1: Understand ESM and Get Buy-in
      • Enterprise Service Management Executive Buy-in Presentation Template
      • Enterprise Service Management General Communications Presentation Template

      2. Assess the current state for ESM

      Determine the current state for ESM and identify the gaps.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 2: Assess the Current State for ESM
      • Enterprise Service Management Assessment Tool
      • Enterprise Service Management Assessment Tool Action Plan Guide
      • Enterprise Service Management Action Plan Tool

      3. Identify ESM pilot and finalize action plan

      Create customer journey maps, identify an ESM pilot, and finalize the action plan for the pilot.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 3: Identify ESM Pilot and Finalize Action Plan
      • Enterprise Service Management Customer Journey Map Template
      [infographic]

      Workshop: Develop a Plan to Pilot Enterprise Service Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand ESM and Get Buy-In

      The Purpose

      Understand what ESM is and how it can improve customer service.

      Determine the scope of your ESM initiative and identify who the stakeholders are for this program.

      Key Benefits Achieved

      Understanding of ESM concepts.

      Understanding of the scope and stakeholders for your ESM initiative.

      Plan for getting buy-in for the ESM program.

      Activities

      1.1 Understand the concepts and benefits of ESM.

      1.2 Determine the scope of your ESM program.

      1.3 Identify your stakeholders.

      1.4 Develop an executive buy-in presentation.

      1.5 Develop a general communications presentation.

      Outputs

      Executive buy-in presentation

      General communications presentation

      2 Assess the Current State for ESM

      The Purpose

      Assess your current state with respect to culture, governance, skills, and tools.

      Identify your strengths and weaknesses from the ESM assessment scores.

      Key Benefits Achieved

      Understanding of your organization’s current enablers and constraints for ESM.

      Determination and analysis of data needed to identify strengths or weaknesses in culture, governance, skills, and tools.

      Activities

      2.1 Understand your organization’s mission and vision.

      2.2 Assess your organization’s culture, governance, skills, and tools.

      2.3 Identify the gaps and determine the necessary foundational action items.

      Outputs

      ESM assessment score

      Foundational action items

      3 Define Services and Create Custom Journey Maps

      The Purpose

      Define and choose the top services at the organization.

      Create customer journey maps for the chosen services.

      Key Benefits Achieved

      List of prioritized services.

      Customer journey maps for the prioritized services.

      Activities

      3.1 Make a list of your services.

      3.2 Prioritize your services.

      3.3 Build customer journey maps.

      Outputs

      List of services

      Customer journey maps

      Exploit Disruptive Infrastructure Technology

      • Buy Link or Shortcode: {j2store}298|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Disruptive & Emerging Technologies
      • Parent Category Link: /disruptive-emerging-technologies
      • New technology can hit like a meteor. Not only disruptive to IT, technology provides opportunities for organization-wide advantage.
      • Your role is endangered. If you don’t prepare for the most disruptive technologies, you could be overshadowed. Don’t let the Chief Marketing Officer (CMO) set the technological innovation agenda
      • Predicting the future isn’t easy. Most IT leaders fail to realize how quickly technology increases in capability. Even for the tech savvy, predicting which specific technologies will become disruptive is difficult.
      • Communication is difficult when the sky is falling. Even forward-looking IT leaders struggle with convincing others to devote time and resources to monitoring technologies with a formal process.

      Our Advice

      Critical Insight

      • Establish the core working group, select a leader, and select a group of visionaries to help brainstorm emerging technologies.
      • Brainstorm about creating a better future, begin brainstorming an initial longlist.
      • Train the group to think like futurists.
      • Evaluate the shortlist.
      • Define your PoC list and schedule.
      • Finalize, present the plan to stakeholders and repeat.

      Impact and Result

      • Create a disruptive technology working group.
      • Produce a longlist of disruptive technologies.
      • Evaluate the longlist to produce a shortlist of disruptive technologies.
      • Develop a plan for a proof-of-concept project for each shortlisted technology.

      Exploit Disruptive Infrastructure Technology Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Exploit Disruptive Infrastructure Technology – A guide to help IT leaders make the most of disruptive impacts.

      As a CIO, there is a need to move beyond day-to-day technology management with an ever-increasing need to forecast technology impacts. Not just from a technical perspective but to map out the technical understandings aligned to potential business impacts and improvements. Technology transformation and innovation is moving more quickly than ever before and as an innovation champion, the CIO or CTO should have foresight in specific technologies with the understanding of how the company could be disrupted in the near future.

      • Exploit Disruptive Infrastructure Technology – Phases 1-3

      2. Disruptive Technology Exploitation Plan Template – A guide to develop the plan for exploiting disruptive technology.

      The Disruptive Technology Exploitation Plan Template acts as an implementation plan for developing a long-term strategy for monitoring and implementing disruptive technologies.

      • Disruptive Technology Exploitation Plan Template

      3. Disruptive Technology Look to the Past Tool – A tool to keep track of the missed technology disruption from previous opportunities.

      The Disruptive Technology Look to the Past Tool will assist you to collect reasonability test notes when evaluating potential disruptive technologies.

      • Disruptive Technology Look to the Past Tool

      4. Disruptive Technology Research Database Tool – A tool to keep track of the research conducted by members of the working group.

      The Disruptive Technology Research Database Tool will help you to keep track of the independent research that is conducted by members of the disruptive technology exploitation working group.

      • Disruptive Technology Research Database Tool

      5. Disruptive Technology Shortlisting Tool

      The Disruptive Technology Shortlisting Tool will help you to codify the results of the disruptive technology working group's longlist winnowing process.

      • Disruptive Technology Shortlisting Tool

      6. Disruptive Technology Value-Readiness and SWOT Analysis Tool – A tool to systematize notional evaluations of the value and readiness of potential disruptive technologies.

      The Disruptive Technology Value Readiness & SWOT Analysis Tool will assist you to systematize notional evaluations of the value and readiness of potential disruptive technologies.

      • Disruptive Technology Value-Readiness and SWOT Analysis Tool

      7. Proof of Concept Template – A handbook to serve as a reference when deciding how to proceed with your proposed solution.

      The Proof of Concept Template will guide you through the creation of a minimum-viable proof-of-concept project.

      • Proof of Concept Template

      8. Disruptive Technology Executive Presentation Template – A template to help you create a brief progress report presentation summarizing your project and program progress.

      The Disruptive Technology Executive Presentation Template will assist you to present an overview of the disruptive technology process, outlining the value to your company.

      • Disruptive Technology Executive Presentation Template

      Infographic

      Workshop: Exploit Disruptive Infrastructure Technology

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-work: Establish the Disruptive Tech Process

      The Purpose

      Discuss the general overview of the disruptive technology exploitation process.

      Develop an initial disruptive technology exploitation plan.

      Key Benefits Achieved

      Stakeholders are on board, the project’s goals are outlined, and the working group is selected.

      Activities

      1.1 Get execs and stakeholders on board.

      1.2 Review the process of analyzing disruptive tech.

      1.3 Select members for the working group.

      1.4 Choose a schedule and time commitment.

      1.5 Select a group of visionaries.

      Outputs

      Initialized disruptive tech exploitation plan

      Meeting agenda, schedule, and participants

      2 Hold the Initial Meeting

      The Purpose

      Understand how disruption will affect the organization, and develop an initial list of technologies to explore.

      Key Benefits Achieved

      Knowledge of how to think like a futurist.

      Understanding of organizational processes vulnerable to disruption.

      Outline of potentially disruptive technologies.

      Activities

      2.1 Start the meeting with introductions.

      2.2 Train the group to think like futurists.

      2.3 Brainstorm about disruptive processes.

      2.4 Brainstorm a longlist.

      2.5 Research and brainstorm separate longlists.

      Outputs

      List of disruptive organizational processes

      Initial longlist of disruptive tech

      3 Create a Longlist and Assess Shortlist

      The Purpose

      Evaluate the specific value of longlisted technologies to the organization.

      Key Benefits Achieved

      Defined list of the disruptive technologies worth escalating to the proof of concept stage.

      Activities

      3.1 Converge the longlists developed by the team.

      3.2 Narrow the longlist to a shortlist.

      3.3 Assess readiness and value.

      3.4 Perform a SWOT analysis.

      Outputs

      Finalized longlist of disruptive tech

      Shortlist of disruptive tech

      Value-readiness analysis

      SWOT analysis

      Candidate(s) for proof of concept charter

      4 Create an Action Plan

      The Purpose

      Understand how the technologies in question will impact the organization.

      Key Benefits Achieved

      Understanding of the specific effects of the new technology on the business processes it is intended to disrupt.

      Business case for the proof-of-concept project.

      Activities

      4.1 Build a problem canvas.

      4.2 Identify affected business units.

      4.3 Outline and map the business processes likely to be disrupted.

      4.4 Map disrupted business processes.

      4.5 Recognize how the new technology will impact business processes.

      4.6 Make the case.

      Outputs

      Problem canvas

      Map of business processes: current state

      Map of disrupted business processes

      Business case for each technology

      Further reading

      Analyst Perspective

      The key is in anticipation.

      “We all encounter unexpected changes and our responses are often determined by how we perceive and understand those changes. We react according to the unexpected occurrence. Business organizations are no different.

      When a company faces a major technology disruption in its markets – one that could fundamentally change the business or impact its processes and technology – the way its management perceive and understand the disruption influences how they describe and plan for it. In other words, the way management sets the context of a disruption – the way they frame it – shapes the strategy they adopt. Technology leaders can vastly influence business strategy by adopting a proactive approach to understanding disruptive and innovative technologies by simply adopting a process to review and evaluate technology impacts to the company’s lines of business.”

      This is a picture of Troy Cheeseman

      Troy Cheeseman
      Practice Lead, Infrastructure & Operations Research
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • New technology can hit like a meteor. Not only disruptive to IT, technology provides opportunities for organization-wide advantage.
      • Your role is endangered. If you don’t prepare for the most disruptive technologies, you could be overshadowed. Don’t let the chief marketing officer (CMO) set the technological innovation agenda.

      Common Obstacles

      • Predicting the future isn’t easy. Most IT leaders fail to realize how quickly technology increases in capability. Even for the tech savvy, predicting which specific technologies will become disruptive is difficult.
      • Communication is difficult when the sky is falling. Even forward-looking IT leaders struggle with convincing others to devote time and resources to monitoring technologies with a formal process.

      Info-Tech’s Approach

      • Identify, resolve, and evaluate. Use an annual process as described in this blueprint: a formal evaluation of new technology that turns analysis into action.
      • Lead the analysis from IT. Establish a team to carry out the annual process as a cure for the causes of “airline magazine syndrome” and to prevent it from happening in the future.
      • Train your team on the patterns of progress, track technology over time in a central database, and read Info-Tech’s analysis of upcoming technology.
      • Create your KPIs. Establish your success indicators to create measurable value when presenting to your executive.
      • Produce a comprehensive proof-of-concept plan that will allow your company to minimize risk and maximize reward when engaging with new technology.

      Info-Tech Insight

      Proactively monitoring, evaluating, and exploiting disruptive tech isn’t optional.
      This will protect your role, IT’s role, and the future of the organization.

      A diverse working group maximizes the insight brought to bear.
      An IT background is not a prerequisite.

      The best technology is only the best when it brings immediate value.
      Good technology might not be ready; ready technology might not be good.

      Review

      We help IT leaders make the most of disruptive impacts.

      This research is designed for:

      Target Audience: CIO, CTO, Head of Infrastructure

      This research will help you:

      • Develop a process for anticipating, analyzing, and exploiting disruptive technology.
      • Communicate the business case for investing in disruptive technology.
      • Categorize emerging technologies to decide what to do with them.
      • Develop a plan for taking action to exploit the technology that will most affect your organization.

      Problem statement:

      As a CIO, there is a need to move beyond day-to-day technology management with an ever-increasing need to forecast technology impacts. Not just from a technical perspective but to map out the technical understandings aligned to potential business impacts and improvements. Technology transformation and innovation is moving more quickly than ever before and as an innovation champion, the CIO or CTO should have foresight in specific technologies with the understanding of how the company could be disrupted in the near future. Foresight + Current Technology + Business Understanding = Understanding the Business Disruption. This should be a repeatable process, not an exception or reactionary response.

      Insight Summary

      Establish the core working group, select a leader, and select a group of visionaries to help brainstorm emerging technologies.

      The right team matters. A core working group will keep focus through the process and a leader will keep everyone accountable. Visionaries are out-of-the-box thinkers and once they understand how to think like a "futurists," they will drive the longlist and shortlist actions.

      Train the group to think like futurists

      To keep up with exponential technology growth you need to take a multi-threaded approach.

      Brainstorm about creating a better future; begin brainstorming an initial longlist

      Establish the longlist. The longlist helps create a holistic view of most technologies that could impact the business. Assigning values and quadrant scoring will shortlist the options and focus your PoC option.

      Converge everyone’s longlists

      Long to short...that's the short of it. Using SWOT, value readiness, and quadrant mapping review sessions will focus the longlist, creating a shortlist of potential POC candidates to review and consider.

      Evaluate the shortlist

      There is no such thing as a risk-free endeavor. Use a systematic process to ensure that the risks your organization takes have the potential to produce significant rewards.

      Define your PoC list and schedule

      Don’t be afraid to fail! Inevitably, some proof-of-concept projects will not benefit the organization. The projects that are successful will more than cover the costs of the failed projects. Roll out small scale and minimize losses.

      Finalize, present the plan to stakeholders, and repeat!

      Don't forget the C-suite. Effectively communicate and present the working group’s finding with a well-defined and succinct presentation. Start the process again!

      This is a screenshot of the Thought map for Exploit disruptive infrastructure Technology.
      1. Identify
        • Establish the core working group and select a leader; select a group of visionaries
        • Train the group to think like futurists
        • Hold your initial meeting
      2. Resolve
      • Create and winnow a longlist
      • Assess and create the shortlist
    • Evaluate
      • Create process maps
      • Develop proof of concept charter
    • The Key Is in Anticipation!

      Use Info-Tech’s approach for analyzing disruptive technology in your own disruptive tech working group

      Phase 1: Identify Phase 2: Resolve Phase 3: Evaluate

      Phase Steps

      1. Establish the disruptive technology working group
      2. Think like a futurist (Training)
      3. Hold initial meeting or create an agenda for the meeting
      1. Create and winnow a longlist
      2. Assess shortlist
      1. Create process maps
      2. Develop proof of concept charter

      Phase Outcomes

      • Establish a team of subject matter experts that will evaluate new, emerging, and potentially disruptive technologies.
      • Establish a process for including visionaries from outside of the working group who will provide insight and direction.
      • Introduce the core working group members.
      • Gain a better understanding of how technology advances.
      • Brainstorm a list of organizational processes.
      • Brainstorm an initial longlist.
      • Finalized longlist
      • Finalized shortlist
      • Initial analysis of each technology on the shortlist
      • Finalized shortlist
      • Initial analysis of each technology on the shortlist
      • Business process maps before and after disruption
      • Proof of concept charter
      • Key performance indicators
      • Estimation of required resources
      • Executive presentation

      Four key challenges make it essential for you to become a champion for exploiting disruptive technology

      1. New technology can hit like a meteor. It doesn’t only disrupt IT; technology provides opportunities for organization-wide advantage.
      2. Your role is endangered. If you don’t prepare for the most disruptive technologies, you could be overshadowed. Don’t let the CMO rule technological innovation.
      3. Predicting the future isn’t easy. Most IT leaders fail to realize how quickly technology increases in capability. Even for the tech savvy, predicting which specific technologies will become disruptive is difficult.
      4. Communication is difficult when the sky is falling. Even forward-looking IT leaders struggle with convincing others to devote time and resources to monitoring emerging technologies with a formal process.

      “Look, you have never had this amount of opportunity for innovation. Don’t forget to capitalize on it. If you do not capitalize on it, you will go the way of the dinosaur.”
      – Dave Evans, Co-Founder and CTO, Stringify

      Technology can hit like a meteor

      “ By 2025:

      • 38.6 billion smart devices will be collecting, analyzing, and sharing data.
      • The web hosting services market is to reach $77.8 billion in 2025.
      • 70% of all tech spending is expected to go for cloud solutions.
      • There are 1.35 million tech startups.
      • Global AI market is expected to reach $89.8 billion.”

      – Nick Gabov

      IT Disruption

      Technology disrupts IT by:

      • Affecting the infrastructure and applications that IT needs to use internally.
      • Affecting the technology of end users that IT needs to support and deploy, especially for technologies with a consumer focus.
      • Allowing IT to run more efficiently and to increase the efficiency of other business units.
      • Example: The rise of the smartphone required many organizations to rethink endpoint devices.

      Business Disruption

      Technology disrupts the business by:

      • Affecting the viability of the business.
      • Affecting the business’ standing in relation to competitors that better deal with disruptive technology.
      • Affecting efficiency and business strategy. IT should have a role in technology-related business decisions.
      • Example: BlackBerry failed to anticipate the rise of the apps ecosystem. The company struggled as it was unable to react with competitive products.

      Senior IT leaders are expected to predict disruptions to IT and the business, while tending to today’s needs

      You are expected to be both a firefighter and a forecaster

      • Anticipating upcoming disruptions is part of your job, and you will be blamed if you fail to anticipate future business disruptions because you are focusing on the present.
      • However, keeping IT running smoothly is also part of your job, and you will be blamed if today’s IT environment breaks down because you are focusing on the future.

      You’re caught between the present and the future

      • You don’t have a process that anticipates future disruptions but runs alongside and integrates with operations in the present.
      • You can’t do it alone. Tending to both the present and the future will require a team that can help you keep the process running.

      Info-Tech Insight

      Be prepared when disruptions start coming down, even though it isn’t easy. Use this research to reduce the effort to a simple process that can be performed alongside everyday firefighting.

      Make disruptive tech analysis and exploitation part of your innovation agenda

      A scatter plot graph is depicted, plotting IT Innovative Leadership (X axis), and Satisfaction with IT(Y axis). IT innovative leadership explains 75% of variation in satisfaction with IT

      Organizations without high satisfaction with IT innovation leadership are only 20% likely to be highly satisfied with IT

      “You rarely see a real-world correlation of .86!”
      – Mike Battista, Staff Scientist, Cambridge Brain Sciences, PhD in Measurement

      There is a clear relationship between satisfaction with IT and the IT department’s innovation leadership.

      Prevent “airline magazine syndrome” by proactively analyzing disruptive technologies

      “The last thing the CIO needs is an executive saying ‘I don’t what it is or what it does…but I want two of them!”
      – Tim Lalonde

      Airline magazine syndrome happens to IT leaders caught between the business and IT. It usually occurs in this manner:

      1. While on a flight, a senior executive reads about an emerging technology that has exciting implications for the business in an airline magazine.
      2. The executive returns and approaches IT, demanding that action be taken to address the disruptive technology – and that it should have been (ideally) completed already.

      Without a Disruptive Technology Exploitation Plan:

      “I don’t know”

      With a Disruptive Technology Exploitation Plan:

      “Here in IT, we have already considered that technology and decided it was overhyped. Let me show you our analysis and invite you to join our working group.”

      OR

      “We have already considered that technology and have started testing it. Let me show you our testing lab and invite you to join our working group.”

      Info-Tech Insight

      Airline magazine syndrome is a symptom of a wider problem: poor CEO-CIO alignment. Solve this problem with improved communication and documentation. Info-Tech’s disruptive tech iterative process will make airline magazine syndrome a thing of the past!

      IT leaders who do not keep up with disruptive technology will find their roles diminished

      “Today’s CIO dominion is in a decaying orbit with CIOs in existential threat mode.”
      – Ken Magee

      Protect your role within IT

      • IT is threatened by disruptive technology:
        • Trends like cloud services, increased automation, and consumerization reduce the need for IT to be involved in every aspect of deploying and using technology.
        • In the long term, machines will replace even intellectually demanding IT jobs, such as infrastructure admin and high-level planning.
      • Protect your role in IT by:
        • Anticipating new technology that will disrupt the IT department and your place within it.
        • Defining new IT roles and responsibilities that accurately reflect the reality of technology today.
        • Having a process for the above that does not diminish your ability to keep up with everyday operations that remain a priority today.

      Protect your role against other departments

      • Your role in the business is threatened by disruptive technology:
        • The trends that make IT less involved with technology allow other executives – such as the CMO – to make IT investments.
        • As the CMO gains the power and data necessary to embrace new trends, the CIO and IT managers have less pull.
      • Protect your role in the business by:
        • Being the individual to consult about new technology. It isn’t just a power play; IT leaders should be the ones who know technology thoroughly.
        • Becoming an indispensable part of the entire business’ innovation strategy through proposing and executing a process for exploiting disruptive technology.

      IT leaders who do keep up have an opportunity to solidify their roles as experts and aggregators

      “The IT department plays a critical role in [innovation]. What they can do is identify a technology that potentially might introduce improvements to the organization, whether it be through efficiency, or through additional services to constituents.”
      – Michael Maguire, Management Consultant

      The contemporary CIO is a conductor, ensuring that IT works in harmony with the rest of the business.

      The new CIO is a conductor, not a musician. The CIO is taking on the role of a business engineer, working with other executives to enable business innovation.

      The new CIO is an expert and an aggregator. Conductor CIOs increasingly need to keep up on the latest technologies. They will rely on experts in each area and provide strategic synthesis to decide if, and how, developments are relevant in order to tune their IT infrastructure.

      The pace of technological advances makes progress difficult to predict

      “An analysis of the history of technology shows that technological change is exponential, contrary to the common-sense ‘intuitive linear’ view. So we won’t experience 100 years of progress in the 21st century – it will be more like 20,000 years of progress (at today’s rate).”
      – Ray Kurzweil

      Technology advances exponentially. Rather than improving by the same amount of capability each year, it multiplies in capability each year.

      Think like a futurist to anticipate technology before it goes mainstream.

      Exponential growth happens much faster than linear growth, especially when it hits the knee of the curve. Even those who acknowledge exponential growth underestimate how capabilities can improve.

      To predict new advances, turn innovation into a process

      “We spend 70 percent of our time on core search and ads. We spend 20 percent on adjacent businesses, ones related to the core businesses in some interesting way. Examples of that would be Google News, Google Earth, and Google Local. And then 10 percent of our time should be on things that are truly new.”
      – Eric Schmidt, Google

      • Don’t get caught in the trap of refining your core processes to the exclusion of innovation. You should always be looking for new processes to improve, new technology to pilot, and where possible, new businesses to get into.
      • Devote about 10% of your time and resources to exploring new technology: the potential rewards are huge.

      You and your team need to analyze technology every year to predict where it’s going.

      A bar graph is shown which depicts the proportion of technology use from 2018-2022. the included devices are: Tablets; PCs; TVs; Non-smartphones; Smartphones; M2M
      • Foundational technologies, such as computing power, storage, and networks, are improving exponentially.
      • Disruptive technologies are specific manifestations of foundational advancements. Advancements of greater magnitude give rise to more manifestations; therefore, there will be more disruptive technologies every year.
      • There is a lot of noise to cut through. Remember Google Glasses? As technology becomes ubiquitous and consumerization reigns, everybody is a technology expert. How do you decide which technologies to focus on?

      Protect IT and the business from disruption by implementing a simple, repeatable disruptive technology exploitation process

      “One of the most consistent patterns in business is the failure of leading companies to stay at the top of their industries when technologies or markets change […] Managers must beware of ignoring new technologies that can’t initially meet the needs of their mainstream customers.”
      – Joseph L. Bower and Clayton M. Christensen

      Challenge

      Solution

      New technology can hit like a meteor, but it doesn’t have to leave a crater:

      Use the annual process described in this blueprint to create a formal evaluation of new technology that turns analysis into action.

      Predicting the future isn’t easy, but it can be done:

      Lead the analysis from the office of the CIO. Establish a team to carry out the annual process as a cure for airline magazine syndrome.

      Your role is endangered, but you can survive:

      Train your team on the patterns of progress, track technology over time in a central database, and read Info-Tech’s analysis of upcoming technology.

      Communication is difficult when the sky is falling, so have a simple way to get the message across:

      Track metrics that communicate your progress, and summarize the results in a single, easy-to-read exploitation plan.

      Info-Tech Insight

      Use Info-Tech’s tools and templates, along with this storyboard, to walk you through creating and executing an exploitation process in six steps.

      Create measurable value by using Info-Tech’s process for evaluating the disruptive potential of technology

      This image contains a bar graph with the following Title: Which are the primary benefits you've either realized or expect to realize by deploying hyperconverged infrastructure in the near term.

      No business process is perfect.

      • Use Info-Tech’s Proof of Concept Template to create a disruptive technology proof of concept implementation plan.
      • Harness your company’s internal wisdom to systematically vet new technology. Engage only in calculated risk and maximize potential benefit.

      Info-Tech Insight

      Inevitably, some proof of concept projects will not benefit the organization. The projects that are successful will more than cover the costs of the failed projects. Roll out small scale and minimize losses.

      Establish your key performance indicators (KPIs)

      Key performance indicators allow for rigorous analysis, which generates insight into utilization by platform and consumption by business activity.

      • Brainstorm metrics that indicate when process improvement is actually taking place.
      • Have members of the group pitch KPIs; the facilitator should record each suggestion on a whiteboard.
      • Make sure to have everyone justify the inclusion of each metric: how does it relate to the improvement that the proof of concept project is intended to drive? How does it relate to the overall goals of the business?
      • Include a list of KPIs, along with a description and a target (ensuring that it aligns with SMART metrics).
      Key Performance Indicator Description Target Result

      Number of Longlist technologies

      Establish a range of Longlist technologies to evaluate 10-15
      Number of Shortlist technologies Establish a range of Shortlist technologies to evaluate 5-10
      number of "look to the past" likes/dislikes Minimum number of testing characteristics 6
      Number of POCs Total number of POCs Approved 3-5

      Communicate your plan with the Disruptive Technology Exploitation Plan Template

      Use the Disruptive Technology Exploitation Plan Template to summarize everything that the group does. Update the report continuously and use it to show others what is happening in the world of disruptive technology.

      Section Title Description
      1 Rationale and Summary of Exploitation Plan A summary of the current efforts that exist for exploring disruptive technology. A summary of the process for exploiting disruptive technology, the resources required, the team members, meeting schedules, and executive approval.
      2 Longlist of Potentially Disruptive Technologies A summary of the longlist of identified disruptive technologies that could affect the organization, shortened to six or less that have the largest potential impact based on Info-Tech’s Disruptive Technology Shortlisting Tool.
      3 Analysis of Shortlist Individually analyze each technology placed on the shortlist using Info-Tech’s Disruptive Technology Value-Readiness and SWOT Analysis Tool.
      4 Proof of Concept Plan Use the results from Section 3 to establish a plan for moving forward with the technologies on the shortlist. Determine the tasks required to implement the technologies and decide who will complete them and when.
      5 Hand-off Pass the project along to identified stakeholders with significant interest in its success. Continue to track metrics and prepare to repeat the disruptive technology exploitation process annually.

      Whether you need a process for exploiting disruptive technology, or an analysis of current trends, Info-Tech can help

      Two sets of research make up Info-Tech’s disruptive technology coverage:

      This image contains four screenshots from each of the following Info-Tech Blueprints: Exploit disruptive Infrastructure Technology; Infrastructure & operations priorities 2022

      This storyboard, and the associated tools and templates, will walk you through creating a disruptive technology working group of your own.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      Disruptive Technology Exploitation Plan Template

      The Disruptive Technology Exploitation Plan Template acts as an implementation plan for developing a long-term strategy for monitoring and implementing disruptive technologies.

      Proof of Concept Template

      The Proof of Concept Template will guide you through the creation of a minimum-viable proof-of-concept project.

      Executive Presentation

      The Disruptive Technology Executive Presentation Template will assist you to present an overview of the disruptive technology process, outlining the value to your company.

      Disruptive Technology Value Readiness & SWOT Analysis Tool

      The Disruptive Technology Value Readiness & SWOT Analysis Tool will assist you to systematize notional evaluations of the value and readiness of potential disruptive technologies.

      Disruptive Technology Research Database Tool

      The Disruptive Technology Research Database Tool will help you to keep track of the independent research that is conducted by members of the disruptive technology exploitation working group.

      Disruptive Technology Shortlisting Tool

      The Disruptive Technology Shortlisting Tool will help you to codify the results of the disruptive technology working group's longlist winnowing process.

      Disruptive Technology Look to the Past Tool

      The Disruptive Technology Look to the Past Tool will assist you to collect reasonability test notes when evaluating potential disruptive technologies.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Explore the need for a disruptive technology working group.

      Call #3: Review the agenda for the initial meeting.

      Call #5: Review how you’re brainstorming and your sources of information.

      Call #7: Review the final shortlist and assessment.

      Call #9: Review the progress of your team.

      Call #2: Review the team name, participants, and timeline.

      Call #4: Assess the results of the initial meeting.

      Call #6: Review the final longlist and begin narrowing it down.

      Call #8: Review the next steps.

      Call #10: Review the communication plan.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work Day 1 Day 2 Day 3 Day 4
      Establish the Disruptive Tech Process Hold Your Initial Meeting Create a Longlist and Assess Shortlist Create Process Maps Develop a Proof of Concept Charter

      Activities

      1.1.a Get executives and stakeholders on board.

      1.1.b Review the process of analyzing disruptive tech.

      1.1.c Select members for the working group.

      1.1.d Choose a schedule and time commitment.

      1.1.e Select a group of visionaries.

      1.2.a Start the meeting with introductions.

      1.2.b Train the group to think like futurists.

      1.2.c Brainstorm about disruptable processes.

      1.2.d Brainstorm a longlist.

      1.2.e Research and brainstorm separate longlists.

      2.1.a Converge the longlists developed by the team.

      2.2.b Narrow the longlist to a shortlist.

      2.2.c Assess readiness and value.

      2.2.d Perform a SWOT analysis.

      3.1.a Build a problem canvas.

      3.1.b Identify affected business units.

      3.1.c Outline and map the business processes likely to be disrupted.

      3.1.d Map disrupted business processes.

      3.1.e Recognize how the new technology will impact business processes.

      3.1.f Make the case.

      3.2.a Develop key performance indicators (KPIs).

      3.2.b Identify key success factors.

      3.2.c Outline project scope.

      3.2.d Identify responsible team.

      3.2.e Complete resource estimation.

      Deliverables

      1. Initialized Disruptive Tech Exploitation Plan
      1. List of Disruptable Organizational Processes
      2. Initial Longlist of Disruptive Tech
      1. Finalized Longlist of Disruptive Tech
      2. Shortlist of Disruptive Tech
      3. Value-Readiness Analysis
      4. SWOT Analysis
      5. Candidate(s) for Proof of Concept Charter
      1. Problem Canvas
      2. Map of Business Processes: Current State
      3. Map of Disrupted Business Processes
      4. Business Case for Each Technology
      1. Completed Proof of Concept Charter

      Exploit Disruptive Infrastructure Technology

      Disrupt or be disrupted.

      Identify

      Create your working group.

      PHASE 1

      Use Info-Tech’s approach for analyzing disruptive technology in your own disruptive tech working group

      1. Identify
        1. Establish the core working group and select a leader; select a group of visionaries
        2. Train the group to think like futurists
        3. Hold your initial meeting
      2. Resolve
        1. Create and winnow a longlist
        2. Assess and create the shortlist
      3. Evaluate
        1. Create process maps
        2. Develop proof of concept charter

      The Key Is in Anticipation!

      Phase 1: Identify

      Create your working group.

      Activities:

      Step 1.1: Establish the core working group and select a leader; select a group of visionaries
      Step 1.2: Train the group to think like futurists
      Step 1.3: Hold the initial meeting

      This step involves the following participants:

      IT Infrastructure Manager

      CIO or CTO

      Potential members and visionaries of the working group

      Outcomes of this step:

      • Establish a team of subject matter experts that will evaluate new, emerging, and potentially disruptive technologies.
      • Establish a process for including visionaries from outside of the working group who will provide insight and direction.
      • Introduce the core working group members.
      • Gain a better understanding of how technology advances.
      • Brainstorm a list of organizational processes.
      • Brainstorm an initial longlist.

      Step 1.1

      Establish the core working group and select a leader; select a group of visionaries.

      Activities:

      • Articulate the long- and short-term benefits and costs to the entire organization
      • Gain support by articulating the long- and short-term benefits and costs to the IT department
      • Gain commitment from key stakeholders and executives
      • Help stakeholders understand what goes into formally exploiting disruptive tech by reviewing this process
      • Establish the core working group and select a leader
      • Create a schedule with a time commitment appropriate to your organization’s size; it doesn’t need to take long
      • Select a group of visionaries external to IT to help the working group brainstorm disruptive technologies

      This step involves the following participants:

      • IT Infrastructure Manager
      • CIO or CTO
      • Potential members and visionaries of the working group

      Outcomes of this step

      • Establish a team of subject matter experts that will evaluate new, emerging, and potentially disruptive technologies.
      • Establish a process for including visionaries from outside of the working group that will provide insight and direction.

      1.1.A Articulate the long- and short-term benefits and costs to the entire organization

      A cost/benefit analysis will give stakeholders a picture of how disruptive technology could affect the business. Use the chart as a starting point and customize it based on your organization.

      Disruptive Technology Affects the Organization

      Benefits Costs

      Short Term

      • First-mover advantage from implementing new technology in the business before competitors – and before start-ups.
      • Better brand image as an organization focused on innovation.
      • Increased overall employee satisfaction by implementing new technology that increases employee capabilities or lowers effort.
      • Possibility of increased IT budget for integrating new technology.
      • Potential for employees to reject wide-scale use of unfamiliar technology.
      • Potential for technology to fail in the organization if it is not sufficiently tested.
      • Executive time required for making decisions about technology recommended by the team.

      Long Term

      • Increased internal business efficiencies from the integration of new technology (e.g. energy efficiency, fewer employees needed due to automation).
      • Better services or products for customers, resulting in increased long-term revenue.
      • Lowered costs of services or products and potential to grow market share.
      • Continued relevance of established organizations in a world changed by disruptive technologies.
      • Technology may not reach the capabilities initially expected, requiring waiting for increased value or readiness.
      • Potential for customers to reject new products resulting from technology.
      • Lack of focus on current core capabilities if technology is massively disruptive.

      1.1.B Gain support by articulating the long- and short-term benefits and costs to the IT department

      A cost/benefit analysis will give stakeholders a picture of how disruptive technology could affect the business. Use the chart as a starting point and customize it based on your organization.

      Disruptive Technology Affects IT

      BenefitsCosts

      Short Term

      • Perception of IT as a core component of business practices.
      • Increase IT’s capabilities to better serve employees (e.g. faster network speeds, better uptime, and storage and compute capacity that meet demands).
      • Cost for acquiring or implementing new technology and updating infrastructure to integrate with it.
      • Cost for training IT staff and end users on new IT technology and processes.
      • Minor costs for initial setup of disruptive technology exploitation process and time taken by members.

      Long Term

      • More efficient and powerful IT infrastructure that capitalizes on emerging trends at the right time.
      • Lower help desk load due to self-service and automation technology.
      • Increased satisfaction with IT due to implementation of improved enterprise technology and visible IT influence on improvements.
      • Increased end-user satisfaction with IT due to understanding and support of consumer technology that affects their lives.
      • New technology may result in lower need for specific IT roles. Cultural disruptions due to changing role of IT.
      • Perception of failure if technology is tested and never implemented.
      • Expectation that IT will continue to implement the newest technology available, even when it has been dismissed as not having value.

      1.1.C Gain commitment from key stakeholders and executives

      Gaining approval from executives and key stakeholders is the final obstacle. Ensure that you cover the following items to have the best chance for project approval.

      • Use a sample deck similar to this section for gaining buy-in, ensuring that you add/remove information to make it specific to your organization. Cover this section, including:
        • Who: Who will lead the team and who will be on it (working group)?
        • What: What resources will be required by the team (costs)?
        • Where/When: How often and where will the team meet (meeting schedule)?
        • Why: Why is there a need to exploit disruptive technology (benefits and examples)?
        • How: How is the team going to exploit disruptive technology (the process)?
      • Go through this blueprint prior to presenting the plan to stakeholders so that you have a strong understanding of the details behind each process and tool.
      • Frame the first iteration of the cycle as a pilot program. Use the completed results of the pilot to establish exploiting disruptive technology as a necessary company initiative.

      Insert the resources required by the disruptive tech exploitation team into Section 1.5 of the Disruptive Technology Exploitation Plan Template. Have executives sign-off on the project in Section 1.6.

      Disruption has undermined some of the most successful tech companies

      “The IT department plays a critical role in [innovation]. What they can do is identify a technology that potentially might introduce improvements to the organization, whether it be through efficiency or through additional services to constituents.”
      - Michael Maguire, Management Consultant

      VoIP’s transformative effects

      Disruptive technology:
      Voice over Internet Protocol (VoIP) is a modern means of making phone calls through the internet by sending voice packets using data, as opposed to the traditional circuit transmissions of the PSTN.

      Who won:
      Organizations that realized the cost savings that VoIP provided for businesses with a steady internet connection saved as much as 60% on telephony expenses. Even in the early stages, with a few more limitations, organizations were able to save a significant amount of money and the technology has continued to improve.

      Who lost?
      Telecom-related companies that failed to realize VoIP was a potential threat to their market, and organizations that lacked the ability to explore and implement the disruptive technology early.

      Digital photography — the new norm

      Disruptive technology:
      Digital photography refers to the storing of photographs in a digital format, as opposed to traditional photography, which exposes light to sensitive photographic film.

      Who won:
      Photography companies and new players that exploited the evolution of data storage and applied it to photography succeeded. Those that were able to balance providing traditional photography and exploiting and introducing digital photography, such as Nikon, left competitors behind. Smartphone manufacturers also benefited by integrating digital cameras.

      Who lost?
      Photography companies, such as Kodak, that failed to respond to the digital revolution found themselves outcompeted and insolvent.

      1.1.D Help stakeholders understand what goes into formally exploiting disruptive tech by reviewing this process

      There are five steps to formally exploiting disruptive technology, each with its own individual outputs and tools to take analysis to the next level.

      Step 1.2:
      Hold Initial Meeting

      Output:

      • Initial list of disruptable processes;
      • Initial longlist

      Step 2.1:

      Brainstorm Longlist

      Output:

      • Finalized longlist;
      • Shortlist

      Step 2.2:

      Assess Shortlist

      Output:

      • Final shortlist;
      • SWOT analysis;
      • Tech categorization

      Step 3.1:
      Create Process Maps

      Output:

      • Completed process maps

      Step 3.2:
      Develop a proof of concept charter

      Output:

      • Proof-of-concept template with KPIs

      Info-Tech Insight

      Before going to stakeholders, complete the entire blueprint to better understand the tools and outputs of the process.

      1.1.E Establish the core working group and select a leader

      • Selecting your core membership for the working group is a critical step to the group’s success. Ensure that you satisfy the following criteria:
        • This is a team of subject matter experts. They will be overseeing the learning and piloting of disruptive technologies. Their input will also be valuable for senior executives and for implementing these technologies.
        • Choose members that can take time away from firefighting tasks to dedicate time to meetings.
        • It may be necessary to reach outside of the organization now or in the future for expertise on certain technologies. Use Info-Tech as a source of information.
      Organization Size Working Group Size
      Small 02-Jan
      Medium 05-Mar
      Large 10-May
      • Once the team is established, you must decide who will lead the group. Ensure that you satisfy the following criteria:
        • A leader should be credible, creative, and savvy in both technology and business.
        • The leader should facilitate, acting as both an expert and an aggregator of the information gathered by the team.

      Choose a compelling name

      The working group needs a name. Be sure to select one with a positive connotation within your organization.

      Section 1.3 of the Disruptive Technology Exploitation Plan Template

      1.1.F Create a schedule with a time commitment appropriate to your organization’s size; it doesn’t need to take long

      Time the disruptive technology working group’s meetings to coincide and integrate with your organization’s strategic planning — at least annually.

      Size Meeting Frequency Time per Meeting Example Meeting Activities
      Small Annually One day A one-day meeting to run through phase 2 of the project (SWOT analysis and shortlist analysis).
      Medium Two days A two-day meeting to run through the project. The additional meeting involves phase 3 of this deck, developing a proof-of-concept plan.
      Large Two+ days Two meetings, each two days. Two days to create and winnow the longlist (phase 2), and two further days to develop a proof of concept plan.

      “Regardless of size, it’s incumbent upon every organization to have some familiarity of what’s happening over the next few years, [and to try] to anticipate what some of those trends may be. […] These trends are going to accelerate IT’s importance in terms of driving business strategy.”
      – Vern Brownell, CEO, D-Wave

      Section 1.4 of the Disruptive Technology Exploitation Plan Template

      1.1.G Select a group of visionaries external to IT to help the working group brainstorm disruptive technologies

      Selecting advisors for your group is an ongoing step, and the roster can change.

      Ensure that you satisfy the following criteria:

      • Look beyond IT to select a team representing several business units.
      • Check for self-professed “geeks” and fans of science fiction that may be happy to join.
      • Membership can be a reward for good performance.

      This group does not have to meet as regularly as the core working group. Input from external advisors can occur between meetings. You can also include them on every second or third iteration of the entire process.

      However, the more input you can get into the group, the more innovative it can become.

      “It is … important to develop design fictions based on engagement with directly or indirectly implicated publics and not to be designed by experts alone.”
      – Emmanuel Tsekleves, Senior Lecturer in Design Interactions, University of Lancaster

      Section 1.3 of the Disruptive Technology Exploitation Plan Template

      The following case study illustrates the innovative potential that is created when you include a diverse group of people

      INDUSTRY - Chip Manufacturing
      SOURCE - Clayton Christensen, Intel

      To achieve insight, you need to collaborate with people from outside of your department.

      Challenge

      • Headquartered in California, through the 1990s, Intel was the largest microprocessor chip manufacturer in the world, with revenue of $25 billion in 1997.
      • All was not perfect, however. Intel faced a challenge from Cyrix, a manufacturer of low-end chips. In 18 months, Cyrix’s share of the low-margin entry-level chip manufacturing business mushroomed from 10% to 70%.

      Solution

      • Troubled by the potential for significant disruption of the microprocessor market, Intel brought in external consultants to hold workshops to educate managers about disruptive innovation.
      • Managers would break into groups and discuss ways Intel could facilitate the disruption of its competitors. In one year, Intel hosted 18 workshops, and 2,000 managers went through the process.

      Results

      • Intel launched the Celeron chip to serve the lower end of the PC market and win market share back from Cyrix (which no longer exists as an independent company) and other competitors like AMD.
      • Within one year, Intel had captured 35% of the market.

      “[The models presented in the workshops] gave us a common language and a common way to frame the problem so that we could reach a consensus around a counterintuitive course of action.” – Andy Grove, then-CEO, Intel Corporation

      Phase 1: Identify

      Create your working group.

      Activities:

      Step 1.1: Establish the core working group and select a leader; select a group of visionaries
      Step 1.2: Train the group to think like futurists
      Step 1.3: Hold the initial meeting

      This step involves the following participants:

      • IT Infrastructure Manager
      • CIO or CTO
      • Potential members and visionaries of the working group

      Outcomes of this phase:

      • Establish a team of subject matter experts that will evaluate new, emerging, and potentially disruptive technologies.
      • Establish a process for including visionaries from outside of the working group who will provide insight and direction.
      • Introduce the core working group members.
      • Gain a better understanding of how technology advances.
      • Brainstorm a list of organizational processes.
      • Brainstorm an initial longlist.

      Step 1.2

      Train the group to think like futurists

      Activities:

      1. Look to the past to predict the future:
        • Step 1: Review the technology opportunities you missed
        • Step 2: Review and record what you liked about the tech
        • Step 3: Review and record your dislikes
        • Step 4: Record and test the reasonability
      2. Crash course on futurology principles
      3. Peek into the future

      This step involves the following participants:

      • IT Infrastructure Manager
      • CIO or CTO
      • Core working group members
      • Visionaries

      Outcomes of this step

      • Team members thinking like futurists
      • Better understanding of how technology advances
      • List of past examples and characteristics

      Info-Tech Insight

      Business buy-in is essential. Manage your business partners by providing a summary of the EDIT methodology and process. Validate the process value, which will allow you create a team of IT and business representatives.

      1.2 Train the group to think like futurists

      1 hour

      Ensure the team understands how technology advances and how they can identify patterns in upcoming technologies.

      1. Lead the group through a brainstorming session.
      2. Follow the next phases and steps.
      3. This session should be led by someone who can facilitate a thought-provoking discussion.
      4. This training deck finishes with a video.

      Input

      • Facilitated creativity
      • Training deck [following slides]

      Output

      • Inspiration
      • Anonymous ideas

      Materials

      • Futurist training “steps”
      • Pen and paper

      Participants

      • Core working group
      • Visionaries
      • Facilitator

      1.2.A Look to the past to predict the future

      30 minutes

      Step 1

      Step 2 Step 3 Step 4

      Review what you missed.

      What did you like?

      What did you dislike?

      Test the reasonability.

      Think about a time you missed a technical disruptive opportunity.

      Start with a list of technologies that changed your business and processes.

      Consider those specifically you could have identified with a repeatable process.

      What were the most impactful points about the technology?

      Define a list of “characteristics” you liked.

      Create a shortlist of items.

      Itemize the impact to process, people, and technology.

      Why did you pass on the tech?

      Define a list of “characteristics” you did not like.

      Create a shortlist of items.

      Itemize the impact to process, people, and technology.

      Avoid the “arm chair quarterback” view.

      Refer to the six positive and negative points.

      Check against your data points at the end of each phase.

      Record the list of missed opportunities

      Record 6 characteristics

      Record 6 characteristics

      Completed “Think like a Futurists” tool

      Use the Disruptive Technology Research Look to the Past Tool to record your output.

      Input

      • Facilitated creativity
      • Speaker’s notes

      Output

      • Inspiration
      • Anonymous ideas
      • Recorded missed opportunities
      • Recorded positive points
      • Recorded dislikes
      • Reasonability test list

      Materials

      • Futurist training “steps”
      • Pen and paper
      • “Look to the Past” tool

      Participants

      • Core working group
      • Visionaries
      • Facilitator

      Understand how the difference between linear and exponential growth will completely transform many organizations in the next decade

      “The last ten years have seen exponential growth in research on disruptive technologies and their impact on industries, supply chains, resources, training, education and employment markets … The debate is still open on who will be the winners and losers of future industries, but what is certain is that change has picked up pace and we are now in a new technology revolution whose impact is potentially greater than the industrial revolution.”
      – Gary L. Evans

      Exponential advancement will ensure that life in the next decade will be very different from life today.

      • Linear growth happens one step at a time.
      • The difference between linear and exponential is hard to notice, at first.
      • We are now at the knee of the curve.

      What about email?

      • Consider the amount of email you get daily
      • Double it
      • Triple it

      Exponential growth happens much faster than linear growth, especially when it hits the knee of the curve. Technology grows exponentially, and we are approaching the knee of the curve.

      This graph is adapted from research by Ray Kurzweil.

      Growth: Linear vs. Exponential

      This image contains a graph demonstrating examples of exponential and linear trends.

      1.2.B Crash course on futurology principles

      1 hour

      “An analysis of the history of technology shows that technological change is exponential, contrary to the common-sense ‘intuitive linear’ view. So we won’t experience 100 years of progress in the 21st century — it will be more like 20,000 years of progress (at today’s rate).”
      - Ray Kurzweil

      Review the differences between exponential and linear growth

      The pace of technological advances makes progress difficult to predict.

      Technology advances exponentially. Rather than improving by the same amount of capability each year, it multiplies in capability each year.

      Think like a futurist to anticipate technology before it goes mainstream.

      Exponential growth happens much faster than linear growth, especially when it hits the knee of the curve. Even those who acknowledge exponential growth underestimate how capabilities can improve.

      The following case study illustrates the rise of social media providers

      “There are 7.7 billion people in the world, with at least 3.5 billion of us online. This means social media platforms are used by one in three people in the world and more than two-thirds of all internet users.”
      – Esteban Ortiz-Ospina

      This graph depicts the trend of the number of people using social media platforms between 2005 and 2019

      The following case study illustrates the rapid growth of Machine to Machine (M2M) connections

      A bar graph is shown which depicts the proportion of technology use from 2018-2022. the included devices are: Tablets; PCs; TVs; Non-smartphones; Smartphones; M2M

      Ray Kurzweil’s Law of Accelerating Returns

      “Ray Kurzweil has been described as ‘the restless genius’ by The Wall Street Journal, and ‘the ultimate thinking machine’ by Forbes. He was ranked #8 among entrepreneurs in the United States by Inc Magazine, calling him the ‘rightful heir to Thomas Edison,’ and PBS included Ray as one of 16 ‘revolutionaries who made America,’ along with other inventors of the past two centuries.”
      Source: KurzweilAI.net

      Growth is linear?

      “Information technology is growing exponentially. That’s really my main thesis, and our intuition about the future is not exponential, it’s really linear. People think things will go at the current pace …1, 2, 3, 4, 5, and 30 steps later, you’re at 30.”

      Better IT strategy enables future business innovation

      “The reality of information technology like computers, like biological technologies now, is it goes exponentially … 2, 4, 8, 16. At step 30, you’re at a billion, and this is not an idle speculation about the future.” [emphasis added]

      “When I was a student at MIT, we all shared a computer that cost tens of millions of dollars. This computer [pulling his smartphone out of his pocket] is a million times cheaper, a thousand times more powerful — that’s a billion-fold increase in MIPS per dollar, bits per dollar… and we’ll do it again in 25 years.”
      Source: “IT growth and global change: A conversation with Ray Kurzweil,” McKinsey & Company

      1.2.C Peak into the future

      1 hour

      Leverage industry roundtables and trend reports to understand the art of the possible

      • Uncover important business and industry trends that can inform possibilities for technology disruption.
      • Market research is critical in identifying factors external to your organization and identifying technology innovation that will provide a competitive edge. It’s important to evaluate the impact each trend or opportunity will have in your organization and market.

      Visit Info-Tech’s Trends & Priorities Research Center

      Visit Info-Tech’s Industry Coverage Research to get started.

      Phase 1: Identify

      Create your working group

      Activities:

      Step 1.1: Establish the core working group and select a leader; select a group of visionaries
      Step 1.2: Train the group to think like futurists
      Step 1.3: Hold the initial meeting

      This step involves the following participants:

      • IT Infrastructure Manager
      • CIO or CTO
      • Potential members and visionaries of the working group

      Outcomes of this phase:

      • Establish a team of subject matter experts that will evaluate new, emerging, and potentially disruptive technologies.
      • Establish a process for including visionaries from outside of the working group who will provide insight and direction.
      • Introduce the core working group members.
      • Gain a better understanding of how technology advances.
      • Brainstorm a list of organizational processes.
      • Brainstorm an initial longlist.

      Info-Tech Insight

      Establish the longlist. The longlist help create a holistic view of most technologies that could impact the business. Assigning values and quadrant scoring will shortlist the options and focus your PoC option.

      Step 1.3

      Hold the initial meeting

      Activities:

      1. Create an agenda for the meeting
      2. Start the kick-off meeting with introductions and a recap
      3. Brainstorm about creating a better future
      4. Begin brainstorming an initial longlist
      5. Have team members develop separate longlists for their next meeting

      This step involves the following participants:

      • IT Infrastructure Manager
      • CIO or CTO
      • Core working group members
      • Visionaries

      Outcomes of this step

      • Introduce the core working group members
      • Gain a better understanding of how technology advances
      • Brainstorm a list of organizational processes
      • Brainstorm an initial longlist

      1.3.A Create an agenda for the meeting

      1 hour

      Kick-off this cycle of the disruptive technology process by welcoming your visionaries and introducing your core working group.

      The purpose of the initial meeting is to brainstorm where new technology will be the most disruptive within the organization. You’ll develop two longlists: one of business processes and one of disruptive technology. These longlists are in addition to the independent research your core working group will perform before Phase 2.

      • Find an outgoing facilitator. Sitting back will let you focus more on ideating, and an engaging presenter will help bring out ideas from your visionaries.
      • The training deck (see step 1.2c) includes presenting a video. We’ve included some of our top choices for you to choose from.
        • Feel free to find your own video or bring in a keynote speaker.
        • The object of the video is to get the group thinking about the future.
        • Customize the training deck as needed.
      • If a cycle has been completed, present your findings and all of the group’s completed deliverables in the first section.
      • This session is the only time you have with your visionaries. Get their ideas on what technologies will be disruptive to start forming a longlist.

      Info-Tech Insight

      The disruptive tech team is prestigious. If your organization is large enough or has the resources, consider having this meeting in an offsite location. This will drive excitement to join the working group if the opportunity arises and incentivize good work.

      Meeting Agenda (Sample)

      Time

      Activity

      8:00am-8:30am Introductions and previous meeting recap
      8:30am-9:30am Training deck
      9:30 AM-10:00am Brainstorming
      10:00am-10:15am Break
      10:15am-10:45am Develop good research techniques
      10:45am-12:00pm Begin compiling your longlist

      Info-Tech Insight

      The disruptive tech team is prestigious. If your organization is large enough or has the resources, consider having this meeting in an offsite location. This will drive excitement to join the working group if the opportunity arises and incentivize good work.

      1.3.B Start the kick-off meeting with introductions and a summary of what work has been done so far

      30 minutes

      1. Start the meeting off with an icebreaker activity. This isn’t an ordinary business meeting – or even group – so we recommend starting off with an activity that will emphasize this unique nature. To get the group in the right mindset, try this activity:
        1. Go around the group and have people present:
        2. Their names and roles
        3. Pose some or all of the following questions/prompts to the group:
          • “Tell me about something you have created.”
          • “Tell me about a time you created a process or program considered risky.”
          • “Tell me about a situation in which you had to come up with several new ideas in a hurry. Were they accepted? Were they successful?”
          • “Tell me about a time you took a risk.”
          • “Tell me about one of your greatest failures and what you learned from it.”
      2. Once everyone has been introduced, present any work that has already been completed.
        1. If you have already completed a cycle, give a summary of each technology that you investigated and the results from any piloting.
        2. If this is the first cycle for the working group, present the information decided in Step 1.1.

      Input

      • Disruptive technology exploitation plan

      Output

      • Networking
      • Brainstorming

      Materials

      • Meeting agenda

      Participants

      • Core working group
      • Visionaries
      • Facilitator

      1.3.C Brainstorm about creating a better future for the company, the stakeholders, and the employees

      30 minutes

      Three sticky notes are depicted, at the top of each note are the following titles: What can we do better; How can we make a better future; How can we continue being successful

      1. Have everyone put up at least two ideas for each chart paper.
      2. Go around the room and discuss their ideas. You may generate some new ideas here.

      These generated ideas are organizational processes that can be improved or disrupted with emerging technologies. This list will be referenced throughout Phases 2 and 3.

      Input

      • Inspiration
      • Anonymous ideas

      Output

      • List of processes

      Materials

      • Chart paper and markers
      • Pen and paper

      Participants

      • Core working group
      • Visionaries

      1.3.D Begin brainstorming a longlist of future technology, and discuss how these technologies will impact the business

      30 minutes

      • Use the Disruptive Technology Research Database Tool to organize technologies and ideas. Longstanding working groups can track technologies here over the course of several years, updating the tool between meetings.
      • Guide the discussion with the following questions, and make sure to focus on the processes generated from Step 1.2.d.

      Focus on

      The Technology

      • What is the technology and what does it do?
      • What processes can it support?

      Experts and Other Organizations

      • What are the vendors saying about the technology?
      • Are similar organizations implementing the technology?

      Your Organization

      • Is the technology ready for wide-scale distribution?
      • Can the technology be tested and implemented now?

      The Technology’s Value

      • Is there any indication of the cost of the technology?
      • How much value will the technology bring?

      Download the Disruptive Technology Database Tool

      Input

      • Inspiration
      • List of processes

      Output

      • Initial longlist

      Materials

      • Chart paper and markers
      • Pen and paper
      • Disruptive Technology Research Database Tool

      Participants

      • Core working group
      • Visionaries

      1.3.E Explore these sources to generate your disruptive technology longlist for the next meeting

      30 Minutes

      There are many sources of information on new and emerging technology. Explore as many sources as you can.

      Science fiction is a valid source of learning. It drives and is influenced by disruptive technology.

      “…the inventor of the first liquid-fuelled rocket … was inspired by H.G. Wells’ science fiction novel War of the Worlds (1898). More recent examples include the 3D gesture-based user interface used by Tom Cruise’s character in Minority Report (2002), which is found today in most touch screens and the motion sensing capability of Microsoft’s Kinect. Similarly, the tablet computer actually first appeared in Stanley Kubrick’s 2001: A Space Odyssey (1968) and the communicator – which we’ve come to refer today as the mobile phone – was first used by Captain Kirk in Star Trek (1966).”
      – Emmanuel Tsekleves, senior lecturer, University of Lancaster

      Right sources: blogs, tech news sites, tech magazines, the tech section of business sites, popular science books about technology, conferences, trade publications, and vendor announcements

      Quantity over quality: early research is not the time to dismiss ideas.

      Discuss with your peers: spark new and innovative ideas

      Insert a brief summary of how independent research is conducted in Section 2.1 of the Disruptive Technology Exploitation Plan Template.

      1.3.E (Cont.) Explore these sources to generate your disruptive technology longlist for the next meeting

      30 Minutes

      There are many sources of information on new and emerging technology. Use this list to kick-start your search.

      Connect with practitioners that are worth their weight in Reddit gold. Check out topic-based LinkedIn groups and subreddits such as r/sysadmin and r/tech. People experienced with technology frequent these groups.

      YouTube is for more than cat videos. Many vendors use YouTube for distributing their previous webinars. There are also videos showcasing various technologies that are uploaded by lecturers, geeks, researchers, and other technology enthusiasts.

      Test your reasonability. Check your “Think Like a Futurist” Tool

      Resolve

      Evaluate Disruptive Technologies

      PHASE 2

      Phase 2: Resolve

      Evaluate disrupted technologies

      Activities:

      Step 2.1: Create and Winnow a Longlist
      Step 2.2: Assess Shortlist

      Info-Tech Insight

      Long to short … that’s the short of it. Using SWOT, value readiness, and quadrant mapping review sessions will focus the longlist, creating a shortlist of potential PoC candidates to review and consider.

      This step involves the following participants:

      • Core working group
      • Infrastructure Management

      Outcomes of this step:

      • Finalized longlist
      • Finalized shortlist
      • Initial analysis of each technology on the shortlist

      Step 2.1

      Create and winnow a longlist

      Activities:

      1. Converge everyone’s longlists
      2. Narrow technologies from the longlist down to a shortlist using Info-Tech’s Disruptive Technology Shortlisting Tool
      3. Use the shortlisting tool to help participants visualize the potential
      4. Input the technologies on your longlist into the Disruptive Technology Shortlisting Tool to produce a shortlist

      This step involves the following participants:

      • Core working group members

      Outcomes of this step:

      • Finalized longlist
      • Finalized shortlist
      • Initial analysis of each technology on the shortlist

      2.1 Organize a meeting with the core working group to combine your longlists and create a shortlist

      1 hour

      Plan enough time to talk about each technology on the list. Each technology was included for a reason.

      • Start with the longlist. Review the longlist compiled at the initial meeting, and then have everyone present the lists that they independently researched.
      • Focus on the company’s context. Make sure that the working group analyzes these disruptive technologies in the context of the organization.
      • Start to compile the shortlist. Begin narrowing down the longlist by excluding technologies that are not relevant.

      Meeting Agenda (Sample)

      TimeActivity
      8:00am-9:30amConverge longlists
      9:30am-10:00amBreak
      10:00am-10:45amDiscuss tech in organizational context
      10:45am-11:15amBegin compiling the shortlist

      Disruptive Technology Exploitation Plan Template

      2.1.A Converge the longlists developed by your team

      90 minutes

      • Start with the longlist developed at the initial meeting. Write this list on the whiteboard.
      • If applicable, have a member present the longlist that was created in the last cycle. Remove technologies that:
        • Are no longer disruptive (e.g. have been implemented or rejected).
        • Have become foundational.
      • Eliminate redundancy: remove items that are very similar.
      • Have members “pitch” items on their lists:
        • Explain why their technologies will be disruptive (2-5 minutes maximum)
        • Add new technologies to the whiteboard
      • Record the following for metrics:
        • Each presented technology
        • Reasons the technology could be disruptive
        • Source of the information
      • Use Info-Tech’s Disruptive Technology Research Database Tool as a starting point.

      Insert the final longlist into Section 2.2 of your Disruptive Technology Exploitation Plan Template.

      Input

      • Longlist developed at first meeting
      • Independent research
      • Previous longlist

      Output

      • Finalized longlist

      Materials

      • Disruptive Technology Research Database Tool
      • Whiteboard and markers
      • Virtual whiteboard

      Participants

      • Core working group

      Review the list of processes that were brainstormed by the visionary group, and ask for input from others

      • IT innovation is most highly valued by the C-suite when it improves business processes, reduces costs, and improves core products and services.
      • By incorporating this insight into your working group’s analysis, you help to attract the attention of senior management and reinforce the group’s necessity.
      • Any input you can get from outside of IT will help your group understand how technology can be disruptive.
        • Visionaries consulted in Phase 1 are a great source for this insight.
      • The list of processes that they helped to brainstorm in Step 1.2 reflects processes that can be impacted by technology.
      • Info-Tech’s research has shown time and again that both CEOs and CIOs want IT to innovate around:
        • Improving business processes
        • Improving core products and services
        • Reducing costs

      Improved business processes

      80%

      Core product and service improvement

      48%

      Reduced costs

      48%

      Increased revenues

      23%

      Penetration into new markets

      21%

      N=364 CXOs & CIOs from the CEO-CIO Alignment Diagnostic Questions were asked on a 7-point scale of 1 = Not at all to 7 = Very strongly. Results are displayed as percentage of respondents selecting 6 or 7.

      Info-Tech Insight

      The disruptive tech team is prestigious. If your organization is large enough or has the resources, consider having this meeting in an offsite location. This will drive excitement to join the working group if the opportunity arises and incentivize good work.

      2.1.B Narrow technologies from the longlist down to a shortlist using Info-Tech’s Disruptive Technology Shortlisting Tool

      90 minutes

      To decide which technology has potential for your organization, have the working group or workshop participants evaluate each technology:

      1. Record each potentially disruptive technology in the longlist on a whiteboard.
      2. Making sure to carefully consider the meaning of the terms, have each member of the group evaluate each technology as “high” or “low” along each of the axes, innovation and transformation, on a piece of paper.
      3. The facilitator collects each piece of paper and inputs the results by technology into the Disruptive Technology Shortlisting Tool.
      Technology Innovation Transformation
      Conversational Commerce High High

      Insert the final shortlist into Section 2.2 of your Disruptive Technology Exploitation Plan Template.

      Input

      • Longlist
      • Futurist brainstorming

      Output

      • Shortlist

      Materials

      • Disruptive Technology Research Database Tool
      • Whiteboard and markers
      • Virtual whiteboard

      Participants

      • Core working group

      Disruptive technologies are innovative and transformational

      Innovation

      Transformation

      • Elements:
        • Creative solution to a problem that is relatively new on the scene.
        • It is different, counterintuitive, or insightful or has any combination of these qualities.
      • Questions to Ask:
        • How new is the technology?
        • How different is the technology?
        • Have you seen anything like it before? Is it counterintuitive?
        • Does it offer an insightful solution to a persistent problem?
      • Example:
        • The sharing economy: Today, simple platforms allow people to share rides and lodgings cheaply and have disrupted traditional services.
      • Elements:
        • Positive change to the business process.
        • Highly impactful: impacts a wide variety of roles in a company in a nontrivial way or impacts a smaller number of roles more significantly.
      • Questions to Ask:
        • Will this technology have a big impact on business operations?
        • Will it add substantial value? Will it change the structure of the company?
        • Will it impact a significant number of employees in the organization?
      • Example:
        • Flash memory improved storage technology incrementally by building on an existing foundation.

      Info-Tech Insight

      Technology can be transformational but not innovative. Not every new technology is disruptive. Even where technology has improved the efficiency of the business, if it does this in an incremental way, it might not be worth exploring using this storyboard.

      2.1.C Use the shortlisting tool to help participants visualize the potential

      1 hour

      Use the Disruptive Technology Shortlisting Tool, tabs 2 and 3.

      Assign quadrants

      • Input group members’ names and the entire longlist (up to 30 technologies) into tab 2 of the Disruptive Technology Shortlisting Tool.
      • On tab 3 of the Disruptive Technology Shortlisting Tool, input the quadrant number that corresponds to the innovation and transformation scores each participant has assigned to each technology.

      Note

      This is an assessment meant to serve as a guide. Use discretion when moving forward with a proof-of-concept project for any potentially disruptive technology.

      Participant Evaluation Quadrant
      High Innovation, High Transformation 1
      High Innovation, Low Transformation 2
      Low Innovation, Low Transformation 3
      Low Innovation, High Transformation 4

      four quadrants are depicted, labeled 1-4. The quadrants are coloured as follows: 1- green; 2- yellow; 3; red; 4; yellow

      2.1.D Use the Disruptive Technology Shortlisting Tool to produce a shortlist

      1 hour

      Use the Disruptive Technology Shortlisting Tool, tabs 3 and 4.

      Use the populated matrix and the discussion list to arrive at a shortlist of four to six potentially disruptive technologies.

      • The tool populates each quadrant based on how many votes it received in the voting exercise.
      • Technologies selected for a particular quadrant by a majority of participants are placed in the quadrant on the graph. Where there was no consensus, the technology is placed in the discussion list.
      • Technologies in the upper right quadrant – high transformation and high innovation – are more likely to be good candidates for a proof-of-concept project. Those in the bottom left are likely to be poor candidates, while those in the remaining quadrants are strong on one of the axes and are unlikely candidates for further systematic evaluation.

      This image contains a screenshot from tab 3 of the Disruptive Technology Shortlisting Tool.

      Input the results of the vote into tab 3 of the Disruptive Technology Shortlisting Tool.

      This image contains a screenshot from tab 4 of the Disruptive Technology Shortlisting Tool.

      View the results on tab 4.

      Phase 2: Resolve

      Evaluate disrupted technologies

      Activities:

      Step 2.1: Create and Winnow a Longlist
      Step 2.2:- Assess Shortlist

      This step involves the following participants:

      • Core working group
      • Infrastructure Management

      Outcomes of this step:

      • Finalized longlist
      • Finalized shortlist
      • Initial analysis of each technology on the shortlist

      Assess Shortlist

      Activities:

      1. Assess the value of each technology to your organization by breaking it down into quality and cost
      2. Investigate the overall readiness of the technologies on the shortlist
      3. Interpret each technology’s value score
      4. Conduct a SWOT analysis for each technology on the shortlist
      5. Use Info-Tech’s disruptive technology shortlist analysis to visualize the tool’s outputs
      6. Select the shortlisted technologies you would like to move forward with

      This step involves the following participants:

      • Core working group members
      • IT Management

      Outcomes of this step:

      • Finalized shortlist
      • Initial analysis of each technology on the shortlist

      2.2 Evaluate technologies based on their value and readiness, and conduct a SWOT analysis for each one

      Use the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      • A technology monitor diagram prioritizes investment in technology by analyzing its readiness and value.
        • Readiness: how close the technology is to being practical and implementable in your industry and organization.
        • Value: how worthwhile the technology is, in terms of its quality and its cost.
      • Value and readiness questionnaires are included in the tool to help determine current and future values for each, and the next four slides explain the ratings further.
      • Categorize technology by its value-readiness score, and evaluate how much potential value each technology has and how soon your company can realize that value.
      • Use a SWOT analysis to qualitatively evaluate the potential that each technology has for your organization in each of the four categories (strengths, weaknesses, opportunities, and threats).

      The technology monitor diagram appears in tab 9 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      This image depicts tab 9 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      2.2.A Assess the value of each technology to your organization by breaking it down into quality and cost

      1 hour

      Update the Disruptive Technology Value-Readiness and SWOT Analysis Tool, tab 4.

      Populate the chart to produce a score for each technology’s overall value to the company conceptualized as the interaction of quality and cost.

      Overall Value

      Quality Cost

      Each technology, if it has a product associated with it, can be evaluated along eight dimensions of quality. Consider how well the product performs, its features, its reliability, its conformance, its durability, its serviceability, its aesthetics, and its perceived quality.

      IT budgets are broken down into capital and operating expenditures. A technology that requires a significant investment along either of these lines is unlikely to produce a positive return. Also consider how much time it will take to implement and operate each technology.

      The value assessment is part of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      This image contains a screenshot from tab 4 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool.

      Info-Tech Insight

      Watch your costs: Technology that seems cheap at first can actually be expensive over time. Be sure to account for operational and opportunity costs as well.

      2.2.B Investigate the overall readiness of the technologies on the shortlist

      1 hour

      Update the Disruptive Technology Value-Readiness and SWOT Analysis Tool, tab 4.

      Overall Readiness

      Age

      How much time has the technology had to mature? Older technology is more likely to be ready for adoption.

      Venture Capital

      The amount of venture capital gathered by important firms in the space is an indicator of market faith.

      Market Size

      How big is the market for the technology? It is more difficult to break into a giant market than a niche market.

      Market Players

      Have any established vendors (Microsoft, Facebook, Google, etc.) thrown their weight behind the technology?

      Fragmentation

      A large number of small companies in the space indicates that the market has yet to reach equilibrium.

      The readiness assessment is part of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      This image contains a screenshot of the Readiness Scoring tab of the Disruptive Technology Value-Readiness and SWOT Analysis Tool.

      Use a variety of sources to populate the chart

      Google is your friend: search each shortlisted technology to find details about its development and important vendors.

      Websites like Crunchbase, VentureBeat, and Mashable are useful sources for information on the companies involved in a space and the amount of money they have each raised.

      2.2.C Interpret each technology’s value score

      1 hour

      Insert the result of the SWOT analysis into tab 7 of Info-Tech’s Disruptive Technology Value-Readiness and SWOT Analysis Tool.

      Visualize the results of the quality-cost analysis

      • Quality and cost are independently significant; it is essential to understand how each technology stacks up on the axes.
      • Use tab 6 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool for an illustration of how quality and cost interact to produce each technology’s final position on the tech monitor graph.
      • Remember: the score is notional and reflects the values that you have assigned. Be sure to treat it accordingly.

      This image contains a screenshot of the Value Analysis tab of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      Green represents a technology that scores extremely high on one axis or the other, or quite high on both. These technologies are the best candidates for proof-of-concept projects from a value perspective.

      Red represents a technology that has scored very low on both axes. These technologies will be expensive, time consuming, and of poor quality.

      Yellow represents the fuzzy middle ground. These technologies score moderately on both axes. Be especially careful when considering the SWOT analysis of these technologies.

      2.2.D Conduct a SWOT analysis for each technology on the shortlist

      1 hour

      Use tab 6 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool.

      A formal process for analyzing disruptive technology is the only way to ensure that it is taken seriously.

      Write each technology as a heading on a whiteboard. Spend 10-15 minutes on each technology conducting a SWOT analysis together.

      Consider four categories for each technology:

      • Strengths: Current uses of the technology or supporting technology and ways in which it helps your organization.
      • Weaknesses: Current limitations of the technology and challenges or barriers to adopting it in your organization.
      • Opportunities: Potential uses of the technology, especially as it advances or improves.
      • Threats: Potential negative disruptions resulting from the technology, especially as it advances or improves.

      The list of processes generated at the cycle’s initial meeting is a great source for opportunities and threats.

      Disruptive Technology Value-Readiness and SWOT Analysis Tool

      This image contains screenshots of the technology tab of the Disruptive Technology Value-Readiness and SWOT Analysis Tool.

      2.2.E Use Info-Tech’s disruptive technology shortlist analysis to visualize the tool’s outputs

      1 hour

      Disruptive Technology Value-Readiness and SWOT Analysis Tool, tab 9

      The tool’s final tab displays the results of the value-readiness analysis and the SWOT analysis in a single location.

      This image contains a screenshot from tab 9 of the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      Insert the shortlist analysis report into Section 3 of your Disruptive Technology Exploitation Plan Template.

      2.2.F Select the shortlisted technologies you would like to move forward with

      1 hour

      Present your findings to the working group.

      • The Disruptive Technology Value-Readiness and SWOT Analysis Tool aggregates your inputs in an easy-to-read, consistent way.
      • Present the tool’s outputs to members of the core working group.
      • Explain the scoring and present the graphic to the group. Go over each technology’s strengths and weaknesses as well as the opportunities and threats it presents/poses to the organization.
      • Go through the proof-of-concept planning phase before striking any technologies from the list.

      This image contains a screenshot of the disruptive technology shortlist analysis from the Disruptive Technology Value-Readiness and SWOT Analysis Tool

      Info-Tech Insight

      A technology’s exceptional value and immediate usability make it the best. A technology can be promising and compelling, but it is unsuitable unless it can bring immediate and exceptional value to your organization. Don’t get caught up in the hype.

      Evaluate

      Create an Action Plan to Exploit Disruptive Technologies

      PHASE 3

      Phase 3: Evaluate

      Create an Action Plan to Exploit Disruptive Technologies

      Activities:

      Step 3.1: Create Process Maps
      Step 3.2: Develop Proof of Concept Charter

      This step involves the following participants:

      • Core working group
      • Infrastructure Management
      • Working group leader
      • CIO

      Outcomes of this step:

      • Business process maps before and after disruption
      • Proof of concept charter
      • Key performance indicators
      • Estimation of required resources

      Step 3.1

      Create Process Maps

      Activities:

      1. Creating a problem canvas by identifying stakeholders, jobs, pains, and gains
      2. Clarify the problem the proof-of-concept project will solve
      3. Identify jobs and stakeholders
      4. Outline how disruptive technology will solve the problem
      5. Map business processes
      6. Identify affected business units
      7. Outline and map the business processes likely to be disrupted
      8. Recognize how the new technology will impact business processes
      9. Make the case: Outline why the new business process is superior to the old

      This step involves the following participants:

      • Working group leader
      • CIO

      Outcomes of this step:

      • Business process maps before and after disruption

      3.1 Create an action plan to exploit disruptive technologies

      Clarify the problem in order to make the case. Fill in section 1.1 of Info-Tech’s Proof of Concept Template to clearly outline the problem each proof of concept is designed to solve.

      Establish roles and responsibilities. Use section 1.2 of the template to outline the roles and responsibilities that fall to each member of the team. Ensure that clear lines of authority are delineated and that the list of stakeholders is exhaustive: include the executives whose input will be required for project approval, all the way to the technicians on the frontline responsible for implementing it.

      Outline the solution to the problem. Demonstrate how each proof-of-concept project provides a solution to the problem outlined in section 1.1. Be sure to clarify what makes the particular technology under investigation a potential solution and record the results in section 1.3.

      This image contains a screenshot of the Proof of concept project template

      Use the Proof of Concept Project Template to track the information you gather throughout Phase 3.

      3.1.A Creating a problem canvas by identifying stakeholders, jobs, pains, and gains

      2 hours

      Instructions:

      1. On a whiteboard, draw the visual canvas supplied below.
      2. Select your issue area, and list jobs, pains, and gains in the associated sections.
      3. Record the pains, jobs, and gains in sections 1.1-1.3 of the Proof of Concept Template.

      Gains

      1. More revenue

      2. Job security

      3. ……

      Jobs

      1. Moving product

      2. Per sale value

      3. ……

      Pains

      1. Clunky website

      2. Bad site navigation

      3. ……

      Input

      • Inspiration
      • Anonymous ideas

      Output

      • List of processes

      Materials

      • Chart paper and markers
      • Pen and paper

      Participants

      • Core working group
      • Visionaries

      3.1.B Clarify the problem the proof-of-concept project will solve

      2 hours

      What is the problem?

      • Every technology is designed to solve a problem faced by somebody somewhere. For each technology that your team has decided to move forward with, identify and clearly state the problem it would solve.
      • A clear problem statement is a crucial part of a new technology’s business case. It is impossible to earn buy-in from the rest of the organization without demonstrating the necessity of a solution.
      • Perfection is impossible to achieve: during the course of their work, everyone encounters pain points. Identify those pain points to arrive at the problem that needs to be solved.

      Example:

      List of pains addressed by conversational commerce:

      • Search functions can be clunky and unresponsive.
      • Corporate websites can be difficult to navigate.
      • Customers are uncomfortable in unfamiliar internet environments.
      • Customers do not like waiting in a long queue to engage with customer service representatives when they have concerns.

      “If I were given one hour to solve a problem, I would spend 59 minutes defining the problem and one minute resolving it.”
      – Albert Einstein

      Input the results of this exercise into Section 1.1 of the Proof of Concept Template.

      3.1.C Identify jobs and stakeholders

      1 hour

      Jobs

      Job: Anything that the “customer” (the target of the solution) needs to get done but that is complicated by a pain.

      Examples:
      The job of the conversational commerce interface is to make selling products easier for the company.
      From the customer perspective, the job of the conversational interface is to make the act of purchasing a product simpler and easier.

      Stakeholders

      Stakeholder: Anyone who is impacted by the new technology and who will end up using, approving, or implementing it.

      Examples:
      The executive is responsible for changing the company’s direction and approving investment in a new sales platform.
      The IT team is responsible for implementing the new technology.
      Marketing will be responsible for selling the change to customers.
      Customers, the end users, will be the ones using the conversational commerce user interface.

      Input the results of this exercise into Section 1.2 of the Proof of Concept Template.

      Info-Tech Insight

      Process deconstruction reveals strengths and weaknesses. Promising technology should improve stakeholders’ abilities to do jobs.

      3.1.D Outline how disruptive technology will solve the problem

      1 hour

      How will the technology in question make jobs easier?

      • How will the disruptive technology you have elected to move forward with create gains for the organization?
      • First, identify the gains that are supposed to come with the project. Consider the benefits that the various stakeholders expect to derive from the jobs identified.
      • Second, make note of how the technology in question facilitates the gains you have noted. Be sure to articulate the exclusive features of the new technology that make it an improvement over the current state.

      Note: The goal of this exercise is to make the case for a particular technology. Sell it!

      Expected Gain: Increase in sales.

      Conversational Commerce’s Contribution: Customers are more likely to purchase products using interfaces they are comfortable with.

      Expected Gain: Decrease in costs.

      Conversational Commerce’s Contribution: Customers who are satisfied with the conversational interface are less likely to interact with live agents, saving labor costs.

      Input the results of this exercise into Section 1.3 of the Proof of Concept Template.

      3.1.E Map business processes

      1 hour

      Map the specific business processes the new technology will impact.

      • Disruptive technologies will impact a wide variety of business processes.
      • Map business processes to visualize what parts of your organization (departments, silos, divisions) will be impacted by the new technology, should it be adopted after the proof of concept.
      • Identify how the disruption will take place.
      • Demonstrate the value of each technology by including the results of the Disruptive Technology Value-Readiness and SWOT Analysis Tool with your process map.

      This image contains a screenshot of the Proof of concept project template

      Use the Proof of Concept Project Template to track the information you gather throughout Phase 3.

      3.1.F Identify affected business units

      30 minutes per technology

      Disruptive technology will impact business units.

      • Using the stakeholders identified earlier in the project, map each technology to the business units that will be affected.
      • Make your list exhaustive. While some technologies will have a limited impact on the business as a whole, others will have ripple effects throughout the organization.
      • Examine affected units at all scales: How will the technology impact operations at the team level? The department level? The division level?

      “The disruption is not just in the technology. Sometimes a good business model can be the disruptor.”
      – Jason Hong, Associate Professor, Carnegie Mellon

      Example:

      • Customer service teams: Conversational commerce will replace some of the duties of the customer service representative. They will have to reorganize to account for this development.
      • IT department: The IT department will be responsible for building/maintaining the conversational interface (or, more likely, they will be responsible for managing the contract with the vendor).
      • Sales analytics: New data from customers in natural language might provide a unique opportunity for the analytics team to develop new initiatives to drive sales growth.

      Input the results of this exercise into Section 2.1 of the Proof of Concept Template.

      3.1.G Outline and map the business processes likely to be disrupted

      15 minutes per technology

      Leverage the insights of the diverse working group.

      • Processes are designed to transform inputs into outputs. All business activities can be mapped into processes.
      • A process map illustrates the sequence of actions and decisions that transform an input into an output.
      • Effective mapping gives managers an “aerial” view of the company’s processes, making it easier to identify inefficiencies, reduce waste, and ultimately, streamline operations.
      • To identify business processes, have group members familiar with the affected business units identify how jobs are typically accomplished within those units.

      “To truly understand a business process, we need information from both the top-down and bottom-up points of view. Informants higher in the organizational hierarchy with a strategic focus are less likely to know process details or problems. But they might advocate and clearly articulate an end-to-end, customer-oriented philosophy that describes the process in an idealized form. Conversely, the salespeople, customer service representatives, order processors, shipping clerks, and others who actually carry out the processes will be experts about the processes, their associated documents, and problems or exception cases they encounter.”
      – Robert J. Glushko, Professor at UC Berkeley and Tim McGrath, Business Consultant

      Info-Tech Insight

      Opinions gathered from a group that reflect the process in question are far more likely to align with your organization’s reality. If you have any questions about a particular process, do not be afraid to go outside of the working group to ask someone who might know.

      3.1.G Outline and map the business processes likely to be disrupted (continued)

      15 minutes per technology

      Create a simple diagram of identified processes.

      • Use different shapes to identify different points in the process.
      • Rectangles represent actions, diamonds represent decisions.
      • On a whiteboard, map out the actions and decisions that take place to transform an input into an output.
      • Input the result into section 2.2 of the Proof of Concept Template.

      This image contains a screenshot of the Software Service Cross-Function Process tab from Edraw Visualization Solutions.

      Source: Edraw Visualization Solutions

      Example: simplified process map

      1. User: visits company website
      2. User: engages search function or browses links
      3. User: selects and purchases product from a menu
      4. Company: ships product to customer

      3.1.H Recognize how the new technology will impact business processes

      15 minutes per technology

      Using the information gleaned from the previous activities, develop a new process map that takes the new technology into account.

      Identify the new actions or decisions that the new technology will affect.

      User: visits company website; User: engages conversational; commerce platform; User: engages search function or browses links; User: makes a natural language query; User: selects and purchases product from a menu</p data-verified=

      User: selects and purchases product from a menu; Company: ships product to customer; Company: ships product to customer">

      Info-Tech Insight

      It’s ok to fail! The only way to know you’re getting close to the “knee of curve" is from multiple failed PoC tests. The more PoC options you have, the more likely it will be that you will have two to three successful results.

      3.1.I Make the case: Outline why the new business process is superior to the old

      15 minutes per technology

      Articulate the main benefits of the new process.

      • Using the revised process map, make the case for each new action.
      • Questions to consider: How does the new technology relieve end-user/customer pains? How does the new technology contribute to the streamlining of the business process? Who will benefit from the new action? What are the implications of those benefits?
      • Record the results of this exercise in section 2.4 of the Proof of Concept Template.

      This image contains an example of an outline comparing the benefits of new and the old business processes.

      Info-Tech Insight

      If you cannot articulate how a new technology will benefit a business process, reconsider moving forward with the proof-of-concept project.

      Phase 3: Evaluate

      Create an Action Plan to Exploit Disruptive Technologies

      Activities:

      Step 3.1: Create Process Maps
      Step 3.2: Develop Proof of Concept Charter

      Develop Proof of Concept Charter

      This step involves the following participants:

      • Core working group
      • Infrastructure Management
      • Working group leader
      • CIO

      Outcomes of this step:

      • Business process maps before and after disruption
      • Proof of concept charter
      • Key performance indicators
      • Estimation of required resources

      Step 3.2

      Develop Proof of Concept Charter

      Activities:

      1. Use SMART success metrics to define your objectives
      2. Develop key performance indicators (KPIs)
      3. Identify key success factors for the project
      4. Outline the project’s scope
      5. Identify the structure of the team responsible for the proof-of-concept project
      6. Estimate the resources required by the project
      7. Be aware of common IT project concerns
      8. Communicate your working group’s findings and successes to a wide audience
      9. Hand off the completed proof-of-concept project plan
      10. Disruption is constant: Repeat the evaluation process regularly to protect the business

      This step involves the following participants:

      • Working group leader
      • CIO

      Outcomes of this step:

      • Proof of concept charter
      • Key performance indicators
      • Estimation of required resources

      3.2 Develop a proof of concept charter

      Keep your proof of concept on track by defining five key dimensions.

      1. Objective: Giving an overview of the planned proof of concept will help to focus and clarify the rest of this section. What must the proof of concept achieve? Objectives should be: specific, measurable, attainable, relevant, and time bound. Outline and track key performance indicators.
      2. Key Success Factors: These are conditions that will positively impact the proof of concept’s success.
      3. Scope: High-level statement of scope. More specifically, state what is in scope and what is out of scope.
      4. Project Team: Identify the team’s structure, e.g. sponsors, subject-matter experts.
      5. Resource Estimation: Identify what resources (time, materials, space, tools, expertise, etc.) will be needed to build and socialize your prototype. How will they be secured?

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.A Use SMART success metrics to define your objectives

      Specific

      Measurable

      Actionable

      Realistic

      Time Bound

      Make sure the objective is clear and detailed.

      Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.

      Objectives become actionable when specific initiatives designed to achieve the objective are identified.

      Objectives must be achievable given your current resources or known available resources.

      An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.

      Who, what, where, why?

      How will you measure the extent to which the goal is met?

      What is the action-oriented verb?

      Is this within my capabilities?

      By when: deadline, frequency?

      Examples:

      1. Increase in sales by $40,000 per month by the end of next quarter.
      2. Immediate increase in web traffic by 600 unique page views per day.
      3. Number of pilots approved per year.
      4. Number of successfully deployed solutions per year.

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.B Develop key performance indicators (KPIs)

      30 minutes per technology

      Key performance indicators allow for rigorous analysis, which generates insight into utilization by platform and consumption by business activity.

      • Use the process improvements identified in step 3.1 to brainstorm metrics that indicate when process improvement is actually taking place.
      • Have members of the group pitch KPIs; the facilitator should record each suggestion on a whiteboard.
      • Make sure to have everyone justify the inclusion of each metric: How does it relate to the improvement that the proof of concept project is intended to drive? How does it relate to the overall goals of the business?
      • Include a list of KPIs, along with a description and a target (ensuring that it aligns with SMART metrics) in section 3.1 of the Proof of Concept Template.

      “An estimated 70% of performance measurement systems fail after implementation. Carefully select your KPIs and avoid this trap!”
      Source: Collins et al. 2016

      Key Performance Indicator Description Target

      Result

      Conversion rate What percentage of customers who visit the site/open the conversational interface continue on to make a purchase? 40%
      Average order value

      How much does each customer spend per visit to the website?

      $212
      Repeat customer rate What percentage of customers have made more than one purchase over time? 65%
      Lifetime customer value Over the course of their interaction with the company, what is the typical value each customer brings? $1566

      Input the results of this exercise into Section 3.1 of the Proof of Concept Template.

      3.2.C Identify key success factors for the project

      30 minutes per technology

      Effective project management involves optimizing four key success factors (Clarke, 1999)

      • Communication: Communicate the expected changes to stakeholders, making sure that everyone who needs to know does know. Example: Make sure customer service representatives know their duties will be impacted by the conversational UI well before the proof-of-concept project begins.
      • Clarity: All involved in the project should be apprised of what the project is intended to accomplish and what the project is not intended to accomplish. Example: The conversational commerce project is not intended to be rolled out to the entire customer base all at once; it is not intended to disrupt normal online sales.
      • Compartmentalization: The working group should suggest some ways that the project can be broken down to facilitate its effective implementation. Example: Sales provides details of customers who might be amenable to a trial, IT secures a vendor, customer service writes a script.
      • Flexibility: The working group’s final output should not be treated as gospel. Ensure that the document can be altered to account for unexpected events. Example: The conversational commerce platform might drive sales of a particular product more than others, necessitating adjustments at the warehouse and shipping level.

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.D Outline the project’s scope

      10 minutes per technology

      Create a high-level outline of the project’s scope.

      • Questions to consider: Broadly speaking, what are the project’s goals? What is the desired future state? Where in the company will the project be rolled out? What are some of the company’s goals that the project is not designed to cover?
      • Be sure to avoid scope creep! Remember: The goal of the proof-of-concept project is to produce a minimum case for viability in a carefully defined area. Reserve a detailed accounting of costs and benefits for the post-proof-of-concept stage.
      • Example: The conversational user interface will only be rolled out in an e-commerce setting. Other business units (HR, for example) are beyond the scope of this particular project.

      “Although scope creep is not the only nemesis a project can have, it does tend to have the farthest reach. Without a properly defined project and/or allowing numerous changes along the way, a project can easily go over budget, miss the deadline, and wreak havoc on project success.”
      – University Alliance, Villanova University

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.E Identify the structure of the team responsible for the proof-of-concept project

      10 minutes per technology

      Brainstorm who will be involved in project implementation.

      • Refer back to the list of stakeholders identified in 3.1.a. Which stakeholders should be involved in implementing the proof-of-concept plan?
      • What business units do they represent?
      • Who should be accountable for the project? At a high level, sketch the roles of each of the participants. Who will be responsible for doing the work? Who will approve it? Who needs to be informed at every stage? Who are the company’s internal subject matter experts?

      Example

      Name/Title Role
      IT Manager Negotiate the contract for the software with vendor
      CMO Promote the conversational interface to customers

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.F Estimate the resources required by the project

      10 minutes per technology

      Time and Money

      • Recall: Costs can be operational, capital, or opportunity.
      • Revisit the Disruptive Technology Value-Readiness and SWOT Analysis Tool. Record the capital and operational expenses expected to be associated with each technology, and add detail where possible (use exact figures from particular vendors instead of percentages).
      • Write the names and titles of each expected participant in the project on a whiteboard. Next to each name, write the number of hours they are expected to devote to the project and include a rough estimate of the cost of their participation to the company. Use full-time employee equivalent (FTE measures) as a base.
      • Outline how other necessary resources (space, tools, expertise, etc.) will be secured.

      Example: Conversational Commerce

      • OpEx: $149/month + 2.9¢/transaction* (2,000 estimated transactions)
      • CapEx: $0!
      • IT Manager: 5 hours at $100/hour
      • IT Technician: 40 hours at $45/hour
      • CMO: 1 hour at $300/hour
      • Customer Service Representative: 10 hours at $35/hour
      • *Estimated total cost for a one-month proof-of-concept project: $3,157

      *This number is a sample taken from the vendor Rhombus

      Input the results of this exercise into Section 3.0 of the Proof of Concept Template.

      3.2.G Be aware of common IT project concerns

      Of projects that did not meet business expectations or were cancelled, how significant were the following issues?

      A bar graph is depicted, comparing small, medium, and large businesses for the following datasets: Over budget; Project failed to be delivered on time; Breach of scope; Low quality; Failed to deliver expected benefit or value

      This survey data did not specifically address innovation projects.

      • Disruptive technology projects will be under increased scrutiny in comparison to other projects.
      • Be sure to meet deadlines and stay within budget.
      • Be cognizant that your projects can go out of scope, and there will be projects that may have to be cancelled due to low quality. Remember: Even a failed test is a learning opportunity!

      Info-Tech’s CIO-CEO Alignment Survey, N=225

      Organization size was determined by the number of IT employees within the organization

      Small = 10 or fewer IT staff, medium = 11 to 25 IT staff, and large/enterprise = 26 or greater IT staff

      3.2.H Communicate your working group’s findings and successes to a wide audience

      Advertise the group’s successes and help prevent airline magazine syndrome from occurring.

      • Share your group’s results internally:
        • Run your own analysis by senior management and then share it across the organization.
        • Maintain a list of technologies that the working group has analyzed and solicit feedback from the wider organization.
        • Post summaries of the technologies in a publicly available repository. The C-suite may not read it right away, but it will be easy to provide when they ask.
        • If senior management has declined to proceed with a certain technology, avoid wasting time and resources on it. However, include notes about why the technology was rejected.
      • These postings will also act as an advertisement for the group. Use the garnered interest to attract visionaries for the next cycle.
      • These postings will help to reiterate the innovative value of the IT department and help bring you to the decision-making table.

      “Some CIOs will have to battle the bias that they belong in the back office and shouldn’t be included in product architecture planning. CIOs must ‘sell’ IT’s strength in information architecture.”
      – Chris Curran, Chief Technologist, PwC (Curran, 2014)

      Info-Tech Insight

      Cast a wide net. By sharing your results with as many people as possible within your organization, you’ll not only attract more attention to your working group, but you will also get more feedback and ideas.

      3.2.I Hand off the completed proof-of-concept project plan

      The proof of concept template is filled out – now what?

      • The core working group is responsible for producing a vision of the future and outlining new technology’s disruptive potential. The actual implementation of the proof of concept (purchasing the hardware, negotiating the SLA with the vendor) is beyond the working group’s responsibilities.
      • If the proof of concept goes ahead, the facilitator should block some time to evaluate the completed project against the key performance indicators identified in the initial plan.
      • A cure for airline magazine syndrome: Be prepared when executives ask about new technology. Present them with the results of the shortlist analysis and the proof-of-concept plan. A clear accounting of the value, readiness, strengths, weaknesses, opportunities, and threats posed by each technology, along with its impact on business processes, is an invaluable weapon against poor technology choices.

      Use section 3.2.b to identify the decision-making stakeholder who has the most to gain from a successful proof-of-concept project. Self-interest is a powerful motivator – the project is more likely to succeed in the hands of a passionate champion.

      Info-Tech Insight

      Set a date for the first meeting of the new iteration of the disruptive technology working group before the last meeting is done. Don’t risk pushing it back indefinitely.

      3.2.J Hand off the completed proof-of-concept project plan

      Record the results of the proof of concept. Keep track of what worked and what didn’t.

      Repeat the process regularly.

      • Finalize the proof of concept template, but don’t stop there: Keep your ear to the ground; follow tech developments using the sources identified in step 1.2.
      • Continue expanding the potential longlist with independent research: Be prepared to expand your longlist. Remember, the more technologies you have on the longlist, the more potential airline magazine syndrome cures you have access to.
      • Have the results of the previous session’s proof of concept plan on hand: At the start of each new iteration, conduct a review. What technologies were successful beyond the proof of concept phase? Which parts of the process worked? Which parts did not? How could they be improved?

      Info-Tech Insight

      The key is in anticipation. This is not a one-and-done exercise. Technology innovation operates at a faster pace than ever before, well below the Moores Law "18 month" timeline as an example. Success is in making EDIT a repeatable process.

      Related Info-Tech Research

      Define Your Digital Business Strategy
      After a major crisis, find your place in the digital economy.

      Develop a Project Portfolio Management Strategy
      Drive project throughput by throttling resource capacity.

      Adopt Design Thinking in Your Organization
      Innovation needs design thinking.

      Digital Maturity Improvement Service
      Prepare your organization for digital transformation – or risk falling behind.

      Research contributors and experts

      Nitin Babel

      Nitin Babel, Co-Founder, niki.ai

      Nitin Babel, MSc, co-created conversational commerce platform niki.ai in early 2015. Since then, the technology has been featured on the front page of the Economic Times, and has secured the backing of Ratan Tata, former chairman of the Tata Group, one of the largest companies in the world.

      Mark Hubbard

      Mark Hubbard, Senior Vice President, FirstOnSite

      Mark is the SVP for Information Technology in Canada with FirstOnSite, a full service disaster recovery and property restoration company. Mark has over 25 years of technology leadership guiding global organizations through the development of strategic and tactical plans to strengthen their technology platforms and implement business aligned technology strategies.

      Chris Green

      Chris Green, Enterprise Architect, Boston Private
      Chris is an IT architect with over 15 years’ experience designing, building, and implementing solutions. He is a results-driven leader and contributor, skilled in a broad set of methods, tools, and platforms. He is experienced with mobile, web, enterprise application integration, business process, and data design.

      Andrew Kope

      Andrew Kope, Head of Data Analytics
      Big Blue Bubble
      Andrew Kope, MSc, oversees a team that develops and maintains a user acquisition tracking solution and a real-time metrics dashboard. He also provides actionable recommendations to the executive leadership of Big Blue Bubble – one of Canada’s largest independent mobile game development studios.

      Jason Hong

      Jason Hong, Associate Professor, School of Computer Science, Human-Computer Interaction Institute, Carnegie Mellon University

      Jason Hong is a member of the faculty at Carnegie Mellon’s School of Computer Science. His research focus lies at the intersection of human-computer interaction, privacy and security, and systems. He is a New America National Cyber Security Fellow (2015-2017) and is widely published in academic and industry journals.

      Tim Lalonde

      Tim Lalonde, Vice President, Mid-Range

      Tim Lalonde is the VP of Technical Operations at Mid-Range. He works with leading-edge companies to be more competitive and effective in their industries. He specializes in developing business roadmaps leveraging technology that create and support change from within — with a focus on business process re-engineering, architecture and design, business case development and problem-solving. With over 30 years of experience in IT, Tim’s guiding principle remains simple: See a problem, fix a problem.

      Jon Mavor

      Jon Mavor, Co-Founder and CTO, Envelop VR
      Jon Mavor is a programmer and entrepreneur, whose past work includes writing the graphics engine for the PC game Total Annihilation. As Chief Technology Officer of Envelop VR, a virtual reality start-up focused on software for the enterprise, Jon has overseen the launch of Envelop for Windows’s first public beta.

      Dan Pitt

      Dan Pitt, President, Palo Alto Innovation Advisors
      Dan Pitt is a network architect who has extensive experience in both the academy and industry. Over the course of his career, Dan has served as Executive Director of the Open Networking Foundation, Dean of Engineering at Santa Clara University, Vice President of Technology and Academic Partnerships at Nortel, Vice President of the Architecture Lab at Bay Networks, and, currently, as President of Palo Alto Innovation Advisors, where he advises and serves as an executive for technology start-ups in the Palo Alto area and around the world.

      Courtney Smith

      Courtney Smith, Co-Founder, Executive Creative Director
      PureMatter

      Courtney Smith is an accomplished creative strategist, storyteller, writer, and designer. Under her leadership, PureMatter has earned hundreds of creative awards and been featured in the PRINT International Design Annual. Courtney has juried over 30 creative competitions, including Creativity International. She is an invited member of the Academy of Interactive and Visual Arts.

      Emmanuel Tsekleves

      Emmanuel Tsekleves, Senior Lecturer in Design Interactions, University of Lancaster
      Dr. Emmanuel Tsekleves is a senior lecturer and writer based out of the United Kingdom. Emmanuel designs interactions between people, places, and products by forging creative design methods along with digital technology. His design-led research in the areas of health, ageing, well-being, and defence has generated public interest and attracted media attention by the national press, such as the Daily Mail, Daily Mirror, The Times, the Daily Mail, Discovery News, and several other international online media outlets.

      Bibliography

      Airini Ab Rahman. “Emerging Technologies with Emerging Effects; A Review”. Universiti Teknologi Malaysia. PERINTIS eJournal, June 2017. Web.

      Anthony, Scott. “Kodak’s Downfall Wasn’t About Technology.” Harvard Business Review, 15 July 2016. Web.

      ARM. The Intelligent Flexible Cloud. 26 Feb. 2015. Web.

      Association of Computing Machinery. Communications of the ACM, n.d. Web.

      Barnett, Thomas. “Three Mobile Trends to Watch.” Cisco Blogs, 3 Feb. 2015. Web.

      Batelle, John. “The 70 Percent Solution.” CNN, 1 Dec 2005. Web.

      Booz Allen Hamilton. Managing Technological Change: 7 Ways to Talk Tech with Management, n.d. Web.

      Brynjolfsson, Erik, and Andrew McAfee. The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W. W. Norton, 2014. Print.

      Christensen, Clayton M. “What is Disruptive Innovation?” Harvard Business Review, Dec 2015. Web.

      Christensen, Clayton M. and James Euchner. “Managing Disruption: An Interview With Clayton Christensen.” Research-Technology Management, 22 Dec 2015. vol. 54, no. 1. Web.

      Christensen, Clayton M., Rory McDonald, and Elizabeth J. Altman. “Disruptive Innovation: An Intellectual History and Directions for Future Research”. Wiley Online Library. Web.

      Christensen, Clayton M., Taddy Hall, Karen Dillon, and David S. Duncan. “Know Your Customers’ Jobs to be Done.” Harvard Business Review, Sept. 2016. Web.

      Cisco. “Cisco Annual Internet Report.” n.d. Web.

      Cisco. Cisco Visual Networking Index: Forecast and Methodology, 2014-2019, 27 May 2015. Web.

      Clark, Steven. “Elon Musk hopes SpaceX will send humans to Mars in 2024.” Spaceflight Now, 2 June 2016. Web.

      Clarke, Angela. “A practical use of key success factors to improve the effectiveness of project management,” International Journal of Project Management, June 1999 (17): 139-145.

      Collins, Andrew L., Patrick Hester, Barry Ezell, and John Horst. “An improvement selection methodology for key performance indicators.” Environmental Systems and Decisions, June 2016, 36 (2): 196-208.

      Computer Sciences Corporation. CSC Global CIO Survey: 2014-2015: CIOs Emerge as Disruptive Innovators: An Annual Barometer of Global CIOs’ Plans, Priorities, Threats, and Opportunities, 2014. Web.

      Constine, John. “Voice is Chat’s Next Battleground.” TechCrunch, 19 Sept. 2016. Web.

      Cressman, Daryl. “Disruptive Innovation and the Idea of Technology”. Maastricht University, June 2019. Web.

      Crown Prosecution Service. A Guide to Process Mapping and Improvement. n.d. Web.

      Curran, Chris. “The CIO’s Role in the Internet of Things.” PwC, 13 Mar. 2014. Web.

      Darbha, Sheta, Mike Shevenell, and Jason Normandin. “Impact of Software-Defined Networking on Infrastructure Management.” CA Technology Exchange, 4.3, Nov. 2013, pp. 33-43. Web.

      Denecken, Sven. Conquering Disruption Through Digital Transformation: Technologies, Leadership Strategies, and Best Practices to Create Opportunities for Innovation. SAP, 2014. Web.

      DHL Trend Research and Cisco Consulting Services. Internet of Things in Logistics: A Collaborative Report by DHL and Cisco on Implications and Use Cases for the Logistics Industry, 2015. Web.

      Dirican, Cüneyt. “The Impacts of Robotics, Artificial Intelligence on Business and Economics.” Procedia: Social and Behavioral Sciences, vol. 195, 2015, pp. 564-573. Web.

      Edraw Visualization Solutions. Examples of Flowcharts, Org Charts and More. “Cross-Function Flowchart Examples – Service Flowchart.”

      Emerson. Data Center 2025: Exploring the Possibilities, 2014. Web.

      Ericsson. Next-Generation Data Center Infrastructure, Feb. 2015. Web.

      Eurotech. Connecting M2M Applications to the Cloud to Bolster Hardware Sales, 2014. Web.

      Evans Gary, Llewellyn. “Disruptive Technology and the Board: The Tip of the Iceberg”. Economics and Business Review, n.d. Web.

      Evans Gary, Llewellyn. “Disruptive Technology and the Board: The Tip of the Iceberg”. Economics and Business Review, n.d. Web.

      Gage, Deborah. “The Venture Capital Secret: 3 Out of 4 Start-Ups Fail.” Wall Street Journal, 20 Sept. 2012. Web.

      Garvin, David A. “Competing on the Eight Dimensions of Quality.” Harvard Business Review, November 1987. Web.

      Gibbs, Colin. Augmented Reality in the Enterprise: Opportunities and Challenges. Gigaom Research, 26 Jan. 2015. Web.

      Glushko, Robert J. and Tim McGrath. Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services. MIT Press, 2005.

      Hadfield, Tom. “Facebook’s Messenger Bot Store could be the most important launch since the App Store.” TechCrunch, 17 March 2016. Web.

      Healey, Nic. “Microsoft's mixed reality vision: 80 million devices by 2020.” CNET, 1 June 2016. Web.

      Hewlett-Packard. Go Beyond Cost Reduction: Use Robotic Process Automation, Oct. 2015. Web.

      Hewlett-Packard. HP Composable Infrastructure: Bridging Traditional IT with the New Style of Business, June 2015. Web.

      Hewlett-Packard. HP Labs, n.d. Web.

      Hong, Jason. “Inside the Great Wall.” Communications of the ACM, 25 May 2016. Web.

      IBM Institute for Value. Your Cognitive Future: How Next-Gen Computing Changes the Way We Live and Work, 2015. Web.

      IBM. A New Way to Work: Futurist Insights to 2025 and Beyond, Jan. 2015. Web.

      Infinity. The Evolution of the Data Centre [sic], 2015. Web.

      Intel Corporation. Intel Annual Report, 1997. Web.

      Isaac, Mike. “Facebook Bets on Bots for its Messenger App.” New York Times, 12 April 2016. Web.

      ISACA. COBIT 5: Enabling Processes. ISACA, 2012. Print.

      K-12 Blueprint. “Planning a Proof of Concept.” 2014. Web.

      Kaushik Rukmini, Meenakshi. “The Impact of Pandemic COVID -19 in Workplace.” European Journal of Business Management and Research, May 2020. Web.

      Knight, Will. “Conversational Interfaces Powerful speech technology from China’s leading Internet company makes it much easier to use a smartphone.” MIT Technology Review, n.d. Web.

      Kostoff, Ronald N., Robert Boylan, and Gene R. Simons. “Disruptive Technology Roadmaps.” Technological Forecasting and Social Change, 2004. Vol. 71. Web.

      Kurzweil, Ray. “The Accelerating Power of Technology.” TED, Feb. 2005. Web.

      Kurzweil, Ray. Kurzweil: Accelerating Intelligence, 2015. Web.

      MacFarquhar, Larissa. “When Giants Fall: What Business Has Learned From Clayton Christensen,” New Yorker, 14 May 2012. Web.

      McClintock, Cat. “2016: The Year for Augmented Reality in the Enterprise.” PTC, n.d. Web.

      McKinsey & Company. IT Growth and Global Change: A Conversation with Ray Kurzweil. 29 Feb. 2012, YouTube. Web.

      Messina, Chris. “2016 Will be the Year of Conversational Commerce.” Medium, 19 Jan 2016. Web.

      Microsoft. Microsoft Research, n.d. Web.

      Miller, Ron. “Forget the Apple Watch, Think Drones in the Enterprise.” TechCrunch, 10 Sep. 2015. Web.

      Nokia Networks. FutureWorks [sic]: Teaching Networks to be Self-Aware: Technology Vision 2020. 2014. Web.

      Nokia Networks. Internet of Things. n.d. Web.

      O’Reilly, Charles, and Andrew J. M. Binns, “The Three Stages of Disruptive Innovation: Idea Generation, Incubation, and Scaling”. Sage Journals, n.d. Web.

      Pew Research Center. AI, Robotics, and the Future of Jobs: Experts Envision Automation and Intelligent Digital Agents Permeating Vast Areas of Our Work and Personal Lives by 2025, but they are Divided on Whether these Advances will Displace More Jobs than they Create. Aug. 2014. Web.

      Ramiller, Neil. “Airline Magazine Syndrome: Reading a Myth of Mismanagement.” Information Technology & People, Sept 2001. Print.

      Raymond James & Associates. The Internet of Things: A Study in Hype, Reality, Disruption, and Growth. 2014. Web.

      Richter, Felix. “No Growth in Sight for Global PC Market.” Statista, 14 March 2016. Web.

      Roy, Mekhala. “4 Examples of Digital Transformation Success in Business”. TechTarget, n.d. Web.

      Simon Weinreich, “How to Manage Disruptive Innovation - a conceptional methodology for value-oriented portfolio planning,” Sciencedirect. 31st CIRP Design Conference 2021.

      Spice Works. The Devices are Coming! How the “Internet of Things” will affect IT… and why resistance is futile. May 2014. Web.

      Spradlin, Dwayne. “Are You Solving the Right Problem?” Harvard Business Review, Sept. 2012. Web.

      Statista. “Number of smartphones sold to end users worldwide from 2007 to 2015 (in million units).” N.d. Web.

      Statista. “Worldwide tablet shipments from 2nd quarter 2010 to 2nd quarter 2016 (in million units).” N.d. Web.

      Sven Schimpf, “Disruptive Field Study; How Companies Identify, Evaluate, Develop and Implement Disruptive Technologies.” Fraunhofer Group for Innovation Research, 2020. Web.

      Tsekleves, Emmanuel. “Science fiction as fact: how desires drive discoveries.” The Guardian. 13 Aug. 2015. Web.

      Tsekleves, Emmanuel. “Science fiction as fact: how desires drive discoveries.” The Guardian, 13 Aug. 2015. Web.

      United States Department of Transportation. “National Motor Vehicle Crash Causation Survey: Report to Congress.” National Highway Traffic Safety Administration, July 2008. Web.

      United States Department of Transportation. “National Motor Vehicle Crash Causation Survey: Report to Congress.” National Highway Traffic Safety Administration, July 2008. Web.

      University Alliance (Villanova U). Managing Scope Creep in Project Management. N.d. Web.

      Vavoula, Giasemi N., and Mike Sharples. “Future Technology Workshop: A Collaborative Method for the Design of New Learning Technologies and Activities.” International Journal of Computer Supported Collaborative Learning, Dec 2007. Vol. 2 no. 4. Web.

      Walraven Pieter. “It’s Operating Systems Vs. Messaging Apps In The Battle For Tech’s Next Frontier.” TechCrunch, 11 Aug 2015. Web.

      Webb, Amy. “The Tech Trends You Can’t Ignore in 2015.” Harvard Business Review, 5 Jan. 2015. Web.

      Wenger, Albert. “The Great Bot Rush of 2015-16.” Continuations, 16 Dec 2015. Web.

      White, Chris. “IoT Tipping Point Propels Digital Experience Era.” Cisco Blogs, 12 Nov. 2014. Web.

      World Economic Forum and Accenture. Industrial Internet of Things: Unleashing the Potential of Connected Products and Services. 2015. Web.

      Yu Dan and Hang Chang Chieh, "A reflective review of disruptive innovation theory," PICMET '08 - 2008 Portland International Conference on Management of Engineering & Technology, 2008, pp. 402-414, doi: 10.1109/PICMET.2008.4599648.

      Master the Public Cloud IaaS Acquisition Models

      • Buy Link or Shortcode: {j2store}228|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $3,820 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Understanding the differences in IaaS platform agreements, purchasing options, associated value, and risks. What are your options for:

      • Upfront or monthly payments
      • Commitment discounts
      • Support options
      • Migration planning and support

      Our Advice

      Critical Insight

      IaaS platforms offer similar technical features, but they vary widely on their procurement model. By fully understanding the procurement differences and options, you will be able to purchase wisely, save money both long and short term, and mitigate investment risk.

      Most vendors have similar processes and options to buy. Finding a transparent explanation and summary of each platform in a side-by-side review is difficult.

      • Are vendor reps being straight forward?
      • What are the licensing requirements?
      • What discounts or incentives can I negotiate?
      • How much do I have to commit to and for how long?

      Impact and Result

      This project will provide several benefits for both IT and the business. It includes:

      • Best IaaS platform to support current and future procurement requirements.
      • Right-sized cloud commitment tailored to the organization’s budget.
      • Predictable and controllable spend model.
      • Flexible and reliable IT infrastructure that supports the lines of business.
      • Reduced financial and legal risk.

      Master the Public Cloud IaaS Acquisition Models Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to learn how the public cloud IaaS procurement models compare. Review Info-Tech’s methodology and understand the top three platforms, features, and benefits to support and inform the IaaS vendor choice.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Educate

      Learn the IaaS basics, terminologies, purchasing options, licensing requirements, hybrid options, support, and organization requirements through a checklist process.

      • Master the Public Cloud IaaS Acquisition Models – Phase 1: Educate
      • Public Cloud Procurement Checklist
      • Microsoft Public Cloud Licensing Guide

      2. Evaluate

      Review and understand the features, downsides, and differences between the big three players.

      • Master the Public Cloud IaaS Acquisition Models – Phase 2: Evaluate
      • Public Cloud Procurement Comparison Summary

      3. Execute

      Decide on a primary vendor that meets requirements, engage with a reseller, negotiate pricing incentives, migration costs, review, and execute the agreement.

      • Master the Public Cloud IaaS Acquisition Models – Phase 3: Execute
      • Public Cloud Acquisition Executive Summary Template

      Infographic

      Define a Release Management Process to Deliver Lasting Value

      • Buy Link or Shortcode: {j2store}158|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your software platforms are a key enabler of your brand. When there are issues releasing, this brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality otherwise they will look elsewhere.

      Our Advice

      Critical Insight

      • Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Impact and Result

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Define a Release Management Process to Deliver Lasting Value Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a Release Management Process to Deliver Lasting Value Deck – A step-by-step document that walks you through how to develop and implement a release management framework that takes advantage of continuous delivery.

      This presentation documents the Info-Tech approach to defining your application release management framework.

      • Define a Release Management Process to Deliver Lasting Value – Phases 1-4

      2. Define a Release Management Process to Deliver Lasting Value Template – Use this template to help you define, detail, and make a reality your strategy in support of your application release management framework.

      The template gives the user a guide to the development of their application release management framework.

      • Define a Release Management Process to Deliver Lasting Value Template

      3. Define a Release Management Process to Deliver Lasting Value Workbook – This workbook documents the results of the exercises contained in the blueprint and offers the user a guide to development of their release management framework.

      This workbook is designed to capture the results of your exercises from the Define a Release Management Process to Deliver Lasting Value blueprint.

      • Define a Release Management Process to Deliver Lasting Value Workbook
      [infographic]

      Workshop: Define a Release Management Process to Deliver Lasting Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define the Current Situation

      The Purpose

      Document the existing release management process and current pain points and use this to define the future-state framework.

      Key Benefits Achieved

      Gain an understanding of the current process to confirm potential areas of opportunity.

      Understand current pain points so that we can build resolution into the new process.

      Activities

      1.1 Identify current pain points with your release management process. If appropriate, rank them in order of most to least disruptive.

      1.2 Use the statement of quality and current pain points (in addition to other considerations) and outline the guiding principles for your application release management framework.

      1.3 Brainstorm a set of metrics that will be used to assess the success of your aspired-to application release management framework.

      Outputs

      Understanding of pain points, their root causes, and ranking.

      Built guiding principles for application release management framework.

      Created set of metrics to measure the effectiveness of the application release management framework.

      2 Define Standard Release Criteria

      The Purpose

      Build sample release criteria, release contents, and standards for how it will be integrated in production.

      Key Benefits Achieved

      Define a map to what success will look like once a new process is defined.

      Develop standards that the new process must meet to ensure benefits are realized.

      Activities

      2.1 Using an example of a product known to the team, list its criteria for release.

      2.2 Using an example of a product known to the team, develop a list of features and tasks that are directly and indirectly important for either a real or hypothetical upcoming release.

      2.3 Using an example of product known to the team, map out the process for its integration into the release-approved code in production. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example highlighting releasability.

      Completed Workbook example defining and detailing feature and task selection.

      Completed Workbook example defining and detailing the integration step.

      3 Define Acceptance and Deployment Standards

      The Purpose

      Define criteria for the critical acceptance and deployment phases of the release.

      Key Benefits Achieved

      Ensure that releases will meet or exceed expectations and meet user quality standards.

      Ensure release standards for no / low risk deployments are recognized and implemented.

      Activities

      3.1 Using an example of product known to the team, map out the process for its acceptance. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      3.2 Using an example of product known to the team, map out the process for its deployment. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example defining and detailing the acceptance step.

      Completed Workbook example defining and detailing the deployment step.

      4 Implement the Strategy

      The Purpose

      Define your future application release management process and the plan to make the required changes to implement.

      Key Benefits Achieved

      Build a repeatable process that meets the standards defined in phases 2 and 3.

      Ensure the pain points defined in Phase 1 are resolved.

      Show how the new process will be implemented.

      Activities

      4.1 Develop a plan and roadmap to enhance the integration, acceptance, and deployment processes.

      Outputs

      List of initiatives to reach the target state

      Application release management implementation roadmap

      Further reading

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Analyst Perspective

      Improving your release management strategy and practices is a key step to fully unlock the value of your portfolio.

      As firms invest in modern delivery practices based around product ownership, Agile, and DevOps, organizations assume that’s all that is necessary to consistently deliver value. As organizations continue to release, they continue to see challenges delivering applications of sufficient and consistent quality.

      Delivering value doesn’t only require good vision, requirements, and technology. It requires a consistent and reliable approach to releasing and delivering products and services to your customer. Reaching this goal requires the definition of standards and criteria to govern release readiness, testing, and deployment.

      This will ensure that when you deploy a release it meets the high standards expected by your clients and delivers the value you have intended.

      Dr. Suneel Ghei

      Principal Research Director, Application Development

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Your software platforms are a key enabler of your brand. When there are issues releasing, the brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture of product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality, otherwise they will look elsewhere.

      Common Obstacles

      • Development teams are moving faster but then face delays waiting for testing and deployment due to a lack of defined release cycle and process.
      • Individual stages in your software development life cycle (SDLC), such as code collaboration, testing, and deployment, have become leaner, but the overall complexity has increased since many products and services are composed of many applications, platforms, and processes.
      • The specifics of releasing products is (wrongly) classified as a technical concern and not a business concern, hindering the ability to prioritize improved release practices.

      Info-Tech's Approach

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Executive Summary

      Info-Tech Insights

      Turn release-related activities into non-events.

      Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Release management is NOT a part of the software delivery life cycle.

      The release cycle runs parallel to the software delivery life cycle but is not tightly coupled with it. The act of releasing begins at the point requirements are confirmed and ends when user satisfaction is measurable. In contrast, the software delivery life cycle is focused on activities such as building, architecting, and testing.

      All releases are NOT created equal.

      Barring standard guiding principles, each release may have specific nuances that need to be considered as part of release planning.

      Your release management journey

      1. Optimize Applications Release Management - Set a baseline release management process and organization.
      2. Modernize Your SDLC - Move your organization to Agile and increase throughput to feed releases.
      3. Deliver on Your Digital Product Vision - Understand the practices that go into delivering products, including articulating your release plans.
      4. Automate Testing to Get More Done - Create the ability to do more testing quickly and ensure test coverage.
      5. Implement DevOps Practices That Work - Build in tools and techniques necessary for release deployment automation.
      6. Define a Release Management Process to Deliver Lasting Value (We Are Here)

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Executive Brief

      Your software delivery teams are expected to deliver value to stakeholders in a timely manner and with high quality

      Software delivery teams must enable the organization to react to market needs and competitive changes to improve the business’ bottom line. Otherwise, the business will question the team’s competencies.

      The business is constantly looking for innovative ways to do their jobs better and they need support from your technical teams.

      The increased stress from the business is widening the inefficiencies that already exist in application release management, risking poor product quality and delayed releases.

      Being detached from the release process, business stakeholders do not fully understand the complexities and challenges of completing a release, which complicates the team’s communication with them when issues occur.

      IT Stakeholders Are Also Not Satisfied With Their Own Throughput

      • Only 29% of IT employees find application development throughput highly effective.
      • Only 9% of organizations were classified as having highly effective application development throughput.
      • Application development throughput ranked 37th out of 45 core IT processes in terms of effectiveness.

      (Info-Tech’s Management and Governance Diagnostic, N=3,930)

      Your teams, however, struggle with core release issues, resulting in delayed delivery (and disappointed stakeholders)

      Implementing tools on top of an inefficient pipeline can significantly magnify the existing release issues. This can lead to missed deadlines, poor product quality, and business distrust with software delivery teams.

      COMMON RELEASE ISSUES

      1. Local Thinking: Release decisions and changes are made and approved without consideration of the holistic system, process, and organization.
      2. No Release Cadence: Lack of process governance and oversight generates unpredictable bottlenecks and load and ill-prepared downstream teams.
      3. Mismanagement of Releases: Program management does not accommodate the various integrated releases completed by multiple delivery teams.
      4. Poor Scope Management: Teams are struggling to effectively accommodate changes during the project.

      The bottom line: The business’ ability to operate is dictated by the software delivery team’s ability to successfully complete releases. If the team performs poorly, then the business will do poorly as well. Application release management is critical to ensure business expectations are within the team’s constraints.

      As software becomes more embedded in the business, firms are discovering that the velocity of business change is now limited by how quickly they can deploy.” – Five Ways To Streamline Release Management, J.S. Hammond

      Historically, managing releases has been difficult and complicated…

      Typically, application release management has been hard to coordinate because…

      • Software has multiple dependencies and coordinating their inclusion into a deployable whole was not planned.
      • Teams many be spending too much time on features that are not needed any longer.
      • Software development functions (such as application architecture, test-first or test-driven design, source code integration, and functional testing) are not optimized.
      • There are no agreed upon service-level contracts (e.g. expected details in requirements, adequate testing, source control strategy) between development functions.
      • The different development functions are not integrated in a holistic style.
      • The different deployment environments have variability in their configuration, reducing the reliability of testing done in different environments.
      • Minimum thresholds for acceptable quality of development functions are either too low (leading to adverse outcomes down stream) or too high (leading to unnecessary delays).

      …but research shows being effective at application release management increases your throughput

      Research conducted on Info-Tech's members shows overwhelming evidence that application throughput is strongly tied to an effective application release management approach.

      The image shows a scatter plot, with Release Management Effectiveness on the x-axis and Application Development Throughput Effectiveness on the Y-axis. The graph shows a steady increase.

      (Info-Tech Management & Governance Diagnostic, since 2019; N=684 organizations)

      An application release management framework is critical for effective and timely delivery of software

      A well-developed application release management framework is transformative and changes...

      From To
      Short-lived projects Ongoing enhancements supporting a product strategy
      Aiming for mandated targets Flexible roadmaps
      Manual execution of release processes Automating a release pipeline as much as possible and reasonable
      Manual quality assurance Automated assessment of quality
      Centralized decision making Small, independent release teams, orchestrated through an optimized value stream

      Info-Tech Insight: Your application release management framework should turn a system release into a non-event. This is only possible through the development of a holistic, low-risk and standardized approach to releasing software, irrespective of their size or complexity.

      Robust continuous “anything” requires proficiency in five core practices

      A continuous anything evaluation should not be a “one-and-done” event. As part of ongoing improvements, keep evolving it to make it a fundamental component of a strong operational strategy.

      Continuous Anything

      • Automate where appropriate
        • Automation is not a silver bullet. All processes are not created equal; and therefore, some are not worthy of being automated.
      • Control system variables
        • Deploying and testing in environments that are apple to apple in comparison reduces the risk of unintended outcomes from production release.
      • Measure process outcomes
        • A process not open to being measured is a process bound to fail. If it can be measured, it should be, and insights found should be used for improving the system.
      • Select smaller features batches
        • Smaller release packages reduce the chances of cognitive load associated with finding root causes for defects and issues that may result as post-production incidents.
      • Reduction of cycle time
        • Identification of waste in each stage of the continuous anything process helps in lowering cost of operations and results in quicker generation of value for stakeholders.

      Invest time in developing an application release management framework for your development team(s) with a continuous anything mindset

      An application release management framework converts a set of features and make them ready for releasability in a low-risk, standardized, and high-quality process.

      The image shows a diagram titled Application Release Engineering From Idea to Product, which illustrates the process.

      A continuous anything (integration, delivery, and deployment) mindset is based on a growth and improvement philosophy, where every event is considered a valid data point for investigation of process efficiency.

      Diagram adapted from Continuous Delivery in the Wild, Pete Hodgson, Published by O'Reilly Media, Inc., 2020

      Related Info-Tech Research

      Streamline Application Maintenance

      • Justify the necessity of streamlined maintenance. Gain a grounded understanding of stakeholder objectives and concerns and validate their achievability against the current state of the people, process, and technologies involved in application maintenance.
      • Strengthen triaging and prioritization practices. Obtain a holistic picture of the business and technical impacts, risks, and urgencies of each accepted maintenance request to justify its prioritization and relevance within your backlog. Identify opportunities to bundle requests together or integrate them within project commitments to ensure completion.
      • Establish and govern a repeatable process. Develop a maintenance process with well-defined stage gates, quality controls, and roles and responsibilities, and instill development best practices to improve the success of delivery.

      “Releasability” (or release criteria) of a system depends upon the inclusion of necessary building blocks and proof that they were worked on

      There is no standard definition of a system’s releasability. However, there are common themes around completions or assessments that should be investigated as part of a release:

      • The range of performance, technical, or compliance standards that need to be assessed.
      • The full range of test types required for business approval: unit tests, acceptance tests, security test, data migration tests, etc.
      • The volume-criticality mix of defects the organization is willing to accept as a risk.
      • The best source and version control strategy for the development team. This is mostly a function of the team's skill with using release branches and coordinating their work artifacts.
      • The addition of monitoring points and measures required for evaluations and impact analysis.
      • The documentation required for audit and compliance.
      • External and internal dependencies and integrations.
      • Validations, approvals, and sign-offs required as part of the business’ operating procedure.
      • Processes that are currently carried out outside and should be moved into the pipeline.
      • Manual processes that may be automated.
      • Any waste activities that do not directly contribute to releasability that can be eliminated from the development process.
      • Knowledge the team has regarding challenges and successes with similar software releases in the past.

      Releasability of a system is different than governing principles for application release management

      Governing principles are fundamental ways of doing something, which in this case is application release management, while releasability will generally have governing principles in addition to specific needs for a successful release.

      Example of Governing Principles

      • Approval from Senior Director is necessary before releasing to production
      • Production deployments can only be done in off-hours
      • We will try to automate processes whenever it is possible for us to do so
      • We will use a collaborative set of metrics to measure our processes

      Examples of Releasability Criteria

      • For the upcoming release, add performance testing for Finance and Budget Teams’ APIs
      • Audit and compliance documentation is required for this release
      • Automation of manual deployment
      • Use trunk-based source code management instead of feature-based

      Regulated industries are not more stable despite being less nimble

      A pervasive myth in industry revolves around the misperception that continuous anything and nimble and non-event application release management is not possible in large bureaucratic and regulated organizations because they are risk-averse.

      "We found that external approvals were negatively correlated with lead-time, deployment frequency and restore time, and had no correlation with change failure rate. In short, approval by an external body (such as a manager or Change Approval Board) simply doesn’t work to increase the stability of production systems…However, it certainly slows things down. It is in fact worse than having no change approval process at all." – Accelerate by Gene Kim, Jez Humble, and Nicole Forsgren

      Many organizations reduce risk in their product release by adopting a paternalistic stance by:

      • Requiring manual sign-offs from senior personnel who are external to the organization.
      • Increasing the number and level of authorization gates.
      • Staying away from change and preferring to stick with what has worked in the past.

      Despite the prevalence of these types of responses to risk, the evidence is that they do not work and are in fact counter-productive because they:

      • Create blocks to frequent releases.
      • Introduce procedural complexity to each release and in effect make them “bigger.”
      • Prefer process over people (and trusting them). Increase non-value-add scrutiny and reporting.

      There is a persistent misunderstanding about continuous anything being only an IT engineering practice

      01

      At the enterprise level, continuous anything focuses on:

      • Visibility of final value being provided in a high-quality and expedited manner
      • Ensuring efficiency in the organization’s delivery framework
      • Ensuring adherence to established governance and risk mitigation strategy

      02

      Focus of this blueprint

      At the product level, continuous anything focuses on:

      • Reliability of the product delivery system
      • Use of scientific evidence for continuous improvement of the product’s delivery system
      • Orchestration of different artifacts into a single whole

      03

      At the functional level, continuous anything focuses on*:

      • Local functional optimization (functions = software engineering, testing, application design)
      • Automation of local functions
      • Use of patterns for standardizing inputs and functional areas

      *Where necessary, practices at this level have been mentioned.

      Related Info-Tech Research

      Implement DevOps Practices That Work

      • Be DevOps, rather than do DevOps. DevOps is a philosophy, not an industry framework. Your organization’s culture must shift toward system-wide thinking, cross-function collaboration, and empathy.
      • Culture, learning, automation, integrated teams, and metrics and governance (CLAIM) are all critical components of effective DevOps.

      Automate Testing to Get More Done

      • Optimize and automate SDLC stages to recover team capacity. Recognize that automation without optimization is a recipe for long-term pain. Do it right the first time.
      • Optimization and automation are not one-hit wonders. Technical debt is a part of software systems and never goes away. The only remedy is constant vigilance and enhancements to the processes.

      The seeds of a good release are sown even before work on it begins

      Pre-release practices such as requirements intake and product backlog management are important because:

      • A standard process for documentation of features and requirements helps reduce “cognitive dissonance” between business and technology teams. Clearly articulated and well-understood business needs are fundamental ingredients of a high-quality product.
      • Product backlog management done right ensures the prioritized delivery of value to stakeholders. Features can become stale or get a bump in importance, depending upon evolving circumstances. Prioritizing the backlog is, therefore, critical for ensuring time, effort, and budget are spent on things that matter.

      Master the Secrets of VMware Licensing to Maximize Your Investment

      • Buy Link or Shortcode: {j2store}138|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • A lack of understanding around VMware’s licensing models, bundles, and negotiation tactics makes it difficult to negotiate from a position of strength.
      • Unfriendly commercial practices combined with hyperlink-ridden agreements have left organizations vulnerable to audits and large shortfall payments.
      • Enterprise license agreements (ELAs) come in several purchasing models and do not contain the EULA or various VMware product guide documentation that governs license usage rules and can change monthly.
      • Without a detailed understanding of VMware’s various purchasing models, shelfware often occurs.

      Our Advice

      Critical Insight

      • Contracts are typically overweighted with a discount at the expense of contractual T&Cs that can restrict license usage and expose you to unpleasant financial surprises and compliance risk.
      • VMware customers almost always have incomplete price information from which to effectively negotiate a “best in class” ELA.
      • VMware has a large lead in being first to market and it realizes that running dual virtualization stacks is complex, unwieldy, and expensive. To further complicate the issues, most skill sets in the industry are skewed towards VMware.

      Impact and Result

      • Negotiate desired terms and conditions at the start of the agreement, and prioritize which use rights may be more important than an additional discount percentage.
      • Gather data points and speak with licensing partners to determine if the deal being offered is in fact as great as VMware says it is.
      • Beware of out-year pricing and ELA optimization reviews that may provide undesirable surprises and more spend than was planned.

      Master the Secrets of VMware Licensing to Maximize Your Investment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage Your VMware Agreements – Use the Info-Tech tools capture your existing licenses and prepare for your renewal bids.

      Use Info-Tech’s licensing best practices to avoid shelfware with VMware licensing and remain compliant in case of an audit.

      • Master the Secrets of VMware Licensing to Maximize Your Investment Storyboard

      2. Manage your VMware agreements

      Use Info-Tech’s licensing best practices to avoid shelfware with VMware licensing and remain compliant in case of an audit.

      • VMware Business as Usual – Install Base SnS Renewal Only Tool
      • VMware ELA RFQ Template

      3. Transition to the VMWare Cloud – Use these tools to evaluate your ELA and vShpere requirements and make an informed choice.

      Manage your renewals and transition to the cloud subscription model.

      • VPP Transactional Purchase Tool
      • VMware ELA Analysis Tool
      • vSphere Edition 7 Features List

      Infographic

      Further reading

      Master the Secrets of VMware Licensing to Maximize Your Investment

      Learn the essential steps to avoid overspending and to maximize negotiation leverage with VMware.

      EXECUTIVE BRIEF

      Analyst Perspective

      Master the Secrets of VMware Licensing to Maximize Your Investment.

      The image contains a picture of Scott Bickley.

      The mechanics of negotiating a deal with VMware may seem simple at first as the vendor is willing to provide a heavy discount on an enterprise license agreement (ELA). However, come renewal time, when a reduction in spend or shelfware is needed, or to exit the ELA altogether, the process can be exceedingly frustrating as VMware holds the balance of power in the negotiation.

      Negotiating a complete agreement with VMware from the start can save you from an immense headache and unforeseen expenditures. Many VMware customers do not realize that the terms and conditions in the Volume Purchasing Program (VPP) and Enterprise Purchasing Program (EPP) agreements limit how and where they are able to use their licenses.

      Furthermore, after the renewal is complete, organizations must still worry about the management of various license types, accurate discovery of what has been deployed, visibility into license key assignments, and over and under use of licenses.

      Preventive and proactive measures enclosed within this blueprint will help VMware clients mitigate this minefield of challenges.

      Scott Bickley
      Practice Lead, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      VMware's dominant position in the virtualization space can create uncertainty to your options in the long term as well as the need to understand:

      • The hybrid cloud model.
      • Hybrid VM security and management.
      • New subscription license model and how it affects renewals.

      Make an informed decision with your VMware investments to allow for continued ROI.

      There are several hurdles that are presented when considering a VMware ELA:

      • Evolving licensing and purchasing models
      • Understanding potential ROI in the cloud landscape
      • Evolving door of corporate ownership

      Overcoming these and other obstacles are key to long-term satisfaction with your VMware infrastructure.

      Info-Tech has a two-phase approach:

      • Manage your VMware agreements.
      • Plan a transition to the cloud.

      A tactical roadmap approach to VMware ELA and the cloud will ensure long-term success and savings.

      Info-Tech Insight

      VMware customers almost always have incomplete price information from which to effectively negotiate a “best in class” ELA.

      Your challenge

      VMware's dominant position in the virtualization space can create uncertainty to your options in the long term driven by:

      • VMware’s dominant market position and ownership of the virtualization market, which is forcing customers to focus on managing capacity demand to ensure a positive ROI on every license.
      • The trend toward a hybrid cloud for many organizations, especially those considering using VMware in public clouds, resulting in confusion regarding licensing and compliance scenarios.

      ELAs and EPPs are generally the only way to get a deep discount from VMware.

      The image contains a pie chart to demonstrate that 85% have answered yes to being audited by VMware for software license compliance.

      Common obstacles

      There are several hurdles that are presented when considering a VMware ELA.

      • A lack of understanding around VMware’s licensing models, bundles, and negotiation tactics makes it difficult to negotiate from a position of strength.
      • Unfriendly commercial practices combined with hyperlink-ridden agreements have left organizations vulnerable to audits and large shortfall payments.
      • ELAs come in several purchasing models and do not contain the EULA or various VMware product guide documentation that govern license usage rules and can change monthly.

      Competition is a key driver of price

      The image contains a screenshot of a bar graph to demonstrate virtualization market share % 2022.

      Source: Datanyze

      Master the Secrets of VMware Licensing to Maximize your Investment

      The image contains a screenshot of the Thought model on Master the secrets of VMware Licensing to Maximize your Investment.

      Info-Tech’s methodology for Master the Secrets of VMware Licensing to Maximize Your Investment

      1. Manage Your VMware Agreements

      2. Transition to the VMware Cloud

      Phase Steps

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      1.5 Understand SnS renewal management

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Manage SnS and cloud subscriptions

      Phase Outcomes

      Understanding of your licensing requirements and what agreement option best fits your needs for now and the future.

      Knowledge of VMware’s sales model and how to negotiate the best deal.

      Knowledge of the evolving cloud subscription model and how to plan your cloud migration and transition to the new licensing.

      Insight summary

      Overarching insight

      With the introduction of the subscription licensing model, VMware licensing and renewals are becoming more complex and require a deeper understanding of the license program options to best manage renewals and cloud deployments as well as to maximize legacy ROI.

      Phase 1 insight

      Contracts are typically overweighted with a discount at the expense of contractual T&Cs that can restrict license usage and expose you to unpleasant financial surprises and compliance risk.

      Phase 1 insight

      VMware has a large lead in being first to market and it realizes running dual virtualization stacks is complex, unwieldy, and expensive. To further complicate the issues, most skill sets in the industry are skewed toward VMware.

      Phase 2 insight

      VMware has purposefully reduced a focus on the actual license terms and conditions; most customers focus on the transactional purchase or the ELA document, but the rules governing usage are on a website and can be changed by VMware regularly.

      Tactical insight

      Beware of out-year pricing and ELA optimization reviews that may provide undesirable surprises and more spend than was planned.

      Tactical insight

      Negotiate desired terms and conditions at the start of the agreement, and prioritize which use rights may be more important than an additional discount percentage.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      VMware ELA Analysis Tool

      VMware ELA RFQ Template Tool

      VPP Transaction Purchase Tool

      VMware ELA Analysis Tool

      Use this tool as a template for an RFQ with VMware ELA contracts.

      Use this tool to analyze cost breakdown and discount based on your volume purchasing program (VPP) level.

      The image contains screenshots of the VMware ELA Analysis Tool. The image contains a screenshot of the VMware ELA RFQ template tool. The image contains a screenshot of the VPP Transaction Purchase Tool.

      Key deliverable:

      VMware Business as Usual SnS Renewal Only Tool

      Use this tool to analyze discounts from a multi-year agreement vs. prepay. See how you can get the best discount.

      The image contains screenshots of the VMware Business as Usual SnS Renewal Only Tool.

      Blueprint Objectives

      The aim of this blueprint is to provide a foundational understanding of VMware’s licensing agreement and best practices to manage them.

      Why VMware

      What to Know

      The Future

      VMware is the leader in OS virtualization, however, this is a saturated market, which is being pressured by public and hybrid cloud as a competitive force taking market share.

      There are few viable alternatives to VMware for virtualization due to vendor lock-in of existing IT infrastructure footprint. It is too difficult and cost prohibitive to make a shift away from VMware even when alternative solutions are available.

      ELAs are the preferred method of contracting as it sets the stage for a land-and-expand product strategy; once locked into the ELA model, customers must examine VMware alternatives with preference or risk having Support and Subscription Services (SnS) re-priced at retail.

      VMware does not provide a great deal of publicly available information regarding its enterprise license agreement (ELA) options, leaving a knowledge gap that allows the sales team to steer the customer.

      VMware is taking countermeasures against increasing competition.

      Recent contract terms changed to eliminate perpetual caps on SnS renewals; they are now tied to a single year of discounted SnS, then they go to list price.

      Migration of list pricing to a website versus contract, where pricing can now be changed, reducing discount percentage effectiveness.

      Increased audits of customers, especially those electing to not renew an ELA.


      Examining VMware’s vendor profile

      Turbonomics conducted a vendor profile on major vendors, focusing on licensing and compliance. It illustrated the following results:

      The image contains a pie graph to demonstrate that the majority of companies say yes to using license enterprise software from VMware.

      The image contains a bar graph to demonstrate what license products organizations use of VMware products.

      Source: Turbonomics
      N-sample size

      Case Study

      The image contains a logo for ADP.

      INDUSTRY: Finance

      SOURCE: VMware.com

      “We’ll have network engineers, storage engineers, computer engineers, database engineers, and systems engineers all working together as one intact team developing and delivering goals on specific outcomes.” – Vipul Nagrath, CIO, ADP

      Improving developer capital management

      Constant innovation helped ADP keep ahead of customer needs in the human resources space, but it also brought constant changes to the IT environment. Internally, the company found it was spending too long working on delivering the required infrastructure and system updates. IT staff wanted to improve velocity for refreshes to better match the needs of ADP developers and encourage continued development innovation.

      Business needs

      • Improve turnaround time on infrastructure refreshes to better meet developer roadmaps.
      • Establish an IT culture that works at the global scale of ADP and empowers individual team members.
      • Streamline approach toward infrastructure resource delivery to reduce need for manual management.

      Impact

      • Infrastructure resource delivery reduced from 100+ days to minutes, improving ADP developer efficiency.
      • VMware Cloud™ on AWS establishes seamless private and public cloud workflows, fostering agility and innovation.
      • Automating IT management redirects resources to R&D, boosting time to market for new services.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Discuss scope requirements, objectives, and your specific challenges.

      Call #2: Assess the current state.

      Determine licensing position.

      Call #3: Complete a deployment count, needs analysis, and internal audit.

      Call #4: Review findings with analyst:

      • Review licensing options.
      • Review licensing rules.
      • Review contract option types.

      Call #5: Select licensing option. Document forecasted costs and benefits.

      Call #6: Review final contract:

      • Discuss negotiation points.
      • Plan a roadmap for SAM.

      Call #7: Negotiate final contract. Evaluate and develop a roadmap for SAM.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 2 to 6 calls over the course of 1 to 2 months.

      Phase # 1

      Manage Your VMware Agreements

      Phase 1

      Phase 2

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Discuss the VMware sales approach

      2.4 Manage SnS and cloud subscriptions

      This phase will walk you through the following activities:

      • Understanding the VMware licensing model
      • Understanding the license agreement options
      • Understanding the VMware sales approach

      This phase will take you thorough:

      • The new VMware subscription movement to the cloud
      • How to prepare and migrate
      • Manage your subscriptions efficiently

      1.1 Establish licensing requirements

      VMware has greatly improved the features of vSphere over time.

      vSphere Main Editions Overview

      • vSphere Standard – Provides the basic features for server consolidation. A support and subscription contract (SnS) is mandatory when purchasing the vSphere Standard.
      • vSphere Enterprise Plus – Provides the full range of vSphere features. A support and subscription contract (SnS) is mandatory when purchasing the Enterprise Plus editions.
      • vSphere Essentials kit – The Essentials kit is an all-in-one solution for small environments with up to three hosts (2 CPUs on each host). Support is optional when purchasing the Essentials kit and is available on a per-incident basis.
      • vSphere Essentials Plus kit – This is similar to the Essentials kit and provides additional features such as vSphere vMotion, vSphere HA, and vSphere replication. A support and subscription contract (SnS) is sold separately, and a minimum of one year of SnS is required.

      Review vSphere Edition Features

      The image contains a screenshot to review the vSphere Edition Features.

      Download the vSphere Edition 7 Features List

      1.2 Evaluate licensing options

      VMware agreement types

      Review purchase options to align with your requirements.

      Transactional VPP EPP ELA

      Transactional

      Entry-level volume license purchasing program

      Mid-level purchasing program

      Highest-level purchasing program

      • Purchasing in this model is not recommended for business purposes unless very infrequent and low quantities.
      • 250 points minimum
      • Four tiers of discounts
      • Rolling eight-quarter points accumulation period
      • Discounts on license only

      Deal size of initial purchase typically is:

      • US$250K MSRP License + SnS (2,500 tokens)
      • Exceptions do exist with purchase volume

      Minimum deal size of top-up purchase:

      • US$50K MSRP License + SnS (500 tokens)
      • Initial purchase determines token level
      • Three-year term

      Minimum deal size of initial purchase:

      • US$150K-$250K
      • Discounted licenses and SnS through term of contract
      • Single volume license key
      • No final true-up
      • Global deployment rights and consolidation of multiple agreements

      1.2.1 The Volume Purchasing Program (VPP)

      This is the entry-level purchasing program aimed at small/mid-sized organizations.

      How the program works

      • The threshold to be able to purchase from the VPP program is 250 points minimum, equivalent to $25,000.
      • Discounts attained can only be applied to license purchases. They do not apply to service and support/renewals. Discounts range from 4% to 12%.
      • For the large majority of products 1 VPP point = ~$100.
        • Point values will be the same globally.
        • Point ratios may vary over time as SKUs are changed.
        • Points are valid for two years.

      Benefits

      • Budget predictability for two years.
      • Simple license purchase process.
      • Receive points on qualifying purchases that accumulate over a rolling eight-quarter period.
      • Online portal for tracking purchases and eligible discounts.
      • Global program where affiliates can purchase from existing contract.

      VPP Point & Discount Table

      Level

      Point Range

      Discount

      1

      250-599

      4%

      2

      600-999

      6%

      3

      1,000-1,749

      9%

      4

      1,750+

      12%

      Source: VMware Volume Purchasing Program

      1.2.2 Activity VPP Transactional Purchase Tool

      1-3 hours

      Instructions:

      1. Use the tool to analyze the cost breakdown and discount based on your Volume Purchasing Program level.
      2. On tab 1, Enter SnS install base renewal units and or new license details.
      3. Review tab 2 for Purchase summary.

      The image contains a screenshot of the VPP Transactional Purchase Tool.

      Input Output
      • SnS renewal details
      • New license requirements and pricing
      • Transaction purchase summary
      • Estimated VPP purchase level
      Materials Participants
      • Current VMware purchase orders
      • Any SnS renewal requirements
      • Transaction Purchase Tool
      • Procurement
      • Vendor Management
      • Licensing Admin

      Download the VPP Transactional Purchase Tool

      1.3 Evaluate agreement options

      Introduction to EPP and ELA

      What to know when using a token/credit-based agreement.

      Token/credit-based agreements carry high risk as customers are purchasing a set number of tokens/credits to be redeemed during the ELA term for licenses.

      • Tokens/credits that are not used during the ELA term expire and become worthless.
      • By default in most agreements (negotiation dependent), tokens/credits are tied to pricing maintained by VMware on its website that is subject to change (increase usually), resulting in a reduced value for the tokens/credits.
        • Therefore, it is necessary to negotiate to have current list prices for all products/versions included in the ELA to prevent price increases while in the current ELA term.
      • Token-based agreements may come with a lower overall discount level as VMware is granting more flexibility in terms of the wider product selection offered, vendor cost of overhead to manage the redemption program, currency exchange risks, and more complex revenue recognition headaches.

      1.3.1 The Enterprise Purchasing Program (EPP)

      This is aimed at mid-tier customers looking for flexibility with deeper discounting.

      How the program works

      • Token-based program in which tokens are redeemed for licenses and/or SnS.
        • Tokens can be added at any time to active fund.
        • Token usage is automatically tracked and reported.
      • Minimum order of 2,500 tokens, equivalent to $250,000 (1 token=$100).
        • Exceptions have been made, allowing for lower minimum spends.
      • Restricted to specific regions, not a global agreement.
      • Self-service portal for access to license keys and support entitlements.
      • Deeper discounting than the VMware Volume Purchase Program.
      • EPP initial purchase gets VPP L4 for four years.

      Benefits

      • Able to mix and match VMware products, manage licenses, and adjust deployment strategy.
      • Prices are protected for term of the EPP agreement.
      • Number of tokens needed to obtain a product or SnS are negotiated at the start of the contract and fixed for the term.
      • SnS is co-termed to the EPP term.
      • Ability to purchase new products that become available at a future date and are listed on the EPP Eligibility Matrix.

      EPP Level & Point Table

      Level

      Point Range

      7

      2,500-3,499

      8

      3,500-4,499

      9

      4,500-5,999

      10

      6,000+

      Source: VMware Volume Purchasing Program

      1.3.2 The ELA is aimed at large global organizations, offering the deepest discounts with operational benefits and flexibility

      What is an ELA?

      • The ELA agreement provides the best vehicle for global enterprises to obtain maximum discounts and price-hold protection for a set period of time. Discounts and price holds are removed once an ELA has expired.
      • The ELA minimum spend previously was $500,000. Purchase volume now generally starts at $250K total spend with exceptions and, depending on VMware, it may be possible to attain for $150K in net-new license spend.

      Key things to know

      • Customers pay up front for license and SnS rights, but depending on the deployment plans, the value of the licenses is not realized and/or recognized for up to two years after point of purchase.
      • License and SnS is paid up front for a three-year period in most ELAs, although a one- or two-year term can be negotiated.
      • Licenses not deployed in year one should be discounted in value and drive a re-evaluation of the ELA ROI, as even heavily discounted licenses that are not used until year three may not be such a great deal in retrospect.
        • Use a time value of money calculation to arrive at a realistic ROI.
        • Partner with Finance and Accounting to ensure the ROI also clears any Internal Hurdle Rate (IHR).
        • Share and strategically position your IHR with VMware and resellers to ensure they understand the minimum value an ELA deal must bring to the table.
      • Organizational changes, such as merger, acquisition, and divestiture (MAD) activities, may result in the customer paying for license rights that can no longer be used and/or require a renegotiated ELA.

      Info-Tech Insight

      If a legacy ELA exists that has “deploy or lose” language, engage VMware to recapture any lost license rights as VMware has changed this language effective with 2016 agreements and there is an “appeals” process for affected customers.

      1.3.3 Select the best ELA variant to match your specific demand profile and financial needs

      The advantages of an ELA are:

      • Maximum discount level + price protection
      • SnS discounted at % of net license fee
      • Sole option for global use territory rights

      General disadvantages are:

      • Term lock-in with SnS for three years
      • Pay up front and if defer usage, ROI drops
      • Territory rights priced at a premium versus domestic use rights

      Type of ELAs

      ELA Type

      Description

      Pros and Cons

      Capped (max quantities)

      Used to purchase a specific quantity and type of license.

      Pro – Clarity on what will be purchased

      Pro – Lower risk of over licensing

      Con – Requires accurate forecasting

      All you can eat or unlimited

      Used to purchase access to specified products that can be deployed in unlimited quantities during the ELA term.

      Pro – Acquire large quantity of licenses

      Pro – Accurate forecasting not critical

      Con – Deployment can easily exceed forecast, leading to high renewal costs

      Burn-down

      A form of capped ELA purchase that uses prepaid tokens that can be used more flexibly to acquire a variety of licenses or services. This can include the hybrid purchasing program (HPP) credits. However, the percentage redeemable for VMware subscription services may be limited to 10% of the MSRP value of the HPP credit.

      Pro – Accurate demand forecast not critical

      Pro – Can be used for products and services

      Con – Unused tokens or credits are forfeited

      True-up

      Allows for additional purchases during the ELA term on a determined schedule based on the established ELA pricing.

      Pro – Consumption payments matched after initial purchase

      Pro – Accurate demand forecast not critical

      Con – Potentially requires transaction throughout term

      1.4 Purchase and manage licenses

      Negotiating ELA terms and conditions

      Editable copies of VMware’s license and governance documentation are a requirement to initiate the dialogue and negotiation process over T&Cs.

      VMware’s licensing is complex and although documentation is publicly available, it is often hidden on VMware’s website.

      Many VMware customers often overlook reviewing the license T&Cs, leaving them open to compliance risks.

      It is imperative for customers to understand:

      • Product definition for licensing of each acquired product
      • Products included by bundle
      • Use restrictions:
        • The VMware Product Guide, which includes information about:
          • ELA Order Forms, Amendments, Exhibits, EULA, Support T&Cs, and other policies that add dozens of pages to a contractual agreement.
          • All of these documents are web based and can change monthly; URL links in the contract do not take the user to the actual document but a landing page from which customers must find the applicable documents.
        • Obtain copies of ALL current documents at the time of your order and keep as a reference in the CLM and SAM systems.

      Build in time to obtain, review, and negotiate these documents (easily weeks to months).

      1.4.1 Negotiating ELA terms and conditions specifics

      License and Deployment

      • Review perpetual use rights for all licenses purchased under the ELA (exception being subscription services).
      • Carefully scrutinize contract language for clearly defined deployment rights.
        • Some agreements contain language that terminates the use rights for licenses not deployed by the end of the ELA term.
      • While older contracts would frequently contain clearly defined token values and product prices for the ELA term, VMware has moved away from this process and now refers to URL links for current MSRP pricing.

      Use Rights

      • The customer’s legal entities and territories listed in the contract are hard limits on the license usage via the VMware Product Guide definitions. Global use rights are not a standard license grant with VMware license agreement by default. Global rights are usually tied to an ELA.
      • VMware audits most aggressively against violations of territory use rights and will use the non-compliance events to resolve the issue via a commercial transaction.
        • Negotiate for assignment rights with no strings attached in terms of fees or multi-party consent by future affiliates or successors to a surviving entity.
      • Extraordinary Corporate Transaction clause: VMware’s standard language prevents customers from using licenses within the ELA for any third party that becomes part of customer’s business by way of acquisition, merger, consolidation, change of control, reorganization, or other similar transaction.
        • Request VMware to drop this language.
      • Include any required language pertaining to MAD events as default language will not allow for transfer or assignment of license rights.

      Checklist of necessary information to negotiate the best deal

      Product details that go beyond the sales pitch

      • Product family
      • Unique product SKU for license renewal
      • Part description
      • Current regional or global price list
      • One and three-year proposal for SnS renewals including new license and SnS detail
      • SnS term dates
      • Discount or offered prices for all line items (global pricing is generally ~20% higher than US pricing)

      Different support levels (e.g. basic, enterprise, per incident)

      • Standard pricing:
        • Basic Support = 21% of current list price (12x5)
        • Production Support = 25% of current list price (24x7 for severity 1 issues) – defined in VMware Support and Subscription Services T&Cs; non-severity 1 issues are 12x5

      Details to ensure the product being purchased matches the business needs

      • Realizing after the fact the product is insufficient with respect to functional requirements or that extra spend is required can be frustrating and extend expected timelines

      SnS renewals pricing is based on the (1) year SnS list price

      • This can be bundled for a multi-year discounted SnS rate (can result in 12%+ under VPP)

      Governing agreements, VPP program details

      • Have a printed copy of documents that are URL links, which VMware can change, allowing for surprises or unexpected changes in rules

      1.4.2 Activity VMware ELA Analysis Tool

      2-4 hours

      Instructions:

      1. As a group, review the various RFQ responses. Identify top three proposals and start to enter proposal details into the VPP Prepay or ELA tabs of the analysis tool.
      2. Review savings in the ELA Offer Analysis tab.

      The image contains screenshots of the VMware ELA Analysis Tool.

      Input Output
      • RFQ requirements data
      • RFQ response data
      • Analysis of ELA proposals
      • ELA savings analysis
      Materials Participants
      • RFQ response documents
      • ELA Analysis Tool
      • IT Leadership
      • Procurement
      • Vendor Management

      Download the VMware ELA Analysis Tool

      1.4.3 Negotiating ELA terms and conditions specifics: pricing, renewal, and exit

      VMware does not offer price protection on future license consumption by default.

      Securing “out years” pricing for SnS or the cost of SnS is critical or it will default to a set percentage (25%) of MSRP, removing the ELA discount.

      Typically, the out year is one year; maximum is two years.

      Negotiate the “go forward” SnS pricing post-ELA term as part of the ELA negotiations when you have some leverage.

      Default after (1) out year is to rise to 25% of current MSRP versus as low as 20% of net license price within the ELA.

      Carefully incorporate the desired installed-base licenses that were acquired pre-ELA into the agreement, but ensure unwanted licenses are removed.

      Ancillary but binding support policies, online terms and conditions, and other hyperlinked documentation should be negotiated and incorporated as part of the agreement whenever possible.

      1.4.4 Find the best reseller partner

      Seek out a qualified VMware partner that will work with you and with your interest as a priority:

      1. Resellers, at minimum, should have achieved an enterprise-level rating, as these partners can offer the deepest discounts and have more clout with VMware.
      2. Select your reseller prior to engaging in any RFX acquisition steps. Verify they are enterprise level or higher AND secure their written commitment to maximum pass-through of the discounting provided to them by VMware.
      3. Document and prioritize key T&Cs for your ELA and submit to your sales team along with a requirement and timeline for their formal response. Essentially, this escalates outside of the VMware process and disrupts the status quo. Ideally this will occur in advance of being presented a contract by VMware and be pre-emptive in nature.
      4. If applicable and of benefit or a high priority, seek out a reseller that is willing to finance the VMware upfront payment cost at a low or no interest rate.
      5. It will be important to have ELA-level deals escalated to higher levels of authority to obtain “best in class” discount levels, above and beyond those prescribed in the VMware sales playbook.
      6. VMware’s standard process is to “route” customers through a pre-defined channel and “deal desk” process. Preferred pricing of up to an additional 10% discount is reserved for the first reseller that registers the deal with VMware, with larger discounts reserved for the Enterprise and Premium partners. Additional discounts can be earned if the deal closes within specified time periods (First Deal Registration).

      1.4.5 Activity VMware ELA RFQ Template

      1-3 hours

      Use this tool for as a template for an RFQ with VMware ELA contracts.

      1. For SnS renewals that contain no new licenses, state that the requirement for award consideration is the provisioning of all details for each itemized SnS renewal product code corresponding to all the licenses of your installed base. The details for the renewals are to be placed in Section 1 of the template.
      2. SnS Renewal Options: Info-Tech recommends that you ask for one- and three-year SnS renewal proposals, assuming these terms are realistic for your business requirements. Then compare your SnS BAU costs for these two options against ELA offers to determine the best choice for your renewal.

      The image contains a screenshot of the VMware ELA RFQ Template.

      Input Output
      • Renewing SnS data
      • Agreement type options
      • Detailed list of required licenses
      • Summary list of SnS requirements
      Materials Participants
      • RFQ Template
      • SnS renewal summary
      • New license/subscription details
      • IT Leadership
      • Vendor Management
      • Procurement

      Download the VMware ELA RFQ Template

      1.4.6 Consider your path forward

      Consider your route forward as contract commitments, license compliance, and terms and conditions differ in structure to perpetual models previously used.

      • Are you able to accurately discover VMware licensing within your environment?
      • Is licensing managed for compliance? Are internal audits conducted so you have accurate results?
      • Have the product use rights been examined for terms and conditions such as geographic rights? Some T&Cs may change over time due to hyperlinked references within commercial documents.
      • How are Oracle and SQL being used within your VMware environment? This may affect license compliance with Oracle and Microsoft in virtualized environments.
      • Prepare for the Subscription model; it’s here now and will be the lead discussion with all VMware reps going forward.

      Shift to Subscription

      1. With the $64bn takeover by Broadcom, there will be a significant shift and pressure to the subscription model.
      2. Broadcom has significant growth targets for its VMware acquisition that can only be achieved through a strong press to a SaaS model.

      Info-Tech Insight

      VMware has a license cost calculator and additional licensing documents that can be used to help determine what spend should be.

      Phase # 2

      Transition to the VMware Cloud

      Phase 1

      Phase 2

      1.1 Establish licensing requirements

      1.2 Evaluate licensing options

      1.3 Evaluate agreement options

      1.4 Purchase and manage licenses

      2.1 Understand the VMware subscription model

      2.2 Migrate workloads and licenses

      2.3 Discuss the VMware sales approach

      2.4 Manage SnS and cloud subscriptions

      This phase will walk you through the following activities:

      • Understand the VMware licensing model
      • Understand the license agreement options
      • Understand the VMware sales approach

      This phase will take you thorough:

      • The new VMware subscription movement to the cloud
      • How to prepare and migrate
      • Manage your subscriptions efficiently

      2.1 Understand the VMware subscription model

      VMware Cloud Universal

      • VMware Cloud Universal unifies compute, network, and storage capabilities across infrastructures, management, and applications.
      • Take advantage of financial and cloud management flexibility by combining on-premises and SaaS capabilities for automation, operations, log analytics, and network visibility across your infrastructure.
      • Capitalize on VMware knowledge by integrating proven migration methods and plans across your transformation journey such as consumption strategies, business outcome workshops, and more.
      • Determine your eligibility to earn a one-time discount with this exclusive benefit designed to offset the value of your current unamortized VMware on-premises license investments and then reallocate toward your multi-cloud initiatives.

      2.2 Migrate workloads and licenses to the cloud

      There are several cloud migration options and solutions to consider.

      • VMware Cloud offers solutions that can provide a low-cost path to the cloud that will help accelerate modernization.
      • There are also many third-party solution providers who can be engaged to migrate workloads and other infrastructure to VMware Cloud and into other public cloud providers.
      • VMware Cloud can be deployed on many IaaS providers such as AWS, Azure, Google, Dell, and IBM.

      VMware Cloud Assist

      1. Leverage all available transition funding opportunities and any IaaS migration incentives from VMware.
      2. Learn and understand the value and capabilities of VMware vRealize Cloud Universal to help you transition and manage hybrid infrastructure.

      2.2.1 Manage your VMware cloud subscriptions

      Use VMware vRealize to manage private, public, and local environments.

      Combine SaaS and on-premises capabilities for automation, operations, log analytics, network visibility, security, and compliance into one license.

      The image contains a screenshot of a diagram to demonstrate VMware cloud subscriptions.

      2.3 The VMware sales approach

      Understand the pitch before entering the discussion

      1. VMware will present a PowerPoint presentation proposal comparing a Business-as-Usual (BAU) scenario versus the ELA model.
      2. Critical factors to consider if considering the proposed ELA are growth rate projections, deployment schedule, cost of non-ELA products/options, shelf-ware, and non-ELA discounts (e.g. VPP, multi-year, or pre-paid).
      3. Involving VMware’s direct account team along with your reseller in the negotiations can be beneficial. Keep in mind that VMware ultimately decides on the final price in terms of the discount that is passed through. Ensure you have a clear line of sight into how pricing is determined.
      4. Explore reseller incentives and promotional programs that may provide for deeper than normal discount opportunities.

      INFO-TECH TIP: Create your own assumptions as inputs into the BAU model and then evaluate the ELA value proposition instead of depending on VMware’s model.

      2.4 Manage SnS and cloud subscriptions

      The new subscription model is making SnS renewal more complex.

      • Start renewal planning four to six months prior to anniversary.
      • Work closely with your reseller on your SnS renewal options.
      • Request “as is” versus subscription renewal proposal from reseller or VMware with a “savings” component.
      • Consider and review multi-year versus annual renewal; savings will differ.
      • For the Subscription transition renewal model, ensure that credits for legacy licensing is provided.
      • Negotiate cloud transition investments and incentives from VMware.

      What information to collect and how to analyze it

      • Negotiating toward preferred terms on SnS is critical, more so than when new license purchases are made, as approximately 75-80% of server virtualization are at x86 workloads, where maintenance revenue is a larger source of revenue for VMware than new license sales.
      • All relevant license and SnS details must be obtained from VMware to include Product Family, Part Description, Product Code (SKU), Regional/Global List Price, SnS Term Dates, and Discount Price for all new licenses.
      • VMware has all costs tied to the US dollar; you must calculate currency conversion into ROI models as VMware does not adjust token values of products across geographies or currency of purchase. The token to dollar value by product SKU is locked for the three-year term. This translates into a variable cost model depending on how local currency fluctuates against the US dollar; time the initial purchase to take this into consideration, if applicable.
      • Products purchased based on MSRP price with each token contains a value of US$100. Under the Hybrid Purchasing Program (HPP) credit values and associated buying power will fluctuate over the term as VMware reserves the right to adjust current list prices. Consider locking in a set product list and pricing versus HPP.
      • Take a structured approach to discover true discounts via the use of a tailored RFQ template and options model to compare and contrast VMware ELA proposals.

      Use Info-Tech Research Group’s customized RFQ template to discover true discount levels and model various purchase options for VMware ELA proposals.

      The image contains a screenshot of the VMware RFQ Template Tool.

      Summary of accomplishment

      Knowledge Gained

      • The key pieces of licensing information that should be gathered about the current state of your own organization.
      • An in-depth understanding of the required licenses across all of your products.
      • Clear methodology for selecting the most effective contract type.
      • Development of measurable, relevant metrics to help track future project success and identify areas of strength and weakness within your licensing program.

      Processes Optimized

      • Senior leaders in IT now have a clear understanding of the importance of licensing in relation to business objectives.
      • Understanding of the various licensing considerations that need to be made.
      • Contract negotiation.

      Related Info-Tech Research

      Prepare for Negotiations More Effectively

      • IT budgets are increasing, but many CIOs feel their budgets are inadequate to accomplish what is being asked of them.
      • Eighty percent of organizations don’t have a mature, repeatable, scalable negotiation process.
      • Training dollars on negotiations are often wasted or ineffective.

      Price Benchmarking & Negotiation

      You need to achieve an objective assessment of vendor pricing in your IT contracts, but you have limited knowledge about:

      • Current price benchmarking on the vendor.
      • Pricing and negotiation intelligence.
      • How to secure a market-competitive price.
      • Vendor pricing tiers, models, and negotiation tactics.

      VMware vRealize Cloud Management

      VMware vCloud Suite is an integrated offering that brings together VMware’s industry-leading vSphere hypervisor and VMware vRealize Suite multi-vendor hybrid cloud management platform. VMware’s new portable licensing units allow vCloud Suite to build and manage both vSphere-based private clouds and multi-vendor hybrid clouds.

      Bibliography

      Barrett, Alex. “vSphere and vCenter licensing and pricing explained -- a VMware license guide.” TechTarget, July 2010. Accessed 7 May 2018.
      Bateman, Kayleigh. “VMware licensing, pricing and features mini guide.” Computer Weekly, May 2011. Accessed 7 May 2018.
      Blaisdell, Rick. “What Are The Common Business Challenges The VMware Sector Faces At This Point In Time?” CIO Review, n.d. Accessed 7 May 2018.
      COMPAREX. “VMware Licensing Program.” COMPAREX, n.d. Accessed 7 May 2018.
      Couesbot, Erwann. “Using VMware? Oracle customers hate this licensing pitfall.” UpperEdge, 17 October 2016. Accessed 7 May 2018.
      Crayon. “VMware Licensing Programs.” Crayon, n.d. Accessed 7 May 2018.
      Datanyze." Virtualization Software Market Share.” Datanyze, n.d. Web.
      Demers, Tom. “Top 18 Tips & Quotes on the Challenges & Future of VMware Licensing.” ProfitBricks, 1 September 2015. Accessed 7 May 2018.
      Fenech, J. “A quick look at VMware vSphere Editions and Licensing.” VMware Hub by Altaro, 17 May 2017. Accessed 7 May 2018.
      Flexera. “Challenges of VMware Licensing.” Flexera, n.d. Accessed 5 February 2018.
      Fraser, Paris. “A Guide for VMware Licensing.” Sovereign, 11 October 2016. Accessed 7 May 2018.
      Haag, Michael. “IDC Data Shows vSAN is the Largest Share of Total HCI Spending.” VMware Blogs, 1 December 2017. Accessed 7 May 2018.
      Kealy, Victoria. “VMware Licensing Quick Guide 2015.” The ITAM Review, 17 December 2015. Accessed 7 May 2018.
      Kirsch, Brian. “A VMware licensing guide to expanding your environment.” TechTarget, August 2017. Accessed 7 May 2018.
      Kirupananthan, Arun. “5 reasons to get VMware licensing right.” Softchoice, 16 April 2018. Accessed 7 May 2018.
      Knorr, Eric. “VMware on AWS: A one-way ticket to the cloud.” InfoWorld, 17 October 2016. Accessed 7 May 2018
      Leipzig. “Help, an audit! License audits by VMware. Are you ready?” COMPAREX Group, 2 May 2016. Accessed 7 May 2018.
      Mackie, Kurt. “VMware Rips Microsoft for Azure “Bare Metal” Migration Solution.” Redmond Magazine, 27 November 2017. Accessed 7 May 2018.
      Micromail. “VMware vSphere Software Licensing.” Micromail, n.d. Accessed 7 May 2018.
      Microsoft Corportation. “Migrating VMware to Microsoft Azure” Microsoft Azure, November 2017. Accessed 7 May 2018.
      Peter. “Server Virtualization and OS Trends.” Spiceworks, 30 August 2016. Accessed 7 May 2018.
      Rich. “VMware running on Azure.” The ITAM Review, 28 November 2017. Accessed 7 May 2018.
      Robb, Drew. “Everything you need to know about VMware’s licensing shake up.” Softchoice, 4 March 2016. Accessed 7 May 2018.
      Rose, Brendan. “How to determine which VMware licensing option is best.” Softchoice, 28 July 2015. Accessed 7 May 2018.
      Scholten, Eric. “New VMware licensing explained.” VMGuru, 12 July 2011. Accessed 7 May 2018.
      Sharwood, Simon. “Microsoft to run VMware on Azure, on bare metal. Repeat. Microsoft to run VMware on Azure.” The Register, 22 November 2017. Accessed 7 May 2018.
      Siebert, Eric. “Top 7 VMware Management Challenges.” Veeam, n.d. Web.
      Smith, Greg. “Will The Real HCI Market Leader Please Stand Up?” Nutanix, 29 September 2017. Accessed 7 May 2018.
      Spithoven, Richard. “Licensing Oracle software in VMware vCenter 6.0.” LinkedIn, 2 May 2016. Accessed 7 May 2018.
      VMTurbo, Inc. “Licensing, Compliance & Audits in the Cloud Era.” Turbonomics, November 2015. Web.
      VMware. “Aug 1st – Dec 31st 2016 Solution Provider Program Requirements & Incentives & Rewards.” VMware, n.d. Web.
      VMware. “Global Support and Subscription Services “SnS” Renewals Policy.” VMware, n.d. Web.
      VMware. “Support Policies.” VMware, n.d. Accessed 7 May 2018.
      VMware. “VMware Cloud Community.” VMware Cloud, n.d. Accessed 7 May 2018.
      VMware. “VMware Cloud on AWS” VMware Cloud, n.d. Accessed 7 May 2018.
      VMware. “VMware Enterprise Purchasing Program.” VMware, 2013. Web.
      VMware. “VMware Product Guide.” VMware, May 2018. Web.
      VMware. “VMware Volume Purchasing Program.” VMware, April 2019. Web.
      VMware. "VMware Case Studies." VMware, n.d. Web.
      Wiens, Rob. “VMware Enterprise Licensing – What You Need To Know. House of Brick, 14 April 2017. Accessed 7 May 2018

      Build a Data Pipeline for Reporting and Analytics

      • Buy Link or Shortcode: {j2store}126|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $61,999 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Continuous and disruptive database design updates while trying to have one design pattern to fit all use cases.
      • Sub-par performance while loading, retrieving, and querying data.
      • You want to shorten time-to-market of the projects aimed at data delivery and consumption.
      • Unnecessarily complicated database design limits usability of the data and requires knowledge of specific data structures for their effective use.

      Our Advice

      Critical Insight

      • Evolve your data architecture. Data pipeline is an evolutionary break away from the enterprise data warehouse methodology.
      • Avoid endless data projects. Building centralized all-in-one enterprise data warehouses takes forever to deliver a positive ROI.
      • Facilitate data self-service. Use-case optimized data delivery repositories facilitate data self-service.

      Impact and Result

      • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
      • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
      • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

      Build a Data Pipeline for Reporting and Analytics Research & Tools

      Start here – read the Executive Brief

      Build your data pipeline using the most appropriate data design patterns.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data progression

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      • Build a Data Pipeline for Reporting and Analytics – Phase 1: Understand Data Progression

      2. Identify data pipeline components

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      • Build a Data Pipeline for Reporting and Analytics – Phase 2: Identify Data Pipeline Components

      3. Select data design patterns

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      • Build a Data Pipeline for Reporting and Analytics – Phase 3: Select Data Design Patterns
      [infographic]

      Workshop: Build a Data Pipeline for Reporting and Analytics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Data Progression

      The Purpose

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      Key Benefits Achieved

      Indicates the ownership of datasets and the high-level data flows across the organization.

      Activities

      1.1 Review & discuss typical pitfalls (and their causes) of major data management initiatives.

      1.2 Discuss the main business capabilities of the organization and how they interact.

      1.3 Discuss the business processes running inside and across business capabilities and the datasets involved.

      1.4 Create the Enterprise Business Process Model (EBPM).

      Outputs

      Understanding typical pitfalls (and their causes) of major data management initiatives.

      Business capabilities map

      Business processes map

      Enterprise Business Process Model (EBPM)

      2 Identify Data Pipeline Components

      The Purpose

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      Key Benefits Achieved

      Design the high-level data progression pipeline.

      Activities

      2.1 Review and discuss the concept of a data pipeline in general, as well as the vertical zones: data creation, accumulation, augmentation, and consumption.

      2.2 Identify these zones in the enterprise business model.

      2.3 Review and discuss multi-lane data progression.

      2.4 Identify different speed lanes in the enterprise business model.

      Outputs

      Understanding of a data pipeline design, including its zones.

      EBPM mapping to Data Pipeline Zones

      Understanding of multi-lane data progression

      EBPM mapping to Multi-Speed Data Progression Lanes

      3 Develop the Roadmap

      The Purpose

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      Key Benefits Achieved

      Use of appropriate data design pattern for each zone with calibration on the data progression speed.

      Activities

      3.1 Review and discuss various data design patterns.

      3.2 Discuss and select the data design pattern selection for data pipeline components.

      3.3 Discuss applicability of data model industry standards (if available).

      Outputs

      Understanding of various data design patterns.

      Data Design Patterns mapping to the data pipeline.

      Selection of an applicable data model from available industry standards.

      Create a Holistic IT Dashboard

      • Buy Link or Shortcode: {j2store}117|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $8,049 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement
      • IT leaders do not have a single holistic view of how their 45 IT processes are operating.
      • Expecting any single individual to understand the details of all 45 IT processes is unrealistic.
      • Problems in performance only become evident when the process has already failed.

      Our Advice

      Critical Insight

      • Mature your IT department by measuring what matters.
      • Don’t measure things just because you can; change what you measure as your organization matures.

      Impact and Result

      • Use Info-Tech’s IT Metrics Library to review typical KPIs for each of the 45 process areas and select those that apply to your organization.
      • Configure your IT Management Dashboard to record your selected KPIs and start to measure performance.
      • Set up the cadence for review of the KPIs and develop action plans to improve low-performing indicators.

      Create a Holistic IT Dashboard Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to develop your KPI program that leads to improved performance.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Choose the KPIs

      Identify the KPIs that matter to your organization’s goals.

      • Create a Holistic IT Dashboard – Phase 1: Choose the KPIs
      • IT Metrics Library

      2. Build the Dashboard

      Use the IT Management Dashboard on the Info-Tech website to display your chosen KPIs.

      • Create a Holistic IT Dashboard – Phase 2: Build the Dashboard

      3. Create the Action Plan

      Use the review of your KPIs to build an action plan to drive performance.

      • Create a Holistic IT Dashboard – Phase 3: Build the Action Plan
      [infographic]

      Workshop: Create a Holistic IT Dashboard

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify What to Measure (Offsite)

      The Purpose

      Determine the KPIs that matter to your organization.

      Key Benefits Achieved

      Identify organizational goals

      Identify IT goals and their organizational goal alignment

      Identify business pain points

      Activities

      1.1 Identify organizational goals.

      1.2 Identify IT goals and organizational alignment.

      1.3 Identify business pain points.

      Outputs

      List of goals and pain points to create KPIs for

      2 Configure the Dashboard Tool (Onsite)

      The Purpose

      Learn how to configure and use the IT Management Dashboard.

      Key Benefits Achieved

      Configured IT dashboard

      Initial IT scorecard report

      Activities

      2.1 Review metrics and KPI best practices.

      2.2 Use the IT Metrics Library.

      2.3 Select the KPIs for your organization.

      2.4 Use the IT Management Dashboard.

      Outputs

      Definition of KPIs to be used, data sources, and ownership

      Configured IT dashboard

      3 Review and Develop the Action Plan

      The Purpose

      Learn how to review and plan actions based on the KPIs.

      Key Benefits Achieved

      Lead KPI review to actions to improve performance

      Activities

      3.1 Create the scorecard report.

      3.2 Interpret the results of the dashboard.

      3.3 Use the IT Metrics Library to review suggested actions.

      Outputs

      Initial IT scorecard report

      Action plan with initial actions

      4 Improve Your KPIs (Onsite)

      The Purpose

      Use your KPIs to drive performance.

      Key Benefits Achieved

      Improve your metrics program to drive effectiveness

      Activities

      4.1 Develop your action plan.

      4.2 Execute the plan and tracking progress.

      4.3 Develop new KPIs as your practice matures.

      Outputs

      Understanding of how to develop new KPIs using the IT Metrics Library

      5 Next Steps and Wrap-Up (Offsite)

      The Purpose

      Ensure all documentation and plans are complete.

      Key Benefits Achieved

      Documented next steps

      Activities

      5.1 Complete IT Metrics Library documentation.

      5.2 Document decisions and next steps.

      Outputs

      IT Metrics Library

      Action plan

      Further reading

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Executive Brief

      Analyst Perspective

      Measurement alone provides only minimal improvements

      It’s difficult for CIOs and other top-level leaders of IT to know if everything within their mandate is being managed effectively. Gaining visibility into what’s happening on the front lines without micromanaging is a challenge most top leaders face.

      Understanding Info-Tech’s Management and Governance Framework of processes that need to be managed and being able to measure what’s important to their organization's success can give leaders the ability to focus on their key responsibilities of ensuring service effectiveness, enabling increased productivity, and creating the ability for their teams to innovate.

      Even if you know what to measure, the measurement alone will lead to minimal improvements. Having the right methods in place to systematically collect, review, and act on those measurements is the differentiator to driving up the maturity of your IT organization.

      The tools in this blueprint can help you identify what to measure, how to review it, and how to create effective plans to improve performance.

      Tony Denford

      Research Director, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • IT leaders do not have a single holistic view of how their IT processes are operating.
      • Expecting any single individual to understand the details of all IT processes is unrealistic.
      • Problems in performance only become evident when the process has already failed.

      Common Obstacles

      • Business changes quickly, and what should be measured changes as a result.
      • Most measures are trailing indicators showing past performance.
      • Measuring alone does not result in improved performance.
      • There are thousands of operational metrics that could be measured, but what are the right ones for an overall dashboard?

      Info-Tech's Approach

      • Use Info-Tech’s IT Metrics Library to review typical KPIs for each of the process areas and select those that apply to your organization.
      • Configure your IT Management Dashboard to record your selected KPIs and start to measure performance.
      • Set up the cadence for review of the KPIs and develop action plans to improve low-performing indicators.

      Info-Tech Insight

      Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.

      Your challenge

      This research is designed to help organizations quickly choose holistic measures, review the results, and devise action plans.

      • The sheer number of possible metrics can be overwhelming. Choose metrics from our IT Metrics Library or choose your own, but always ensure they are in alignment with your organizational goals.
      • Ensure your dashboard is balanced across all 45 process areas that a modern CIO is responsible for.
      • Finding leading indicators to allow your team to be proactive can be difficult if your team is focused on the day-to-day operational tasks.
      • It can be time consuming to figure out what to do if an indicator is underperforming.

      Build your dashboard quickly using the toolset in this research and move to improvement actions as soon as possible.

      The image is a bar graph, titled KPI-based improvements. On the X-axis are four categories, each with one bar for Before KPIs and another for After KPIs. The categories are: Productivity; Fire Incidents; Request Response Time; and Savings.

      Productivity increased by 30%

      Fire/smoke incidents decreased by 25% (high priority)

      Average work request response time reduced by 64%

      Savings of $1.6 million in the first year

      (CFI, 2013)

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • What should be measured can change over time as your organization matures and the business environment changes. Understanding what creates business value for your organization is critical.
      • Organizations almost always focus on past result metrics. While this is important, it will not indicate when you need to adjust something until it has already failed.
      • It’s not just about measuring. You also need to review the measures often and act on the biggest risks to your organization to drive performance.

      Don’t get overwhelmed by the number of things you can measure. It can take some trial and error to find the measures that best indicate the health of the process.

      The importance of frequent review

      35% - Only 35% of governing bodies review data at each meeting. (Committee of University Chairs, 2008)

      Common obstacles

      Analysis paralysis

      Poor data can lead to incorrect conclusions, limit analysis, and undermine confidence in the value of your dashboard.

      Achieving perfect data is extremely time consuming and may not add much value. It can also be an excuse to avoid getting started with metrics and analytics.

      Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate in your analysis and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.

      Info-Tech Insight

      Analytics are only as good as the data that informs it. Aim for just enough data quality to make informed decisions without getting into analysis paralysis.

      Common obstacles

      The problem of surrogation

      Tying KPIs and metrics to performance often leads to undesired behavior. An example of this is the now infamous Wells Fargo cross-selling scandal, in which 3.5 million credit card and savings accounts were opened without customers’ consent when the company incented sales staff to meet cross-selling targets.

      Although this is an extreme example, it’s an all-too-common phenomenon.

      A focus on the speed of closure of tickets often leads to shortcuts and lower-quality solutions.

      Tying customer value to the measures can align the team on understanding the objective rather than focusing on the measure itself, and the team will no longer be able to ignore the impact of their actions.

      Surrogation is a phenomenon in which a measure of a behavior replaces the intent of the measure itself. People focus on achieving the measure instead of the behavior the measure was intended to drive.

      Info-Tech’s thought model

      The Threefold Role of the IT Executive Core CIO Objectives
      IT Organization - Manager A - Optimize the Effectiveness of the IT Organization
      Enterprise - Partner B - Boost the Productivity of the Enterprise
      Market - Innovator C - Enable Business Growth Through Technology

      Low-Maturity Metrics Program

      Trailing indicators measure the outcomes of the activities of your organization. Hopefully, the initiatives and activities are aligned with the organizational goals.

      High-Maturity Metrics Program

      The core CIO objectives align with the organizational goals, and teams define leading indicators that show progress toward those goals. KPIs are reviewed often and adjustments are made to improve performance based on the leading indicators. The results are improved outcomes, greater transparency, and increased predictability.

      The image is a horizontal graphic with multiple text boxes. The first (on the left) is a box that reads Organizational Goals, second a second box nested within it that reads Core CIO Objectives. There is an arrow pointing from this box to the right. The arrow connects to a text box that reads Define leading indicators that show progress toward objectives. To the right of that, there is a title Initiatives & activities, with two boxes beneath it: Processes and Projects. Below this middle section, there is an arrow pointing left, with the text: Adjust behaviours. After this, there is an arrow pointing right, to a box with the title Outcomes, and the image of an unlabelled bar graph.

      Info-Tech’s approach

      Adopt an iterative approach to develop the right KPIs for your dashboard

      Periodically: As appropriate, review the effectiveness of the KPIs and adjust as needed.

      Frequently: At least once per month, but the more frequent, the more agility your organization will have.

      The image shows a series of steps in a process, each connected by an arrow. The process is iterative, so the steps circle back on themselves, and repeat. The process begins with IT Metrics Library, then Choose or build KPIs, then Build Dashboard, then Review KPIs and Create action plan. Review KPIs and Create action plan are steps that the graphic indicates should be repeated, so the arrows are arranged in a circle around these two items. Following that, there is an additional step: Are KPIs and action plans leading to improved results? After this step, we return to the Choose or build KPIs step.

      The Info-Tech difference:

      1. Quickly identify the KPIs that matter to your organization using the IT Metrics Library.
      2. Build a presentable dashboard using the IT Management Dashboard available on the Info-Tech website.
      3. When indicators show underperformance, quickly get them back on track using the suggested research in the IT Metrics Library.
      4. If your organization’s needs are different, define your own custom metrics using the same format as the IT Metrics Library.
      5. Use the action plan tool to keep track of progress

      Info-Tech’s methodology for creating a holistic IT dashboard

      1. Choose the KPIs 2. Build the Dashboard 3. Create the Action Plan
      Phase Steps
      1. Review available KPIs
      2. Select KPIs for your organization
      3. Identify data sources and owners
      1. Understand how to use the IT Management Dashboard
      2. Build and review the KPIs
      1. Prioritize low-performing indicators
      2. Review suggested actions
      3. Develop your action plan
      Phase Outcomes A defined and documented list of the KPIs that will be used to monitor each of the practice areas in your IT mandate A configured dashboard covering all the practice areas and the ability to report performance in a consistent and visible way An action plan for addressing low-performing indicators

      Insight summary

      Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.

      Don’t just measure things because you can. Change what you measure as your organization becomes more mature.

      Select what matters to your organization

      Measure things that will resolve pain points or drive you toward your goals.

      Look for indicators that show the health of the practice, not just the results.

      Review KPIs often

      Ease of use will determine the success of your metrics program, so keep it simple to create and review the indicators.

      Take action to improve performance

      If indicators are showing suboptimal performance, develop an action plan to drive the indicator in the right direction.

      Act early and often.

      Measure what your customers value

      Ensure you understand what’s valued and measure whether the value is being produced. Let front-line managers focus on tactical measures and understand how they are linked to value.

      Look for predictive measures

      Determine what action will lead to the desired result and measure if the action is being performed. It’s better to predict outcomes than react to them.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      IT Metrics Library

      Customize the KPIs for your organization using the IT Metrics Library

      IT Metrics Library Action Plan

      Keep track of the actions that are generated from your KPI review

      Key deliverable:

      IT Management Dashboard and Scorecard

      The IT Overall Scorecard gives a holistic view of the performance of each IT function

      Blueprint benefits

      IT Benefits

      • An IT dashboard can help IT departments understand how well they are performing against key indicators.
      • It can allow IT teams to demonstrate to their business partners the areas they are focusing on.
      • Regular review and action planning based on the results will lead to improved performance, efficiency, and effectiveness.
      • Create alignment of IT teams by focusing on common areas of performance.

      Business Benefits

      • Ensure alignment and transparency between the business and IT.
      • Understand the value that IT brings to the operation and strategic initiatives of your organization.
      • Understand the contribution of the IT team to achieving business outcomes.
      • Focus IT on the areas that are important to you by requesting new measures as business needs change.

      Measure the value of this blueprint

      Utilize the existing IT Metrics Library and IT Dashboard tools to quickly kick off your KPI program

      • Developing the metrics your organization should track can be very time consuming. Save approximately 120 hours of effort by choosing from the IT Metrics Library.
      • The need for a simple method to display your KPIs means either developing your own tool or buying one off the shelf. Use the IT Management Dashboard to quickly get your KPI program up and running. Using these tools will save approximately 480 hours.
      • The true value of this initiative comes from using the KPIs to drive performance.

      Keeping track of the number of actions identified and completed is a low overhead measure. Tracking time or money saved is higher overhead but also higher value.

      The image is a screen capture of the document titled Establish Baseline Metrics. It shows a table with the headings: Metric, Current, Goal.

      The image is a chart titled KPI benefits. It includes a legend indicating that blue bars are for Actions identified, purple bars are for Actions completed, and the yellow line is for Time/money saved. The graph shows Q1-Q4, indicating an increase in all areas across the quarters.

      Executive Brief Case Study

      Using data-driven decision making to drive stability and increase value

      Industry: Government Services

      Source: Info-Tech analyst experience

      Challenge

      A newly formed application support team with service desk responsibilities was becoming burned out due to the sheer volume of work landing on their desks. The team was very reactive and was providing poor service due to multiple conflicting priorities.

      To make matters worse, there was a plan to add a major new application to the team’s portfolio.

      Solution

      The team began to measure the types of work they were busy doing and then assessed the value of each type of work.

      The team then problem solved how they could reduce or eliminate their low-value workload.

      This led to tracking how many problems were being resolved and improved capabilities to problem solve effectively.

      Results

      Upon initial data collection, the team was performing 100% reactive workload. Eighteen months later slightly more than 80% of workload was proactive high-value activities.

      The team not only was able to absorb the additional workload of the new application but also identified efficiencies in their interactions with other teams that led to a 100% success rate in the change process and a 92% decrease in resource needs for major incidents.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostic and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 - Choose the KPIs

      Call #1: Scope dashboard and reporting needs.

      Call #2: Learn how to use the IT Metrics Library to select your metrics.

      Phase 2 – Build the Dashboard

      Call #3: Set up the dashboard.

      Call #4: Capture data and produce the report.

      Phase 3 – Create the Action Plan

      Call #5: Review the data and use the metrics library to determine actions.

      Call #6: Improve the KPIs you measure.

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 5 and 8 calls over the course of 2 to 3 months.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Identify What to Measure Configure the Dashboard Tool Review and Develop the Action Plan Improve Your KPIs Compile Workshop Output
      Activities

      1.1 Identify organizational goals.

      1.2 Identify IT goals and organizational alignment.

      1.3 Identify business pain points.

      2.1 Determine metrics and KPI best practices.

      2.2 Learn how to use the IT Metrics Library.

      2.3 Select the KPIs for your organization.

      2.4 Configure the IT Management Dashboard.

      3.1 Create the scorecard report.

      3.2 Interpret the results of the dashboard.

      3.3 Use the IT Metrics Library to review suggested actions.

      4.1 Develop your action plan.

      4.2 Execute the plan and track progress.

      4.3 Develop new KPIs as your practice matures.

      5.1 Complete the IT Metrics Library documentation.

      5.2 Document decisions and next steps.

      Outcomes 1. List of goals and pain points that KPIs will measure

      1. Definition of KPIs to be used, data sources, and ownership

      2. Configured IT dashboard

      1. Initial IT scorecard report

      2. Action plan with initial actions

      1. Understanding of how to develop new KPIs using the IT Metrics Library

      1. IT Metrics Library documentation

      2. Action plan

      Phase 1

      Choose the KPIs

      Phase 1

      1.1 Review Available KPIs

      1.2 Select KPIs for Your Org.

      1.3 Identify Data Sources and Owners

      Phase 2

      2.1 Understand the IT Management Dashboard

      2.2 Build and Review the KPIs

      Phase 3

      3.1 Prioritize Low-Performing Indicators

      3.2 Review Suggested Actions

      3.3 Develop the Action Plan

      This phase will walk you through the following activities:

      Reviewing and selecting the KPIs suggested in the IT Metrics Library.

      Identifying the data source for the selected KPI and the owner responsible for data collection.

      This phase involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Step 1.1

      Review Available KPIs

      Activities

      1.1.1 Download the IT Metrics Library and review the KPIs for each practice area.

      Choose the KPIs

      Step 1.1 – Review Available KPIs

      Step 1.2 – Select KPIs for Your Org.

      Step 1.3 – Identify Data Sources and owners

      This step will walk you through the following activities:

      Downloading the IT Metrics Library

      Understanding the content of the tool

      Reviewing the intended goals for each practice area

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      Downloaded tool ready to select the KPIs for your organization

      Using the IT Metrics Library

      Match the suggested KPIs to the Management and Governance Framework

      The “Practice” and “Process” columns relate to each of the boxes on the Info-Tech Management and Governance Framework. This ensures you are measuring each area that needs to be managed by a typical IT department.

      The image shows a table on the left, and on the right, the Info-Tech Management and Governance Structure. Sections from the Practice and Process columns of the table have arrows emerging from them, pointing to matching sections in the framework.

      Using the IT Metrics Library

      Content for each entry

      KPI - The key performance indicator to review

      CSF - What needs to happen to achieve success for each goal

      Goal - The goal your organization is trying to achieve

      Owner - Who will be accountable to collect and report the data

      Data Source (typical) - Where you plan to get the data that will be used to calculate the KPI

      Baseline/Target - The baseline and target for the KPI

      Rank - Criticality of this goal to the organization's success

      Action - Suggested action if KPI is underperforming

      Blueprint - Available research to address typical underperformance of the KPI

      Practice/Process - Which practice and process the KPI represents

      1.1.1 Download the IT Metrics Library

      Input

      • IT Metrics Library

      Output

      • Ideas for which KPIs would be useful to track for each of the practice areas

      Materials

      • Whiteboard/flip charts

      Participants

      • IT senior leadership
      • Process area owners
      • Metrics program owners and administrators

      4 hours

      1. Click the link below to download the IT Metrics Library spreadsheet.
      2. Open the file and select the “Data Entry” tab.
      3. The sheet has suggested KPIs for each of the 9 practice areas and 45 processes listed in the Info-Tech Management and Governance Framework. You can identify this grouping in the “Practice” and “Process” columns.
      4. For each practice area, review the suggested KPIs and their associated goals and discuss as a team which of the KPIs would be useful to track in your organization.

      Download the IT Metrics Library

      Step 1.2

      Select KPIs for Your Organization

      Activities

      1.2.1 Select the KPIs that will drive your organization forward

      1.2.2 Remove unwanted KPIs from the IT Metrics Library

      Choose the KPIs

      Step 1.1 – Review Available KPIs

      Step 1.2 – Select KPIs for Your Org.

      Step 1.3 – Identify Data Sources and Owners

      This step will walk you through the following activities:

      • Selecting the KPIs for your organization and removing unwanted KPIs from IT Metrics Library

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      A shortlist of selected KPIs

      1.2.1 Select the KPIs that will drive your organization forward

      Input

      • IT Metrics Library

      Output

      • KPIs would be useful to track for each of the practice areas

      Materials

      • IT Metrics Library

      Participants

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      4 hours

      1. Review the suggested KPIs for each practice area and review the goal.
      2. Some suggested KPIs are similar, so make sure the goal is appropriate for your organization.
      3. Pick up to three KPIs per practice.

      1.2.2 Remove unwanted KPIs

      Input

      • IT Metrics Library

      Output

      • KPIs would be useful to track for each of the practice areas

      Materials

      • IT Metrics Library

      Participants

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      0.5 hours

      1. To remove unwanted KPIs from the IT Metric Library Tool, select the unwanted row, right-click on the row, and delete it.
      2. The result should be up to three KPIs per practice area left on the spreadsheet.

      Step 1.3

      Identify data sources and owners

      Activities

      1.3.1 Document the data source

      1.3.2 Document the owner

      1.3.3 Document baseline and target

      Choose the KPIs

      Step 1.1 – Review Available KPIs

      Step 1.2 – Select KPIs for Your Org.

      Step 1.3 – Identify Data Sources and Owners

      This step will walk you through the following activities:

      Documenting for each KPI where you plan to get the data, who is accountable to collect and report the data, what the current baseline is (if available), and what the target is

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      A list of KPIs for your organization with appropriate attributes documented

      1.3 Identify data sources, owners, baseline, and target

      Input

      • IT Metrics Library

      Output

      • Completed IT Metrics Library

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators

      2 hours

      1. For each selected KPI, complete the owner, data source, baseline, and target if the information is available.
      2. If the information is not available, document the owner and assign them to complete the other columns.

      Phase 2

      Build the Dashboard

      Phase 1

      1.1 Review Available KPIs

      1.2 Select KPIs for Your Org.

      1.3 Identify Data Sources and Owners

      Phase 2

      2.1 Understand the IT Management Dashboard

      2.2 Build and Review the KPIs

      Phase 3

      3.1 Prioritize Low-Performing Indicators

      3.2 Review Suggested Actions

      3.3 Develop the Action Plan

      This phase will walk you through the following activities:

      Understanding the IT Management Dashboard

      Configuring the IT Management Dashboard and entering initial measures

      Produce thing IT Scorecard from the IT Management Dashboard

      Interpreting the results

      This phase involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Step 2.1

      Understand the IT Management Dashboard

      Activities

      2.1.1 Logging into the IT Management Dashboard

      2.1.2 Understanding the “Overall Scorecard” tab

      2.1.3 Understanding the “My Metrics” tab

      Build the Dashboard

      Step 2.1 – Understand the IT Management Dashboard

      Step 2.2 – Build and review the KPIs

      This step will walk you through the following activities:

      Accessing the IT Management Dashboard

      Basic functionality of the tool

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      Understanding of how to administer the IT Management Dashboard

      2.1.1 Logging into the IT Management Dashboard

      Input

      • Info-Tech membership

      Output

      • Access to the IT Management Dashboard

      Materials

      • Web browser

      Participants

      • Metrics program owners and administrators

      0.5 hours

      1. Using your web browser, access your membership at infotech.com.
      2. Log into your Info-Tech membership account.
      3. Select the “My IT Dashboard” option from the menu (circled in red).
      4. If you cannot gain access to the tool, contact your membership rep.

      The image is a screen capture of the Info-Tech website, with the Login button at the top right of the window circled in red.

      2.1.2 Understanding the “Overall Scorecard” tab

      0.5 hours

      1. Once you select “My IT Dashboard,” you will be in the “Overall Scorecard” tab view.
      2. Scrolling down reveals the data entry form for each of the nine practice areas in the Info-Tech Management and Governance Framework, with each section color-coded for easy identification.
      3. Each of the section headers, KPI names, data sources, and data values can be updated to fit the needs of your organization.
      4. This view is designed to show a holistic view of all areas in IT that are being managed.

      2.1.3 Understanding the “My Metrics” tab

      0.5 hours

      1. On the “My Metrics” tab you can access individual scorecards for each of the nine practice areas.
      2. Below the “My Metrics” tab is each of the nine practice areas for you to select from. Each shows a different subset of KPIs specific to the practice.
      3. The functionality of this view is the same as the overall scorecard. Each title, KPI, description, and actuals are editable to fit your organization’s needs.
      4. This blueprint does not go into detail on this tab, but it is available to be used by practice area leaders in the same way as the overall scorecard.

      Step 2.2

      Build and review the KPIs

      Activities

      2.2.1 Entering the KPI descriptions

      2.2.2 Entering the KPI actuals

      2.2.3 Producing the IT Overall Scorecard

      Build the Dashboard

      Step 2.1 – Understand the IT Management Dashboard

      Step 2.2 – Build and review the KPIs

      This step will walk you through the following activities:

      Entering the KPI descriptions

      Entering the actuals for each KPI

      Producing the IT Overall Scorecard

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      An overall scorecard indicating the selected KPI performance

      2.2.1 Entering the KPI descriptions

      Input

      • Access to the IT Management Dashboard
      • IT Metrics Library with your organization’s KPIs selected

      Output

      • KPI descriptions entered into tool

      Materials

      • Web browser

      Participants

      • Metrics program owners and administrators

      1 hour

      1. Navigate to the IT Management Dashboard as described in section 2.1.1 and scroll down to the practice area you wish to complete.
      2. If needed, modify the section name to match your organization’s needs.
      3. Select “Add another score.”

      2.2.1 Entering the KPI descriptions

      1 hour

      1. Select if your metric is a custom metric or a standard metric available from one of the Info-Tech diagnostic tools.
      2. Enter the metric name you selected from the IT Metrics Library.
      3. Select the value type.
      4. Select the “Add Metric” button.
      5. The descriptions only need to be entered when they change.

      Example of a custom metric

      The image is a screen capture of the Add New Metric function. The metric type selected is Custom metric, and the metric name is Employee Engagement. There is a green Add Metric button, which is circled in red.

      Example of a standard metric

      The image is a screen capture of the Add New Metric function. The metric type selected is Standard Metric. The green Add Metric button at the bottom is circled in red.

      2.2.2 Entering the KPI actuals

      Input

      • Actual data from each data source identified

      Output

      • Actuals recorded in tool

      Materials

      • Web browser

      Participants

      • Metrics program owners and administrators

      1 hour

      1. Select the period you wish to create a scorecard for by selecting “Add New Period” or choosing one from the drop-down list.
      2. For each KPI on your dashboard, collect the data from the data source and enter the actuals.
      3. Select the check mark (circled) to save the data for the period.

      The image is a screen capture of the My Overall Scorecard Metrics section, with a button at the bottom that reads Add New Period circled in red

      The image has the text People and Resources at the top. It shows data for the KPI, and there is a check mark circled in red.

      2.2.3 Producing the IT Overall Scorecard

      Input

      • Completed IT Overall Scorecard data collection

      Output

      • IT Overall Scorecard

      Materials

      • Web browser

      Participants

      • Metrics program owners and administrators

      0.5 hours

      1. Select the period you wish to create a scorecard for by selecting from the drop-down list.
      2. Click the “Download as PDF” button to produce the scorecard.
      3. Once the PDF is produced it is ready for review or distribution.

      Phase 3

      Create the Action Plan

      Phase 1

      1.1 Review Available KPIs

      1.2 Select KPIs for Your Org.

      1.3 Identify Data Sources and Owners

      Phase 2

      2.1 Understand the IT Management Dashboard

      2.2 Build and Review the KPIs

      Phase 3

      3.1 Prioritize Low-Performing Indicators

      3.2 Review Suggested Actions

      3.3 Develop the Action Plan

      This phase will walk you through the following activities:

      Prioritizing low-performing indicators

      Using the IT Metrics Library to review suggested actions

      Developing your team’s action plan to improve performance

      This phase involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Step 3.1

      Prioritize low-performing indicators

      Activities

      3.1.1 Determine criteria for prioritization

      3.1.2 Identify low-performing indicators

      3.1.3 Prioritize low-performing indicators

      Create the action plan

      Step 3.1 – Prioritize low-performing indicators

      Step 3.2 – Review suggested actions

      Step 3.3 – Develop the action plan

      This step will walk you through the following activities:

      Determining the criteria for prioritization of low-performing indicators

      Identifying low-performing indicators

      Prioritizing the low-performing indicators

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      A prioritized list of low-performing indicators that need remediation

      3.1.1 Determine criteria for prioritization

      Often when metrics programs are established, there are multiple KPIs that are not performing at the desired level. It’s easy to expect the team to fix all the low-performing indicators, but often teams are stretched and have conflicting priorities.

      Therefore it’s important to spend some time to prioritize which of your indicators are most critical to the success of your business.

      Also consider, if one area is performing well and others have multiple poor indicators, how do you give the right support to optimize the results?

      Lastly, is it better to score slightly lower on multiple measures or perfect on most but failing badly on one or two?

      3.1.1 Determine criteria for prioritization

      Input

      • Business goals and objectives
      • IT goals and objectives
      • IT organizational structure

      Output

      • Documented scorecard remediation prioritization criteria

      Materials

      • Whiteboard or flip charts

      Participants

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      1 hour

      1. Identify any KPIs that are critical and cannot fail without high impact to your organization.
      2. Identify any KPIs that cannot fail for an extended period and document the time period.
      3. Rank the KPIs from most critical to least critical in the IT Metrics Library.
      4. Look at the owner accountable for the performance of each KPI. If there are any large groups, reassess the ownership or rank.
      5. Periodically review the criteria to see if they’re aligned with meeting current business goals.

      3.1.2 Identify low-performing indicators

      Input

      • Overall scorecard
      • Overall scorecard (previous period)
      • IT Metrics Library

      Output

      • List of low-performing indicators that need remediation
      • Planned actions to improve performance

      Materials

      • Whiteboard or flip charts

      Participants

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      1 hour

      1. Review the overall scorecard for the current period. List any KPIs that are not meeting the target for the current month in the “Action Plan” tab of the IT Metrics Library.
      2. Compare current month to previous month. List any KPIs that are moving away from the long-term target documented in the tool IT Metrics Library.
      3. Revise the target in the IT Metrics Library as business needs change.

      3.1.3 Prioritize low-performing indicators

      Input

      • IT Metrics Library

      Output

      • Prioritized list of planned actions for low-performing indicators

      Materials

      • IT Metrics Library

      Participants

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      1 hour

      1. Look through the list of new and outstanding planned actions in the “Action Plan” tab of the IT Metrics Library, review progress, and prioritize outstanding items.
      2. Compare the list that needs remediation with the rank in the data entry tab.
      3. Adjust the priority of the outstanding and new actions to reflect the business needs.

      Step 3.2

      Review suggested actions

      Activities

      3.2.1 Review suggested actions in the IT Metrics Library

      Create the Action Plan

      Step 3.1 – Prioritize low-performing indicators

      Step 3.2 – Review suggested actions

      Step 3.3 – Develop the action plan

      This step will walk you through the following activities:

      Reviewing the suggested actions in the IT Metrics Library

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      An idea of possible suggested actions

      Take Action

      Knowing where you are underperforming is only half the battle. You need to act!

      • So far you have identified which indicators will tell you whether or not your team is performing and which indicators are most critical to your business success.
      • Knowing is the first step, but things will not improve without some kind of action.
      • Sometimes the action needed to course-correct is small and simple, but sometimes it is complicated and may take a long time.
      • Utilize the diverse ideas of your team to find solutions to underperforming indicators.
      • If you don’t have a viable simple solution, leverage the IT Metrics Library, which suggests high-level action needed to improve each indicator. If you need additional information, use your Info-Tech membership to review the recommended research.

      3.2.1 Review suggested actions in the IT Metrics Library

      Input

      • IT Metrics Library

      Output

      • Suggested actions

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      0.5 hours

      1. For each of your low-performing indicators, review the suggested action and related research in the IT Metrics Library.

      Step 3.3

      Develop the action plan

      Activities

      3.3.1 Document planned actions

      3.3.2 Assign ownership of actions

      3.3.3 Determine timeline of actions

      3.3.4 Review past action status

      Create the action plan

      Step 3.1 – Prioritize low- performing indicators

      Step 3.2 – Review suggested actions

      Step 3.3 – Develop the action plan

      This step will walk you through the following activities:

      Using the action plan tool to document the expected actions for low-performing indicators

      Assigning an owner and expected due date for the action

      Reviewing past action status for accountability

      This step involves the following participants:

      • Senior IT leadership
      • Process area owners
      • Metrics program owners and administrators

      Outcomes of this step

      An action plan to invoke improved performance

      3.3.1 Document planned actions

      Input

      • IT Metrics Library

      Output

      • Planned actions

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      1 hour

      1. Decide on the action you plan to take to bring the indicator in line with expected performance and document the planned action in the “Action Plan” tab of the IT Metrics Library.

      Info-Tech Insight

      For larger initiatives try to break the task down to what is likely manageable before the next review. Seeing progress can motivate continued action.

      3.3.2 Assign ownership of actions

      Input

      • IT Metrics Library

      Output

      • Identified owners for each action

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      0.5 hours

      1. For each unassigned task, assign clear ownership for completion of the task.
      2. The task owner should be the person accountable for the task.

      Info-Tech Insight

      Assigning clear ownership can promote accountability for progress.

      3.3.3 Determine timeline of actions

      Input

      • IT Metrics Library

      Output

      • Expected timeline for each action

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      0.5 hours

      1. For each task, agree on an estimated target date for completion.

      Info-Tech Insight

      If the target completion date is too far in the future, break the task into manageable chunks.

      3.3.4 Review past action status

      Input

      • IT Metrics Library

      Output

      • Complete action plan for increased performance

      Materials

      • IT Metrics Library

      Participants

      • Process area owners
      • Metrics program owners and administrators
      • Task owners

      0.5 hours

      1. For each task, review the progress since last review.
      2. If desired progress is not being made, adjust your plan based on your organizational constraints.

      Info-Tech Insight

      Seek to understand the reasons that tasks are not being completed and problem solve for creative solutions to improve performance.

      Measure the value of your KPI program

      KPIs only produce value if they lead to action

      • Tracking the performance of key indicators is the first step, but value only comes from taking action based on this information.
      • Keep track of the number of action items that come out of your KPI review and how many are completed.
      • If possible, keep track of the time or money saved through completing the action items.

      Keeping track of the number of actions identified and completed is a low overhead measure.

      Tracking time or money saved is higher overhead but also higher value.

      The image is a chart titled KPI benefits. It includes a legend indicating that blue bars are for Actions identified, purple bars are for Actions completed, and the yellow line is for Time/money saved. The graph shows Q1-Q4, indicating an increase in all areas across the quarters.

      Establish Baseline Metrics

      Baseline metrics will be improved through:

      1. Identifying actions needed to remediate poor-performing KPIs
      2. Associating time and/or money savings as a result of actions taken
      Metric Current Goal
      Number of actions identified per month as a result of KPI review 0 TBD
      $ saved through actions taken due to KPI review 0 TBD
      Time saved through actions taken due to KPI review 0 TBD

      Summary of Accomplishment

      Problem Solved

      Through this project we have identified typical key performance indicators that are important to your organization’s effective management of IT.

      You’ve populated the IT Management Dashboard as a simple method to display the results of your selected KPIs.

      You’ve also established a regular review process for your KPIs and have a method to track the actions that are needed to improve performance as a result of the KPI review. This should allow you to hold individuals accountable for improvement efforts.

      You can also measure the effectiveness of your KPI program by tracking how many actions are identified as a result of the review. Ideally you can also track the money and time savings.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech Workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Select the KPIs for your organization

      Examine the benefits of the KPIs suggested in the IT Metrics Library and help selecting those that will drive performance for your maturity level.

      Build an action plan

      Discuss options for identifying and executing actions that result from your KPI review. Determine how to set up the discipline needed to make the most of your KPI review program.

      Research Contributors and Experts

      Valence Howden

      Principal Research Director, CIO – Service Management Info-Tech Research Group

      • Valence has extensive experience in helping organizations be successful through optimizing how they govern themselves, how they design and execute strategies, and how they drive service excellence in all work.

      Tracy-Lynn Reid

      Practice Lead, CIO – People & Leadership Info-Tech Research Group

      • Tracy-Lynn covers key topics related to People & Leadership within an information technology context.

      Fred Chagnon

      Practice Lead, Infrastructure & Operations Info-Tech Research Group

      • Fred brings extensive practical experience in all aspects of enterprise IT Infrastructure, including IP networks, server hardware, operating systems, storage, databases, middleware, virtualization and security.

      Aaron Shum

      Practice Lead, Security, Risk & Compliance Info-Tech Research Group

      • With 20+ years of experience across IT, InfoSec, and Data Privacy, Aaron currently specializes in helping organizations implement comprehensive information security and cybersecurity programs as well as comply with data privacy regulations.

      Cole Cioran

      Practice Lead, Applications and Agile Development Info-Tech Research Group

      • Over the past twenty-five years, Cole has developed software; designed data, infrastructure, and software solutions; defined systems and enterprise architectures; delivered enterprise-wide programs; and managed software development, infrastructure, and business systems analysis practices.

      Barry Cousins

      Practice Lead, Applications – Project and Portfolio Mgmt. Info-Tech Research Group

      • Barry specializes in Project Portfolio Management, Help/Service Desk, and Telephony/Unified Communications. He brings an extensive background in technology, IT management, and business leadership.

      Jack Hakimian

      Vice President, Applications Info-Tech Research Group

      • Jack has close to 25 years of Technology and Management Consulting experience. He has served multi-billion-dollar organizations in multiple industries, including Financial Services and Telecommunications. Jack also served several large public sector institutions.

      Vivek Mehta

      Research Director, CIO Info-Tech Research Group

      • Vivek publishes on topics related to digital transformation and innovation. He is the author of research on Design a Customer-Centric Digital Operating Model and Create Your Digital Strategy as well as numerous keynotes and articles on digital transformation.

      Carlos Sanchez

      Practice Lead, Enterprise Applications Info-Tech Research Group

      • Carlos has a breadth of knowledge in enterprise applications strategy, planning, and execution.

      Andy Neill

      Practice Lead, Enterprise Architecture, Data & BI Info-Tech Research Group

      • Andy has extensive experience in managing technical teams, information architecture, data modeling, and enterprise data strategy.

      Michael Fahey

      Executive Counselor Info-Tech Research Group

      • As an Executive Counselor, Mike applies his decades of business experience and leadership, along with Info-Tech Research Group’s resources, to assist CIOs in delivering outstanding business results.

      Related Info-Tech Research

      Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

      • Reinforce service orientation in your IT organization by ensuring your IT metrics generate value-driven resource behavior.

      Use Applications Metrics That Matter

      • It all starts with quality and customer satisfaction.

      Take Control of Infrastructure Metrics

      • Master the metrics maze to help make decisions, manage costs, and plan for change.

      Bibliography

      Bach, Nancy. “How Often Should You Measure Your Organization's KPIs?” EON, 26 June 2018. Accessed Jan. 2020.

      “The Benefits of Tracking KPIs – Both Individually and for a Team.” Hoopla, 30 Jan. 2017. Accessed Jan. 2020.

      Chepul, Tiffany. “Top 22 KPI Examples for Technology Companies.” Rhythm Systems, Jan. 2020. Accessed Jan. 2020.

      Cooper, Larry. “CSF's, KPI's, Metrics, Outcomes and Benefits” itSM Solutions. 5 Feb. 2010. Accessed Jan 2020.

      “CUC Report on the implementation of Key Performance Indicators: case study experience.” Committee of University Chairs, June 2008. Accessed Jan 2020.

      Harris, Michael, and Bill Tayler. “Don’t Let Metrics Undermine Your Business.” HBR, Sep.–Oct 2019. Accessed Jan. 2020.

      Hatari, Tim. “The Importance of a Strong KPI Dashboard.” TMD Coaching. 27 Dec. 2018. Accessed Jan. 2020.

      Roy, Mayu, and Marian Carter. “The Right KPIs, Metrics for High-performing, Cost-saving Space Management.” CFI, 2013. Accessed Jan 2020.

      Schrage, Michael, and David Kiron. “Leading With Next-Generation Key Performance Indicators.” MIT Sloan Management Review, 26 June 2018. Accessed Jan. 2020.

      Setijono, Djoko, and Jens J. Dahlgaard. “Customer value as a key performance indicator (KPI) and a key improvement indicator (KII)” Emerald Insight, 5 June 2007. Accessed Jan 2020.

      Skinner, Ted. “Balanced Scorecard KPI Examples: Comprehensive List of 183 KPI Examples for a Balanced Scorecard KPI Dashboard (Updated for 2020).” Rhythm Systems, Jan. 2020. Accessed Jan 2020.

      Wishart, Jessica. “5 Reasons Why You Need The Right KPIs in 2020” Rhythm Systems, 1 Feb. 2020. Accessed Jan. 2020.

      Build an Application Integration Strategy

      • Buy Link or Shortcode: {j2store}198|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • Even though organizations are now planning for Application Integration (AI) in their projects, very few have developed a holistic approach to their integration problems resulting in each project deploying different tactical solutions.
      • Point-to-point and ad hoc integration solutions won’t cut it anymore: the cloud, big data, mobile, social, and new regulations require more sophisticated integration tooling.
      • Loosely defined AI strategies result in point solutions, overlaps in technology capabilities, and increased maintenance costs; the correlation between business drivers and technical solutions is lost.

      Our Advice

      Critical Insight

      • Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
      • An architectural approach to AI strategy is critical to making appropriate technology decisions and promoting consistency across AI solutions through the use of common patterns.
      • Get control of your AI environment with an appropriate architecture, including policies and procedures, before end users start adding bring-your-own-integration (BYOI) capabilities to the office.

      Impact and Result

      • Engage in a formal AI strategy and involve the business when aligning business goals with AI value; each double the AI success rate.
      • Benefits from a formal AI strategy largely depend on how gaps will be filled.
      • Create an Integration Center of Competency for maintaining architectural standards and guidelines.
      • AI strategies are continuously updated as new business drivers emerge from changing business environments and/or essential technologies.

      Build an Application Integration Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for AI Strategy

      Obtain organizational buy-in and build a standardized and formal AI blueprint.

      • Storyboard: Build an Application Integration Strategy

      2. Assess the organization's readiness for AI

      Assess your people, process, and technology for AI readiness and realize areas for improvement.

      • Application Integration Readiness Assessment Tool

      3. Develop a Vision

      Fill the required AI-related roles to meet business requirements

      • Application Integration Architect
      • Application Integration Specialist

      4. Perform a Gap Analysis

      Assess the appropriateness of AI in your organization and identify gaps in people, processes, and technology as it relates to AI.

      • Application Integration Appropriateness Assessment Tool

      5. Build an AI Roadmap

      Compile the important information and artifacts to include in the AI blueprint.

      • Application Integration Strategy Template

      6. Build the Integration Blueprint

      Keep a record of services and interfaces to reduce waste.

      • Integration Service Catalog Template

      Infographic

      Workshop: Build an Application Integration Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Make the Case for AI Strategy

      The Purpose

      Uncover current and future AI business drivers, and assess current capabilities.

      Key Benefits Achieved

      Perform a current state assessment and create a future vision.

      Activities

      1.1 Identify Current and Future Business Drivers

      1.2 AI Readiness Assessment

      1.3 Integration Service Catalog Template

      Outputs

      High-level groupings of AI strategy business drivers.

      Determine the organization’s readiness for AI, and identify areas for improvement.

      Create a record of services and interfaces to reduce waste.

      2 Know Current Environment

      The Purpose

      Identify building blocks, common patterns, and decompose them.

      Key Benefits Achieved

      Develop an AI Architecture.

      Activities

      2.1 Integration Principles

      2.2 High-level Patterns

      2.3 Pattern decomposition and recomposition

      Outputs

      Set general AI architecture principles.

      Categorize future and existing interactions by pattern to establish your integration framework.

      Identification of common functional components across patterns.

      3 Perform a Gap Analysis

      The Purpose

      Analyze the gaps between the current and future environment in people, process, and technology.

      Key Benefits Achieved

      Uncover gaps between current and future capabilities and determine if your ideal environment is feasible.

      Activities

      3.1 Gap Analysis

      Outputs

      Identify gaps between the current environment and future AI vision.

      4 Build a Roadmap for Application Integration

      The Purpose

      Define strategic initiatives, know your resource constraints, and use a timeline for planning AI.

      Key Benefits Achieved

      Create a plan of strategic initiatives required to close gaps.

      Activities

      4.1 Identify and prioritize strategic initiatives

      4.2 Distribute initiatives on a timeline

      Outputs

      Use strategic initiatives to build the AI strategy roadmap.

      Establish when initiatives are going to take place.

      Reinforce End-User Security Awareness During Your COVID-19 Response

      • Buy Link or Shortcode: {j2store}311|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Endpoint Security
      • Parent Category Link: /endpoint-security

      Without the control over the areas in which employees are working, businesses are opening themselves up to a greater degree of risk during the pandemic. How does a business raise awareness for employees who are going to be working remotely?

      Our Advice

      Critical Insight

      • An expanding remote workforce requires training efforts to evolve to include the unique security threats that face remote end users.
      • By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.

      Impact and Result

      • Teach remote end users how to recognize current cyberattacks before they fall victim and turn them into active barriers against cyberattacks.
      • Use Info-Tech’s blueprint and materials to build a customized training program that uses best practices.

      Reinforce End-User Security Awareness During Your COVID-19 Response Research & Tools

      Start here

      COVID-19 is forcing many businesses to expand their remote working capabilities further than before. Using this blueprint, see how to augment your existing training or start from scratch during a remote work situation.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Reinforce End-User Security Awareness During Your COVID-19 Response Storyboard
      • Security Awareness and Training Program Development Tool
      • Security Awareness and Training Metrics Tool
      • End-User Security Knowledge Test Template

      1. Training Materials

      Use Info-Tech’s training materials to get you started on remote training and awareness.

      • Training Materials – Phishing
      • Training Materials – Incident Response
      • Training Materials – Cyber Attacks
      • Training Materials – Web Usage
      • Training Materials – Physical Computer Security
      • Training Materials – Mobile Security
      • Training Materials – Passwords
      • Training Materials – Social Engineering
      • Security Training Email Templates
      [infographic]

      Asset Management

      • Buy Link or Shortcode: {j2store}1|cart{/j2store}
      • Related Products: {j2store}1|crosssells{/j2store}
      • Up-Sell: {j2store}1|upsells{/j2store}
      • Download01-Title: Asset Management Executive Brief
      • Download-01: Visit Link
      • member rating overall impact: 9.1/10
      • member rating average dollars saved: $16,518
      • member rating average days saved: 19
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Asset management has a clear impact on the financials of your company. Clear insights are essential to keep your spending at the right level.

      Asset Management

      Decide What's Important and What Is Less So

      • Large vertical image:
      • member rating overall impact: Highly Rated
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Redefining the business impact analysis through the lens of value

      The Business Impact Analysis (BIA) is easily one of the most misunderstood processes in the modern enterprise. For many, the term conjures images of dusty binders filled with disaster recovery plans. A compliance checkbox exercise focused solely on what to do when the servers are smoking or the building is flooded. This view, while not entirely incorrect, is dangerously incomplete. It relegates the BIA to a reactive, insurance-policy mindset when it should be a proactive, strategic intelligence tool.

      Yes, I got that text from AI. So recognizable. But you know what? There is a kernel of truth in this.

      A modern BIA is about understanding and protecting value more than just about planning for disaster. That is the one thing we must keep in mind at all times. The BIA really is a deep dive into the DNA of the organization. It maps the connections between information assets, operational processes, and business outcomes. It answers the critical question, “What matters? And why ? And what is the escalating cost of its absence?”

      The Strategic Starting Point: A Top-Down Business Analysis

      To answer “what matters,” the process must begin at the highest level: with senior management and, ideally, the board. Defining the organization's core mission and priorities is a foundational governance task, a principle now embedded in European regulations like DORA.

      Rank the Business Units

      The process begins at the highest level with senior management. I would say, the board. They need to decide what the business is all about. (This is in line with the DORA rules in Europe.) The core business units or departments of the organization are ranked based on their contribution to the company's mission. This ranking is frequently based on revenue generation, but it can also factor in strategic importance, market position, or essential support functions. For example, the “Production” and “Sales” units might be ranked higher than “Internal HR Administration.” This initial ranking provides the foundational context for all subsequent decisions.

      I want to make something crystal clear: this ranking is merely a practical assessment. Obviously the HR and well being departments play a pivotal role in the value delivery of the company. Happy employees make for happy customers.  

      But, being a bit Wall-Streety about it, the sales department generating the biggest returns is probably only surpassed by the business unit producing the product for those sales. And with that I just said that the person holding the wrench, who knows your critical production machine, is your most valuable HR asset. Just saying.

      Identify Critical Functions Within Each Unit

      With the business units prioritized, the next step is to drill down into each one and identify its critical operational functions. The focus here is on processes, not technology. For the top-ranked “Sales” unit, critical functions might include:

      • SF-01: Processing New Customer Orders

      • SF-02: Managing the Customer Relationship Management (CRM) System

      • SF-03: Generating Sales Quotes

      • SF-04: Closing the Sale

      These functions are then rated against each other within the business unit to create a prioritized list of what truly matters for that unit to achieve its goals.

      And here I'm going to give you some food for thought. There will be a superficial geographical difference in importance. If you value continuity then new business may not be the top critical department. I can imagine this is completely counter intuitive. But remember that it is cheaper to keep and upsell an existing client than it is to acquire a new one.

      Information asset classification is a key component of resilience.

      With a clear map of what the business does, the next logical step is to identify what it uses to get it done. This brings us to the non-negotiable foundation of resilience: comprehensive information asset classification.

      Without knowing what you have, where it is, and what it's worth, any attempt at risk management is simply guesswork. You risk spending millions protecting low/mid-value data while leaving the crown jewels exposed (I guess your Ciso will have said something 😊). In this article, we will explore how foundational asset classification can evolve into a mature, value-driven impact analysis, offering a blueprint for transforming the BIA from a tactical chore into a strategic imperative.

      Before you can determine the effect of losing an asset, you must first understand the asset itself. Information asset classification is the systematic process of inventorying, categorizing, and assigning business value to your organization's data. Now that we have terabyte-scale data on servers, cloud environments, and countless SaaS applications, you have your work cut out for you. It is, however, a most critical investment in the risk management lifecycle.

      Classification forces an organization to look beyond the raw data and evaluate it through two primary lenses: criticality and sensitivity.

      • Criticality is a measure of importance. It answers the question: “How much damage would the business suffer if this asset were unavailable or corrupted?” This is directly tied to the operational functions that depend on the asset. The criticality of a customer database, for instance, is determined by the impact on the sales, marketing, and support functions that would grind to a halt without it. This translates to the availability rating. 

      • Sensitivity is a measure of secrecy. It answers the question: “What is the potential harm if this asset were disclosed to unauthorized parties?” This considers reputational damage, competitive disadvantage, legal penalties, and customer privacy violations. This translates to the confidentiality rating.

      Without this dual understanding, it's impossible to implement a proportional and cost-effective security program. The alternative is a one-size-fits-all approach, which invariably leads to one of two expensive failures:

      1. Overprotection: Applying the highest level of security controls to all information is prohibitively expensive and creates unnecessary operational friction. It's like putting a bank vault door on a broom closet.

      2. Underprotection: Applying a baseline level of security to all assets leaves your most critical and sensitive information dangerously vulnerable. It exposes your organization to unacceptable risk. Remember assigning an A2 rating to all your infra because it cannot be related to specific business processes? The “we'll take care of it at the higher levels” approach leads to exactly this issue.

      By understanding the criticality and sensitivity of assets, organizations can ensure that security efforts are directly tied to business objectives, making the investment in protection proportional to the asset's value. Proportionality is also embedded in new European legislation.

      A practical framework for executing classification exercises

      While the concept is straightforward, the execution can be complex. A successful classification program requires a methodical framework that moves from high-level policy to granular implementation. in this first stage, we're going to talk about data.

      Step 1: Define the Classification Levels

      The first step is to establish a simple, intuitive classification scheme. When you complicate it, you lose your people. Most organizations find success with a three- or four-tiered model, which is easy for employees to understand and apply. For example:

      • Public: Information intended for public consumption with no negative impact from disclosure (e.g., marketing materials, press releases).

      • Internal: Information for use within the organization but not overly sensitive. Its disclosure would be inconvenient but not damaging (e.g., internal memos on non-sensitive topics, general project plans).

      • Confidential: Sensitive business information that, if disclosed, could cause measurable damage to the organization's finances, operations, or reputation (e.g., business plans, financial forecasts, customer lists).

      • Restricted or secret: The most sensitive data that could cause severe financial or legal damage if compromised. Access is strictly limited on a need-to-know basis (e.g., trade secrets, source code, PII, M&A details).

      Step 2: Tackle the Data Inventory Problem

      This is often the most challenging phase: identifying and locating all information assets. You must create a comprehensive inventory and detail not just the data itself but its entire context:

      • Data Owners: The business leader accountable for the data and for determining its classification.

      • Data Custodians: The IT or operational teams responsible for implementing and managing the security controls on the data.

      • Location: Where does the data live? Is it in a specific database, a cloud storage bucket, a third-party application, or a physical filing cabinet?

      • External Dependencies: Crucially, this inventory must extend beyond the company's walls. Which third-party vendors (payroll processors, cloud hosting providers, marketing agencies) handle, store, or transport your data? Their security posture is now part of your risk surface. In Europe, this is now a foundation of your data management through GDPR, DORA, the AI Act and other legislation. 

      Step 3: Establish a Lifecycle Approach

      Information isn't static. Its value and handling requirements can change over its lifecycle. Your classification process must define clear rules for each stage:

      • Creation: How is data classified when it's first created? How is it marked (e.g., digital watermarks, document headers)?

      • Storage & Use: What security controls apply to each classification level at rest and in transit (e.g., encryption standards, access control rules)? What about legislative initiatives?

      • Archiving & Retention: How long must the data be kept to meet business needs and legal requirements? What about external storage?

      • Destruction: What are the approved methods for securely destroying the data (e.g., cryptographic erasure, physical shredding) once it's no longer required?

      Without clear, consistent handling standards for each level, the classification labels themselves are meaningless. The classification directly dictates the required security measures.

      The hierarchy of importance.

      This dual (business processes and asset classification) top-down approach to determining criticality is often referred to as the 'hierarchy of importance,' which helps in systematically prioritizing assets based on their business value.

      Once assets are inventoried, the next step is to systematically determine their criticality. Randomly assigning importance to thousands of assets is futile. A far more effective method is a top-down, hierarchical approach that mirrors the structure of the business itself. This method creates a clear “chain of criticality,” where the importance of a technical asset is directly derived from the value of the business function it supports.

      Map the Supporting Assets and Resources

      Only now, once you have clearly defined the critical business functions and prioritized them, can you finally map the specific assets and resources they depend on. These are the people, technology, and facilities that enable the function. For the critical function “Processing New Customer Orders,” the supporting assets might include:

      • Application: SAP ERP System (Module SD)

      • Database: Oracle Customer Order Database

      • Hardware: Primary ERP Server Cluster

      • Personnel: Sales team and Order Entry team

      The criticality of the “Oracle Customer Order Database” is now clear. It is clearly integrated into the business; it is critically important because it is an essential asset for a top-priority function (SF-01) within a top-ranked business unit (“Sales”). This top-down structure provides a clear, business-justified view of risk that management can easily understand. It allows you to see precisely how a technical risk (e.g., a vulnerability in the Oracle database) can bubble up to impact a core business operation.

      From Criticality to Consequence: Master Impact Analysis

      With a clear understanding of what's indispensable, the BIA can now finally move to its core purpose: analyzing the tangible and intangible impacts of a disruption over time. A robust impact analysis prevents “impact inflation,” which is the common tendency to focus solely on unrealistic scenarios or self-importance assurances, as this just causes management to discount your findings. That just causes management to discount your findings. A more credible approach uses a range of outcomes that paint a realistic picture of escalating damage over time.

      Your analysis should assess the loss of the four core pillars of information security:

      • Loss of Confidentiality: The unauthorized disclosure of sensitive information. The impact can range from legal fines for a data breach to the loss of competitive advantage from a leaked product design.

      • Loss of Integrity: The unauthorized or improper modification of data. This can lead to flawed decision-making based on corrupted reports, financial fraud, or a complete loss of trust in the system.

      • Loss of Availability: The inability to access a system or process. This is the most common focus of traditional BIA, leading to lost productivity, missed sales, and an inability to deliver services.

      • Insecurity around Authenticity: Your ability to ensure you receive data from the expected party. 

      This brings us to the CIAA rating, which encompasses Confidentiality, Integrity, Availability, and Authenticity, providing a comprehensive framework for assessing information security impacts.

      Qualitative vs. Quantitative Analysis

      Impacts can be measured in two ways, and the most effective BIAs use a combination of both:

      • Qualitative Analysis: This uses descriptive scales (e.g., High, Medium, Low) to assess impacts that are difficult to assign a specific monetary value to. This is ideal for measuring things like reputational damage, loss of customer confidence, or employee morale. Its main advantage is prioritizing risks quickly, but it lacks the financial precision needed for a cost-benefit analysis.

      • Quantitative Analysis: This assigns a specific monetary value ($) to the impact. This is used for measurable losses like lost revenue per hour, regulatory fines, or the cost of manual workarounds. The major advantage is that it provides clear financial data to justify security investments. For example, “This outage will cost us $100,000 per hour in lost sales” is a powerful statement when requesting funding for a high-availability solution.

      A mature analysis might involve scenario modeling—where we walk through a small set of plausible disruption scenarios with business stakeholders to define a range of outcomes (minimum, maximum, and most likely). This provides a far more nuanced and credible dataset that aligns with how management views other business risks.

      The additional lens: The Customer Value Chain Contribution (CVCC)©

      To elevate the BIA from an internal exercise to a truly strategic tool, we can apply one more lens: the Customer Value Chain Contribution (CVCC)©. This approach reframes the impact analysis to focus explicitly on the customer. Instead of just asking, “What is the impact on our business?” we ask, “What is the impact on our customer's experience and our ability to deliver value to them?”

      The CVCC method involves mapping your critical processes and assets to specific stages of the customer journey. For example:

      • Awareness/Acquisition: A disruption to the company website or marketing automation platform directly impacts your ability to attract new customers.

      • Conversion/Sale: An outage of the e-commerce platform or CRM system prevents customers from making purchases, directly impacting revenue and frustrating users at a key moment.

      • Service Delivery/Fulfillment: A failure in the warehouse management or logistics system means orders can't be fulfilled, breaking promises made to the customer.

      • Support/Retention: If the customer support ticketing system is down, customers with problems can't get help, leading to immense frustration and potential churn.

      By analyzing impact through the CVCC lens, the consequences become far more vivid and compelling. “Loss of the CRM system” becomes “a complete inability to process new sales leads or support existing customers, causing direct revenue loss and significant reputational damage.” This framing aligns the BIA directly with the goal of any business: creating and retaining satisfied customers. It transforms the discussion from technical risk to the preservation of the customer relationship and the value chain that supports it.

      From document to real value

      When you build your BIA on this framework, meaning that it is rooted in sound asset classification, structured by the correct top-down criticality analysis, and enriched by the customer-centric view of impact, then it is no longer a static document. It becomes the dynamic, strategic blueprint for organizational resilience.

      These insights generate business decisions:

      • Prioritized risk mitigation: they show exactly where to focus security efforts and resources for the greatest return on investment.

      • Justified security spending: they provide the quantitative and qualitative data needed to make a compelling business case for new security controls, technologies, and processes.

      • Informed recovery planning: they establish clear, business-justified Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) that form the foundation of any effective business continuity and disaster recovery plan.

      I'm convinced that this expanded vision of the business impact analysis embeds the right analytical understanding of value and risk into the fabric of the organization. I want you to move beyond the fear of disaster and toward a confident, proactive posture of resilience. Like that, you ensure that in a world of constant change and disruption, the things that truly matter are always understood, always protected, and always available.

      Always happy to chat.

      Build, Optimize, and Present a Risk-Based Security Budget

      • Buy Link or Shortcode: {j2store}371|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Year after year, CISOs need to develop a comprehensive security budget that is able to mitigate against threats.
      • This budget will have to be defended against many other stakeholders to ensure there is proper funding.
      • Security budgets are unlike other departmental budgets. Increases or decreases in the budget can drastically affect the organizational risk level.
      • CISOs struggle with the ability to assess the effectiveness of their security controls and where to allocate money.

      Our Advice

      Critical Insight

      • CISOs can demonstrate the value of security when they correlate mitigations to business operations and attribute future budgetary needs to business evolution.
      • To identify the critical areas and issues that must be reflected in your security budget, develop a comprehensive corporate risk analysis and mitigation effectiveness model, which will illustrate where the moving targets are in your security posture.

      Impact and Result

      • Info-Tech’s methodology moves you away from the traditional budgeting approach to building a budget that is designed to be as dynamic as the business growth model.
      • Collect your organization's requirements and build different budget options to describe how increases and decreases can affect the risk level.
      • Discuss the different budgets with the business to determine what level of funding is needed for the desired level of security.
      • Gain approval of your budget early by preshopping and presenting the budget to individual stakeholders prior to the final budget approval process.

      Build, Optimize, and Present a Risk-Based Security Budget Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build, optimize, and present a risk-based security budget, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review requirements for the budget

      Collect and review the required information for your security budget.

      • Build, Optimize, and Present a Risk-Based Security Budget – Phase 1: Review Requirements for the Budget

      2. Build the budget

      Take your requirements and build a risk-based security budget.

      • Build, Optimize, and Present a Risk-Based Security Budget – Phase 2: Build the Budget
      • Security Budgeting Tool

      3. Present the budget

      Gain approval from business stakeholders by presenting the budget.

      • Build, Optimize, and Present a Risk-Based Security Budget – Phase 3: Present the Budget
      • Preshopping Security Budget Presentation Template
      • Final Security Budget Presentation Template
      [infographic]

      Workshop: Build, Optimize, and Present a Risk-Based Security Budget

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Requirements for the Budget

      The Purpose

      Understand your organization’s security requirements.

      Collect and review the requirements.

      Key Benefits Achieved

      Requirements are gathered and understood, and they will provide priorities for the security budget.

      Activities

      1.1 Define the scope and boundaries of the security budget.

      1.2 Review the security strategy.

      1.3 Review other requirements as needed, such as the mitigation effectiveness assessment or risk tolerance level.

      Outputs

      Defined scope and boundaries of the security budget

      2 Build the Budget

      The Purpose

      Map business capabilities to security controls.

      Create a budget that represents how risk can affect the organization.

      Key Benefits Achieved

      Finalized security budget that presents three different options to account for risk and mitigations.

      Activities

      2.1 Identify major business capabilities.

      2.2 Map capabilities to IT systems and security controls.

      2.3 Categorize security controls by bare minimum, standard practice, and ideal.

      2.4 Input all security controls.

      2.5 Input all other expenses related to security.

      2.6 Review the different budget options.

      2.7 Optimize the budget through defense-in-depth options.

      2.8 Finalize the budget.

      Outputs

      Identified major business capabilities, mapped to the IT systems and controls

      Completed security budget providing three different options based on risk associated

      Optimized security budget

      3 Present the Budget

      The Purpose

      Prepare a presentation to speak with stakeholders early and build support prior to budget approvals.

      Present a pilot presentation and incorporate any feedback.

      Prepare for the final budget presentation.

      Key Benefits Achieved

      Final presentations in which to present the completed budget and gain stakeholder feedback.

      Activities

      3.1 Begin developing a communication strategy.

      3.2 Build the preshopping report.

      3.3 Practice the presentation.

      3.4 Conduct preshopping discussions with stakeholders.

      3.5 Collect initial feedback and incorporate into the budget.

      3.6 Prepare for the final budget presentation.

      Outputs

      Preshopping Report

      Final Budget Presentation

      Monitor IT Employee Experience

      • Buy Link or Shortcode: {j2store}543|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $29,096 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • In IT, high turnover and sub-optimized productivity can have huge impacts on IT’s ability to execute SLAs, complete projects on time, and maintain operations effectively.
      • With record low unemployment rates in IT, retaining top employees and keeping them motivated in their jobs has never been more critical.

      Our Advice

      Critical Insight

      • One bad experience can cost you your top employee. Engagement is the sum total of the day-to-day experiences your employees have with your company.
      • Engagement, not pay, drives results. Engagement is key to your team's productivity and ability to retain top talent. Approach it systematically to learn what really drives your team.
      • It’s time for leadership to step up. As the CIO, it’s up to you to take ownership of your team’s engagement.

      Impact and Result

      • Info-Tech tools and guidance will help you initiate an effective conversation with your team around engagement, and avoid common pitfalls in implementing engagement initiatives.
      • Monitoring employee experience continuously using the Employee Experience Monitor enables you to take a data-driven approach to evaluating the success of your engagement initiatives.

      Monitor IT Employee Experience Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should focus on employee experience to improve engagement in IT, review Info-Tech’s methodology, and understand how our tools will help you construct an effective employee engagement program.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Start monitoring employee experience

      Plan out your employee engagement program and launch the Employee Experience Monitor survey for your team.

      • Drive IT Performance by Monitoring Employee Experience – Phase 1: Start Monitoring Employee Experience
      • None
      • None
      • EXM Setup Guide
      • EXM Training Guide for Managers
      • None
      • EXM Communication Template

      2. Analyze results and ideate solutions

      Interpret your Employee Experience Monitor results, understand what they mean in the context of your team, and involve your staff in brainstorming engagement initiatives.

      • Drive IT Performance by Monitoring Employee Experience – Phase 2: Analyze Results and Ideate Solutions
      • EXM Focus Group Facilitation Guide
      • Focus Group Facilitation Guide Driver Definitions

      3. Select and implement engagement initiatives

      Select engagement initiatives for maximal impact, create an action plan, and establish open and ongoing communication about engagement with your team.

      • Drive IT Performance by Monitoring Employee Experience – Phase 3: Measure and Communicate Results
      • Engagement Progress One-Pager
      [infographic]

      Workshop: Monitor IT Employee Experience

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Launch the EXM

      The Purpose

      Set up the EXM and collect a few months of data to build on during the workshop.

      Key Benefits Achieved

      Arm yourself with an index of employee experience and candid feedback from your team to use as a starting point for your engagement program.

      Activities

      1.1 Identify EXM use case.

      1.2 Identify engagement program goals and obstacles.

      1.3 Launch EXM.

      Outputs

      Defined engagement goals.

      EXM online dashboard with three months of results.

      2 Explore Engagement

      The Purpose

      To understand the current state of engagement and prepare to discuss the drivers behind it with your staff.

      Key Benefits Achieved

      Empower your leadership team to take charge of their own team's engagement.

      Activities

      2.1 Review EXM results to understand employee experience.

      2.2 Finalize focus group agendas.

      2.3 Train managers.

      Outputs

      Customized focus group agendas.

      3 Hold Employee Focus Groups

      The Purpose

      Establish an open dialogue with your staff to understand what drives their engagement.

      Key Benefits Achieved

      Understand where in your team’s experience you can make the most impact as an IT leader.

      Activities

      3.1 Identify priority drivers.

      3.2 Identify engagement KPIs.

      3.3 Brainstorm engagement initiatives.

      3.4 Vote on initiatives within teams.

      Outputs

      Summary of focus groups results

      Identified engagement initiatives.

      4 Select and Plan Initiatives

      The Purpose

      Learn the characteristics of successful engagement initiatives and build execution plans for each.

      Key Benefits Achieved

      Choose initiatives with the greatest impact on your team’s engagement, and ensure you have the necessary resources for success.

      Activities

      4.1 Select engagement initiatives with IT leadership.

      4.2 Discuss and decide on the top five engagement initiatives.

      4.3 Create initiative project plans.

      4.4 Build detailed project plans.

      4.5 Present project plans.

      Outputs

      Engagement project plans.

      2022 Tech Trends

      • Buy Link or Shortcode: {j2store}94|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • The post-pandemic workplace continues to shift and requires collaboration between remote workers and office workers.
      • Digital transformation has accelerated across every organization and CIOs must maneuver to keep pace.
      • Customer expectations have shifted, and spending habits are moving away from in-person activities to online.
      • IT must improve its maturity in key capabilities to maintain relevance in the organization.

      Our Advice

      Critical Insight

      • Improve the capabilities that matter. Focus on IT capabilities that are most relevant to competing in the digital economy and will enable the CEO's mission for growth.
      • Assess how external environment presents opportunities or threats to your organization using a scenarios approach, then chart a plan.

      Impact and Result

      • Use the data and analysis from Info-Tech's 2022 Tech Trends report to inform your digital strategic plan.
      • Discover the five trends shaping IT's path in 2022 and explore use cases for emerging technologies.
      • Hear directly from leading subject matter experts on each trend with featured episodes from our Tech Insights podcast.

      2022 Tech Trends Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. 2022 Tech Trends Report – A deck that discusses five use cases that can improve on your organization’s ability to compete in the digital economy.

      The post-pandemic pace of change continues to accelerate as the economic rapidly becomes more digital. To keep pace with shifting consumer expectations, CIOs must help the CEO compete in the digital economy by focusing on five key capabilities: innovation, human resources management, data architecture, security strategy, and business process controls and internal audit. Raising maturity in these capabilities will help CIOs deliver on opportunities to streamline back-office processes and develop new lines of revenue.

      • 2022 Tech Trends Report

      Infographic

      Further reading

      2022 Tech Trends

      Enabling the digital economy

      Supporting the CEO for growth

      The post-pandemic pace of change

      The disruptions to the way we work caused by the pandemic haven’t bounced back to normal.

      As part of its research process for the 2022 Tech Trends Report, Info-Tech Research Group conducted an open online survey among its membership and wider community of professionals. The survey was fielded from August 2021 through to September 2021, collecting 475 responses. We asked some of the same questions as last year’s survey so we can compare results as well as new questions to explore new trends.

      How much do you expect your organization to change permanently compared to how it was operating before the pandemic?

      • 7% – No change. We'll keep doing business as we always have.
      • 33% – A bit of change. Some ways of working will shift long term
      • 47% – A lot of change. The way we work will be differ in many ways long term. But our business remains...
      • 13% – Transformative change. Our fundamental business will be different and we'll be working in new ways.

      This year, about half of IT professionals expect a lot of change to the way we work and 13% expect a transformative change with a fundamental shift in their business. Last year, the same percentage expected a lot of change and only 10% expected transformative change.

      30% more professionals expect transformative permanent change compared to one year ago.

      47% of professionals expect a lot of permanent change; this remains the same as last year. (Info-Tech Tech Trends 2022 Survey)

      The pandemic accelerated the speed of digital transformation

      With the massive disruption preventing people from gathering, businesses shifted to digital interactions with customers.

      A visualization of the growth of 'Global average share of customer interactions that are digital' from December 2019 to July 2020. In that time it went from 36% to 58% with an 'Acceleration of 3 years'.

      Companies also accelerated the pace of creating digital or digitally enhanced products and services.

      A visualization of the growth of 'Global average share of partially or fully digitized products and/or services' from December 2019 to July 2020. In that time it went from 35% to 55% with an 'Acceleration of 7 years'. (McKinsey, 2020)

      “The Digital Economy incorporates all economic activity reliant on or significantly enhanced by the use of digital inputs, including digital technologies, digital infrastructure, digital services and data.” (OECD Definition)

      IT must enable participation in the digital economy

      Consumer spending is tilting more digital.

      Consumers have cut back spending on sectors where purchases are mostly made offline. That spending has shifted to digital services and online purchases. New habits formed during the pandemic are likely to stick for many consumers, with a continued shift to online consumption for many sectors.

      Purchases on online platforms are projected to rise from 10% today to 33% by 2030.

      Estimated online share of consumption
      Recreation & culture 30%
      Restaurants & hotels 50%
      Transport 10%
      Communications 90%
      Education 50%
      Health 20%
      Housing & utilities 50%
      (HSBC, 2020)

      Changing customer expectations pose a risk.

      IT practitioners agree that customer expectations are changing. They expect this to be more likely to disrupt their business in the next 12 months than new competition, cybersecurity incidents, or government-enacted policy changes.

      Factors likely to disrupt business in next 12 months
      Government-enacted policy changes 22%
      Cybersecurity incidents 56%
      Regulatory changes 45%
      Established competitor wins 26%
      New player enters the market 23%
      Changing customer expectations 68%
      (Info-Tech Tech Trends 2022 Survey)

      This poses a challenge to IT departments below the “expand” level of maturity

      CIOs must climb the maturity ladder to help CEOs drive growth.

      Most IT departments rated their maturity in the “optimize” or “support” level on Info-Tech’s maturity ladder.

      CIOs at the “optimize” level can play a role in digital transformation by improving back-office processes but should aim for a higher mandate.

      CIOs achieving at the “expand” level can help directly improve revenues by improving customer-facing products and services, and those at the “transform” level can help fundamentally change the business to create revenue in new ways. CIOs can climb the maturity ladder by enabling new digital capabilities.

      Maturity is heading in the wrong direction.

      Only half of IT practitioners described their department’s maturity as “transform” compared to last year’s survey, and more than twice the number rated themselves as “struggle.”

      A colorful visualization of the IT 'Maturity Ladder' detailing levels of IT function within an organization. Percentages represent answers from IT practitioners to an Info-Tech survey about the maturity level of their company. Starting from the bottom: 13% answered 'Struggle', compared to 6% in 2020; 35% answered 'Support'; 37% answered 'Optimize'; 12% answered 'Expand'; and only 3% answered 'Transform', compared to 6% in 2020.

      48% rate their IT departments as low maturity.

      Improve maturity by focusing on key capabilities to compete in the digital economy

      Capabilities to unlock digital

      Innovation: Identify innovation opportunities and plan how to use technology innovation to create a competitive advantage or achieve improved operational effectiveness and efficiency.

      Human Resources Management: Provide a structured approach to ensure optimal planning, evaluation, and development of human resources.

      Data Architecture: Manage the business’ data stores, including technology, governance, and people that manage them. Establish guidelines for the effective use of data.

      Security Strategy: Define, operate, and monitor a system for information security management. Keep the impact and occurrence of information security incidents within risk appetite levels.

      Business Process Controls and Internal Audit: Manage business process controls such as self-assessments and independent assurance reviews to ensure information related to and used by business processes meets security and integrity requirements. (ISACA, 2020)

      A periodic table-esque arrangement of Info-Tech tools and templates titled 'IT Management and Governance Framework', subtitled 'A comprehensive and connected set of research to help you optimize and improve your core IT processes', and anchored by logos for Info-Tech and COBIT. Color-coded sections with highlighted tools or templates are: 'Strategy and Governance' with 'APO04 Innovation' highlighted; 'People and Resources' with 'APO07 Human Resources Management' highlighted; 'Security and Risk' with 'APO13 Security Strategy' and 'DSS06 MEA02 Business Process Controls and Internal Audit' highlighted; 'Data and BI' with 'ITRG07 Data Architecture' highlighted. Other sections are 'Financial Management', 'Service planning and architecture', 'Infrastructure and operations', 'Apps', and 'PPM and projects'.

      5 Tech Trends for 2022

      In this report, we explore five use cases for emerging technology that can improve on capabilities needed to compete in the digital economy. Use cases combine emerging technologies with new processes and strategic planning.

      DIGITAL ECONOMY

      TREND 01 | Human Resources Management

      HYBRID COLLABORATION
      Provide a digital employee experience that is flexible, contextual, and free from the friction of hybrid operating models.

      TREND 02 | Security Strategy

      BATTLE AGAINST RANSOMWARE
      Prevent ransomware infections and create a response plan for a worst-case scenario. Collaborate with relevant external partners to access resources and mitigate risks.

      TREND 03 | Business Process Controls and Internal Audit

      CARBON METRICS IN ENERGY 4.0
      Use internet of things (IoT) and auditable tracking to provide insight into business process implications for greenhouse gas emissions.

      TREND 04 | Data Architecture

      INTANGIBLE VALUE CREATION
      Provide governance around digital marketplace and manage implications of digital currency. Use blockchain technology to turn unique intellectual property into saleable digital products

      TREND 05 | Innovation

      AUTOMATION AS A SERVICE
      Automate business processes and access new sophisticated technology services through platform integration.

      Hybrid Collaboration

      TREND 01 | HUMAN RESOURCES MANAGEMENT

      Provide a digital employee experience that is flexible, contextual, and free from the friction of hybrid operating models.

      Emerging technologies:
      Intelligent conference rooms; intelligent workflows, platforms

      Introduction

      Hybrid work models enable productive, diverse, and inclusive talent ecosystems necessary for the digital economy.

      Hybrid work models have become the default post-pandemic work approach as most knowledge workers prefer the flexibility to choose whether to work remotely or come into the office. CIOs have an opportunity lead hybrid work by facilitating collaboration between employees mixed between meeting at the office and virtually.

      IT departments rose to the challenge to quickly facilitate an all-remote work scenario for their organizations at the outset of the pandemic. Now they must adapt again to facilitate the hybrid work model, which brings new friction to collaboration but also new opportunities to hire a talented, engaged, and diverse workforce.

      79% of organizations will have a mix of workers in the office and at home. (Info-Tech Tech Trends 2022 Survey)

      35% view role type as a determining factor in the feasibility of the hybrid work model.

      Return-to-the-office tensions

      Only 18% of employees want to return to the office full-time.

      But 70% of employers want people back in the office. (CNBC, April 2021)

      Signals

      IT delivers the systems needed to make the hybrid operating model a success.

      IT has an opportunity to lead by defining the hybrid operating model through technology that enables collaboration. To foster collaboration, companies plan to invest in the same sort of tools that helped them cope during the pandemic.

      As 79% of organizations envision a hybrid model going forward, investments into hybrid work tech stacks – including web conferencing tools, document collaboration tools, and team workspaces – are expected to continue into 2022.

      Plans for future investment in collaboration technologies

      Web Conferencing 41%
      Document Collaboration and Co-Authoring 39%
      Team Workspaces 38%
      Instant Messaging 37%
      Project and Task Management Tools 36%
      Office Meeting Room Solutions 35%
      Virtual Whiteboarding 30%
      Intranet Sites 21%
      Enterprise Social Networking 19%
      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      COVID-19

      Vaccination rates around the world are rising and allowing more offices to welcome back workers because the risk of COVID-19 transmission is reduced and jurisdictions are lifting restrictions limiting gatherings.

      Worker satisfaction

      Most workers don't want to go to the office full-time. In a Bloomberg poll (2021), almost half of millennial and Gen Z workers say they would quit their job if not given an option to work remotely.

      IT spending

      Companies are investing more into IT budgets to find ways to support a mix of remote work and in-office resources to cope with work disruption. This extra spending is offset in some cases by companies saving money from having employees work from home some portion of the time. (CIO Dive, 2021)

      Risks and Benefits

      Benefits

      Flexibility Employees able to choose between working from home and working in the office have more control over their work/life balance.
      Intelligence Platforms that track contextual work relationships can accelerate workflows through smart recommendations that connect people at the right time, in the right place.
      Talent Flexible work arrangements provide businesses with access to the best talent available around the world and employees with more career options as they work from a home office (The Official Microsoft Blog, 2021).

      Risks

      Uncertainty The pandemic lacks a clear finish line and local health regulations can still waver between strict control of movement and open movement. There are no clear assurances of what to expect for how we'll work in the near future.
      FOMO With some employees going back to the office while others remain at home, employee bases could be fractured along the lines of those seeing each other in person every day and those still connecting by videoconference.
      Complexity Workers may not know in advance whether they're meeting certain people in person or online, or a mix of the two. They'll have to use technology on the fly to try and collaborate across a mixed group of people in the office and people working remotely (McKinsey Quarterly, 2021).

      “We have to be careful what we automate. Do we want to automate waste? If a company is accustomed to having a ton of meetings and their mode in the new world is to move that online, what are you going to do? You're going to end up with a lot of fatigue and disenchantment…. You have to rethink your methods before you think about the automation part of it." (Vijay Sundaram, Chief Strategy Officer, Zoho)

      Photo of Vijay Sundaram, Chief strategy officer, Zoho.

      Listen to the Tech Insights podcast: Unique approach to hybrid collaboration

      Case Study: Zoho

      Situation

      Zoho Corp. is a cloud software firm based in Chennai, India. It develops a wide range of cloud software, including enterprise collaboration software and productivity tools. Over the past decade, Zoho has used flexible work models to grant remote work options to some employees.

      When the coronavirus pandemic hit, not only did the office have to shut down but also many employees had to relocate back with families in rural areas. The human costs of the pandemic experienced by staff required Zoho to respond by offering counseling services and material support to employees.

      Complication

      Zoho prides itself as an employee-centric company and views its culture as a community that's purpose goes beyond work. That sense of community was lost because of the disruption caused by the pandemic. Employees lost their social context and their work role models. Zoho had to find a way to recreate that without the central hub of the office or find a way to work with the limitations of it not being possible.

      Resolution

      To support employees in rural settings, Zoho sent out phones to provide redundant bandwidth. As lockdowns in India end, Zoho is taking a flexible approach and giving employees the option to come to the office. It's seeing more people come back each week, drawn by the strong community.

      Zoho supports the hybrid mix of workers by balancing synchronous and asynchronous collaboration. It holds meetings when absolutely necessary through tools like Zoho Meet but tries to keep more work context to asynchronous collaboration that allows people to complete tasks quickly and move on. Its applications are connected to a common platform that is designed to facilitate workflows between employees with context and intelligence. (Interview with Vijay Sundaram, Chief Strategy Officer, Zoho)

      “We tend to think of it on a continuum of synchronous to asynchronous work collaboration. It’s become the paramount norm for so many different reasons…the point is people are going to work at different times in different locations. So how do we enable experiences where everyone can participate?" (Jason Brommet, Head of Modern Work and Security Business Group at Microsoft)

      Photo of Jason Brommet, Head of Modern Work and Security Business Group at Microsoft.

      Listen to the Tech Insights podcast: Microsoft on the ‘paradox of hybrid work’

      Case Study: Microsoft

      Situation

      Before the pandemic, only 18% of Microsoft employees were working remotely. As of April 1, 2020, they were joined by the other 82% of non-essential workers at the company in working remotely.

      As with its own customers, Microsoft used its own software to enable this new work experience, including Microsoft Teams for web conferencing and instant messaging and Office 365 for document collaboration. Employees proved just as productive getting their work done from home as they were working in the office.

      Complication

      At Microsoft, the effects of firm-wide remote work changed the collaboration patterns of the company. Even though a portion of the company was working remotely before the pandemic, the effects of everyone working remotely were different. Employees collaborated in a more static and siloed way, focusing on scheduled meetings with existing relationships. Fewer connections were made with more disparate parts of the organization. There was also a decrease in synchronous communication and an increase in asynchronous communication.

      Resolution

      Microsoft is creating new tools to break down the silos in organizations that are grappling with hybrid work challenges. For example, Viva Insights is designed to inform workers about their collaboration habits with analytics. Microsoft wants to provide workers with insights on their collaborative networks and whether they are creating new connections or deepening existing connections. (Interview with Jason Brommet, Head of Modern Work and Security Business Group, Microsoft; Nature Human Behaviour, 2021)

      What's Next?

      Distributed collaboration space:

      International Workplace Group says that more companies are taking advantage of its full network deals on coworking spaces. Companies such as Standard Charter are looking to provide their workers with a happy compromise between working from home and making the commute all the way to the central office. The hub-and-spoke model gives employees the opportunity to work near home and looks to be part of the hybrid operating model mix for many companies. (Interview with Wayne Berger, CEO of IWG Canada & Latin America)

      Optimized hybrid meetings:

      Facilitating hybrid meetings between employees grouped in the office and remote workers will be a major pain point. New hybrid meeting solutions will provide cameras embedded with intelligence to put boardroom participants into independent video streams. They will also focus on making connecting to the same meeting from various locations as convenient as possible and capture clear and crisp audio from each speaker.

      Uncertainties

      Mix between office and remote work:

      It's clear we're not going to work the way we used to previously with central work hubs, but full-on remote work isn't the right path forward either. A new hybrid work model is emerging, and organizations are experimenting to find the right approach.

      Attrition:

      Between April and September 2021, 15 million US workers quit their jobs, setting a record pace. Employees seek a renewed sense of purpose in their work, and many won’t accept mandates to go back to the office. (McKinsey, 2021)

      Equal footing in meetings:

      What are the new best practices for conducting an effective meeting between employees in the office and those who are remote? Some companies ask each employee to connect via a laptop. Others are using conference rooms with tech to group in-office workers together and connect them with remote workers.

      Hybrid Collaboration Scenarios

      Organizations can plan their response to the hybrid work context by plotting their circumstances across two continuums: synchronous to asynchronous collaboration approach and remote work to central hub work model.

      A map of hybrid collaboration scenarios with two axes representing 'Work Context, From all remote work to gathering in a central hub' and 'Collaboration Style, From collaborating at the same time to collaborating at different times'. The axes split the map into quarters. 'Work Context' ranges from 'Remote Work' on the left to 'Central Hub' on the right. 'Collaboration Style' ranges from 'Synchronous' on top to 'Asynchronous' on bottom. The top left quarter, synchronous remote work, reads 'Virtual collective collaboration via videoconference and collaboration software, with some workers meeting in coworking spaces.' The top right quarter, synchronous central hub, reads 'In-person collective collaboration in the office.' The bottom left quarter, asynchronous remote work, reads 'Virtual group collaboration via project tracking tools and shared documents.' The bottom right quarter, asynchronous central hub, reads 'In-person group collaboration in coworking spaces and the main office.'

      Recommendations

      Rethink technology solutions. Don't expect your pre-pandemic videoconference rooms to suffice. And consider how to optimize your facilities and infrastructure for hot-desking scenarios.

      Optimize remote work. Shift from the collaboration approach you put together just to get by to the program you'll use to maximize flexibility.

      Enable effective collaboration. Enable knowledge sharing no matter where and when your employees work and choose the best collaboration software solutions for your scenario.

      Run better meetings. Successful hybrid workplace plans must include planning around hybrid meetings. Seamless hybrid meetings are the result of thoughtful planning and documented best practices.

      89% of organizations invested in web conferencing technology to facilitate better collaboration, but only 43% invested in office meeting room solutions. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Battle Against Ransomware

      TREND 02 | SECURITY STRATEGY

      Prevent ransomware infections and create a response plan for a worst-case scenario. Collaborate with relevant external partners to access resources and mitigate risks.

      Emerging technologies:
      Open source intelligence; AI-powered threat detection

      “It has been a national crisis for some time…. For every [breach] that hits the news there are hundreds that never make it.” (Steve Orrin, Federal Chief Technology Officer, Intel)

      Photo of Steve Orrin, Federal Chief Technology Officer, Intel.

      Listen to the Tech Insights podcast: Ransomware crisis and AI in military

      Introduction

      Between 2019 and 2020, ransomware attacks rose by 62% worldwide and by 158% in North America. (PBS NewsHour, 2021)

      Security strategies are crucial for companies to control access to their digital assets and confidential data, providing it only to the right people at the right time. Now security strategies must adapt to a new caliber of threat in ransomware to avoid operational disruption and reputational damage.

      In 2021, ransomware attacks exploiting flaws in widely used software from vendors Kaseya, SolarWinds, and Microsoft affected many companies and saw record-breaking ransomware payments made to state-sponsored cybercriminal groups.

      After a ransomware attack caused Colonial Pipeline to shut down its pipeline operations across the US, the ransomware issue became a topic of federal attention with executives brought before Senate committees. A presidential task force to combat ransomware was formed.

      62% of IT professionals say they are more concerned about being a victim of ransomware than they were one year ago. (Info-Tech Tech Trends 2022 Survey)

      $70 million demanded by REvil gang in ransom to unlock firms affected by the Kaseya breach. (TechRadar, 2021)

      Signals

      Organizations are taking a multi-faceted approach to preparing for the event of a ransomware breach.

      The most popular methods to prepare for ransomware are to buy an insurance policy or create offline backups and redundant systems. Few are making an effort to be aware of free decryption tools, and only 2% admit to budgeting to pay ransoms.

      44% of IT professionals say they spent time and money specifically to prevent ransomware over the past year. (Info-Tech Tech Trends 2022 Survey)

      Approaches to prepare for ransomware

      Kept aware of free decryption tools available 9%
      Set aside budget to pay ransoms 2%
      Designed network to contain ransomware 24%
      Implemented technology to eradicate ransomware 36%
      Created a specific incident response plan for ransomware 26%
      Created offline backups and redundant systems 41%
      Purchased insurance covering cyberattacks 47%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      National security concerns

      Attacks on US infrastructure and government agencies have prompted the White House to treat ransomware as a matter of national security. The government stance is that Russia supports the attacks. The US is establishing new mechanisms to address the threat. Plans include new funding to support ransomware response, a mandate for organizations to report incidents, and requirements for organizations to consider the alternatives before paying a ransom. (Institute for Security and Technology, 2021)

      Advice from cybersecurity insurance providers

      Increases in ransom payouts have caused cybersecurity insurance providers to raise premiums and put in place more security requirements for policyholders to try and prevent ransomware infection. However, when clients are hit with ransomware, insurance providers advise to pay the ransom as it's usually the cheapest option. (ProPublica, 2019)

      Reputational damage

      Ransomware attacks also often include a data breach event with hackers exfiltrating the data before encrypting it. Admitting a breach to customers can seriously damage an organization's reputation as trustworthy. Organizations may also be obligated to pay for credit protection of their customers. (Interview with Frank Trovato, Research Director – Infrastructure, Info-Tech Research Group)

      Risks and Benefits

      Benefits

      Privacy Protecting personal data from theft improves people’s confidence that their privacy is being respected and they are not at risk of identity theft.
      Productivity Ransomware can lock out employees from critical work systems and stop them from being able to complete their tasks.
      Access Ransomware has prevented public access to transportation, healthcare, and any number of consumer services for days at a time. Ransomware prevention ensures public service continuity.

      Risks

      Expenses Investing in cybersecurity measures to protect against attacks is becoming more expensive, and recently cybersecurity insurance premiums have gone up in response to expensive ransoms.
      Friction More security requirements could create friction between IT priorities and business priorities in trying to get work done.
      Stability If ransomware attacks become worse or cybercriminals retaliate for not receiving payments, people could find their interactions with government services and commercial services are disrupted.

      Case Study: Victim to ransomware

      Situation

      In February 2020, a large organization found a ransomware note on an admin’s workstation. They had downloaded a local copy of the organization’s identity management database for testing and left a port open on their workstation. Hackers exfiltrated it and encrypted the data on the workstation. They demanded a ransom payment to decrypt the data.

      Complication

      Because private information of employees and customers was breached, the organization decided to voluntarily inform the state-level regulator. With 250,000 accounts affected, plans were made to require password changes en masse. A public announcement was made two days after the breach to ensure that everyone affected could be reached.

      The organization decided not to pay the ransom because it didn’t need the data back, since it had a copy on an unaffected server.

      Resolution

      After a one-day news cycle for the breach, the story about the ransom was over. The organization also received praise for handling the situation well and quickly informing stakeholders.

      The breach motivated the organization to put more protections in place. It implemented a deny-by-default network and turned off remote desktop protocol and secure shell. It mandated multi-factor authentication and put in a new endpoint-detection and response system. (Interview with CIO of large enterprise)

      What's Next

      AI for cybersecurity:

      New endpoint protections using AI are being deployed to help defend against ransomware and other cybersecurity intrusions. The solutions focus on the prevention and detection of ransomware by learning about the expected behavior of an environment and then detecting anomalies that could be attack attempts. This type of approach can be applied to everything from reading the contents of an email to helping employees detect phishing attempts to lightweight endpoint protection deployed to an Internet of Things device to detect an unusual connection attempt.

      Unfortunately, AI is a tool available to both the cybersecurity industry and hackers. Examples of hackers tampering with cybersecurity AI to bypass it have already surfaced. (Forbes, 23 Sept. 2021)

      Uncertainties

      Government response:

      In the US, the Ransomware Task Force has made recommendations to the government but it's not clear whether all of them will be followed. Other countries such as Russia are reported to be at least tolerating ransomware operations if not supporting them directly with resources.

      Supply chain security:

      Sophisticated attacks using zero-day exploits in widely used software show that organizations simply can't account for every potential vulnerability.

      Arms escalation:

      The ransomware-as-a-service industry is doing good business and finding new ways to evade detection by cybersecurity vendors. New detection techniques involving AI are being introduced by vendors, but will it just be another step in the back-and-forth game of one-upmanship? (Interview with Frank Trovato)

      Battle Against Ransomware Scenarios

      Determine your organization’s threat profile for ransomware by plotting two variables: the investment made in cybersecurity and the sophistication level of attacks that you should be prepared to guard against.

      A map of Battle Against Ransomware scenarios with two axes representing 'Attack Sophistication, From off-the-shelf, ransomware-as-a-service kits to state-sponsored supply chain attacks' and 'Investment in Cybersecurity, From low, minimal investment to high investment for a multi-layer approach.'. The axes split the map into quarters. 'Attack Sophistication' ranges from 'Ransomware as a Service' on the left to 'State-Sponsored' on the right. 'Investment in Cybersecurity' ranges from 'High' on top to 'Low' on bottom. The top left quarter, highly invested ransomware as a service, reads 'Organization is protected from most ransomware attacks and isn’t directly targeted by state-sponsored attacks.' The top right quarter, highly invested state-sponsored, reads 'Organization is protected against most ransomware attacks but could be targeted by state-sponsored attacks if considered a high-value target.' The bottom left quarter, low investment ransomware as a service, reads 'Organization is exposed to most ransomware attacks and is vulnerable to hackers looking to make a quick buck by casting a wide net.' The bottom right quarter, low investment state-sponsored, reads 'Organization is exposed to most ransomware attacks and risks being swept up in a supply chain attack by being targeted or as collateral damage.'

      Recommendations

      Create a ransomware incident response plan. Assess your current security practices and identify gaps. Quantify your ransomware risk to prioritize investments and run tabletop planning exercises for ransomware attacks.

      Reduce your exposure to ransomware. Focus on securing the frontlines by improving phishing awareness among staff and deploying AI tools to help flag attacks. Use multi-factor authentication. Take a zero-trust approach and review your use of RDP, SSH, and VPN.

      Require security in contracts. Security must be built into vendor contracts. Government contracts are now doing this, elevating security to the same level as functionality and support features. This puts money incentives behind improving security. (Interview with Intel Federal CTO Steve Orrin)

      42% of IT practitioners feel employees must do much more to help defend against ransomware. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Carbon Metrics in Energy 4.0

      TREND 03 | BUSINESS PROCESS CONTROLS AND INTERNAL AUDIT

      Use Internet of Things (IoT) and auditable tracking to provide insight into business process implications for greenhouse gas emissions.

      Emerging technologies:
      IoT

      Introduction

      Making progress towards a carbon-neutral future.

      A landmark report published in 2021 by the United Nations Intergovernmental Panel on Climate Change underlines that human actions can still determine the future course of climate change. The report calls on governments, individuals, and organizations to stop putting new greenhouse gas emissions into the atmosphere no later than 2050, and to be at the halfway point to achieving that by 2030.

      With calls to action becoming more urgent, organizations are making plans to reduce the use of fossil fuels, move to renewable energy sources, and reduce consumption that causes more emissions downstream. As both voluntary and mandatory regulatory requirements task organizations with reducing emissions, they will first be challenged to accurately measure the size of their footprint.

      CIOs in organizations are well positioned to make conscious decisions to both influence how technology choices impact carbon emissions and implement effective tracking of emissions across the entire enterprise.

      Canada’s CIO strategy council is calling on organizations to sign a “sustainable IT pledge” to cut emissions from IT operations and supply chain and to measure and disclose emissions annually. (CIO Strategy Council, Sustainable IT Pledge)

      SCOPE 3 – Indirect Consumption

      • Goods and services
      • Fuel, travel, distribution
      • Waste, investments, leased assets, employee activity

      SCOPE 2 – Indirect Energy

      • Electricity
      • Heat and cooling

      SCOPE 1 – Direct

      • Facilities
      • Vehicles

      Signals

      Emissions tracking requires a larger scope.

      About two-thirds of organizations have a commitment to reduce greenhouse gas emissions. When asked about what tactics they use to reduce emissions, the most popular options affect either scope 1 emissions (retiring older IT equipment) or scope 2 emissions (using renewable energy sources). Fewer are using tactics that would measure scope 3 emissions such as using IoT to track or using software or AI.

      68% of organizations say they have a commitment to reduce greenhouse gas emissions. (Info-Tech Tech Trends 2022 Survey)

      Approaches to reducing carbon emissions

      Using "smart technologies" or IoT to help cut emissions 12%
      Creating incentive programs for staff to reduce emissions 10%
      Using software or AI to manage energy use 8%
      Using external DC or cloud on renewable energy 16%
      Committing to external emissions standards 15%
      Retiring/updating older IT equipment 33%
      Using renewable energy sources 41%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      Investor pressure

      The world’s largest asset manager, at $7 trillion in investments, says it will move away from investing in firms that are not aligned to the Paris Agreement. (The New York Times, 2020)

      Compliance tipping point

      International charity CDP has been collecting environmental disclosure from organizations since 2002. In 2020, more than 9,600 of the world’s largest companies – representing over 50% of global market value – took part. (CDP, 2021)

      International law

      In 2021, six countries have net-zero emissions policies in law, six have proposed legislations, and 20 have policy documents. (Energy & Climate Intelligence Unit, 2021)

      Employee satisfaction

      In 2019, thousands of workers walked out of offices of Amazon, Google, Twitter, and Microsoft to demand their employers do more to reduce carbon emissions. (NBC News, 2021)

      High influence factors for carbon reduction

      • 25% – New government laws or policies
      • 9% – External social pressures
      • 9% – Pressure from investors
      • 8% – International climate compliance efforts
      • 7% – Employee satisfaction

      (Info-Tech Tech Trends 2022 Survey)

      Risks and Benefits

      Benefits

      Trust Tracking carbon emissions creates transparency into an organization’s operations and demonstrates accountability to its carbon emissions reduction goals.
      Innovation As organizations become more proficient with carbon measurement and modeling, insights can be leveraged as a decision-making tool.
      Resilience Reducing energy usage shrinks your carbon footprint, increases operational efficiency, and decreases energy costs.

      Risks

      Regulatory Divergence Standardization of compliance enforcement around carbon emissions is a work in progress. Several different voluntary frameworks exist, and different governments are taking different approaches including taxation and cap-and-trade markets.
      Perceptions Company communications that speak to emissions reduction targets without providing proof can be accused of “greenwashing” or falsely trying to improve public perception.
      Financial Pain Institutional investments are requiring clear commitments and plans to reduce greenhouse gases. Some jurisdictions are now taxing carbon emissions.

      “When you can take technology and embed that into management change decisions that impact the environment, you can essentially guarantee that [greenhouse gas] offset. Companies that are looking to reduce their emissions can buy those offsets and it creates value for everybody.” (Wade Barnes, CEO and founder of Farmers Edge)

      Photo of Wade Barnes, CEO and founder of Farmers Edge.

      Listen to the Tech Insights podcast: The future of farming is digital

      Case Study

      Situation

      The Alberta Technology Innovation and Emissions Reduction Regulation is Alberta’s approach to reduce emissions from large industrial emitters. It prices GHG and provides a trading system.

      No-till farming and nitrogen management techniques sequester up to 0.3 metric tons of GHG per year.

      Complication

      Farmers Edge offers farmers a digital platform that includes IoT and a unified data warehouse. It can turn farm records into digital environmental assets, which are aggregated and sold to emitters.

      Real-time data from connected vehicles, connected sensors, and other various inputs can be verified by third-party auditors.

      Resolution

      Farmers Edge sold aggregated carbon offsets to Alberta power producer Capital Power to help it meet regulatory compliance.

      Farmers Edge is expanding its platform to include farmers in other provinces and in the US, providing them opportunity to earn revenue via its Smart Carbon program.

      The firm is working to meet standards outlined by the U.S. Department of Agriculture’s Natural Resources Conservation Service. (Interview with Wade Barnes, CEO, Farmers Edge)

      What's Next

      Global standards:

      The International Sustainability Standards Board (ISSB) has been formed by the International Financial Reporting Standards Foundation and will have its headquarters location announced in November at a United Nations conference. The body is already governing a set of global standards that have a roadmap for development through 2023 through open consultation. The standards are expected to bring together the multiple frameworks for sustainability standards and offer one global set of standards. (Business Council of Canada, 2021)

      CIOs take charge:

      The CIO is well positioned to take the lead role on corporate sustainability initiatives, including measuring and reducing an organization’s carbon footprint (or perhaps even monetizing carbon credits for an organization that is a negative emitter). CIOs can use their position as facilities managers and cross-functional process owners and mandate to reduce waste and inefficiency to take accountability for this important role. CIOs will expand their roles to deliver transparent and auditable reporting on environmental, social, and governance (ESG) goals for the enterprise.

      Uncertainties

      International resolve:

      Fighting the climate crisis will require governments and private sector collaboration from around the world to commit to creating new economic structures to discourage greenhouse gas emissions and incentivize long-term sustainable thinking. If some countries or private sector forces continue to prioritize short-term gains over sustainability, the U.N.’s goals won’t be achieved and the human costs as a result of climate change will become more profound.

      Cap-and-trade markets:

      Markets where carbon credits are sold to emitters are organized by various jurisdictions around the world and have different incentive structures. Some are created by governments and others are voluntary markets created by industry. This type of organization for these markets limits their size and makes it hard to scale the impact. Organizations looking to sell carbon credits at volume face the friction of having to navigate different compliance rules for each market they want to participate in.

      Carbon Metrics in Energy 4.0 Scenarios

      Determine your organization’s approach to measuring carbon dioxide and other greenhouse gas emissions by considering whether your organization is likely to be a high emitter or a carbon sink. Also consider your capability to measure and report on your carbon footprint.

      A map of Carbon Metrics in Energy 4.0 scenarios with two axes representing 'Quantification Capability, From not tracking any emissions whatsoever to tracking all emissions at every scope' and 'Greenhouse Gas Emissions, From mitigating more emissions than you create to emitting more than regulations allow'. The axes split the map into quarters. 'Quantification Capability' ranges from 'No Measures' on the left to 'All Emissions Measured' on the right. 'Greenhouse Gas Emissions' ranges from 'More Than Allowed' on top to 'Net-Negative' on bottom. The top left quarter, no measures and more than allowed, reads 'Companies that are likely to be high emitters and not measuring will attract the most scrutiny from regulators and investors.' The top right quarter, all measured and more than allowed, reads 'Companies emit more than regulators allow but the measurements show a clear path to mitigation through the purchase of carbon credits.' The bottom left quarter, no measures and net-negative, reads 'Companies able to achieve carbon neutrality or even be net-negative in emissions but unable to demonstrate it will still face scrutiny from regulators.' The bottom right quarter, all measured and net-negative, reads 'Companies able to remove more emissions than they create have an opportunity to aggregate those reductions and sell on a cap-and-trade market.'

      Recommendations

      Measure the whole footprint. Devise a plan to measure scope 1, 2, and 3 greenhouse gas emissions at a level that is auditable by a third party.

      Gauge the impact of Industry 4.0. New technologies in Industry 4.0 include IoT, additive manufacturing, and advanced analytics. Make sustainability a core part of your focus as you plan out how these technologies will integrate with your business.

      Commit to net zero. Make a clear commitment to achieve net-zero emissions by a specific date as part of your organization’s core strategy. Take a continuous improvement approach to make progress towards the goal with measurable results.

      New laws from governments will have the highest degree of influence on an organization’s decision to reduce emissions. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Intangible Value Creation

      TREND 04 | DATA ARCHITECTURE

      Use blockchain technology to turn unique intellectual property into saleable digital products. Provide governance around marketplaces where sales are made.

      Emerging technologies:
      Blockchain, Distributed Ledger Technology, Virtual Environments

      Introduction

      Decentralized technologies are propelling the digital economy.

      As the COVID-19 pandemic has accelerated our shift into virtual social and economic systems, blockchain technology poses a new technological frontier – further disrupting digital interactions and value creation by providing a modification of data without relying on third parties. New blockchain software developments are being used to redefine how central banks distribute currency and to track provenance for scarce digital assets.

      Tokenizing the blockchain

      Non-fungible tokens (NFTs) are distinct cryptographic tokens created from blockchain technology. The rarity systems in NFTs are redefining digital ownership and being used to drive creator-centric communities.

      Not crypto-currency, central currency

      Central Bank Digital Currencies (CBDC) combine the same architecture of cryptocurrencies built on blockchain with the financial authority of a central bank. These currencies are not decentralized because they are controlled by a central authority, rather they are distributed systems. (Decrypt, 2021)

      80% of banks are working on a digital currency. (Atlantic Council, 2021)

      Brands that launched NFTs

      NBA, NFL, Formula 1, Nike, Stella Artois, Coca-Cola, Mattel, Dolce & Gabbana, Ubisoft, Charmin

      Banks that launched digital currencies

      The Bahamas, Saint Kitts and Nevis, Antigua and Barbuda, Saint Lucia, Grenada

      Signals

      ID on the blockchain

      Blockchains can contain smart contracts that automatically execute given specific conditions, protecting stakeholders involved in a transaction. These have been used by central banks to automate when and how currency can be spent and by NFT platforms to attribute a unique identity to a digital asset. Automation and identity verification are the most highly valued digital capabilities of IT practitioners.

      $69.3 million – The world’s most expensive NFT artwork sale, for Beeple’s “Everydays: The First 5,000 Days” (The New York Times, Mar. 2021)

      Digital capabilities that provide high value to the organization

      E-commerce 50%
      Automation 79%
      Smart contracts 42%
      Community building and engagement 55%
      Real-time payments 46%
      Tracking provenance 33%
      Identity verification 74%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      Financial autonomy

      Central banks view cryptocurrencies as "working against the public good" and want to maintain control over their financial system to maintain the integrity of payments and provide financial crime oversight and protections against money laundering. (Board of Governors of the Federal Reserve System, 2021)

      Bitcoin energy requirements and greenhouse gas emissions

      Annual energy consumption of the Bitcoin blockchain in China is estimated to peak in 2024 at 297 TwH and generate 130.5 million metric tons of carbon emissions. That would exceed the annual GHG of the Czech Republic and Qatar and rank in the top 10 among 182 cities and 42 industrial sectors in China. This is motiving cryptocurrency developers and central banks to move away from the energy-intensive "Proof of Work" mining approach and towards the "Proof of Stake" approach. (Nature Communications, 2021)

      Digital communities

      During the pandemic, people spent more time exploring digital spaces and interacting in digital communities. Asset ownership within those communities is a way for individuals to show their own personal investment in the community and achieve a status that often comes with additional privileges. The digital assets can also be viewed as an investment vehicle or to gain access to exclusive experiences.

      “The pillars of the music economy have always been based on three things that the artist has never had full control of. The idea of distribution is freed up. The way we are going to connect to fans in this direct to fan value prop is very interesting. The fact we can monetize it, and that money exchange, that transaction is immediate. And on a platform like S!NG we legitimately have a platform to community build…. Artists are getting a superpower.” (Raine Maida, Chief Product Officer, S!NG Singer, Our Lady Peace)

      Raine Maida, Chief Product Officer, S!NG, and Singer, Our Lady Peace.

      Listen to the Tech Insights podcast: Raine Maida's startup is an NFT app for music

      Case Study

      Situation

      Artists can create works and distribute them to a wide audience more easily than ever with the internet. Publishing a drawing or a song to a website allows it to be infinitely copied. Creators can use social media accounts and digital advertisements to build up a fan base for their work and monetize it through sales or premium-access subscriber schemes.

      Complication

      The internet's capacity for frictionless distribution is a boon and a burden for artists at the same time. Protecting copyright in a digital environment is difficult because there is no way to track a song or a picture back to its creator. This devalues the work because it can be freely exchanged by users.

      Resolution

      S!NG allows creators to mint their works with a digital token that stamps its origin to the file and tracks provenance as it is reused and adapted into other works. It uses the ERC 721 standard on the Ethereum blockchain to create its NFT tokens. They are portable files that the user can create for free on the S!NG platform and are interoperable with other digital token platforms. This enables a collaboration utility by reducing friction in using other people's works while giving proper attribution. Musicians can create mix tracks using the samples of others’ work easily and benefit from a smart-contract-based revenue structure that returns money to creators when sales are made. (Interview with Geoff Osler and Raine Maida, S!NG Executives)

      Risks and Benefits

      Benefits

      Autonomy Digital money and assets could proliferate the desire for autonomy as users have greater control over their assets (by cutting out the middlemen, democratizing access to investments, and re-claiming ownership over intangible data).
      Community Digital worlds and assets offer integrated and interoperable experiences influenced by user communities.
      Equity Digital assets allow different shareholder equity models as they grant accessible and affordable access to ownership.

      Risks

      Volatility Digital assets are prone to volatile price fluctuations. A primary reason for this is due to its perceived value relative to the fiat currency and the uncertainty around its future value.
      Security While one of the main features of blockchain-based digital assets is security, digital assets are vulnerable to breaches during the process of storing and trading assets.
      Access Access to digital marketplaces requires a steep learning curve and a base level of technical knowledge.

      What's Next

      Into the Metaverse:

      Digital tokens are finding new utility in virtual environments known as the Metaverse. Decentraland is an example of a virtual reality environment that can be accessed via a web browser. Based on the Ethereum blockchain, it's seen sales of virtual land plots for hundreds of thousands of dollars. Sotheby's is one buyer, building a digital replica of its New Bond Street gallery in London, complete with commissionaire Hans Lomuldur in avatar form to greet visitors. The gallery will showcase and sell Sotheby's digital artworks. (Artnet News, 2021)

      Bitcoin as legal tender:

      El Salvador became the first country in the world to make Bitcoin legal tender in September 2021. The government intended for this to help citizens avoid remittance fees when receiving money sent from abroad and to provide a way for citizens without bank accounts to receive payments. Digital wallet Chivo launched with technical glitches and in October a loophole that allowed “price scalping” had to be removed to stop speculators from using the app to trade for profit. El Salvador’s experiment will influence whether other countries consider using Bitcoin as legal tender. (New Scientist, 2021)

      Uncertainties

      Stolen goods at the mint:

      William Shatner complained that Twitter account @tokenizedtweets had taken his content without permission and minted tokens for sale. In doing so, he pointed out there’s no guarantee a minted digital asset is linked to the creator of the attached intellectual property.

      Decentralized vs. distributed finance:

      Will blockchain-based markets be controlled by a single platform operator or become truly open? For example, Dapper Labs centralizes the minting of NFTs on its Flow blockchain and controls sales through its markets. OpenSea allows NFTs minted elsewhere to be brought to the platform and sold.

      Supply and demand:

      Platforms need to improve the reliability of minting technology to create tokens in the future. Ethereum's network is facing more demand than it can keep up with and requires future upgrades to improve its efficiency. Other platforms that support minting tokens are also awaiting upgrades to be fully functional or have seen limited NFT projects launched on their platform.

      Intangible Value Creation Scenarios

      Determine your organization’s strategy by considering the different scenarios based on two main factors. The design decisions are made around whether digital assets are decentralized or distributed and whether the assets facilitate transactions or collections.

      A map of Intangible Value Creation scenarios with two axes representing 'Fungibility, From assets that are designed to be exchanged like currency to assets that are unique' and 'Asset Control Model, From decentralized control with open ownership to centralized control with distributed assets'. The axes split the map into quarters. 'Fungibility' ranges from 'Transactional' on the left to 'Collectible' on the right. 'Asset Control Model' ranges from 'Distributed' on top to 'Decentralized' on bottom. The top left quarter, distributed transactional, reads 'Platform-controlled digital exchanges and utility (e.g. tokens exchanged for fan experiences, central bank digital currency, S!NG).' The top right quarter, distributed collectible, reads 'Platform-controlled digital showcases and community (e.g. NBA Top Shot, Decentraland property).' The bottom left quarter, decentralized transactional, reads 'Peer-controlled digital exchanges and utility (e.g. Bitcoin).' The bottom right quarter, decentralized collectible, reads 'Peer-controlled digital showcases and community (e.g. OpenSea and Ethereum-based NFTs).'

      Recommendations

      Determine your role in the digital asset ecosystem.
      • Becoming a platform provider for digital tokens will require a minting capability to create blockchain-based assets and a marketplace for users to exchange them.
      • Issuing digital tokens to a platform through a sale will require making partnerships and marketing.
      • Investing in digital assets will require management of digital wallets and subject-matter expert analysis of the emerging markets.
      Track the implications of digital currencies.

      Track what your country’s central bank is planning for digital currency and determine if you’ll need to prepare to support it. Be informed about payment partner support for cryptocurrency and consider any complications that may introduce.

      $1 billion+ – The amount of cryptocurrency spent by consumers globally through crypto-linked Visa cards in first half of 2021. (CNBC, July 2021)

      Info-Tech Resources

      Automation as a Service

      TREND 05 | INNOVATION

      Automate business processes and access new sophisticated technology services through platform integration.

      Emerging technologies:
      Cloud platforms, APIs, Generative AI

      Introduction

      The glue for innovation

      Rapidly constructing a business model that is ready to compete in a digital economy requires continuous innovation. Application programming interfaces (APIs) can accelerate innovation by unlocking marketplaces of ready-to-use solutions to business problems and automating manual tasks to make more time for creativity. APIs facilitate a microarchitecture approach and make it possible to call upon a new capability with a few lines of code. This is not a new tool, as the first API was specified in 1951, but there were significant advances of both scale and capability in this area in 2021.

      In the past 18 months, API adoption has exploded and even industries previously considered as digital laggards are now integrating them to reinvent back-office processes. Technology platforms specializing in API management are attracting record-breaking investment. And sophisticated technology services such as artificial intelligence are being delivered by APIs.

      APIs can play a role in every company’s digital strategy, from transforming back-office processes to creating revenue as part of a platform.

      $500,000 was invested in API companies in 2016. (Forbes, May 2021)

      $2,000,000,000+ was invested in API companies in 2020. (Forbes, May 2021)

      69% of IT practitioners say digital transformation has been a high priority for their organization during the pandemic. (Info-Tech Tech Trends 2022 Survey)

      51% of developers used more APIs in 2020 than in 2019. (InsideHPC, 2021)

      71% of developers planned to use even more APIs in 2021. (InsideHPC, 2021)

      Signals

      IT practitioners indicate that digital transformation was a strong focus for their organization during the pandemic and will remain so during the period afterwards, and one-third say their organizations were “extremely focused” on digital transformation.

      When it came to shifting processes from being done manually to being completed digitally, more than half of IT practitioners say they shifted at least 21% of their processes during the past year. More than one in five say that at least 60% of their processes were shifted from manual to digital in the past year.

      3.5 trillion calls were performed on API management platform Apigee, representing a 50% increase year over year. (SiliconANGLE, 2021)

      Processes shifted from manual to digital in the past year

      A horizontal bar chart recording survey responses regarding the percent of processes that shifted from manual to digital in the past year. The horizontal axis is 'percent of survey respondents' with values from 0 to 35%. The vertical axis is 'percent of process shifted to digital' with bar labels 'Between 0 to 20%', 'Between 21 to 40%', and so on until 'Between 81 to 100%'. 20% of respondents answered '0 to 20%' of processes went digital. 28% of respondents answered '21 to 40%' of processes went digital. 30% of respondents answered '41 to 60%' of processes went digital. 15% of respondents answered '61 to 80%' of processes went digital. 7% of respondents answered '81 to 100%' of processes went digital.

      Drivers

      Covid-19

      The pandemic lockdowns pushed everyone into a remote-work scenario. With in-person interaction not an option, even more traditional businesses had to adapt to digital processes.

      Customer Expectations

      The success of digital services in the consumer space is causing expectations to rise in other areas, such as professional services. Consumers now want their health records to be portable and they want to pay their lawyer through e-transfer, not by writing a cheque. (Interview with Mik Lernout)

      Standardization

      Technology laggard industries such as legal and healthcare are recognizing the pain of working with siloed systems. New standardization efforts are driving the adoption of open APIs at a rapid rate. (Interview with Jennifer Jones, Research Director – Industry, Info-Tech Research Group)

      Risks and Benefits

      Benefits

      Speed Using a microarchitecture approach with readily available services constructed in different ways provides a faster way to get from idea to minimum-viable product.
      Intelligence Open APIs have more than ever exposed people to sophisticated AI algorithms that were in the domain of only advanced researchers just a couple years ago. Developers can integrate AI with a couple lines of code. Non-technical users can train algorithms with low-code and no-code tools (Forbes, Sept. 2021).
      Resilience If one function of a solution doesn't work, it can be easily replaced with another one available on the market and the overall experience is maintained.

      Risks

      Loss of Privacy APIs are being targeted by hackers as a way to access personal information. Recent API-related leaks affected Experian, John Deere, Clubhouse, and Peloton (VentureBeat, 2021).
      Complexity Using a decentralized approach to assemble applications means that there is no single party accountable for the solution. Different pieces can break, or oversights can go unnoticed.
      Copycats Platforms that take the approach of exposing all functions via API run the risk of having their services used by a competitor to offer the same solution but with an even better user experience.

      “When we think about what the pandemic did, we had this internal project called 'back to the future.' It kind of put the legal industry in a time machine and it kind of accelerated the legal industry 5, maybe even 10 years. A lot of the things we saw with the innovators became table stakes.” (Mik Lernout, Vice President of Product, Clio)

      Photo of Mik Lernout, Vice president of product, Clio.

      Listen to the Tech Insights podcast: Clio drives digital transformation to redefine the legal industry

      Case Study

      Situation

      The COVID-19 pandemic required the legal industry to shift to remote work. A typically change-resistant industry was now holding court hearings over videoconference, taking online payments, and collecting e-signatures on contracts. For Clio, a software-as-a-service software vendor that serves the legal industry, its client base grew and its usage increased. It previously focused on the innovators in the legal industry, but now it noticed laggards were going digital too.

      Complication

      Law firms have very different needs depending on their legal practice area (e.g. family law, corporate law, or personal injury) and what jurisdiction they operate in.

      Clients are also demanding more from their lawyers in terms of service experience. They don't want to travel to the law office to drop off a check but expect digital interactions on par with service they receive in other areas.

      Resolution

      Since its inception, Clio built its software product so that all of its functions could be called upon by an API as well. It describes its platform as the "operating system for the legal industry." Its API functions include capabilities like managing activities, billing, and contracts. External developers can submit applications to the Clio Marketplace to add new functionality. Its platform approach enables it to find solutions for its 150,000+ users. During the pandemic, Clio saw its customers rely on its APIs more than ever before. It expects this accelerated adoption to be the way of working in the future. (ProgrammableWeb, 2021; Interview with Mik Lernout)

      What's Next

      GOOGLE’S API-FIRST APPROACH:

      Google is expanding its Apigee API management platform so enterprises will be able to connect existing data and applications and access them via APIs. It's part of Google's API-first approach to digital transformation, helping enterprises with their integration challenges. The new release includes tools and a framework that's needed to integrate services in this way and includes pre-built connectors for common business apps and services such as Salesforce, Cloud SQL, MySQL, and BigQuery. (SiliconANGLE, 2021)

      Uncertainties

      API SECURITY:

      APIs represent another potential vulnerability for hackers to exploit and the rise in popularity has come with more security incidents. Companies using APIs have leaked data through APIs, with one research report on the state of API security finding that 91% of organizations have suffered an API security incident. Yet more than a quarter of firms running production APIs don’t have an API security strategy. (VentureBeat, 2021)

      For low IT maturity organizations moving onto platforms that introduce API capabilities, education is required about the consequences of creating more integrations. Platforms must bear some responsibility for monitoring for irregular activity. (Interview with Mik Lernout)

      Automation as a Service Scenarios

      Determine your organization’s platform strategy from the basis of your digital maturity – from that of a laggard to a native – and whether it involves monetized APIs vs. freely available public APIs. A strategy can include both the consumption of APIs and the creation of them.

      A map of Automation as a Service scenarios with two axes representing 'Business Model, From an open and public API to a monetized pay-for-use API' and 'Digital Maturity, From being a digital laggard to being a digital native'. The axes split the map into quarters. 'Business Model' ranges from 'Public APIs' on the left to 'Monetized APIs' on the right. 'Digital Maturity' ranges from 'Digital Native' on top to 'Digital Laggard' on bottom. The top left quarter, digital native public APIs, reads 'Platform business model that grows through adoption of free APIs (e.g. Clio).' The top right quarter, digital native monetized APIS, reads 'Platform business model with spectrum of API services including free tiers.' The bottom left quarter, digital laggard public APIs, reads 'Consume public APIs to simplify and automate business processes and improve customer experience (e.g. law firms using Clio).' The bottom right quarter, digital laggard monetized APIs, reads 'Consume paid APIs to provide customers with expanded services (e.g. retailer Lowe’s uses AccuWeather to predict supply and demand).'

      Recommendations

      Leverage APIs to connect your systems. Create a repeatable process to improve the quality, reusability, and governance of your web APIs.

      Transform your business model with digital platforms. Use the best practices of digital native enterprises and leverage your core assets to compete in a digital economy.

      Deliver sophisticated new capabilities with APIs. Develop an awareness of new services made available through API integration, such as artificial intelligence, and take advantage of them.

      4.5 billion words per day generated by the OpenAI natural language API GPT-3, just nine months after launch. (OpenAI, 2021)

      Info-Tech Resources

      Behind the design

      Inspiration provided by the golden ratio

      The golden ratio has long fascinated humans for its common occurrence in nature and inspired artists who adopted its proportions as a guiding principle for their creations. A new discovery of the golden ratio in economic cycles was published in August 2021 by Bert de Groot, et al. As the boundaries of value creation blur between physical and digital and the pace of change accelerates, these digital innovations may change our lives in many ways. But they are still bound by the context of the structure of the economy. Hear more about this surprising finding from de Groot and from this report’s designer by listening to our podcast. (Technological Forecasting and Social Change, 2021)

      “Everything happening will adapt itself into the next cycle, and that cycle is one phi distance away.” (Bert de Groot, professor of economics at Erasmus University Rotterdam)

      Photo of Bert de Groot, Professor of Economics at Erasmus University Rotterdam.

      Listen to the Tech Insights podcast: New discovery of the golden ratio in the economy

      Contributing Experts

      Vijay Sundaram
      Chief Strategy Officer, Zoho
      Photo of Vijay Sundaram, Chief Strategy Officer, Zoho.
      Jason Brommet
      Head of Modern Work and Security Business Group, Microsoft
      Photo of Jason Brommet, Head of Modern Work and Security Business Group at Microsoft.
      Steve Orrin
      Federal Chief Technology Officer, Intel
      Photo of Steve Orrin, Federal Chief Technology Officer, Intel.
      Wade Barnes
      CEO and Founder, Farmers Edge
      Photo of Wade Barnes, CEO and founder of Farmers Edge.

      Contributing Experts

      Raine Maida
      Chief Product Officer, S!NG
      Singer, Our Lady Peace
      Raine Maida, Chief Product Officer, S!NG Singer, Our Lady Peace.
      Geoff Osler
      CEO, S!NG
      Photo of Geoff Osler, CEO, S!NG.
      Mik Lernout
      Vice President of Product, Clio
      Photo of Mik Lernout, Vice President of Product, Clio.
      Bert de Groot
      Professor of Economics, Erasmus University Rotterdam
      Photo of Bert de Groot, Professor of Economics at Erasmus University Rotterdam.

      Bibliography – Enabling the Digital Economy

      “2021 Canada Dealer Financing Satisfaction Study.” J.D. Power, 13 May 2021. Accessed 27 May 2021.

      Brown, Sara. “The CIO Role Is Changing. Here’s What’s on the Horizon.” MIT Sloan, 2 Aug. 2021. Accessed 16 Aug. 2021.

      de Groot, E. A., et al. “Disentangling the Enigma of Multi-Structured Economic Cycles - A New Appearance of the Golden Ratio.” Technological Forecasting and Social Change, vol. 169, Aug. 2021, pp. 120793. ScienceDirect, https://doi.org/10.1016/j.techfore.2021.120793.

      Hatem, Louise, Daniel Ker, and John Mitchell. “Roadmap toward a common framework for measuring the Digital Economy.” Report for the G20 Digital Economy Task Force, OECD, 2020. Accessed 19 Oct. 2021.

      LaBerge, Laura, et al. “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever.” McKinsey, 5 Oct. 2020. Accessed 14 June 2021.

      Pomeroy, James. The booming digital economy. HSBC, Sept. 2020. Web.

      Salman, Syed. “Digital Transformation Realized Through COBIT 2019.” ISACA, 13 Oct. 2020. Accessed 25 Oct. 2021.

      Bibliography – Hybrid Collaboration

      De Smet, Aaron, et al. “Getting Real about Hybrid Work.” McKinsey Quarterly, 9 July 2021. Web.

      Herskowitz, Nicole. “Brace Yourselves: Hybrid Work Is Hard. Here’s How Microsoft Teams and Office 365 Can Help.” Microsoft 365 Blog, 9 Sept. 2021. Web.

      Melin, Anders, and Misyrlena Egkolfopoulou. “Employees Are Quitting Instead of Giving Up Working From Home.” Bloomberg, 1 June 2021. Web.

      Spataro, Jared. “Microsoft and LinkedIn Share Latest Data and Innovation for Hybrid Work.” The Official Microsoft Blog, 9 Sept. 2021. Web.

      Subin, Samantha. “The new negotiation over job benefits and perks in post-Covid hybrid work.” CNBC, 23 Apr. 2021. Web.

      Torres, Roberto. “How to Sidestep Overspend as Hybrid Work Tests IT.” CIO Dive, 26 July 2021. Accessed 16 Sept. 2021.

      Wong, Christine. “How the hybrid workplace will affect IT spending.” ExpertIP, 15 July 2021. Web.

      Yang, Longqi, et al. “The Effects of Remote Work on Collaboration among Information Workers.” Nature Human Behaviour, Sept. 2021, pp. 1-12. Springer Nature, https://doi.org/10.1038/s41562-021-01196-4.

      Bibliography – Battle Against Ransomware

      Berg, Leandro. “RTF Report: Combatting Ransomware.” Institute for Security and Technology (IST), 2021. Accessed 21 Sept. 2021.

      Dudley, Renee. “The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks.” ProPublica, 27 Aug. 2019. Accessed 22 Sept. 2021.

      Durbin, Steve. “Council Post: Artificial Intelligence: The Future Of Cybersecurity?” Forbes, 23 Sept. 2021. Accessed 21 Oct. 2021.

      “FACT SHEET: Ongoing Public U.S. Efforts to Counter Ransomware.” The White House, 13 Oct. 2021. Web.

      Jeffery, Lynsey, and Vignesh Ramachandran. “Why ransomware attacks are on the rise — and what can be done to stop them.” PBS NewsHour, 8 July 2021. Web.

      McBride, Timothy, et al. Data Integrity: Recovering from Ransomware and Other Destructive Events. NIST Special Publication (SP) 1800-11, National Institute of Standards and Technology, 22 Sept. 2020. NIST Computer Security Resource Center (CSRC), https://doi.org/10.6028/NIST.SP.1800-11.

      Mehrotra, Karitkay, and Jennifer Jacobs. “Crypto Channels Targeted in Biden’s Fight Against Ransomware.” BNN Bloomberg, 21 Sept. 2021. Web.

      Sharma, Mayank. “Hackers demand $70m ransom after executing massive Solar Winds-like attack.” TechRadar, 5 July 2021. Web.

      “Unhacked: 121 Tools against Ransomware on a Single Website.” Europol, 26 July 2021. Web.

      Bibliography – Carbon Metrics in Energy 4.0

      “The A List 2020.” CDP, 2021. Web.

      Baazil, Diedrik, Hugo Miller, and Laura Hurst. “Shell loses climate case that may set precedent for big oil.” Australian Financial Review, 27 May 2021. Web.

      “BlackRock’s 2020 Carbon Footprint.” BlackRock, 2020. Accessed 25 May 2021.

      “CDP Media Factsheet.” CDP, n.d. Accessed 25 May 2021.

      Glaser, April, and Leticia Miranda. “Amazon workers demand end to pollution hitting people of color hardest.” NBC News, 24 May 2021. Accessed 25 May 2021.

      Little, Mark. “Why Canada should be the home of the new global sustainability standards board.” Business Council of Canada, 1 Oct. 2021. Accessed 22 Oct. 2021.

      McIntyre, Catherine. “Canada vying for global headquarters to oversee sustainable-finance standards.” The Logic, 22 July 2021. Web.

      “Net Zero Scorecard.” Energy & Climate Intelligence Unit, 2021. Accessed 25 May 2021.

      Sayer, Peter. “Greenhouse gas emissions: The next big issue for CIOs.” CIO, 13 Oct. 2021. Web.

      “Scope 1 and Scope 2 Inventory Guidance.” US EPA, OAR. 14 Dec. 2020. Web.

      Sorkin, Andrew Ross. “BlackRock C.E.O. Larry Fink: Climate Crisis Will Reshape Finance.” The New York Times, 14 Jan. 2020. Web.

      “Sustainable IT Pledge.” CIO Strategy Council, 2021. Accessed 22 Oct. 2021.

      Bibliography – Intangible Value Creation

      Areddy, James T. “China Creates Its Own Digital Currency, a First for Major Economy.” Wall Street Journal, 5 Apr. 2021. Web.

      Boar, Codruta, et al. Impending arrival - a sequel to the survey on central bank digital currency. BIS Papers No 107, Jan. 2020. Web.

      Brainard, Lael. “Speech by Governor Brainard on Private Money and Central Bank Money as Payments Go Digital: An Update on CBDCs.” Board of Governors of the Federal Reserve System, 24 May 2021. Accessed 28 May 2021.

      Howcroft, Elizabeth, and Ritvik Carvalho. “How a 10-second video clip sold for $6.6 million.” Reuters, 1 Mar. 2021. Web.

      “Central Bank Digital Currency Tracker.” Atlantic Council, 2021. Accessed 10 Sept. 2021.

      “Expert Comment From Warwick Business School: Problems With El Salvador’s Bitcoin Experiment Are Unsurprising.” Mondo Visione, 8 Sept. 2021. Accessed 10 Sept. 2021.

      Goldstein, Caroline. “In Its Ongoing Bid to Draw Crypto-Collectors, Sotheby’s Unveils a Replica of Its London H.Q. in the Blockchain World Decentraland.” Artnet News, 7 June 2021. Web.

      Hamacher, Adriana. “Taco Bell to Charmin: 10 Big Brands Jumping On The NFT Bandwagon.” Decrypt, 22 Mar. 2021. Web.

      Hazan, Eric, et al. “Getting tangible about intangibles: The future of growth and productivity?” McKinsey. 16 June 2021. Web.

      Bibliography – Intangible Value Creation

      Herrera, Pedro. “Dapp Industry Report: Q3 2021 Overview.” DappRadar, 1 Oct. 2021. Web.

      Holland, Frank. “Visa Says Crypto-Linked Card Usage Tops $1 Billion in First Half of 2021.” CNBC, 7 July 2021. Web.

      Jiang, Shangrong, et al. “Policy Assessments for the Carbon Emission Flows and Sustainability of Bitcoin Blockchain Operation in China.” Nature Communications, vol. 12, no. 1, Apr. 2021, p. 1938. Springer Nature, https://doi.org/10.1038/s41467-021-22256-3.

      Reyburn, Scott. “JPG File Sells for $69 Million, as ‘NFT Mania’ Gathers Pace.” The New York Times, 11 Mar. 2021. Web.

      Taylor, Luke. “Bitcoin: El Salvador’s Cryptocurrency Gamble Hit by Trading Loophole.” New Scientist, 25 Oct. 2021. Web.

      Bibliography – Automation as a Service

      Belsky, Scott. “The Furry Lisa, CryptoArt, & The New Economy Of Digital Creativity.” Medium, 21 Feb. 2021. Web.

      Culbertson, Joy. “10 Top Law APIs.” ProgrammableWeb, 14 Feb. 2021. Web.

      Caballar, Rina Diane. “Programming by Voice May Be the Next Frontier in Software Development - IEEE Spectrum.” IEEE Spectrum: Technology, Engineering, and Science News, 22 Mar 2021. Accessed 23 Mar. 2021.

      Gonsalves, Chris. “The Problem with APIs.” VentureBeat, 7 May 2021. Web.

      Graca, Joao. “Council Post: How APIs Are Democratizing Access To AI (And Where They Hit Their Limits).” Forbes, 24 Sept 2021. Accessed 28 Sept. 2021.

      Harris, Tony. “What is the API Economy?” API Blog: Everything You Need to Know, 4 May 2021. Web.

      Kitsing, Meelis. Scenarios for Digital Platform Ecosystems, 2020, pp. 453-57. ResearchGate, https://doi.org/10.1109/ICCCS49078.2020.9118571.

      Pilipiszyn, Ashley. “GPT-3 Powers the Next Generation of Apps.” OpenAI, 25 Mar. 2021. Web.

      Rethans, John. “So You Want to Monetize Your APIs?” APIs and Digital Transformation, 29 June 2018. Web.

      Bibliography – Automation as a Service

      Salyer, Patrick. “API Stack: The Billion Dollar Opportunities Redefining Infrastructure, Services & Platforms.” Forbes, 4 May 2021. Accessed 27 Oct. 2021.

      staff. “RapidAPI Raises $60M for Expansion of API Platform.” InsideHPC, 21 Apr. 2021. Web.

      Taulli, Tom. “API Economy: Is It The Next Big Thing?” Forbes, 18 Jan. 2021. Accessed 5 May 2021.

      Warren, Zach. “Clio Taking 2021 Cloud Conference Virtual, Announces New Mission Among Other News.” Legaltech News, 11 Mar. 2021. Web.

      Wheatley, Mike. “Google Announces API-First Approach to Application Data Integration with Apigee.” SiliconANGLE, 28 Sept. 2021. Web.

      About the research

      Tech trends survey

      As part of its research process for the 2022 Tech Trends Report, Info-Tech Research Group conducted an open online survey among its membership and wider community of professionals. The survey was fielded from August 2021 to September 2021, collecting 475 responses.

      The underlying metrics are diverse, capturing 14 countries and regions and 16 Industries.

      A geospatial chart of the world documenting the percentage of respondents from each country to Info-Tech's '2022 Tech Trends Report' Percentages are below.
      01 United States 45.3% 08 India 1.7%
      02 Canada 19.2% 09 Other (Asia) 1.7%
      03 Africa 9.3% 10 New Zealand 1.5%
      04 Other (Europe) 5.3% 11 Germany 0.8%
      05 Australia 4.2% 12 Mexico 0.4%
      06 Great Britain 3.8% 13 Netherlands 0.4%
      07 Middle East 2.9% 14 Japan 0.2%

      Industry

      01 Government 18.9%
      02 Media, Information, & Technology 12.8%
      03 Professional Services 12.8%
      04 Manufacturing 9.9%
      05 Education 8.8%
      06 Healthcare 8.2%
      07 Financial Services 7.8%
      08 Transportation & Logistics 3.4%
      09 Utilities 3.4%
      10 Insurance 2.5%
      11 Retail & Wholesale 2.5%
      12 Construction 2.3%
      13 Natural Resources 2.1%
      14 Real Estate & Property Management 1.7%
      15 Arts & Leisure 1.5%
      16 Professional Associations 1.3%

      Department

      IT (information technology) 88.2%
      Other (Department) 3.79%
      Operations 2.32%
      Research & Development 1.89%
      Sales 1.26%
      Administration 1.06%
      Finance 0.42%
      HR (Human Resources) 0.42%
      Marketing 0.42%
      Production 0.21%

      Role

      Manager 24%
      Director-level 22%
      C-level officer 19%
      VP-level 9%
      Team lead / supervisor 7%
      Owner / President / CEO 7%
      Team member 7%
      Consultant 5%
      Contractor 1%

      IT Spend

      Respondents on average spent 35 million per year on their IT budget.

      Accounting for the outlier responses – the median spend sits closer to 4.5 million per year. The highest spend on IT was within the Government, Healthcare, and Retail & Wholesale sectors.

      Adding the Right Value: Building Cloud Brokerages That Enable

      • Buy Link or Shortcode: {j2store}110|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering, and how?

      Our Advice

      Critical Insight

      • To avoid failure, you need to provide security and compliance, but basic user satisfaction means becoming a frictionless intermediary.
      • Enabling brokers provide knowledge and guidance for the best usage of cloud.
      • While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

      Impact and Result

      • Avoid disintermediation.
      • Maintain compliance.
      • Leverage economies of scale.
      • Ensure architecture discipline.

      Adding the Right Value: Building Cloud Brokerages That Enable Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Cloud Brokerage Deck – A guide to help you start designing a cloud brokerage that delivers value beyond gatekeeping.

      Define the value, ecosystem, and metrics required to add value as a brokerage. Develop a brokerage value proposition that aligns with your audience and capabilities. Define and rationalize the ecosystem of partners and value-add activities for your brokerage. Define KPIs that allow you to maximize and balance both usability and compliance.

      • Adding the Right Value: Building Cloud Brokerages That Enable Storyboard
      [infographic]

      Further reading

      Adding the Right Value: Building Cloud Brokerages That Enable

      Considerations for implementing an institutional-focused cloud brokerage.

      Your Challenge

      Increasingly, large institutions and governments are adopting cloud-first postures for delivering IT resources. Combined with the growth of cloud offerings that are able to meet the certifications and requirements of this segment that has been driven by federal initiatives like Cloud-First in Canada and Cloud Smart in the United States, these two factors have left institutions (and the businesses that serve them) with the challenge of delivering cloud services to their users while maintaining compliance, control, and IT sanity.

      In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering and how?

      Navigating the Problem

      Not all cloud brokerages are the same. And while they can be an answer to cloud complexity, an ineffective brokerage can drain value and complicate operations even further. Cloud brokerages need to be designed:

      1. To deliver the right type of value to its users.
      2. To strike the balance between effective governance & security and flexibility & ease of use.

      Info-Tech’s Approach

      By defining your end goals, framing solutions based on the type of value and rigor your brokerage needs to deliver, and focusing on the right balance of security and flexibility, you can deliver a brokerage that delivers the best of all worlds.

      1. Define the brokerage value you want to deliver.
      2. Build the catalog and partner ecosystem.
      3. Understand how to maximize adoption and minimize disintermediation while maintaining architectural discipline and compliance.

      Info-Tech Insight

      Sometimes a brokerage delivery model makes sense, sometimes it doesn’t! Understanding the value addition you want your brokerage to provide before creating it allows you to not only avoid pitfalls and maximize benefits but also understand when a brokerage model does and doesn’t make sense in the first place.

      Project Overview

      Understand what value you want your brokerage to deliver

      Different institutions want brokerage delivery for different reasons. It’s important to define up front why your users need to work through a brokerage and what value that brokerage needs to deliver.

      What’s in the catalog? Is it there to consolidate and simplify billing and consumption? Or does it add value further up the technology stack or value chain? If so, how does that change the capabilities you need internally and from partners?

      Security and compliance are usually the highest priority

      Among institutions adopting cloud, a broker that can help deliver their defined security and compliance standards is an almost universal requirement. Especially in government institutions, this can mean the need to meet a high standard in both implementation and validation.

      The good news is that even if you lack the complete set of skills in-house, the high certification levels available from hyperscale providers combined with a growing ecosystem of service providers working on these platforms means you can usually find the right partner(s) to make it possible.

      The real goal: frictionless intermediation and enablement

      Ultimately, if end users can’t get what they need from you, they will go around you to get it. This challenge, which has always existed in IT, is further amplified in a cloud service world that offers users a cornucopia of options outside the brokerage. Furthermore, cloud users expect to be able to consume IT seamlessly. Without frictionless satisfaction of user demand your brokerage will become disintermediated, which risks your highest priorities of security and compliance.

      Understand the evolution: Info-Tech thought model

      While initial adoption of cloud brokerages in institutions was focused on ensuring the ability of IT to extend its traditional role as gatekeeper to the realm of cloud services, the focus has now shifted upstream to enabling ease of use and smart adoption of cloud services. This is evidenced clearly in examples like the US government’s renaming of its digital strategy from “Cloud First” to “Cloud Smart” and has been mirrored in other regions and institutions.

      Info-Tech Insights

      To avoid failure, you need to provide security and compliance.

      Basic user satisfaction means becoming a frictionless intermediary.

      Exceed expectations! Enabling brokers provide knowledge and guidance for the best usage of cloud.

      • Security & Compliance
      • Frictionless Intermediation
      • Cloud-Enabling Brokerage

      Define the role of a cloud broker

      Where do brokers fit in the cloud model?

      • NIST Definition: An entity that manages the use, performance, and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.
      • Similar to a telecom master agent, a cloud broker acts as the middle-person and end-user point of contact, consolidating the management of underlying providers.
      • A government or institutional cloud broker (GCB) is responsible for the delivery of all cloud services consumed by the departments or agencies it supports or that are mandated to use it.

      Balancing governance and agility

      Info-Tech Insight

      While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

      Model brokerage drivers and benefits

      Reduced costs: Security through standardization: Frictionless consumption: Avoid disinter-mediation; Maintain compliance; Leverage economies of scale; Ensure architecture discipline

      Maintain compliance and ensure architecture discipline: Brokerages can be an effective gating point for ensuring properly governed and managed IT consumption that meets the specific regulations and compliances required for an institution. It can also be a strong catalyst and enabler for moving to even more effective cloud consumption through automation.

      Avoid disintermediation: Especially in institutions, cloud brokers are a key tool in the fight against disintermediation – that is, end users circumventing your IT department’s procurement and governance by consuming an ad hoc cloud service.

      Leverage economies of scale: Simply put, consolidation of your cloud consumption drives effectiveness by making the most of your buying power.

      Info-Tech Insights

      Understanding the importance of each benefit type to your brokerage audience will help you define the type of brokerage you need to build and what skills and partners will be required to deliver the right value.

      The brokerage landscape

      The past ten years have seen governments and institutions evolve from basic acceptance of cloud services to the usage of cloud as the core of most IT initiatives.

      • As part of this evolution, many organizations now have well-defined standards and guidance for the implementation, procurement, and regulation of cloud services for their use.
      • Both Canada (Strategic Plan for Information Management and Information Technology) and the United States (Cloud Smart – formerly known as Cloud First) have recently updated their guidance on adoption of cloud services. The Australian Government has also recently updated its Cloud Computing Policy.
      • AWS and Azure both now claim Full FedRAMP (Federal Risk and Authorization Management Program) certification.
      • This has not only enabled easy adoption of these core hyperscale cloud service by government but also driven the proliferation of a large ecosystem of FedRAMP-authorized cloud service providers.
      • This trend started with government at the federal level but has cascaded downstream to provincial and municipal governments globally, and the same model seems likely to be adopted by other governments and other institution types over time.

      Info-Tech Insight

      The ecosystem of platforms and tools has grown significantly and examples of best practices, especially in government, are readily available. Once you’ve defined your brokerage’s value stance, the building blocks you need to deliver often don’t need to be built from scratch.

      Address the unique challenges of business-led IT in institutions

      With the business taking more accountability and management of their own technology, brokers must learn how to evolve from being gatekeepers to enablers.

      This image This lists the Cons of IT acting as a gatekeeper providing oversight, and the Pros of IT acting as an Enabler in an IT Partnership.  the Cons are: Restrict System Access; Deliver & Monitor Applications; Own Organizational Risk; Train the Business.  The Pros are: Manage Role-Based Access; Deliver & Monitor Platforms; Share Organizational Risk; Coach & Mentor the Business

      Turn brokerage pitfalls into opportunities

      The greatest risks in using a cloud broker come from its nature as a single point of distribution for service and support. Without resources (or automation) to enable scale, as well as responsive processes for supporting users in finding the right services and making those services available through the brokerage, you will lose alignment with your users’ needs, which inevitably leads to disintermediation, loss of IT control, and broken compliance

      Info-Tech Insights

      Standardization and automation are your friend when building a cloud brokerage! Sometimes this means having a flexible catalog of options and configurations, but great brokerages can deliver value by helping their users redefine and evolve their workloads to work more effectively in the cloud. This means providing guidance and facilitating the landing/transformation of users’ workloads in the cloud, the right way.

      Challenges Impact
      • Single point of failure
      • Managing capacity
      • Alignment of brokerage with underlying agencies
      • Additional layer of complexity
      • Inability to deliver service
      • Disintermediation
      • Broken security/compliance
      • Loss of cost control/purchasing power

      Validate your cloud brokerage strategy using Info-Tech’s approach

      Value Definition

      • Define your brokerage type and value addition

      Capabilities Mapping

      • Understand the partners and capabilities you need to be able to deliver

      Measuring Value

      • Define KPIs for both compliant delivery and frictionless intermediation

      Provide Cloud Excellence

      • Move from intermediation to enablement and help users land on the cloud the right way

      Define the categories for your brokerage’s benefit and value

      Depending on the type of brokerage, the value delivered may be as simple as billing consolidation, but many brokerages go much deeper in their value proposition.

      This image depicts a funnel, where the following inputs make up the Broker Value: Integration, Interface and Management Enhancement; User Identity and Risk Management/ Security & Compliance; Cost & Workload Efficiency, Service Aggregation

      Define the categories of brokerage value to add

      • Purchasing Agents save the purchaser time by researching services from different vendors and providing the customer with information about how to use cloud computing to support business goals.
      • Contract Managers may also be assigned power to negotiate contracts with cloud providers on behalf of the customer. In this scenario, the broker may distribute services across multiple vendors to achieve cost-effectiveness, while managing the technical and procurement complexity of dealing with multiple vendors.
        • The broker may provide users with an application program interface (API) and user interface (UI) that hides any complexity and allows the customer to work with their cloud services as if they were being purchased from a single vendor. This type of broker is sometimes referred to as a cloud aggregator.
      • Cloud Enablers can also provide the customer with additional services, such as managing the deduplication, encryption, and cloud data transfer and assisting with data lifecycle management and other activities.
      • Cloud Customizers integrate various underlying cloud services for customers to provide a custom offering under a white label or its own brand.
      • Cloud Agents are essentially the software version of a Contract Manager and act by automating and facilitating the distribution of work between different cloud service providers.

      Info-Tech Insights

      Remember that these categories are general guidelines! Depending on the requirements and value a brokerage needs to deliver, it may fit more than one category of broker type.

      Brokerage types and value addition

      Info-Tech Insights

      Each value addition your brokerage invests in delivering should tie to reinforcing efficiency, compliance, frictionlessness, or enablement.

      Value Addition Purchasing Agent Contract Manager Cloud Enabler Cloud Customizer Cloud Agent
      Underlying service selection

      Standard Activity

      Standard Activity Standard Activity Standard Activity Common Activity
      Support and info Standard Activity

      Common Activity

      Standard Activity Standard Activity Common Activity
      Contract lifecycle (pricing/negotiation) Standard Activity Common Activity Standard Activity
      Workload distribution (to underlying services) (aggregation) Common Activity Standard Activity Standard Activity Standard Activity
      Value-add or layered on services Standard Activity Common Activity
      Customization/integration of underlying services Standard Activity
      Automated workload distribution (i.e. software) Standard Activity

      Start by delivering value in these common brokerage service categories

      Security & Compliance

      • Reporting & Auditing
      • SIEM & SOC Services
      • Patching & Monitoring

      Cost Management

      • Right-Sizing
      • Billing Analysis
      • Anomaly Detection & Change Recommendations

      Data Management

      • Data Tiering
      • Localization Management
      • Data Warehouse/Lake Services

      Resilience & Reliability

      • Backup & Archive
      • Replication & Sync
      • DR & HA Management
      • Ransomware Prevention/Mitigation

      Cloud-Native & DevOps Enablement

      • Infrastructure as Code (IaC)
      • DevOps Tools & Processes
      • SDLC Automation Tools

      Design, Transformation, and Integration

      • CDN Integration
      • AI Tools Integration
      • SaaS Customizations

      Activity: Brokerage value design

      Who are you and who are you building this for?

      • Internal brokerage (i.e. you are a department in an organization that is tasked with providing IT resources to other internal groups)
        • No profit motivation
        • Primary goal is to maintain compliance and avoid disintermediation
      • Third-party brokerage (i.e. you are an MSP that needs to build a brokerage to provide a variety of downstream services and act as the single point of consumption for an organization)
        • Focus on value-addition to the downstream services you facilitate for your client
        • Increased requirement to quickly add new partners/services from downstream as required by your client

      What requirements and pains do you need to address?

      • Remember that in the world of cloud, users ultimately can go around IT to find the resources and tools they want to use. In short, if you don’t provide ease and value, they will get it somewhere else.
      • Assess the different types of cloud brokerages out there as a guide to what sort of value you want to deliver.

      Why are you creating a brokerage? There are several categories of driver and more than one may apply.

      • Compliance and security gating/validation
      • Cost consolidation and governance
      • Value-add or feature enhancement of raw/downstream services being consumed

      It’s important to clearly understand how best you can deliver unique value to ensure that they want to consume from you.

      This is an image of a Venn diagram between the following: Who are you trying to serve?; Why and how are you uniquely positioned to deliver?; What requirements do they have and what pain points can you help solve?.  Where all three circles overlap is the Brokerage Value Proposition.

      Understand the ecosystem you’ll require to deliver value

      GCB

      • Enabling Effectiveness
      • Cost Governance
      • Adoption and User Satisfaction
      • Security & Compliance

      Whatever value proposition and associated services your brokerage has defined, either internal resources or additional partners will be required to run the platform and processes you want to offer on top of the defined base cloud platforms.

      Info-Tech Insights

      Remember to always align your value adds and activities to the four key themes:

      • Efficiency
      • Compliance
      • Frictionlessness
      • Cloud Enablement

      Delivering value may require an ecosystem

      The additional value your broker delivers will depend on the tools and services you can layer on top of the base cloud platform(s) you support.

      In many cases, you may require different partners to fulfil similar functions across different base platforms. Although this increases complexity for the brokerage, it’s also a place where additional value can be delivered to end users by your role as a frictionless intermediary.

      Base Partner/Platform

      • Third-party software & platforms
      • Third-party automations & integrations
      • Third-party service partners
      • Internal value-add functions

      Build the ecosystem you need for your value proposition

      Leverage partners and automation to bake compliance in.

      Different value-add types (based on the category/categories of broker you’re targeting) require different additional platforms and partners to augment the base cloud service you’re brokering.

      Security & Config

      • IaC Tools
      • Cloud Resource Configuration Validation
      • Templating Tools
      • Security Platforms
      • SDN and Networking Platforms
      • Resilience (Backup/Replication/DR/HA) Platforms
      • Data & Storage Management
      • Compliance and Validation Platforms & Partners

      Cost Management

      • Subscription Hierarchy Management
      • Showback and Chargeback Logic
      • Cost Dashboarding and Thresholding
      • Governance and Intervention

      Adoption & User Satisfaction

      • Service Delivery SLAs
      • Support Process & Tools
      • Capacity/Availability Management
      • Portal Usability/UX

      Speed of Evolution

      • Partner and Catalog/Service Additions
      • Broker Catalog Roadmapping
      • User Request Capture (new services)
      • User Request Capture (exceptions)

      Build your features and services lists

      Incorporate your end user, business, and IT perspectives in defining the list of mandatory and desired features of your target solution.

      See our Implement a Proactive and Consistent Vendor Selection Process blueprint for information on procurement practices, including RFP templates.

      End User

      • Visual, drag-and-drop models to define data models, business logic, and user interfaces
      • One-click deployment
      • Self-healing application
      • Vendor-managed infrastructure
      • Active community and marketplace
      • Prebuilt templates and libraries
      • Optical character recognition and natural language processing

      Business

      • Audit and change logs
      • Theme and template builder
      • Template management
      • Knowledgebase and document management
      • Role-based access
      • Business value, operational costs, and other KPI monitoring
      • Regulatory compliance
      • Consistent design and user experience across applications
      • Business workflow automation

      IT

      • Application and system performance monitoring
      • Versioning and code management
      • Automatic application and system refactoring and recovery
      • Exception and error handling
      • Scalability (e.g. load balancing) and infrastructure management
      • Real-time debugging
      • Testing capabilities
      • Security management
      • Application integration management

      Understand the stakeholders

      Hyperscale Platform/Base Platform: Security; Compliance and Validation;Portal/Front-End; Cost Governance; Broker Value Add(s)

      Depending on the value-add(s) you are trying to deliver, as well as the requirements from your institution(s), you will have a different delineation of responsibilities for each of the value-add dimensions. Typically, there will be at least three stakeholders whose role needs to be considered for each dimension:

      • Base Cloud Provider
      • Third-Party Platforms/Service Providers
      • Internal Resources

      Info-Tech Insights

      It’s important to remember that the ecosystem of third-party options available to you in each case will likely be dependent on if a given partner operates or supports your chosen base provider.

      Define the value added by each stakeholder in your value chain

      Value Addition Cost Governance Security & Compliance Adoption and User Satisfaction New Service Addition Speed End-User Cloud Effectiveness
      Base platform(s)
      Third party
      Internal

      A basic table of the stakeholders and platforms involved in your value stream is a critical tool for aligning activities and partners with brokerage value.

      Remember to tie each value-add category you’re embarking on to at least one of the key themes!

      Cost Governance → Efficiency

      Security & Compliance → Compliance

      Adoption & User Satisfaction → Frictionlessness

      New Service Addition Responsiveness → Frictionlessness, Enablement

      End-User Cloud Effectiveness → Enablement

      Info-Tech Insights

      The expectations for how applications are consumed and what a user experience should look like is increasingly being guided by the business and by the disintermediating power of the cloud-app ecosystem.

      “Enabling brokers” help embrace business-led IT

      In environments where compliance and security are a must, the challenges of handing off application management to the business are even more complex. Great brokers learn to act not just as a gatekeeper but an enabler of business-led IT.

      Business Empowerment

      Organizations are looking to enhance their Agile and BizDevOps practices by shifting traditional IT practices left and toward the business.

      Changing Business Needs

      Organizational priorities are constantly changing. Cost reduction opportunities and competitive advantages are lost because of delayed delivery of features.

      Low Barrier to Entry

      Low- and no-code development tools, full-stack solutions, and plug-and-play architectures allow non-technical users to easily build and implement applications without significant internal technical support or expertise.

      Democratization of IT

      A wide range of digital applications, services, and information are readily available and continuously updated through vendor and public marketplaces and open-source communities.

      Technology-Savvy Business

      The business is motivated to learn more about the technology they use so that they can better integrate it into their processes.

      Balance usability and compliance: accelerate cloud effectiveness

      Move to being an accelerator and an enabler! Rather than creating an additional layer of complexity, we can use the abstraction of a cloud brokerage to bring a wide variety of value-adds and partners into the ecosystem without increasing complexity for end users.

      Manage the user experience

      • Your portal is a great source of data for optimizing user adoption and satisfaction.
      • Understand the KPIs that matter to your clients or client groups from both a technical and a service perspective.

      Be proactive and responsive in meeting changing needs

      • Determine dashboard consumption by partner view.
      • Regularly review and address the gaps in your catalog.
      • Provide an easy mechanism for adding user-demanded services.

      Think like a service provider

      • You do need to be able to communicate and even market internally new services and capabilities as you add them or people won't know to come to you to use them.
      • It's also critical in helping people move along the path to enablement and knowing what might be possible that they hadn't considered.

      Provide cloud excellence functions

      Enablement Broker

      • Mentorship & Training
        • Build the skills, knowledge, and experiences of application owners and managers with internal and external expertise.
      • Organizational Change Leadership
        • Facilitate cultural, governance, and other organizational changes through strong relationships with business and IT leadership.
      • Good Delivery Practices & Thinking
        • Develop, share, and maintain a toolkit of good software development lifecycle (SDLC) practices and techniques.
      • Knowledge Sharing
        • Centralize a knowledgebase of up-to-date and accurate documentation and develop community forums to facilitate knowledge transfer.
      • Technology Governance & Leadership
        • Implement the organizational standards, policies, and rules for all applications and platforms and coordinate growth and sprawl.
      • Shared Services & Integrations
        • Provide critical services and integrations to support end users with internal resources or approved third-party providers and partners.

      Gauge value with the right metrics

      Focus your effort on measuring key metrics.

      Category

      Purpose

      Examples

      Business Value – The amount of value and benefits delivered. Justify the investment and impact of the brokerage and its optimization to business operations. ROI, user productivity, end-user satisfaction, business operational costs, error rate
      Application Quality – Satisfaction of application quality standards. Evaluate organizational effort to address and maximize user satisfaction and adoption rates. Adoption rate, usage friction metrics, user satisfaction metrics
      Delivery Effectiveness – The delivery efficiency of changes. Enable members to increase their speed to effective deployment, operation, and innovation on cloud platforms. Speed of deployment, landing/migration success metrics

      Determine measures that demonstrate the value of your brokerage by aligning it with your quality definition, value drivers, and users’ goals and objectives. Recognize that your journey will require constant monitoring and refinement to adjust to situations that may arise as you adopt new products, standards, strategies, tactics, processes, and tools.

      Activity Output

      Ultimately, the goal is designing a brokerage that can evolve from gatekeeping to frictionless intermediation to cloud enablement.

      Maintain focus on the value proposition, your brokerage ecosystem, and the metrics that represent enablement for your users and avoid pitfalls and challenges from the beginning.

      Activity: Define your brokerage type and value addition; Understand the partners and capabilities you need to be able to deliver; Define KPIs for both delivery (compliance) and adoption (frictionlessness); Output: GCB Strategy Plan; Addresses: Why and when you should build a GCB; How to avoid pitfalls; How to maximize benefits; How to maximize responsiveness and user satisfaction; How to roadmap and add services with agility.

      Appendix

      Related blueprints and tools

      Document Your Cloud Strategy

      This blueprint covers aligning your value proposition with general cloud requirements.

      Define Your Digital Business Strategy

      Phase 1 of this research covers identifying value chains to be transformed.

      Embrace Business-Managed Applications

      Phase 1 of this research covers understanding the business-managed applications as a factor in developing a frictionless intermediary model.

      Implement a Proactive and Consistent Vendor Selection Process

      This blueprint provides information on partner selection and procurement practices, including RFP templates.

      Bibliography

      “3 Types of Cloud Brokers That Can Save the Cloud.” Cloud Computing Topics, n.d. Web.

      Australian Government Cloud Computing Policy. Government of Australia, October 2014. Web.

      “Cloud Smart Policy Overview.” CIO.gov, n.d. Web.

      “From Cloud First to Cloud Smart.” CIO.gov, n.d. Web.

      Gardner, Dana. “Cloud brokering: Building a cloud of clouds.” ZDNet, 22 April 2011. Web.

      Narcisi, Gina. “Cloud, Next-Gen Services Help Master Agents Grow Quickly And Beat 'The Squeeze' “As Connectivity Commissions Decline.” CRN, 14 June 2017. Web.

      Smith, Spencer. “Asigra calls out the perils of cloud brokerage model.” TechTarget, 28 June 2019. Web.

      Tan, Aaron. “Australia issues new cloud computing guidelines.” TechTarget, 27 July 2020. Web.

      The European Commission Cloud Strategy. ec.europa.eu, 16 May 2019. Web.

      “TrustRadius Review: Cloud Brokers 2022.” TrustRadius, 2022. Web.

      Yedlin, Debbie. “Pros and Cons of Using a Cloud Broker.” Technology & Business Integrators, 17 April 2015. Web.

      Create a Right-Sized Disaster Recovery Plan

      • Buy Link or Shortcode: {j2store}410|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $83,037 Average $ Saved
      • member rating average days saved: 32 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a disaster recovery plan (DRP).
      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Our Advice

      Critical Insight

      • At its core, disaster recovery (DR) is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      • Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      • Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      Impact and Result

      • Define appropriate objectives for service downtime and data loss based on business impact.
      • Document an incident response plan that captures all of the steps from event detection to data center recovery.
      • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Create a Right-Sized Disaster Recovery Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Disaster Recovery Plan (DRP) Research – A step-by-step document that helps streamline your DR planning process and build a plan that's concise, usable, and maintainable.

      Any time a major IT outage occurs, it increases executive awareness and internal pressure to create an IT DRP. This blueprint will help you develop an actionable DRP by following our four-phase methodology to define scope, current status, and dependencies; conduct a business impact analysis; identify and address gaps in the recovery workflow; and complete, extend, and maintain your DRP.

      • Create a Right-Sized Disaster Recovery Plan – Phases 1-4

      2. DRP Case Studies – Examples to help you understand the governance and incident response components of a DRP and to show that your DRP project does not need to be as onerous as imagined.

      These examples include a client who leveraged the DRP blueprint to create practical, concise, and easy-to-maintain DRP governance and incident response plans and a case study based on a hospital providing a wide range of healthcare services.

      • Case Study: Practical, Right-Sized DRP
      • Case Study: Practical, Right-Sized DRP – Healthcare Example

      3. DRP Maturity Scorecard – An assessment tool to evaluate the current state of your DRP.

      Use this tool to measure your current DRP maturity and identify gaps to address. It includes a comprehensive list of requirements for your DRP program, including core and industry requirements.

      • DRP Maturity Scorecard

      4. DRP Project Charter Template – A template to communicate important details on the project purpose, scope, and parameters.

      The project charter template includes details on the project overview (description, background, drivers, and objectives); governance and management (project stakeholders/roles, budget, and dependencies); and risks, assumptions, and constraints (known and potential risks and mitigation strategy).

      • DRP Project Charter Template

      5. DRP Business Impact Analysis Tool – An evaluation tool to estimate the impact of downtime to determine appropriate, acceptable recovery time objectives (RTOs) and recovery point objectives (RPOs) and to review gaps between objectives and actuals.

      This tool enables you to identify critical applications/systems; identify dependencies; define objective scoring criteria to evaluate the impact of application/system downtime; determine the impact of downtime and establish criticality tiers; set recovery objectives (RTO/RPO) based on the impact of downtime; record recovery actuals (RTA/RPA) and identify any gaps between objectives and actuals; and identify dependencies that regularly fail (and have a significant impact when they fail) to prioritize efforts to improve resiliency.

      • DRP Business Impact Analysis Tool
      • Legacy DRP Business Impact Analysis Tool

      6. DRP BIA Scoring Context Example – A tool to record assumptions you made in the DRP Business Impact Analysis Tool to explain the results and drive business engagement and feedback.

      Use this tool to specifically record assumptions made about who and what are impacted by system downtime and record assumptions made about impact severity.

      • DRP BIA Scoring Context Example

      7. DRP Recovery Workflow Template – A flowchart template to provide an at-a-glance view of the recovery workflow.

      This simple format is ideal during crisis situations, easier to maintain, and often quicker to create. Use this template to document the Notify - Assess - Declare disaster workflow, document current and planned future state recovery workflows, including gaps and risks, and review an example recovery workflow.

      • DRP Recovery Workflow Template (PDF)
      • DRP Recovery Workflow Template (Visio)

      8. DRP Roadmap Tool – A visual roadmapping tool that will help you plan, communicate, and track progress for your DRP initiatives.

      Improving DR capabilities is a marathon, not a sprint. You likely can't fund and resource all the measures for risk mitigation at once. Instead, use this tool to create a roadmap for actions, tasks, projects, and initiatives to complete in the short, medium, and long term. Prioritize high-benefit, low-cost mitigations.

      • DRP Roadmap Tool

      9. DRP Recap and Results Template – A template to summarize and present key findings from your DR planning exercises and documents.

      Use this template to present your results from the DRP Maturity Scorecard, BCP-DRP Fitness Assessment, DRP Business Impact Analysis Tool, tabletop planning exercises, DRP Recovery Workflow Template, and DRP Roadmap Tool.

      • DRP Recap and Results Template

      10. DRP Workbook – A comprehensive tool that enables you to organize information to support DR planning.

      Leverage this tool to document information regarding DRP resources (list the documents/information sources that support DR planning and where they are located) and DR teams and contacts (list the DR teams, SMEs critical to DR, and key contacts, including business continuity management team leads that would be involved in declaring a disaster and coordinating response at an organizational level).

      • DRP Workbook

      11. Appendix

      The following tools and templates are also included as part of this blueprint to use as needed to supplement the core steps above:

      • DRP Incident Response Management Tool
      • DRP Vendor Evaluation Questionnaire
      • DRP Vendor Evaluation Tool
      • Severity Definitions and Escalation Rules Template
      • BCP-DRP Fitness Assessment
      [infographic]

      Workshop: Create a Right-Sized Disaster Recovery Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Parameters for Your DRP

      The Purpose

      Identify key applications and dependencies based on business needs.

      Key Benefits Achieved

      Understand the entire IT “footprint” that needs to be recovered for key applications. 

      Activities

      1.1 Assess current DR maturity.

      1.2 Determine critical business operations.

      1.3 Identify key applications and dependencies.

      Outputs

      Current challenges identified through a DRP Maturity Scorecard.

      Key applications and dependencies documented in the Business Impact Analysis (BIA) Tool.

      2 Determine the Desired Recovery Timeline

      The Purpose

      Quantify application criticality based on business impact.

      Key Benefits Achieved

      Appropriate recovery time and recovery point objectives defined (RTOs/RPOs).

      Activities

      2.1 Define an objective scoring scale to indicate different levels of impact.

      2.2 Estimate the impact of downtime.

      2.3 Determine desired RTO/RPO targets for applications based on business impact.

      Outputs

      Business impact analysis scoring criteria defined.

      Application criticality validated.

      RTOs/RPOs defined for applications and dependencies.

      3 Determine the Current Recovery Timeline and DR Gaps

      The Purpose

      Determine your baseline DR capabilities (your current state).

      Key Benefits Achieved

      Gaps between current and desired DR capability are quantified.

      Activities

      3.1 Conduct a tabletop exercise to determine current recovery procedures.

      3.2 Identify gaps between current and desired capabilities.

      3.3 Estimate likelihood and impact of failure of individual dependencies.

      Outputs

      Current achievable recovery timeline defined (i.e. the current state).

      RTO/RPO gaps identified.

      Critical single points of failure identified.

      4 Create a Project Roadmap to Close DR Gaps

      The Purpose

      Identify and prioritize projects to close DR gaps.

      Key Benefits Achieved

      DRP project roadmap defined that will reduce downtime and data loss to acceptable levels.

      Activities

      4.1 Determine what projects are required to close the gap between current and desired DR capability.

      4.2 Prioritize projects based on cost, effort, and impact on RTO/RPO reduction.

      4.3 Validate that the suggested projects will achieve the desired DR capability.

      Outputs

      Potential DR projects identified.

      DRP project roadmap defined.

      Desired-state incident response plan defined, and project roadmap validated.

      5 Establish a Framework for Documenting Your DRP, and Summarize Next Steps

      The Purpose

      Outline how to create concise, usable DRP documentation.

      Summarize workshop results. 

      Key Benefits Achieved

      A realistic and practical approach to documenting your DRP.

      Next steps documented. 

      Activities

      5.1 Outline a strategy for using flowcharts and checklists to create concise, usable documentation.

      5.2 Review Info-Tech’s DRP templates for creating system recovery procedures and a DRP summary document.

      5.3 Summarize the workshop results, including current potential downtime and action items to close gaps.

      Outputs

      Current-state and desired-state incident response plan flowcharts.

      Templates to create more detailed documentation where necessary.

      Executive communication deck that outlines current DR gaps, how to close those gaps, and recommended next steps.

      Further reading

      Create a Right-Sized Disaster Recovery Plan

      Close the gap between your DR capabilities and service continuity requirements.

      ANALYST PERSPECTIVE

      An effective disaster recovery plan (DRP) is not just an insurance policy.

      "An effective DRP addresses common outages such as hardware and software failures, as well as regional events, to provide day-to-day service continuity. It’s not just insurance you might never cash in. Customers are also demanding evidence of an effective DRP, so organizations without a DRP risk business impact not only from extended outages but also from lost sales. If you are fortunate enough to have executive buy-in, whether it’s due to customer pressure or concern over potential downtime, you still have the challenge of limited time to dedicate to disaster recovery (DR) planning. Organizations need a practical but structured approach that enables IT leaders to create a DRP without it becoming their full-time job."

      Frank Trovato,

      Research Director, Infrastructure

      Info-Tech Research Group

      Is this research for you?

      This Research Is Designed For:

      • Senior IT management responsible for executing DR.
      • Organizations seeking to formalize, optimize, or validate an existing DRP.
      • Business continuity management (BCM) professionals leading DRP development.

      This Research Will Help You:

      • Create a DRP that is aligned with business requirements.
      • Prioritize technology enhancements based on DR requirements and risk-impact analysis.
      • Identify and address process and technology gaps that impact DR capabilities and day-to-day service continuity.

      This Research Will Also Assist:

      • Executives who want to understand the time and resource commitment required for DRP.
      • Members of BCM and crisis management teams who need to understand the key elements of an IT DRP.

      This Research Will Help Them:

      • Scope the time and effort required to develop a DRP.
      • Align business continuity, DR, and crisis management plans.

      Executive summary

      Situation

      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a DRP.
      • Industry standards and government regulations are driving external pressure to develop business continuity and IT DR plans.
      • Customers are asking suppliers and partners to provide evidence that they have a workable DRP before agreeing to do business.

      Complication

      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors, but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Resolution

      • Create an effective DRP by following a structured process to discover current capabilities and define business requirements for continuity:
        • Define appropriate objectives for service downtime and data loss based on business impact.
        • Document an incident response plan that captures all of the steps from event detection to data center recovery.
        • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Info-Tech Insight

      1. At its core, DR is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      2. Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      3. Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      An effective DRP is critical to reducing the cost of downtime

      If you don’t have an effective DRP when failure occurs, expect to face extended downtime and exponentially rising costs due to confusion and lack of documented processes.

      Image displayed is a graph that shows that delay in recovery causes exponential revenue loss.

      Potential Lost Revenue

      The impact of downtime tends to increase exponentially as systems remain unavailable (graph at left). A current, tested DRP will significantly improve your ability to execute systems recovery, minimizing downtime and business impact. Without a DRP, IT is gambling on its ability to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks or months – and substantial business impact.

      Adapted from: Philip Jan Rothstein, 2007

      Cost of Downtime for the Fortune 1000

      Cost of unplanned apps downtime per year: $1.25B to $2.5B.

      Cost of critical apps failure per hour: $500,000 to $1M.

      Cost of infrastructure failure per hour: $100,000.

      35% reported to have recovered within 12 hours.

      17% of infrastructure failures took more than 24 hours to recover.

      13% of application failures took more than 24 hours to recover.

      Source: Stephen Elliot, 2015

      Info-Tech Insight

      The cost of downtime is rising across the board, and not just for organizations that traditionally depend on IT (e.g. e-commerce). Downtime cost increase since 2010:

      Hospitality: 129% increase

      Transportation: 108% increase

      Media organizations: 104% increase

      An effective DRP also sets clear recovery objectives that align with system criticality to optimize spend

      The image displays a disaster recovery plan example, where different tiers are in place to support recovery in relation to time.

      Take a practical approach that creates a more concise and actionable DRP

      DR planning is not your full-time job, so it can’t be a resource- and time-intensive process.

      The Traditional Approach Info-Tech’s Approach

      Start with extensive risk and probability analysis.

      Challenge: You can’t predict every event that can occur, and this delays work on your actual recovery procedures.

      Focus on how to recover regardless of the incident.

      We know failure will happen. Focus on improving your ability to failover to a DR environment so you are protected regardless of what causes primary site failure.

      Build a plan for major events such as natural disasters.

      Challenge: Major destructive events only account for 12% of incidents while software/hardware issues account for 45%. The vast majority of incidents are isolated local events.

      An effective DRP improves day-to-day service continuity, and is not just for major events.

      Leverage DR planning to address both common (e.g. power/network outage or hardware failure) as well as major events. It must be documentation you can use, not shelfware.

      Create a DRP manual that provides step-by-step instructions that anyone could follow.

      Challenge: The result is lengthy, dense manuals that are difficult to maintain and hard to use in a crisis. The usability of DR documents has a direct impact on DR success.

      Create concise documentation written for technical experts.

      Use flowcharts, checklists, and diagrams. They are more usable in a crisis and easier to maintain. You aren’t going to ask a business user to recover your SQL Server databases, so you can afford to be concise.

      DR must be integrated with day-to-day incident management to ensure service continuity

      When a tornado takes out your data center, it’s an obvious DR scenario and the escalation towards declaring a disaster is straightforward.

      The challenge is to be just as decisive in less-obvious (and more common) DR scenarios such as a critical system hardware/software failure, and knowing when to move from incident management to DR. Don’t get stuck troubleshooting for days when you could have failed over in hours.

      Bridge the gap with clearly-defined escalation rules and criteria for when to treat an incident as a disaster.

      Image displays two graphs. The graph on the left measures the extent that service management processes account for disasters by the success meeting RTO and RPO. The graph on the right is a double bar graph that shows DRP being integrated and not integrated in the following categories: Incident Classifications, Severity Definitions, Incident Models, Escalation Procedures. These are measured based on the success meeting RTO and RPO.

      Source: Info-Tech Research Group; N=92

      Myth busted: The DRP is separate from day-to-day ops and incident management.

      The most common threats to service continuity are hardware and software failures, network outages, and power outages

      The image displayed is a bar graph that shows the common threats to service continuity. There are two areas of interest that have labels. The first is: 45% of service interruptions that went beyond maximum downtime guidelines set by the business were caused by software and hardware issues. The second label is: Only 12% of incidents were caused by major destructive events.

      Source: Info-Tech Research Group; N=87

      Info-Tech Insight

      Does this mean I don’t need to worry about natural disasters? No. It means DR planning needs to focus on overall service continuity, not just major disasters. If you ignore the more common but less dramatic causes of service interruptions, you are diminishing the business value of a DRP.

      Myth busted: DRPs are just for destructive events – fires, floods, and natural disasters.

      DR isn’t about identifying risks; it’s about ensuring service continuity

      The traditional approach to DR starts with an in-depth exercise to identify risks to IT service continuity and the probability that those risks will occur.

      Here’s why starting with a risk register is ineffective:

      • Odds are, you won’t think of every incident that might occur. If you think of twenty risks, it’ll be the twenty-first that gets you. If you try to guard against that twenty-first risk, you can quickly get into cartoonish scenarios and much more costly solutions.
      • The ability to failover to another site mitigates the risk of most (if not all) incidents (fire, flood, hardware failure, tornado, etc.). A risk and probability analysis doesn’t change the need for a plan that includes a failover procedure.

      Where risk is incorporated in this methodology:

      • Use known risks to further refine your strategy (e.g. if you are prone to hurricanes, plan for greater geographic separation between sites; ensure you have backups, in addition to replication, to mitigate the risk of ransomware).
      • Identify risks to your ability to execute DR (e.g. lack of cross-training, backups that are not tested) and take steps to mitigate those risks.

      Myth busted: A risk register is the critical first step to creating an effective DR plan.

      You can’t outsource accountability and you can’t assume your vendor’s DR capabilities meet your needs

      Outsourcing infrastructure services – to a cloud provider, co-location provider, or managed service provider (MSP) – can improve your DR and service continuity capabilities. For example, a large public cloud provider will generally have:

      • Redundant telecoms service providers, network infrastructure, power feeds, and standby power.
      • Round-the-clock infrastructure and security monitoring.
      • Multiple data centers in a given region, and options to replicate data and services across regions.

      Still, failure is inevitable – it’s been demonstrated multiple times1 through high-profile outages. When you surrender direct control of the systems themselves, it’s your responsibility to ensure the vendor can meet your DR requirements, including:

      • A DR site and acceptable recovery times for systems at that site.
      • An acceptable replication/backup schedule.

      Sources: Kyle York, 2016; Shaun Nichols, 2017; Stephen Burke, 2017

      Myth busted: I outsource infrastructure services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Choose flowcharts over process guides, checklists over procedures, and diagrams over descriptions

      IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      In reality, you write a DR plan for knowledgeable technical staff, which allows you to summarize key details your staff already know. Concise, visual documentation is:

      • Quicker to create.
      • Easier to use.
      • Simpler to maintain.

      "Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."

      – Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management

      A graph is displayed. It shows a line graph where the DR success is higher by using flowcharts, checklists, and diagrams.

      Source: Info-Tech Research Group; N=95

      *DR Success is based on stated ability to meet recovery time objectives (RTOs) and recovery point objectives (RPOs), and reported confidence in ability to consistently meet targets.

      Myth busted: A DRP must include every detail so anyone can execute recovery.

      A DRP is part of an overall business continuity plan

      A DRP is the set of procedures and supporting documentation that enables an organization to restore its core IT services (i.e. applications and infrastructure) as part of an overall business continuity plan (BCP), as described below. Use the templates, tools, and activities in this blueprint to create your DRP.

      Overall BCP
      IT DRP BCP for Each Business Unit Crisis Management Plan
      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. This includes:
      • Identifying critical applications and dependencies.
      • Defining an appropriate (desired) recovery timeline based on a business impact analysis (BIA).
      • Creating a step-by-step incident response plan.
      A set of plans to resume business processes for each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. A set of processes to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. This includes emergency response plans, crisis communication plans, and the steps to invoke BC/DR plans when applicable. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a structured approach to develop a crisis management process.

      Note: For DRP, we focus on business-facing IT services (as opposed to the underlying infrastructure), and then identify required infrastructure as dependencies (e.g. servers, databases, network).

      Take a practical but structured approach to creating a concise and effective DRP

      Image displayed shows the structure of this blueprint. It shows the structure of phases 1-4 and the related tools and templates for each phase.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Info-Tech advisory services deliver measurable value

      Info-Tech members save an average of $22,983 and 22 days by working with an Info-Tech analyst on DRP (based on client response data from Info-Tech Research Group’s Measured Value Survey, following analyst advisory on this blueprint).

      Why do members report value from analyst engagement?

      1. Expert advice on your specific situation to overcome obstacles and speed bumps.
      2. Structured project and guidance to stay on track.
      3. Project deliverables review to ensure the process is applied properly.

      Guided implementation overview

      Your trusted advisor is just a call away.

      Define DRP scope (Call 1)

      Scope requirements, objectives, and your specific challenges. Identify applications/ systems to focus on first.

      Define current status and system dependencies (Calls 2-3)

      Assess current DRP maturity. Identify system dependencies.

      Conduct a BIA (Calls 4-6)

      Create an impact scoring scale and conduct a BIA. Identify RTO and RPO for each system.

      Recovery workflow (Calls 7-8)

      Create a recovery workflow based on tabletop planning. Identify gaps in recovery capabilities.

      Projects and action items (Calls 9-10)

      Identify and prioritize improvements. Summarize results and plan next steps.

      Your guided implementations will pair you with an advisor from our analyst team for the duration of your DRP project.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Image displays the workshop overview for this blueprint. It is a workshop that runs for 4 days and covers various activities and produces many deliverables.

      End-user complaints distract from serious IT-based risks to business continuity

      Case Study

      Industry: Manufacturing
      Source: Info-Tech Research Group Client Engagement

      A global manufacturer with annual sales over $1B worked with Info-Tech to improve DR capabilities.

      DRP BIA

      Conversations with the IT team and business units identified the following impact of downtime over 24 hours:

      • Email: Direct Cost: $100k; Goodwill Impact Score: 8.5/16
      • ERP: Direct Cost: $1.35mm; Goodwill Impact Score: 12.5/16

      Tabletop Testing and Recovery Capabilities

      Reviewing the organization’s current systems recovery workflow identified the following capabilities:

      • Email: RTO: minutes, RPO: minutes
      • ERP: RTO: 14 hours, RPO: 24 hours

      Findings

      Because of end-user complaints, IT had invested heavily in email resiliency though email downtime had a relatively minimal impact on the business. After working through the methodology, it was clear that the business needed to provide additional support for critical systems.

      Insights at each step:

      Identify DR Maturity and System Dependencies

      Conduct a BIA

      Outline Incident Response and Recovery Workflow With Tabletop Exercises

      Mitigate Gaps and Risks

      Create a Right-Sized Disaster Recovery Plan

      Phase 1

      Define DRP Scope, Current Status, and Dependencies

      Step 1.1: Set Scope, Kick-Off the DRP Project, and Create a Charter

      This step will walk you through the following activities:

      • Establish a team for DR planning.
      • Retrieve and review existing, relevant documentation.
      • Create a project charter.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team (Key IT SMEs)
      • IT Managers

      Results and Insights

      • Set scope for the first iteration of the DRP methodology.
      • Don’t try to complete your DR and BCPs all at once.
      • Don’t bite off too much at once.

      Kick-off your DRP project

      You’re ready to start your DR project.

      This could be an annual review – but more likely, this is the first time you’ve reviewed the DR plan in years.* Maybe a failed audit might have provided a mandate for DR planning, or a real disaster might have highlighted gaps in DR capabilities. First, set appropriate expectations for what the project is and isn’t, in terms of scope, outputs, and resource commitments. Very few organizations can afford to hire a full-time DR planner, so it’s likely this won’t be your full-time job. Set objectives and timelines accordingly.

      Gather a team

      • Often, DR efforts are led by the infrastructure and operations leader. This person can act as the DRP coordinator or may delegate this role.
      • Key infrastructure subject-matter experts (SMEs) are usually part of the team and involved through the project.

      Find and review existing documentation

      • An existing DRP may have information you can re-purpose rather than re-create.
      • High-level architecture diagrams and network diagrams can help set scope (and will become part of your DR kit).
      • Current business-centric continuity of operations plans (COOPs) or BCPs are important to understand.

      Set specific, realistic objectives

      • Create a project charter (see next slide) to record objectives, timelines, and assumptions.
      *Only 20% of respondents to an Info-Tech Research Group survey (N=165) had a complete DRP; only 38% of respondents with a complete or mostly complete DRP felt it would be effective in a crisis.

      List DRP drivers and challenges

      1(a) Drivers and roadblocks

      Estimated Time: 30 minutes

      Identify the drivers and challenges to completing a functional DRP plan with the core DR team.

      DRP Drivers

      • Past outages (be specific):
        • Hardware and software failures
        • External network and power outages
        • Building damage
        • Natural disaster(s)
      • Audit findings
      • Events in the news
      • Other?

      DRP Challenges

      • Lack of time
      • Insufficient DR budget
      • Lack of executive support
      • No internal DRP expertise
      • Challenges making the case for DRP
      • Other?

      Write down insights from the meeting on flip-chart paper or a whiteboard and use the findings to inform your DRP project (e.g. challenges to address).

      Clarify expectations with a project charter

      1(b) DRP Project Charter Template

      DRP Project Charter Template components:

      Define project parameters, roles, and objectives, and clarify expectations with the executive team. Specific subsections are listed below and described in more detail in the remainder of this phase.

      • Project Overview: Includes objectives, deliverables, and scope. Leverage relevant notes from the “Project Drivers” brainstorming exercise (e.g. past outages and near misses which help make the case).
      • Governance and Management: Includes roles, responsibilities, and resource requirements.
      • Project Risks, Assumptions, and Constraints: Includes risks and mitigation strategies, as well as any assumptions and constraints.
      • Project Sign-Off: Includes IT and executive sign-off (if required).

      Note: Identify the initial team roles and responsibilities first so they can assist in defining the project charter.

      The image is a screenshot of the first page of the DRP Project Charter Template.

      Step 1.2: Assess Current State DRP Maturity

      This step will walk you through the following activities:

      • Complete Info-Tech’s DRP Maturity Scorecard.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs

      Results and Insights

      • Identify the current state of the organization’s DRP and continuity management. Set a baseline for improvement.
      • Discover where improvement is most needed to create an effective plan.

      Only 38% of IT departments believe their DRPs would be effective in a real crisis

      Even organizations with documented DRPs struggle to make them actionable.

      • Even when a DRP does become a priority (e.g. due to regulatory or customer drivers), the challenge is knowing where to start and having a methodical step-by-step process for doing the work. With no guide to plan and resource the project, it becomes work that you complete piecemeal when you aren’t working on other projects, or at night after the kids go to bed.
      • Far too many organizations create a document to satisfy auditors rather than creating a usable plan. People in this group often just want a fill-in-the-blanks template. What they will typically find is a template for the traditional 300-page manual that goes in a binder that sits on a shelf, is difficult to maintain, and is not effective in a crisis.
      Two bar graphs are displayed. The graph on the left shows that only 20% of survey respondents indicate they have a complete DRP. The graph on the right shows that 38% of those who have a mostly completed or full DRP actually feel it would be effective in a crisis.

      Use the DRP Maturity Scorecard to assess the current state of your DRP and identify areas to improve

      1(c) DRP Maturity Scorecard

      Info-Tech’s DRP Maturity Scorecard evaluates completion status and process maturity for a comprehensive yet practical assessment across three aspects of an effective DRP program – Defining Requirements, Implementation, and Maintenance.

      Image has three boxes. One is labelled Completion status, another below it is labelled Process Maturity. There is an addition sign in between them. With an arrow leading from both boxes is another box that is labelled DRP Maturity Assessment

      Completion Status: Reflects the progress made with each component of your DRP Program.

      Process Maturity: Reflects the consistency and quality of the steps executed to achieve your completion status.

      DRP Maturity Assessment: Each component (e.g. BIA) of your DRP Program is evaluated based on completion status and process maturity to provide an accurate holistic assessment. For example, if your BIA completion status is 4 out of 5, but process maturity is a 2, then requirements were not derived from a consistent defined process. The risk is inconsistent application prioritization and misalignment with actual business requirements.

      Step 1.3: Identify Applications, Systems, and Dependencies

      This step will walk you through the following activities:

      • Identify systems, applications, and services, and the business units that use them.
      • Document applications, systems, and their dependencies in the DRP Business Impact Analysis Tool.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Identify core services and the applications that depend on them.
      • Add applications and dependencies to the DRP Business Impact Analysis Tool.

      Select 5-10 services to get started on the DRP methodology

      1(d) High-level prioritization

      Estimated Time: 30 minutes

      Working through the planning process the first time can be challenging. If losing momentum is a concern, limit the BIA to a few critical systems to start.

      Run this exercise if you need a structured exercise to decide where to focus first and identify the business users you should ask for input on the impact of system downtime.

      1. On a whiteboard or flip-chart paper, list business units in a column on the left. List key applications/systems in a row at the top. Draw a grid.
      2. At a high level, review how applications are used by each unit. Take notes to keep track of any assumptions you make.
        • Add a ✓ if members of the unit use the application or system.
        • Add an ✱ if members of the unit are heavy users of the application or system and/or use it for time sensitive tasks.
        • Leave the box blank if the app isn’t used by this unit.
      3. Use the chart to prioritize systems to include in the BIA (e.g. systems marked with an *) but also include a few less-critical systems to illustrate DRP requirements for a range of systems.

      Image is an example of what one could complete from step 1(d). There is a table shown. In the column on the left lists sales, marketing, R&D, and Finance. In the top row, there is listed: dialer, ERP. CRM, Internet, analytics, intranet

      Application Notes
      CRM
      • Supports time-critical sales and billing processes.
      Dialer
      • Used for driving the sales-call queue, integration with CRM.

      Draw a high-level sketch of your environment

      1(e) Sketch your environment

      Estimated Time: 1-2 hours

      A high-level topology or architectural diagram is an effective way to identify dependencies, application ownership, outsourced services, hardware redundancies, and more.

      Note:

      • Network diagrams or high-level architecture diagrams help to identify dependencies and redundancies. Even a rough sketch is a useful reference tool for participants, and will be valuable documentation in the final DR plan.
      • Keep the drawings tidy. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
      • Collaborate with relevant SMEs to identify dependencies. Keep the drawing high-level.
      • Illustrate connections between applications or components with lines. Use color coding to illustrate where applications are hosted (e.g. in-house, at a co-lo, in a cloud or MSP environment).
      Example of a high-level topology or architectural diagram

      Document systems and dependencies

      Collaborate with system SMEs to identify dependencies for each application or system. Document the dependencies in the DRP Business Impact Analysis Tool (see image below)

      • When listing applications, focus on business-facing systems or services that business users will recognize and use terminology they’ll understand.
      • Group infrastructure components that support all other services as a single core infrastructure service to simplify dependency mapping (e.g. core router, virtual hosts, ID management, and DNS).
      • In general, each data center will have its own core infrastructure components. List each data center separately – especially if different services are hosted at each data center.
      • Be specific when documenting dependencies. Use existing asset tracking tables, discovery tools, asset management records, or configuration management tools to identify specific server names.
      • Core infrastructure dependencies, such as the network infrastructure, power supply, and centralized storage, will be a common set of dependencies for most applications, so group these into a separate category called “Core Infrastructure” to minimize repetition in your DR planning.
      • Document production components in the BIA tool. Capture in-production, redundant components performing the same work on a single dependency line. List standby systems in the notes.

      Info-Tech Best Practice

      In general, visual documentation is easier to use in a crisis and easier to maintain over time. Use Info-Tech’s research to help build your own visual SOPs.

      Document systems and dependencies

      1(f) DRP Business Impact Analysis Tool – Record systems and dependencies

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool.

      Stories from the field: Info-Tech clients find value in Phase 1 in the following ways

      An organization uncovers a key dependency that needed to be treated as a Tier 1 system

      Reviewing the entire ecosystem for applications identified key dependencies that were previously considered non-critical. For example, a system used to facilitate secure data transfers was identified as a key dependency for payroll and other critical business processes, and elevated to Tier 1.

      A picture’s worth a thousand words (and 1600 servers)

      Drawing a simple architectural diagram was an invaluable tool to identify key dependencies and critical systems, and to understand how systems and dependencies were interconnected. The drawing was an aha moment for IT and business stakeholders trying to make sense of their 1600-server environment.

      Make the case for DRP

      A member of the S&P 500 used Info-Tech’s DRP Maturity Scorecard to provide a reliable objective assessment and make the case for improvements to the board of directors.

      State government agency initiates a DRP project to complement an existing COOP

      Info-Tech's DRP Project Charter enabled the CIO to clarify their DRP project scope and where it fit into their overall COOP. The project charter example provided much of the standard copy – objectives, scope, project roles, methodology, etc. – required to outline the project.

      Phase 1: Insights and accomplishments

      Image has two screenshots from Info-Tech's Phase 1 tools and templates.

      Created a charter and identified current maturity

      Image has two screenshots. One is from Info-Tech's DRP Business Impact Analysis Tool and the other is from the example in step 1(d).

      Identified systems and dependencies for the BIA

      Summary of Accomplishments:

      • Created a DRP project charter.
      • Completed the DRP Maturity Scorecard and identified current DRP maturity.
      • Prioritized applications/systems for a first pass through DR planning.
      • Identified dependencies for each application and system.

      Up Next: Conduct a BIA to establish recovery requirements

      Create a Right-Sized Disaster Recovery Plan

      Phase 2

      Conduct a BIA to Determine Acceptable RTOs and RPOs

      Step 2.1: Define an Objective Impact Scoring Scale

      This step will walk you through the following activities:

      • Create a scoring scale to measure the business impact of application and system downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Use a scoring scale tied to multiple categories of real business impact to develop a more objective assessment of application and system criticality.

      Align capabilities to appropriate and acceptable RTOs and RPOs with a BIA

      Too many organizations avoid a BIA because they perceive it as onerous or unneeded. A well-managed BIA is straightforward and the benefits are tangible.

      A BIA enables you to identify appropriate spend levels, maintain executive support, and prioritize DR planning for a more successful outcome. Info-Tech has found that a BIA has a measurable impact on the organization’s ability to set appropriate objectives and investment goals.

      Two bar graphs are depicted. The one on the left shows 93% BIA impact on appropriate RTOs. The graph on the right shows that with BIA, there is 86% on BIA impact on appropriate spending.

      Info-Tech Insight

      Business input is important, but don’t let a lack of it delay a draft BIA. Complete a draft based on your knowledge of the business. Create a draft within IT, and use it to get input from business leaders. It’s easier to edit estimates than to start from scratch; even weak estimates are far better than a blank sheet.

      Pick impact categories that are relevant to your business to develop a holistic view of business impact

      Direct Cost Impact Categories

      • Revenue: permanently lost revenue.
        • Example: one third of daily sales are lost due to a website failure.
      • Productivity: lost productivity.
        • Example: finance staff can’t work without the accounting system.
      • Operating costs: additional operating costs.
        • Example: temporary staff are needed to re-key data.
      • Financial penalties: fines/penalties that could be incurred due to downtime.
        • Example: failure to meet contractual service-level agreements (SLAs) for uptime results in financial penalties.

      Goodwill, Compliance, and Health and Safety Categories

      • Stakeholder goodwill: lost customer, staff, or business partner goodwill due to harm, frustration, etc.
        • Example: customers can’t access needed services because the website is down.
        • Example: a payroll system outage delays paychecks for all staff.
        • Example: suppliers are paid late because the purchasing system is down.
      • Compliance, health, and safety:
        • Example: financial system downtime results in a missed tax filing.
        • Example: network downtime disconnects security cameras.

      Info-Tech Insight

      You don’t have to include every impact category in your BIA. Include categories that could affect your business. Defer or exclude other categories. For example, the bulk of revenue for governmental organizations comes from taxes, which won’t be permanently lost if IT systems fail.

      Modify scoring criteria to help you measure the impact of downtime

      The scoring scales define different types of business impact (e.g. costs, lost goodwill) using a common four-point scale and 24-hour timeframe to simplify BIA exercises and documentation.

      Use the suggestions below as a guide as you modify scoring criteria in the DRP Business Impact Analysis Tool:

      • All the direct cost categories (revenue, productivity, operating costs, financial penalties) require the user to define only a maximum value; the tool will populate the rest of the criteria for that category. Use the suggestions below to find the maximum scores for each of the direct cost categories:
        • Revenue: Divide total revenue for the previous year by 365 to estimate daily revenue. Assume this is the most revenue you could lose in a day, and use this number as the top score.
        • Loss of Productivity: Divide fully-loaded labor costs for the organization by 365 to estimate daily productivity costs. Use this as a proxy measure for the work lost if all business stopped for one day.
        • Increased Operating Costs: Isolate this to known additional costs that result from a disruption (e.g. costs for overtime or temporary staff). Estimate the maximum cost for the organization.
        • Financial Penalties: Isolate this to known financial penalties (e.g. due to failure to meet SLAs or compliance requirements). Use the estimated maximum penalty as the highest value on the scale.
      • Impact on Goodwill: Use an estimate of the percentage of all stakeholders impacted to assess goodwill impact.
      • Impact on Compliance; Impact on Health and Safety: The BIA tool contains default scoring criteria that account for the severity of the impact, the likelihood of occurrence, and in the case of compliance, whether a grace period is available. Use this scale as-is, or adapt this scale to suit your needs.

      Modify the default scoring scale in the DRP Business Impact Analysis Tool to reflect your organization

      2(a) DRP Business Impact Analysis Tool – Scoring criteria


      A screenshot of Info-Tech's DRP Business Impact Analysis Tool's scoring criteria

      Step 2.2: Estimate the Impact of Downtime

      This step will walk you through the following activities:

      • Identify the business impact of service/system/application downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team
      • IT Service SMEs
      • Business-Side Technology Owners (optional)

      Results and Insights

      • Apply the scoring scale to develop a more objective assessment of the business impact of downtime.
      • Create criticality tiers based on the business impact of downtime.

      Estimate the impact of downtime for each system and application

      2(b) Estimate the impact of systems downtime

      Estimated Time: 3 hours

      On tab 3 of the DRP Business Impact Analysis Tool indicate the costs of downtime, as described below:

      1. Have a copy of the “Scoring Criteria” tab available to use as a reference (e.g. printed or on a second display). In tab 3 use the drop-down menu to assign a score of 0 to 4 based on levels of impact defined in the “Scoring Criteria” tab.
      2. Work horizontally across all categories for a single system or application. This will familiarize you with your scoring scales for all impact categories, and allow you to modify the scoring scales if needed before you proceed much further.
      3. For example, if a core call center phone system was down:

      • Loss of Revenue would be the portion of sales revenue generated through the call center. This might score a 1 or 2 depending on the percent of sales that are processed by the call center.
      • The Impact on Customers might be a 2 or 3 depending on the extent that some customers might be using the call center to receive support or purchase new products or services.
      • The Legal/Regulatory Compliance and Health or Safety Risk might be a 0, as the call center has no impact in either area.
    • Next, work vertically across all applications or systems within a single impact category. This will allow you to compare scores within the category as you create them to ensure internal consistency.
    • Add impact scores to the DRP Business Impact Analysis Tool

      2(c) DRP Business Impact Analysis Tool

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Record business reasons and assumptions that drive BIA scores

      2(d) DRP BIA Scoring Context Example

      Info-Tech suggests that IT leadership and staff identify the impact of downtime first to create a version that you can then validate with relevant business owners. As you work through the BIA as a team, have a notetaker record assumptions you make to help you explain the results and drive business engagement and feedback.

      Some common assumptions:

      • You can’t schedule a disaster, so Info-Tech suggests you assume the worst possible timing for downtime. Base the impact of downtime on the worst day for a disaster (e.g. year-end close, payroll run).
      • Record assumptions made about who and what are impacted by system downtime.
      • Record assumptions made about impact severity.
      • If you deviate from the scoring scale, or if a particular impact doesn’t fit well into the defined scoring scale, document the exception.

      Screenshot of Info-Tech's DRP BIA Scoring Context Example

      Use Info-Tech’s DRP BIA Scoring Context Example as a note-taking template.

      Info-Tech Insight

      You can’t build a perfect scoring scale. It’s fine to make reasonable assumptions based on your judgment and knowledge of the business. Just write down your assumptions. If you don’t write them down, you’ll forget how you arrived at that conclusion.

      Assign a criticality rating based on total direct and indirect costs of downtime

      2(e) DRP Business Impact Analysis Tool – Assign criticality tiers

      Once you’ve finished estimating the impact of downtime, use the following rough guideline to create an initial sort of applications into Tiers 1, 2, and 3.

      1. In general, sort applications based on the Total Impact on Goodwill, Compliance, and Safety first.
        • An effective tactic for a quick sort: assign a Tier 1 rating where scores are 50% or more of the highest total score, Tier 2 where scores are between 25% and 50%, and Tier 3 where scores are below 25%. Some organizations will also include a Tier 0 for the highest-scoring systems.
        • Then review and validate these scores and assignments.
      2. Next, consider the Total Cost of Downtime.
        • The Total Cost is calculated by the tool based on the Scoring Criteria in tab 2 and the impact scores on tab 3.
        • Decide if the total cost impact justifies increasing the criticality rating (e.g. from Tier 2 to Tier 1 due to high cost impact).
      3. Review the assigned impact scores and tiers to check that they’re in alignment. If you need to make an exception, document why. Keep exceptions to a minimum.

      Example: Highest total score is 12

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Step 2.3: Determine Acceptable RTO/RPO Targets

      This step will walk you through the following activities:

      • Review the “Debate Space” approach to setting RTO and RPO (recovery targets).
      • Set preliminary RTOs and RPOs by criticality tier.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Align recovery targets with the business impact of downtime and data loss.

      Use the “Debate Space” approach to align RTOs and RPOs with the impact of downtime

      The business must validate acceptable and appropriate RTOs and RPOs, but IT can use the guidelines below to set an initial estimate.

      Right-size recovery.

      A shorter RTO typically requires higher investment. If a short period of downtime has minimal impact, setting a low RTO may not be justifiable. As downtime continues, impact begins to increase exponentially to a point where downtime is intolerable – an acceptable RTO must be shorter than this. Apply the same thinking to RPOs – how much data loss is unnoticeable? How much is intolerable?

      A diagram to show the debate space in relation to RTOs and RPOs

      The “Debate Space” is between minimal impact and maximum tolerance for downtime.

      Estimate appropriate, acceptable RTOs and RPOs for each tier

      2(f) Set recovery targets

      Estimated Time: 30 minutes

      RTO and RPO tiers simplify management by setting similar recovery goals for systems and applications with similar criticality.

      Use the “Debate Space” approach to set appropriate and acceptable targets.

      1. For RTO, establish a recovery time range that is appropriate based on impact.
        • Overall, the RTO tiers might be 0-4 hours for gold, 4-24 hours for silver, and 24-48 hours for bronze.
      2. RPOs reflect target data protection measures.
        • Identify the lowest RPO within a tier and make that the standard.
        • For example, RPO for gold data might be five minutes, silver might be four hours, and bronze might be one day.
        • Use this as a guideline. RPO doesn’t always align perfectly with RTO tiers.
      3. Review RTOs and RPOs and make sure they accurately reflect criticality.

      Info-Tech Insight

      In general, the more critical the system, the shorter the RPO. But that’s not always the case. For example, a service bus might be Tier 1, but if it doesn’t store any data, RPO might be longer than other Tier 1 systems. Some systems may have a different RPO than most other systems in that tier. As long as the targets are acceptable to the business and appropriate given the impact, that’s okay.

      Add recovery targets to the DRP Business Impact Analysis Tool

      2(g) DRP Business Impact Analysis Tool – Document recovery objectives

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Document recovery objectives

      Stories from the field: Info-Tech clients find value in Phase 2 in the following ways

      Most organizations discover something new about key applications, or the way stakeholders use them, when they work through the BIA and review the results with stakeholders. For example:

      Why complete a BIA? There could be a million reasons

      • A global manufacturer completed the DRP BIA exercise. When email went down, Service Desk phones lit up until it was resolved. That grief led to a high availability implementation for email. However, the BIA illustrated that ERP downtime was far more impactful.
      • ERP downtime would stop production lines, delay customer orders, and ultimately cost the business a million dollars a day.
      • The BIA results clearly showed that the ERP needed to be prioritized higher, and required business support for investment.

      Move from airing grievances to making informed decisions

      The DRP Business Impact Analysis Tool helped structure stakeholder consultations on DR requirements for a large university IT department. Past consultations had become an airing of grievances. Using objective impact scores helped stakeholders stay focused and make informed decisions around appropriate RTOs and RPOs.

      Phase 2: Insights and accomplishments

      Screenshots of the tools and templates from this phase.

      Estimated the business impact of downtime

      Screenshot of a tools from this phase

      Set recovery targets

      Summary of Accomplishments

      • Created a scoring scale tied to different categories of business impact.
      • Applied the scoring scale to estimate the business impact of system downtime.
      • Identified appropriate, acceptable RTOs and RPOs.

      Up Next:Conduct a tabletop planning exercise to establish current recovery capabilities

      Create a Right-Sized Disaster Recovery Plan

      Phase 3

      Identify and Address Gaps in the Recovery Workflow

      Step 3.1: Determine Current Recovery Workflow

      This step will walk you through the following activities:

      • Run a tabletop exercise.
      • Outline the steps for the initial response (notification, assessment, disaster declaration) and systems recovery (i.e. document your recovery workflow).
      • Identify any gaps and risks in your initial response and systems recovery.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs (for systems in scope)
      • Application SMEs (for systems in scope)

      Results and Insights

      • Use a repeatable practical exercise to outline and document the steps you would use to recover systems in the event of a disaster, as well as identify gaps and risks to address.
      • This is also a knowledge-sharing opportunity for your team, and a practical means to get their insights, suggestions, and recovery knowledge down on paper.

      Tabletop planning: an effective way to test and document your recovery workflow

      In a tabletop planning exercise, the DRP team walks through a disaster scenario to map out what should happen at each stage, and effectively defines a high-level incident response plan (i.e. recovery workflow).

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      A bar graph is displayed that shows that tabletop planning has the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      *Note: Relative importance indicates the contribution an individual testing methodology, conducted at least annually, had on predicting success meeting recovery objectives, when controlling for all other types of tests in a regression model. The relative-importance values have been standardized to sum to 100%.

      Success was based on the following items:

      • RTOs are consistently met.
      • IT has confidence in the ongoing ability to meet RTOs.
      • RPOs are consistently met.
      • IT has confidence in the ongoing ability to meet RPOs.

      Why is tabletop planning so effective?

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more frequently than other testing methodologies.
      • It easily translates into the backbone of your recovery documentation, as it allows you to review all aspects of your recovery plan.

      Focus first on IT DR

      Your DRP is IT contingency planning. It is not crisis management or BCP.

      The goal is to define a plan to restore applications and systems following a disruption. For your first tabletop exercise, Info-Tech recommends you use a non-life-threatening scenario that requires at least a temporary relocation of your data center (i.e. failing over to a DR site/environment). Assume a gas leak or burst water pipe renders the data center inaccessible. Power is shut off and IT must failover systems to another location. Once you create the master procedure, review the plan to ensure it addresses other scenarios.

      Info-Tech Insight

      When systems fail, you are faced with two high-level options: failover or recover in place. If you document the plan to failover systems to another location, you’ll have documented the core of your DR procedures. This differs from traditional scenario planning where you define separate plans for different what-if scenarios. The goal is one plan that can be adapted to different scenarios, which reduces the effort to build and maintain your DRP.

      Conduct a tabletop planning exercise to outline DR procedures in your current environment

      3(a) Tabletop planning

      Estimated Time: 2-3 hours

      For each high-level recovery step, do the following:

      1. On white cue cards:
        • Record the step.
        • Indicate the task owner (if required for clarity).
        • Note time required to complete the step. After the exercise, use this to build a running recovery time where 00:00 is when the incident occurred.
      2. On yellow cue cards, document gaps in people, process, and technology requirements to complete the step.
      3. On red cue cards, indicate risks (e.g. no backup person for a key staff member).
      An example is shown on what can be done during step 3(a). Three cue cards are showing in white, yellow, and red.

      Do:

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't:

      • Get weighed down by tools.
      • Document the details right away – stick to the high-level plan for the first exercise.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.

      Flowchart the current-state incident response plan (i.e. document the recovery workflow)

      3(b) DRP Recovery Workflow Template and Case Study: Practical, Right-Sized DRP

      Why use flowcharts?

      • Flowcharts provide an at-a-glance view, ideal for disaster scenarios where pressure is high and quick upward communication is necessary.
      • For experienced staff, a high-level reminder of key steps is sufficient.

      Use the completed tabletop planning exercise results to build this workflow.

      "We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director, IT Operations, Healthcare Industry

      Source: Info-Tech Research Group Interview

      Screenshot of Info-Tech's DRP Recovery Workflow Template

      For a formatted template you can use to capture your plan, see Info-Tech’s DRP Recovery Workflow Template.

      For a completed example of tabletop planning results, review Info-Tech’s Case Study: Practical, Right-Sized DRP.

      Identify RPA

      What’s my RPA? Consider the following case:

      • Once a week, a full backup is taken of the complete ERP system and is transferred over the WAN to a secondary site 250 miles away, where it is stored on disk.
      • Overnight, an incremental backup is taken of the day’s changes, and is transferred to the same secondary site, and also stored on disk.
      • During office hours, the SAN takes a snapshot of changes which are kept on local storage (information on the accounting system usually only changes during office hours).
      • So what’s the RPA? One hour (snapshots), one day (incrementals), or one week (full backups)?

      When identifying RPA, remember the following:

      You are planning for a disaster scenario, where on-site systems may be inaccessible and any copies of data taken during the disaster may fail, be corrupt, or never make it out of the data center (e.g. if the network fails before the backup file ships). In the scenario above, it seems likely that off-site incremental backups could be restored, leading to a 24-hour RPA. However, if there were serious concerns about the reliability of the daily incrementals, the RPA could arguably be based on the weekly full backups.

      Info-Tech Best Practice

      The RPA is a commitment to the maximum data you would lose in a DR scenario with current capabilities (people, process, and technology). Pick a number you can likely achieve. List any situations where you couldn’t meet this RPA, and identify those for a risk tolerance discussion. In the example above, complete loss of the primary SAN would also mean losing the snapshots, so the last good copy of the data could be up to 24-hours old.

      Add recovery actuals (RTA/RPA) to your copy of the BIA

      3(c) DRP Business Impact Analysis Tool– Recovery actuals

      On the “Impact Analysis” tab in the DRP Business Impact Analysis Tool, enter the estimated maximum downtime and data loss in the RTA and RPA columns.

      1. Estimate the RTA based on the required time for complete recovery. Review your recovery workflow to identify this timeline. For example, if the notification, assessment, and declaration process takes two hours, and systems recovery requires most of a day, the estimated RTA could be 24 hours.
      2. Estimate the RPA based on the longest interval between copies of the data being shipped offsite. For example, if data on a particular system is backed up offsite once per day, and the onsite system was destroyed just before that backup began, the entire day’s data could be lost and estimated RPA could be 24 hours. Note: Enter 9999 to indicate that data is unrecoverable.

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Recovery actuals

      Info-Tech Best Practice

      It’s okay to round numbers to the nearest shift, day, or week for simplicity (e.g. 24 hours rather than 22.5 hours, or 8 hours rather than 7.25 hours).

      Test the recovery workflow against additional scenarios

      3(d) Workflow review

      Estimated Time: 1 hour

      Review your recovery workflow with a different scenario in mind.

      • Work from and update the soft copy of your recovery workflow.
      • Would any steps be different if the scenario changes? If yes, capture the different flow with a decision diamond. Identify any new gaps or risks you encounter with red and yellow cards. Use as few decision diamonds as possible.

      Screenshot of testing the workflow against the additional scenarios

      Info-Tech Best Practice

      As you start to consider scenarios where injuries or loss of life are a possibility, remember that health and safety risks are the top priority in a crisis. If there’s a fire in the data center, evacuating the building is the first priority, even if that means foregoing a graceful shut down. For more details on emergency response and crisis management, see Implement Crisis Management Best Practices.

      Consider additional IT disaster scenarios

      3(e) Thought experiment – Review additional scenarios

      Walk through your recovery workflow in the context of additional, different scenarios to ensure there are no gaps. Collaborate with your DR team to identify changes that might be required, and incorporate these changes in the plan.

      Scenario Type Considerations
      Isolated hardware/software failure
      • Failover to the DR site may not be necessary (or only for affected systems).
      Power outage or network outage
      • Do you have standby power? Do you have network redundancy?
      Local hazard (e.g. chemical leak, police incident)
      • Systems might be accessible remotely, but hands-on maintenance will be required eventually.
      • An alternate site is required for service continuity.
      Equipment/building damage (e.g. fire, roof collapse)
      • Staff injuries or loss of life are a possibility.
      • Equipment may need repair or replacement (vendor involvement).
      • An alternate site is required for service continuity.
      Regional natural disasters
      • Staff injuries or loss of life are a possibility.
      • Utilities may be affected (power, running water, etc.).
      • Expect staff to take care of their families first before work.
      • A geographically distant alternate site may be required for service continuity.

      Step 3.2: Identify and Prioritize Projects to Close Gaps

      This step will walk you through the following activities:

      • Analyze the gaps that were identified from the maturity scorecard, tabletop planning exercise, and the RTO/RPO gaps analysis.
      • Brainstorm solutions to close gaps and mitigate risks.
      • Determine a course of action to close these gaps. Prioritize each project. Create a project implementation timeline.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs

      Results and Insights

      • Prioritized list of projects and action items that can improve DR capabilities.
      • Often low-cost, low-effort quick wins are identified to mitigate at least some gaps/risks. Higher-cost, higher-effort projects can be part of a longer-term IT strategy. Improving service continuity is an ongoing commitment.

      Brainstorm solutions to address gaps and risk

      3(f) Solutioning

      Estimated Time: 1.5 hours

      1. Review each of the risk and gap cards from the tabletop exercise.
      2. As a group, brainstorm ideas to address gaps, mitigate risks, and improve resiliency. Write the list of ideas on a whiteboard or flip-chart paper. The solutions can range from quick-wins and action items to major capital investments.
      3. Try to avoid debates about feasibility at this point – that should happen later. The goal is to get all ideas on the board.

      An example of how to complete Activity 3(f). Three cue cards showing various steps are attached by arrows to steps on a whiteboard.

      Info-Tech Best Practice

      It’s about finding ways to solve the problem, not about solving the problem. When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution; other ideas can expand on and improve that first idea.

      Select an optimal DR deployment model from a world of choice

      There are many options for a DR deployment. What makes sense for you?

      • Sifting through the options for a DR site can be overwhelming. Simplify by eliminating deployment models that aren’t a good fit for your requirements or organization using Info-Tech’s research.
      • Someone will ask you about DR in the cloud. Cut to the chase and evaluate cloud for fit with your organization’s current capabilities and requirements. Read about the 10 Secrets for Successful DR in the Cloud.
      • Selecting and deploying a DR site is an exercise in risk mitigation. IT’s role is to advise the business on options to address the risk of not having a DR site, including cost and effort estimates. The business must then decide how to manage risk. Build total cost of ownership (TCO) estimates and evaluate possible challenges and risks for each option.

      Is it practical to invest in greater geo-redundancy that meets RTOs and RPOs during a widespread event?

      Info-Tech suggests you consider events that impact both sites, and your risk tolerance for that impact. Outline the impact of downtime at a high level if both the primary and secondary site were affected. Research how often events severe enough to have impacted both your primary and secondary sites have occurred in the past. What’s the business tolerance for this type of event?

      A common strategy: have a primary and DR site that are close enough to support low RPO/RTO, but far enough away to mitigate the impact of known regional events. Back up data to a remote third location as protection against a catastrophic event.

      Info-Tech Insight

      Approach site selection as a project. Leverage Select an Optimal Disaster Recovery Deployment Model to structure your own site-selection project.

      Set up the DRP Roadmap Tool

      3(g) DRP Roadmap Tool – Set up tool

      Use the DRP Roadmap Tool to create a high-level roadmap to plan and communicate DR action items and initiatives. Determine the data you’ll use to define roadmap items.

      Screenshot of Info-Tech's DRP Roadmap Tool

      Plan next steps by estimating timeline, effort, priority, and more

      3(h) DRP Roadmap Tool – Describe roadmap items

      A screenshot of Info-Tech's DRP Roadmap Tool to show how to describe roadmap items

      Review and communicate the DRP Roadmap Tool

      3(i) DRP Roadmap Tool – View roadmap chart

      A screenshot of Info-Tech's DRP Roadmap Tool's Roadmap tab

      Step 3.3: Review the Future State Recovery Process

      This step will walk you through the following activities:

      • Update the recovery workflow to outline your future recovery procedure.
      • Summarize findings from DR exercises and present the results to the project sponsor and other interested executives.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs (Future State Recovery Flow)
      • DR Project Sponsor

      Results and Insights

      • Summarize results from DR planning exercises to make the case for needed DR investment.

      Outline your future state recovery flow

      3(j) Update the recovery workflow to outline response and recovery in the future

      Estimated Time: 30 minutes

      Outline your expected future state recovery flow to demonstrate improvements once projects and action items have been completed.

      1. Create a copy of your DRP recovery workflow in a new tab in Visio.
      2. Delete gap and risk cards that are addressed by proposed projects. Consolidate or eliminate steps that would be simplified or streamlined in the future if projects are implemented.
      3. Create a short-, medium-, and long-term review of changes to illustrate improvements over time to the project roadmap.
      4. Update this workflow as you implement and improve DR capabilities.

      Screenshot of the recovery workflow

      Validate recovery targets and communicate actual recovery capabilities

      3(k) Validate findings, present recommendations, secure budget

      Estimated Time: time required will vary

      1. Interview managers or process owners to validate RTO, RPO, and business impact scores.Use your assessment of “heavy users” of particular applications (picture at right) to remind you which business users you should include in the interview process.
      2. Present an overview of your findings to the management team.Use Info-Tech’s DRP Recap and Results Template to summarize your findings.
      3. Take projects into the budget process.With the management team aware of the rationale for investment in DRP, build the business case and secure budget where needed.

      Present DRP findings and make the case for needed investment

      3(I) DRP Recap and Results Template

      Create a communication deck to recap key findings for stakeholders.

      • Write a clear problem statement. Identify why you did this project (what problem you’re solving).
      • Clearly state key findings, insights, and recommendations.
      • Leverage the completed tools and templates to populate the deck. Callouts throughout the template presentation will direct you to take and populate screenshots throughout the document.
      • Use the presentation to communicate key findings to, and gather feedback from, business unit managers, executives, and IT staff.
      Screenshots of Info-Tech's DRP Recap and Results Template

      Stories from the field: Info-Tech clients find value in Phase 3 in the following ways

      Tabletop planning is an effective way to discover gaps in recovery capabilities. Identify issues in the tabletop exercise so you can manage them before disaster strikes. For example:

      Back up a second…

      A client started to back up application data offsite. To minimize data transfer and storage costs, the systems themselves weren’t backed up. Working through the restore process at the DR site, the DBA realized 30 years of COBOL and SQR code – critical business functionality – wasn’t backed up offsite.

      Net… work?

      A 500-employee professional services firm realized its internet connection could be a significant roadblock to recovery. Without internet, no one at head office could access critical cloud systems. The tabletop exercise identified this recovery bottleneck and helped prioritize the fix on the roadmap.

      Someone call a doctor!

      Hospitals rely on their phone systems for system downtime procedures. A tabletop exercise with a hospital client highlighted that if the data center were damaged, the phone system would likely be damaged as well. Identifying this provided more urgency to the ongoing VOIP migration.

      The test of time

      A small municipality relied on a local MSP to perform systems restore, but realized it had never tested the restore procedure to identify RTA. Contacting the MSP to review capabilities became a roadmap item to address this risk.

      Phase 3: Insights and accomplishments

      Screenshot of Info-Tech's DRP recovery workflow template

      Outlined the DRP response and risks to recovery

      Screenshots of activities completed related to brainstorming risk mitigation measures.

      Brainstormed risk mitigation measures

      Summary of Accomplishments

      • Planned and documented your DR incident response and systems recovery workflow.
      • Identified gaps and risks to recovery and incident management.
      • Brainstormed and identified projects and action items to mitigate risks and close gaps.

      Up Next: Leverage the core deliverables to complete, extend, and maintain your DRP

      Create a Right-Sized Disaster Recovery Plan

      Phase 4

      Complete, Extend, and Maintain Your DRP

      Phase 4: Complete, Extend, and Maintain Your DRP

      This phase will walk you through the following activities:

      • Identify progress made on your DRP by reassessing your DRP maturity.
      • Prioritize the highest value major initiatives to complete, extend, and maintain your DRP.

      This phase involves the following participants:

      • DRP Coordinator
      • Executive Sponsor

      Results and Insights

      • Communicate the value of your DRP by demonstrating progress against items in the DRP Maturity Scorecard.
      • Identify and prioritize future major initiatives to support the DRP, and the larger BCP.

      Celebrate accomplishments, plan for the future

      Congratulations! You’ve completed the core DRP deliverables and made the case for investment in DR capabilities. Take a moment to celebrate your accomplishments.

      This milestone is an opportunity to look back and look forward.

      • Look back: measure your progress since you started to build your DRP. Revisit the assessments completed in phase 1, and assess the change in your overall DRP maturity.
      • Look forward: prioritize future initiatives to complete, extend, and maintain your DRP. Prioritize initiatives that are the highest impact for the least requirement of effort and resources.

      We have completed the core DRP methodology for key systems:

      • BIA, recovery objectives, high-level recovery workflow, and recovery actuals.
      • Identify key tasks to meet recovery objectives.

      What could we do next?

      • Repeat the core methodology for additional systems.
      • Identify a DR site to meet recovery requirements, and review vendor DR capabilities.
      • Create a summary DRP document including requirements, capabilities, and change procedures.
      • Create a test plan and detailed recovery documentation.
      • Coordinate the creation of BCPs.
      • Integrate DR in other key operational processes.

      Revisit the DRP Maturity Scorecard to measure progress and identify remaining areas to improve

      4(a) DRP Maturity Scorecard – Reassess your DRP program maturity

      1. Find the copy of the DRP Maturity Scorecard you completed previously. Save a second copy of the completed scorecard in the same folder.
      2. Update scoring where you have improved your DRP documentation or capabilities.
      3. Review the new scores on tab 3. Compare the new scores to the original scores.

      Screenshot of DRP Maturity Assessment Results

      Info-Tech Best Practice

      Use the completed, updated DRP Maturity Scorecard to demonstrate the value of your continuity program, and to help you decide where to focus next.

      Prioritize major initiatives to complete, extend, and maintain the DRP

      4(b) Prioritize major initiatives

      Estimated Time: 2 hours

      Prioritize major initiatives that mitigate significant risk with the least cost and effort.

      1. Use the scoring criteria below to evaluate risk, effort, and cost for potential initiatives. Modify the criteria if required for your organization. Write this out on a whiteboard or flip-chart paper.
      2. Assign a score from 1 to 3. Multiply the scores for each initiative together for an aggregate score. In general, prioritize initiatives with higher scores.
      Score A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative?
      3: High Critical impact on +50% of stakeholders, or major impact to compliance posture, or significant health/safety risk. One sprint, can be completed by a few individuals with minor supervision. Within the IT discretionary budget.
      2: Medium Impacts <50% of stakeholders, or minor impact on compliance, or degradation to health or safety controls. One quarter, and/or some increased effort required, some risk to completion. Requires budget approval from finance.
      1: Low Impacts limited to <25% of stakeholders, no impact on compliance posture or health/safety. One year, and/or major vendor or organizational challenges. Requires budget approval from the board of directors.

      Info-Tech Best Practice

      You can use a similar scoring exercise to prioritize and schedule high-benefit, low-effort, low-cost items identified in the roadmap in phase 3.

      Example: Prioritize major initiatives

      4(b) Prioritize major initiatives continued

      Write out the table on a whiteboard (record the results in a spreadsheet for reference). In the case below, IT might decide to work on repeating the core methodology first as they create the active testing plans, and tackle process changes later.

      Initiative A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative? Aggregate score (A x B x C)
      Repeat the core methodology for all systems 2 – will impact some stakeholders, no compliance or safety impact. 2 – will require about 3 months, no significant complications. 3 – No cost. 12
      Add DR to project mgmt. and change mgmt. 1 – Mitigates some recovery risks over the long term. 1 – Requires extensive consultation and process review. 3 – No cost. 3
      Active failover testing on plan 2 – Mitigates some risks; documentation and cross training is already in place. 2 – Requires 3-4 months of occasional effort to prepare for test. 2 – May need to purchase some equipment before testing. 8

      Info-Tech Best Practice

      Find a pace that allows you to keep momentum going, but also leaves enough time to act on the initial findings, projects, and action items identified in the DRP Roadmap Tool. Include these initiatives in the Roadmap tool to visualize how identified initiatives fit with other tasks identified to improve your recovery capabilities.

      Repeat the core DR methodology for additional systems and applications


      You have created a DR plan for your most critical systems. Now, add the rest:

      • Build on the work you’ve already done. Re-use the BIA scoring scale. Update your existing recovery workflows, rather than creating and formatting an entirely new document. A number of steps in the recovery will be shared with, or similar to, the recovery procedures for your Tier 1 systems.

      Risks and Challenges Mitigated

      • DR requirements and capabilities for less-critical systems have not been evaluated.
      • Gaps in the recovery process for less critical systems have not been evaluated or addressed.
      • DR capabilities for less critical systems may not meet business requirements.
      Sample Outputs
      Add Tier 2 & 3 systems to the BIA.
      Complete another tabletop exercise for Tier 2 & 3 systems recovery, and add the results to the recovery workflow.
      Identify projects to close additional gaps in the recovery process. Add projects to the project roadmap.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Extend your core DRP deliverables

      You’ve completed the core DRP deliverables. Continue to create DRP documentation to support recovery procedures and governance processes:

      • DR documentation efforts fail when organizations try to boil the ocean with an all-in-one plan aimed at auditors, business leaders, and IT. It’s long, hard to maintain, and ends up as shelfware.
      • Create documentation in layers to keep it manageable. Build supporting documentation over time to support your high-level recovery workflow.

      Risks and Challenges Mitigated

      • Key contact information, escalation, and disaster declaration responsibilities are not identified or formalized.
      • DRP requirements and capabilities aren’t centralized. Key DRP findings are in multiple documents, complicating governance and oversight by auditors, executives, and board members.
      • Detailed recovery procedures and peripheral information (e.g. network diagrams) are not documented.
      Sample Outputs
      Three to five detailed systems recovery flowcharts/checklists.
      Documented team roles, succession plans, and contact information.
      Notification, assessment, and disaster declaration plan.
      DRP summary.
      Layer 1, 2 & 3 network diagrams.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Select an optimal DR deployment model and deployment site

      Your DR site has been identified as inadequate:

      • Begin with the end in mind. Commit to mastering the selected model and leverage your vendor relationship for effective DR.
      • Cut to the chase and evaluate the feasibility of cloud first. Gauge your organization’s current capabilities for DR in the cloud before becoming infatuated with the idea.
      • A mixed model gives you the best of both worlds. Diversify your strategy by identifying fit for purpose and balancing the work required to maintain various models.

      Risks and Challenges Mitigated

      • Without an identified DR site, you’ll be scrambling when a disaster hits to find and contract for a location to restore IT services.
      • Without systems and application data backed up offsite, you stand to lose critical business data and logic if all copies of the data at your primary site were lost.
      Sample Outputs
      Application assessment for cloud DR.
      TCO tool for different environments.
      Solution decision and executive presentation.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Select the Optimal Disaster Recovery Deployment Model, to help you make sense of a world of choice for your DR site.

      Extend DRP findings to business process resiliency with a BCP pilot

      Integrate your findings from DRP into the overall BCP:

      • As an IT leader you have the skillset and organizational knowledge to lead a BCP project, but ultimately business leaders need to own the BCP – they know their processes and requirements to resume business operations better than anyone else.
      • The traditional approach to BCP is a massive project that most organizations can’t execute without hiring a consultant. To execute BCP in-house, carve up the task into manageable pieces.

      Risks and Challenges Mitigated

      • No formal plan exists to recover from a disruption to critical business processes.
      • Business requirements for IT systems recovery may change following a comprehensive review of business continuity requirements.
      • Outside of core systems recovery, IT could be involved in relocating staff, imaging and issuing new end-user equipment, etc. Identifying these requirements is part of BCP.
      Sample Outputs
      Business process-focused BIA for one business unit.
      Recovery workflows for one business unit.
      Provisioning list for one business unit.
      BCP project roadmap.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Develop a Business Continuity Plan, to develop and deploy a repeatable BCP methodology.

      Test the plan to validate capabilities and cross-train staff on recovery procedures

      You don’t have a program to regularly test the DR plan:

      • Most DR tests are focused solely on the technology and not the DR management process – which is where most plans fail.
      • Be proactive – establish an annual test cycle and identify and coordinate resources well in advance.
      • Update DRP documentation with findings from the plan, and track the changes you make over time.

      Risks and Challenges Mitigated

      • Gaps likely still exist in the plan that are hard to find without some form of testing.
      • Customers and auditors may ask for some form of DR testing.
      • Staff may not be familiar with DR documentation or how they can use it.
      • No formal cycle to validate and update the DRP.
      Sample Outputs
      DR testing readiness assessment.
      Testing handbooks.
      Test plan summary template.
      DR test issue log and analysis tool.

      Info-Tech Best Practice

      Uncover deficiencies in your recovery procedures by using Info-Tech’s blueprint Reduce Costly Downtime Through DR Testing.

      “Operationalize” DRP management

      Inject DR planning in key operational processes to support plan maintenance:

      • Major changes, or multiple routine changes, can materially alter DR capabilities and requirements. It’s not feasible to update the DR plan after every routine change, so leverage criticality tiers in the BIA to focus your change management efforts. Critical systems require more rigorous change procedures.
      • Likewise, you can build criticality tiers into more focused project management and performance measurement processes.
      • Schedule regular tasks in your ticketing system to verify capabilities and cross-train staff on key recovery procedures (e.g. backup and restore).

      Risks and Challenges Mitigated

      • DRP is not updated “as needed” – as requirements and capabilities change due to business and technology changes.
      • The DRP is disconnected from day-to-day operations.
      Sample Outputs
      Reviewed and updated change, project, and performance management processes.
      Reviewed and updated internal SLAs.
      Reviewed and updated data protection and backup procedures.

      Review infrastructure service provider DR capabilities

      Insert DR planning in key operational processes to support plan maintenance:

      • Reviewing vendor DR capabilities is a core IT vendor management competency.
      • As your DR requirements change year-to-year, ensure your vendors’ service commitments still meet your DR requirements.
      • Identify changes in the vendor’s service offerings and DR capabilities, e.g. higher costs for additional DR support, new offerings to reduce potential downtime, or conversely, a degradation in DR capabilities.

      Risks and Challenges Mitigated

      • Vendor capabilities haven’t been measured against business requirements.
      • No internal capability exists currently to assess vendor ability to meet promised SLAs.
      • No internal capability exists to track vendor performance on recoverability.
      Sample Outputs
      A customized vendor DRP questionnaire.
      Reviewed vendor SLAs.
      Choose to keep or change service levels or vendor offerings based on findings.

      Phase 4: Insights and accomplishments

      Screenshot of DRP Maturity Assessment Results

      Identified progress against targets

      Screenshot of prioritized further initiatives.

      Prioritized further initiatives

      Screenshot of DRP Planning Roadmap

      Added initiatives to the roadmap

      Summary of Accomplishments

      • Developed a list of high-priority initiatives that can support the extension and maintenance of the DR plan over the long term.
      • Reviewed and update maturity assessments to establish progress and communicate the value of the DR program.

      Summary of accomplishment

      Knowledge Gained

      • Conduct a BIA to determine appropriate targets for RTOs and RPOs.
      • Identify DR projects required to close RTO/RPO gaps and mitigate risks.
      • Use tabletop planning to create and validate an incident response plan.

      Processes Optimized

      • Your DRP process was optimized, from BIA to documenting an incident response plan.
      • Your vendor evaluation process was optimized to identify and assess a vendor’s ability to meet your DR requirements, and to repeat this evaluation on an annual basis.

      Deliverables Completed

      • DRP Maturity Scorecard
      • DRP Business Impact Analysis Tool
      • DRP Roadmap Tool
      • Incident response plan and systems recovery workflow
      • Executive presentation

      Info-Tech’s insights bust the most obstinate myths of DRP

      Myth #1: DRPs need to focus on major events such as natural disasters and other highly destructive incidents such as fire and flood.

      Reality: The most common threats to service continuity are hardware and software failures, network outages, and power outages.

      Myth #2: Effective DRPs start with identifying and evaluating potential risks.

      Reality: DR isn’t about identifying risks; it’s about ensuring service continuity.

      Myth #3: DRPs are separate from day-to-day operations and incident management.

      Reality: DR must be integrated with service management to ensure service continuity.

      Myth #4: I use a co-lo or cloud services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Reality: You can’t outsource accountability. You can’t just assume your vendor’s DR capabilities will meet your needs.

      Myth #5: A DRP must include every detail so anyone can execute the recovery.

      Reality: IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      Supplement the core documentation with these tools and templates

      • An Excel workbook workbook to track key roles on DR, business continuity, and emergency response teams. Can also track DR documentation location and any hardware purchases required for DR.
      • A questionnaire template and a response tracking tool to structure your investigation of vendor DR capabilities.
      • Integrate escalation with your DR plan by defining incident severity and escalation rules . Use this example as a template or integrate ideas into your own severity definitions and escalation rules in your incident management procedures.
      • A minute-by-minute time-tracking tool to capture progress in a DR or testing scenario. Monitor progress against objectives in real time as recovery tasks are started and completed.

      Next steps: Related Info-Tech research

      Select the Optimal Disaster Recovery Deployment Model Evaluate cloud, co-lo, and on-premises disaster recovery deployment models.

      Develop a Business Continuity Plan Streamline the traditional approach to make BCP development manageable and repeatable.

      Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.

      Document and Maintain Your Disaster Recovery Plan Put your DRP on a diet: keep it fit, trim, and ready for action.

      Reduce Costly Downtime Through DR Testing Improve your DR plan and your team’s ability to execute on it.

      Implement Crisis Management Best Practices An effective crisis response minimizes the impact of a crisis on reputation, profitability, and continuity.

      Research contributors and experts

      • Alan Byrum, Director of Business Continuity, Intellitech
      • Bernard Jones (MBCI, CBCP, CORP, ITILv3), Owner/Principal, B Jones BCP Consulting, LLC
      • Paul Beaudry, Assistant Vice-President, Technical Services, MIS, Richardson International Limited
      • Yogi Schulz, President, Corvelle Consulting

      Glossary

      • Business Continuity Management (BCM) Program: Ongoing management and governance process supported by top management and appropriately resourced to implement and maintain business continuity management. (Source: ISO 22301:2012)
      • Business Continuity Plan (BCP): Documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following disruption. The BCP is not necessarily one document, but a collection of procedures and information.
      • Crisis: A situation with a high level of uncertainty that disrupts the core activities and/or credibility of an organization and requires urgent action. (Source: ISO 22300)
      • Crisis Management Team (CMT): A group of individuals responsible for developing and implementing a comprehensive plan for responding to a disruptive incident. The team consists of a core group of decision makers trained in incident management and prepared to respond to any situation.
      • Disaster Recovery Planning (DRP): The activities associated with the continuing availability and restoration of the IT infrastructure.
      • Incident: An event that has the capacity to lead to loss of, or a disruption to, an organization’s operations, services, or functions – which, if not managed, can escalate into an emergency, crisis, or disaster.
      • BCI Editor’s Note: In most countries “incident” and “crisis” are used interchangeably, but in the UK the term “crisis” has been generally reserved for dealing with wide-area incidents involving Emergency Services. The BCI prefers the use of “incident” for normal BCM purposes. (Source: The Business Continuity Institute)

      • Incident Management Plan: A clearly defined and documented plan of action for use at the time of an incident, typically covering the key personnel, resources, services, and actions needed to implement the incident management process.
      • IT Disaster: A service interruption requiring IT to rebuild a service, restore from backups, or activate redundancy at the backup site.
      • Recovery Point: Time elapsed between the last good copy of the data being taken and failure/corruption on the production environment; think of this as data loss.
      • Recovery Point Actual (RPA): The currently achievable recovery point after a disaster event, given existing people, processes, and technology. This reflects expected maximum data loss that could actually occur in a disaster scenario.
      • Recovery Point Objective (RPO): The target recovery point after a disaster event, usually calculated in hours, on a given system, application, or service. Think of this as acceptable and appropriate data loss. RPO should be based on a business impact analysis (BIA) to identify an acceptable and appropriate recovery target.
      • Recovery Time: Time required to restore a system, application, or service to a functional state; think of this as downtime.
      • Recovery Time Actual (RTA): The currently achievable recovery time after a disaster event, given existing people, processes, and technology. This reflects expected maximum downtime that could actually occur in a disaster scenario.
      • Recovery Time Objective (RTO): The target recovery time after a disaster event for a given system, application, or service. RTO should be based on a business impact analysis (BIA) to identify acceptable and appropriate downtime.

      Bibliography

      BCMpedia. “Recovery Objectives: RTO, RPO, and MTPD.” BCMpedia, n.d. Web.

      Burke, Stephen. “Public Cloud Pitfalls: Microsoft Azure Storage Cluster Loses Power, Puts Spotlight On Private, Hybrid Cloud Advantages.” CRN, 16 Mar. 2017. Web.

      Elliot, Stephen. “DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified.” IDC, 2015. Web.

      FEMA. Planning & Templates. FEMA, 2015. Web.

      FINRA. “Business Continuity Plans and Emergency Contact Information.” FINRA, 2015. Web.

      FINRA. “FINRA, the SEC and CFTC Issue Joint Advisory on Business Continuity Planning.” FINRA, 2013. Web.

      Gosling, Mel, and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 2009. Web.

      Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, n.d. Web.

      Homeland Security. Federal Information Security Management Act (FISMA). Homeland Security, 2015. Web.

      Nichols, Shaun. “AWS's S3 Outage Was So Bad Amazon Couldn't Get Into Its Own Dashboard to Warn the World.” The Register, 1 Mar. 2017. Web.

      Potter, Patrick. “BCM Regulatory Alphabet Soup.” RSA Archer Organization, 2012. Web.

      Rothstein, Philip Jan. “Disaster Recovery Testing: Exercising Your Contingency Plan.” Rothstein Associates Inc., 2007. Web.

      The Business Continuity Institute. “The Good Practice Guidelines.” The Business Continuity Institute, 2013. Web.

      The Disaster Recovery Journal. “Disaster Resource Guide.” The Disaster Recovery Journal, 2015. Web.

      The Disaster Recovery Journal. “DR Rules & Regulations.” The Disaster Recovery Journal, 2015. Web.

      The Federal Financial Institution Examination Council (FFIEC). Business Continuity Planning. IT Examination Handbook InfoBase, 2015. Web.

      York, Kyle. “Read Dyn’s Statement on the 10/21/2016 DNS DDoS Attack.” Oracle, 22 Oct. 2016. Web.

      Build an Information Security Strategy

      • Buy Link or Shortcode: {j2store}242|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $45,303 Average $ Saved
      • member rating average days saved: 34 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Many security leaders struggle to decide how to best to prioritize their scarce information security resources
      • The need to move from a reactive approach to security towards a strategic planning approach is clear. The path to getting there is less so.

      Our Advice

      Critical Insight

      The most successful information security strategies are:

      • Holistic – They consider the full spectrum of information security, including people, processes, and technology.
      • Risk aware – They understand that security decisions should be made based on the security risks facing their organization, not just on “best practice.”
      • Business aligned – They demonstrate an understanding of the goals and strategies of the organization and how the security program can support the business.

      Impact and Result

      • Info-Tech has developed a highly effective approach to building an information security strategy, an approach that has been successfully tested and refined for more than seven years with hundreds of different organizations:
      • This approach includes tools for:
        • Ensuring alignment with business objectives.
        • Assessing organizational risk and stakeholder expectations.
        • Enabling a comprehensive current state assessment.
        • Prioritizing initiatives and building out a security roadmap.

      Build an Information Security Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Information Security (IS) Strategy Research – A step-by-step document that helps you build a holistic, risk-based, and business-aligned IS strategy.

      Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context. Use this storyboard to augment your security strategy by ensuring alignment with business objectives, assessing your organization's risk and stakeholder expectations, understanding your current security state, and prioritizing initiatives and a security roadmap.

      • Build an Information Security Strategy – Phases 1-4

      2. Information Security Requirements Gathering Tool – A tool to make informed security risk decisions to support business needs.

      Use this tool to formally identify business goals and customer and compliance obligations and make explicit links to how security initiatives propose to support these business interests. Then define the scope and boundaries for the security strategy and the risk tolerance definitions that will guide future security risk decisions.

      • Information Security Requirements Gathering Tool

      3. Information Security Pressure Analysis Tool – An evaluation tool to invest in the right security functions using a pressure analysis approach.

      Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the cost and value in alignment with business strategies. Security pressure sets the baseline that will help you avoid over-investing or under-investing in your security functions.

      • Information Security Pressure Analysis Tool

      4. Information Security Program Gap Analysis Tool – A structured tool to systematically understand your current security state.

      Effective security planning should not be one size fits all – it must consider business alignment, security benefit, and resource cost. To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go in the future.

      • Information Security Program Gap Analysis Tool

      5. Information Security Strategy Communication Deck – A best-of-breed presentation document to build a clear, concise, and compelling strategy document.

      Use this communication deck template to present the results of the security strategy to stakeholders, demonstrate the progression from the current state to the future state, and establish the roadmap of the security initiatives that will be implemented. This information security communication deck will help ensure that you’re communicating effectively for your cause.

      • Information Security Strategy Communication Deck

      6. Information Security Charter – An essential document for defining the scope and purpose of a security project or program.

      A charter is an essential document for defining the scope and purpose of security. Without a charter to control and set clear objectives for this committee, the responsibility of security governance initiatives will likely be undefined within the enterprise, preventing the security governance program from operating efficiently. This template can act as the foundation for a security charter to provide guidance to the governance of information security.

      • Information Security Charter
      [infographic]

      Workshop: Build an Information Security Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Security Requirements

      The Purpose

      Understand business and IT strategy and plans.

      Key Benefits Achieved

      Defined security obligations, scope, and boundaries.

      Activities

      1.1 Define business and compliance.

      1.2 Establish security program scope.

      1.3 Analyze the organization’s risk and stakeholder pressures.

      1.4 Identify the organizational risk tolerance level.

      Outputs

      Security obligations statement

      Security scope and boundaries statement

      Defined risk tolerance level

      Risk assessment and pressure analysis

      2 Perform a Gap Analysis

      The Purpose

      Define the information security target state.

      Key Benefits Achieved

      Set goals and Initiatives for the security strategy in line with the business objectives.

      Activities

      2.1 Assess current security capabilities.

      2.2 Identify security gaps.

      2.3 Build initiatives to bridge the gaps.

      Outputs

      Information security target state

      Security current state assessment

      Initiatives to address gaps

      3 Complete the Gap Analysis

      The Purpose

      Continue assessing current security capabilities.

      Key Benefits Achieved

      Identification of security gaps and initiatives to bridge them according to the business goals.

      Activities

      3.1 Identify security gaps.

      3.2 Build initiatives to bridge the maturity gaps.

      3.3 Identify initiative list and task list.

      3.4 Define criteria to be used to prioritize initiatives.

      Outputs

      Completed security current state assessment

      Task list to address gaps

      Initiative list to address gaps

      Prioritize criteria

      4 Develop the Roadmap

      The Purpose

      Create a plan for your security strategy going forward.

      Key Benefits Achieved

      Set path forward to achieving the target state for the business through goal cascade and gap initiatives.

      Activities

      4.1 Conduct cost/benefit analysis on initiatives.

      4.2 Prioritize gap initiatives based on cost and alignment with business.

      4.3 Build an effort list.

      4.4 Determine state times and accountability.

      4.5 Finalize security roadmap and action plan.

      4.6 Create communication plan.

      Outputs

      Information security roadmap

      Draft communication deck

      5 Communicate and Implement

      The Purpose

      Finalize deliverables.

      Key Benefits Achieved

      Consolidate documentation into a finalized deliverable that can be used to present to executives and decision makers to achieve buy-in for the project.

      Activities

      5.1 Support communication efforts.

      5.2 Identify resources in support of priority initiatives.

      Outputs

      Security strategy roadmap documentation

      Detailed cost and effort estimates

      Mapping of Info-Tech resources against individual initiatives

      Further reading

      Build an Information Security Strategy

      Create value by aligning your strategy to business goals and business risks.

      Analyst Perspective

      Set your security strategy up for success.

      “Today’s rapid pace of change in business innovation and digital transformation is a call to action to information security leaders.

      Too often, chief information security officers find their programs stuck in reactive mode, a result of years of mounting security technical debt. Shifting from a reactive to proactive stance has never been more important. Unfortunately, doing so remains a daunting task for many.

      While easy to develop, security plans premised on the need to blindly follow ‘best practices’ are unlikely to win over many stakeholders. To be truly successful, an information security strategy needs to be holistic, risk-aware, and business-aligned.”

      Kevin Peuhkurinen

      Research Director – Security, Risk & Compliance

      Info-Tech Research Group

      Executive summary

      Your Challenge

      • Many security leaders struggle to decide how best to prioritize their scarce information security resources.
      • The need to move from a reactive approach to security toward a strategic planning approach is clear. The path to getting there is less clear.

      Common Obstacle

      • Developing a security strategy can be challenging. Complications include:
        • Performing an accurate assessment of your current security program can be extremely difficult when you don’t know what to assess or how.
        • Determining the appropriate target state for security can be even more challenging. A strategy built around following best practices is unlikely to garner significant support from business stakeholders.

      Info-Tech’s Approach

      • Info-Tech has developed a highly effective approach to building an information security strategy, an approach that has been successfully tested and refined for 7+ years with hundreds of organizations.
      • This unique approach includes tools for:
        • Ensuring alignment with business objectives.
        • Assessing organizational risk and stakeholder expectations.
        • Enabling a comprehensive current state assessment.
        • Prioritizing initiatives and building out a security roadmap.

      Info-Tech Insight

      The most successful information security strategies are:

      • Holistic. They consider the full spectrum of information security, including people, processes, and technologies.
      • Risk-Aware. They understand that security decisions should be made based on the security risks facing their organization, not just on best practice.
      • Business-Aligned. They demonstrate an understanding of the goals and strategies of the organization, and how the security program can support the business.

      It’s not a matter of if you have a security incident, but when

      Organizations need to prepare and expect the inevitable security breach.

      Fifty-eight percent of companies surveyed that experienced a breach were small businesses.

      Eighty-nine percent of breaches have a financial or espionage motive.

      Three graphs are depicted. The first is labeled ‘Total Cost for Three Data Breach Root Causes,’ the second ‘Distribution of Benchmark by Root Cause of the Data Breach,’ and the third ‘Per Capita for Three Root Causes of a Data Breach.’ The three root causes are malicious or criminal attack (US$166 million per capita), system glitch ($132 million per capita), and human error ($133 million per capita).

      Source: Ponemon Institute, “2019 Global Cost of Data Breach Study”

      An information security strategy can help you prepare for incidents

      Organizations need to expect the inevitable security breach.

      90%

      of businesses have experienced an external threat in the last year.

      50%

      of IT professionals consider security to be their number one priority.

      53%

      of organizations claimed to have experienced an insider attack in the previous 12 months. 1

      46%

      of businesses believe the frequency of attacks is increasing. 2

      Effective IT leaders approach their security strategy from an understanding that attacks on their organization will occur. Building a strategy around this assumption allows your security team to understand the gaps in your current approach and become proactive instead of being reactive.

      Sources: 1 Kaspersky Lab, “Global IT Security Risks Survey”; 2 CA Technologies, “Insider Threat 2018 Report”

      Persistent Issues

      Evolving Ransomware

      • Continual changes in types and platforms make ransomware a persistent threat. The frequency of ransomware attacks was reported to have increased by 67% in the past five years. 1

      Phishing Attacks

        • Despite filtering and awareness, email remains the most common threat vector for phishing attacks (94%) and an average of 3% of participants in phishing campaigns still click on them. 2

      Insider Privilege and Misuse

      • Typically, 34% of breaches are perpetrated by insiders, with 15% involving privilege misuse. Takeaway: Care less about titles and more about access levels. 3

      Denial of Service

      • The median amount of time that an organization is under attack from DDoS attack is three days.

      Emerging Trends

      Advanced Identity and Access Governance

      • Using emerging technologies in automation, orchestration, and machine learning, the management and governance of identities and access has become more advanced.

      Sources: 1 Accenture, “2019 The Cost of Cyber Crime Study”; 2,3 Verizon, “2019 Data Breach Investigations Report”

      New threat trends in information security aren’t new.

      Previously understood attacks are simply an evolution of prior implementations, not a revolution.

      Traditionally, most organizations are not doing a good-enough job with security fundamentals, which is why attackers have been able to use the same old tricks.

      However, information security has finally caught the attention of organizational leaders, presenting the opportunity to implement a comprehensive security program.

      Cyberattacks have a significant financial impact

      Global average cost of a data breach: $3.92 Million

      Source: Ponemon Institute, “2019 Cost of a Data Breach Study: Global Overview”

      A bar graph, titled ‘Average cost of data breach by industry,’ is depicted. Of 17 industries depicted, public is the lowest average cost (US$1.29 million) and health is the highest average cost ($6.45 million).

      Primary incident type (with a confirmed data breach)

      1. Leading incident type is Denial of Service attacks (DoS), taking up to 70% of all incidents.
      2. When it comes to data breaches, we see that the use of stolen credentials leads to the most cases of confirmed breaches, accounting for 29%.

      Personal records tend to be the most compromised data types, while databases tend to be the most frequently involved asset in breaches.

      Source: Verizon, “2019 Data Breach Investigations Report”

      Security threats are not going away

      We continue to see and hear of security breaches occurring regularly.

      A bar graph depicts the percentage of businesses who experienced a data breach in the last year–US total and global total. Numbers have increased from 2016 to 2019. In 2016, 19 percent of US businesses experienced a breach. In 2019, this number was 59 percent.

      An attacker must be successful only once. The defender – you – must be successful every time.

      Info-Tech’s approach

      Maturing from reactive to strategic information security

      Two circular graphs depict the move from ‘reactive security’ to ‘strategic security’ organizations can accomplish using Info-Tech’s approach.

      Tools icon that is used in the first three stages of the strategic security graph above. Indicates Info-Tech tools included in this blueprint.

      The Info-Tech difference:

      1. A proven, structured approach to mature your information security program from reactive to strategic.
      2. A comprehensive set of tools to take the pain out of each phase in the strategy building exercise.
      3. Visually appealing templates to communicate and socialize your security strategy and roadmap to your stakeholders.

      Info-Tech’s Security Strategy Model

      Info-Tech’s Security Strategy Model is depicted in this rectangular image with arrows. The first level depicts business context (enterprise goals, compliance obligations, scope and boundaries) and pressures (security risks, risk tolerance, stakeholder expectations). The second level depicts security target state (maturity model, security framework, security alignment goals, target maturity, time frame) and current state (current state assessment, gap analysis). The third level depicts the information security roadmap (initiative list, task list, prioritization methodology, and Gantt chart).

      The Info-Tech difference:

      An information security strategy model that is:

      1. Business-Aligned. Determines business context and cascades enterprise goals into security alignment goals.
      2. Risk-Aware. Understands the security risks of the business and how they intersect with the overall organizational risk tolerance.
      3. Holistic. Leverages a best-of-breed information security framework to provide comprehensive awareness of organizational security capabilities.

      Info-Tech’s best-of-breed security framework

      This image shows how Info-Tech’s framework is based on ISO 27000 series, CIS Top 20, COBIT 2019, NIST 800-53, and NIST CSF.

      Info-Tech’s approach

      Creating an information security strategy

      Value to the business

      Outcome

      Best-of-breed security strategy

      Have documentation that paints a picture of the road to compliance. Integrate your framework with your risk tolerance and external pressures.

      Be ready for future changes by aligning your security strategy to security framework best practices.

      Address the nature of your current information security

      Eliminate gaps in process and know what is in scope for your security strategy. Learn what pressures your business and industry are under.

      Gain insight into your current state, allowing you to focus on high-value projects first, transitioning towards a target state.

      Highlight overlooked functions of your current security strategy

      Build a comprehensive security program that brings to light all aspects of your security program.

      Instead of pursing ad hoc projects, know what needs work and how to prioritize your pressing security issues.

      Create a tangible roadmap to your target state

      Create a plan for your future state of information security. Refer to and update your target state as your business needs change.

      Document your current progress and path forward in the future. Know your goals and requirements, codified in a living document.

      Use our prepopulated deliverables to fast track your progress

      Let Info-Tech do the work for you. With completed deliverables, have tangible documents to convey your business needs.

      A comprehensive set of deliverables with concrete, defensible data to justify any business changes.

      A living security strategy

      Pivot and change prioritization to meet the needs of your security deficits.

      Future-proof your security strategy for any contingency.

      The Info-Tech difference:

      Evolve the security program to be more proactive by leveraging Info-Tech’s approach to building a security strategy.

      • Dive deep into security obligations and security pressures to define the business context.
      • Conduct a thorough current state and future state analysis that is aligned with a best-of-breed framework.
      • Prioritize gap-closing initiatives to create a living security strategy roadmap.

      Use Info-Tech’s blueprint to save one to three months

      This image depicts how using Info-Tech’s four-phase blueprint can save an estimated seven to 14 weeks of an organization’s time and effort.

      Iterative benefit

      Over time, experience incremental value from your initial security strategy. Through continual updates your strategy will evolve but with less associated effort, time, and costs.

      These estimates are based on experiences with Info-Tech clients throughout the creation of this blueprint.

      Key deliverable:

      Information Security Strategy Communication Deck (PPT)

      Present your findings in a prepopulated document that can summarizes all key findings of the blueprint.

      Screenshots from Info-Tech’s Information Security Strategy Communication Deck Template.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Information Security Requirements Gathering Tool

      Define the business, customer, and compliance alignment for your security program.

      Information Security Pressure Analysis Tool

      Determine your organization’s security pressures and ability to tolerate risk.

      Information Security Program Gap Analysis Tool

      Use our best-of-breed security framework to perform a gap analysis between your current and target states.

      Information Security Charter

      Ensure the development and management of your security policies meet the broader program vision.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostic and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical Guided Implementation on this topic look like?

      Guided Implementation #1 - Assess security requirements
      • Call #1 - Introduce project and complete pressure analysis.
      Guided Implementation #2 - Build a gap initiative strategy
      • Call #1 - Introduce the maturity assessment.
      • Call #2 - Perform gap analysis and translate into initiatives.
      • Call #3 - Consolidate related gap initiatives and define, cost, effort, alignment, and security benefits.
      Guided Implementation #3 - Prioritize initiatives and build roadmap
      • Call #1 - Review cost/benefit analysis and build an effort map.
      • Call #2 - Build implementation waves and introduce Gantt chart.
      Guided Implementation #4 - Execute and maintain
      • Call #1 - Review Gantt chart and ensure budget/buy-in support.
      • Call #2 - Three-month check-in: Execute and maintain.

      A Guided Implementation is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical Guided Implementation is between 2-12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information, or contact workshops@infotech.com or 1-888-670-8889.

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Activities

      Assess Security Requirements

      Perform a Gap Analysis

      Complete the Gap Analysis

      Develop Roadmap

      Communicate and Implement

      1.1 Understand business and IT strategy and plans

      1.2 Define business and compliance requirements

      1.3 Establish the security program scope

      1.4 Analyze the organization’s risks and stakeholder pressures

      1.5 Identify the organizational risk tolerance level

      2.1 Define the information security target state

      2.2 Assess current security capabilities

      2.3 Identify security gaps

      2.4 Build initiatives to bridge the gaps

      3.1 Continue assessing current security capabilities

      3.2 Identify security gaps

      3.3 Build initiatives to bridge the maturity gaps

      3.4 Identify initiative list and task list

      3.5 Define criteria to be used to prioritize initiatives

      4.1 Conduct cost/benefit analysis on initiatives

      4.2 Prioritize gap initiatives based on cost, time, and alignment with the business

      4.3 Build effort map

      4.4 Determine start times and accountability

      4.5 Finalize security roadmap and action plan

      4.6 Create communication plan

      5.1 Finalize deliverables

      5.2 Support communication efforts

      5.3 Identify resources in support of priority initiatives

      Deliverables

      1.Security obligations statement

      2.Security scope and boundaries statement

      3.Defined risk tolerance level

      4.Risk assessment and pressure analysis

      1.Information security target state

      2.Security current state assessment

      3.Initiatives to address gaps

      1.Completed security current state assessment

      2.Task list to address gaps address gaps

      4.Prioritization criteria

      1.Information security roadmap

      2.Draft communication deck

      1.Security strategy roadmap documentation

      2.Detailed cost and effort estimates

      3.Mapping of Info-Tech resources against individual initiatives

      Executive Brief Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research group

      Founded over 100 years ago, Credit Service Company (CSC)* operates in the United States with over 40 branches located across four states. The organization services over 50,000 clients.

      Situation

      Increased regulations, changes in technology, and a growing number of public security incidents had caught the attention of the organization’s leadership. Despite awareness, an IT and security strategy had not been previously created. Management was determined to create a direction for the security team that aligned with their core mission of providing exceptional service and expertise.

      Solution

      During the workshop, the IT team and Info-Tech analysts worked together to understand the organization’s ideal state in various areas of information security. Having a concise understanding of requirements was a stepping stone to beginning to develop CSC’s prioritized strategy.

      Results

      Over the course of the week, the team created a document that concisely prioritized upcoming projects and associated costs and benefits. On the final day of the workshop, the team effectively presented the value of the newly developed security strategy to senior management and received buy-in for the upcoming project.

      *Some details have been changed for client privacy.

      Phase 1

      Assess Security Requirements

        Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

        Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

        Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

        Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      1.1 Define goals and scope of the security strategy.

      1.2 Assess your organization’s current inherent security risks.

      1.3 Determine your organization’s stakeholder pressures for security.

      1.4 Determine your organization’s risk tolerance.

      1.5 Establish your security target state.

      1.1.1 Record your business goals

      Once you have identified your primary and secondary business goals, as well as the corresponding security alignment goals, record them in the Information Security Requirements Gathering Tool. The tool provides an activity status that will let you know if any parts of the tool have not been completed.

      1. Record your identified primary and secondary business goals in the Goals Cascade tab of the Information Security Requirements Gathering Tool.

      Use the drop-down lists to select an appropriate goal or choose “Other.” If you do choose “Other,” you will need to manually enter an appropriate business goal.

      2. For each of your business goals, select one to two security alignment goals. The tool will provide you with recommendations, but you can override these by selecting a different goal from the drop-down lists.

      A screenshot of the ‘Business Goals Cascade,’ which is part of the ‘Information Security Requirements Gathering Tool.’

      A common challenge for security leaders is how to express their initiatives in terms that are meaningful to business executives. This exercise helps to make an explicit link between what the business cares about and what security is trying to accomplish.

      1.1.2 Review your goals cascade

      Estimated Time: 15 minutes

      1. When you have completed the goals cascade, you can review a graphic diagram that illustrates your goals. The graphic is found on the Results tab of the Information Security Requirements Gathering Tool.
        • Security must support the primary business objectives. A strong security program will enable the business to compete in new and creative ways, rather than simply acting as an obstacle.
        • Failure to meet business obligations can result in operational problems, impacting the organization’s ability to function and the organization’s bottom line.
      2. Once you have reviewed the diagram, copy it into the Information Security Strategy Communication Deck.

      A screenshot of the ‘Goal Cascade Diagrams,’ which is part of the ‘Information Security Requirements Gathering Tool.’

      Identify your compliance obligations

      Most conventional regulatory obligations are legally mandated legislation or compliance obligations, such as:

      Sarbanes-Oxley Act (SOX)

      Applies to public companies that have registered equity or debt securities within the SEC to guarantee data integrity against financial fraud.

      Payment Card Industry Data Security Standard (PCI DSS)

      Applies to any organization that processes, transmits, or stores credit card information to ensure cardholder data is protected.

      Health Insurance Portability and Accountability Act (HIPAA)

      Applies to the healthcare sector and protects the privacy of individually identifiable healthcare information.

      Health Information Technology for Economic and Clinical Health (HITECH)

      Applies to the healthcare sector and widens the scope of privacy and security protections available under HIPAA.

      Personal Information Protection and Electronic Documents Act (PIPEDA)

      Applies to private sector organizations that collect personal information in Canada to ensure the protection of personal information in the course of commercial business.

      Compliance obligations also extend to voluntary security frameworks:

      NIST

      National Institute of Standards and Technology; a non-regulatory agency that develops and publicizes measurement

      CIS – 20 CSC

      Center for Internet Security – 20 Critical Security Controls; foundational set of effective cybersecurity practices.

      ISO 27001

      An information security management system framework outlining policies and procedures.

      COBIT 5

      An information technology and management and governance framework.

      HITRUST

      A common security framework for organizations that use or hold regulated personal health information.

      1.1.3 Record your compliance obligations

      Estimated Time: 30 minutes

      1. Identify your compliance obligations. Most organizations have compliance obligations that must be adhered to. These can include both mandatory and voluntary obligations. Mandatory obligations include:
        • Laws
        • Government regulations
        • Industry standards
        • Contractual agreements
        Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your security strategy, include only those that have information security or privacy requirements.
      2. Record your compliance obligations, along with any notes, in your copy of the Information Security Requirements Gathering Tool.

      A screenshot of ‘Security Compliance Obligations,’ part of the ‘Information Security Requirements Gathering Tool.’

      Establish your scope and boundaries

      It is important to know at the outset of the strategy: what are we trying to secure?

      This includes physical areas we are responsible for, types of data we care about, and departments or IT systems we are responsible for.

      This also includes what is not in scope. For some outsourced services or locations, you may not be responsible for their security. In some business departments, you may not have control of security processes. Ensure that it is made explicit at the outset what will be included and what will be excluded from security considerations.

      Physical Scope and Boundaries

      • How many offices and locations does your organization have?
      • Which locations/offices will be covered by your information security management system (ISMS)?
      • How sensitive is the data residing at each location?
      • You may have many physical locations, and it is not necessary to list every one. Rather, list exceptional cases that are specifically in or out of scope.

      IT Systems Scope and Boundaries

      • There may be hundreds of applications that are run and maintained in your organization. Some of these may be legacy applications. Does your ISMS need to secure all your programs or a select few?
      • Is the system owned or outsourced?
      • Where are we accountable for security?
      • How sensitive is the data that each system handles?

      Organizational Scope and Boundaries

      • Will your ISMS cover all departments within your organization? For example, do certain departments (e.g. Operations) not need any security coverage?
      • Do you have the ability to make security decisions for each department?
      • Who are the key stakeholders/data owners for each department?

      Organizational scope considerations

      Many different groups will fall within the purview of the security strategy. Consider these two main points when deciding which departments will be in scope:

      1. If a group/user has access to data or systems that can impact the organization, then securing that group/user should be included within scope of the security strategy.
      2. If your organization provides some work direction to a group/user, they should be included within scope of the security strategy.
      1. Identify your departments and business groups
        • Start by identifying departments that provide some essential input or service to the organization or departments that interact with sensitive data.
      2. Break out different subsidiaries or divisions
        • Subsidiaries may or may not be responsible for securing themselves and protecting their data, but either way they are often heavily reliant on corporate for guidance and share IT resourcing support.
      3. Identify user groups
        • Many user groups exist, all requiring different levels of security. For example, from on-premises to remote access, from full-time employees to part-time or contractors.

      Physical scope considerations

      List physical locations by type

      Offices

      The primary location(s) where business operations are carried out. Usually leased or owned by the business.

      Regional Offices

      These are secondary offices that can be normal business offices or home offices. These locations will have a VPN connection and some sort of tenant.

      Co-Locations

      These are redundant data center sites set up for additional space, equipment, and bandwidth.

      Remote Access

      This includes all remaining instances of employees or contractors using a VPN to connect.

      Clients and Vendors

      Various vendors and clients have dedicated VPN connections that will have some control over infrastructure (whether owed/laaS/other).

      List physical locations by nature of the location

      Core areas within physical scope

      These are many physical locations that are directly managed. These are high-risk locations with many personal and services, resulting in many possible vulnerabilities and attack vectors.

      Locations on the edge of control

      These are on the edge of the physical scope, and thus, in scope of the security strategy. These include remote locations, remote access connections, etc.

      Third-party connections

      Networks of third-party users are within physical scope and need defined security requirements and definitions of how this varies per user.

      BYOD

      Mostly privately owned mobile devices with either on-network or remote access.

      It would be overkill and unhelpful to list every single location or device that is in scope. Rather, list by broad categories as suggested above or simply list exceptional cases that are in/out of scope.

      IT systems scope considerations

      Consider identifying your IT systems by your level of control or ownership.

      Fully owned systems

      These are systems that are wholly owned or managed by your organization.

      IT is almost always the admin of these systems. Generally they are hosted on premises. All securitization through methods such as patching or antivirus is done and managed by your IT department.

      Cloud/remote hosted (SaaS)

      These are systems with a lot of uncertainties because the vendor or service provided is either not known or what they are doing for security is not fully known.

      These systems need to be secured regardless, but supplier and vendor relationship management becomes a major component of how to manage these systems. Often, each system has varying levels of risk based on vendor practices.

      Hybrid owned (IaaS/PaaS)

      You likely have a good understanding of control for these systems, but they may not be fully managed by you (i.e. ownership of the infrastructure). These systems are often hosted by third parties that do some level of admin work.

      A main concern is the unclear definition of responsibility in maintaining these systems. These are managed to some degree by third parties; it is challenging for your security program to perform the full gamut of security or administrative functions.

      Unknown/unowned systems

      There are often systems that are unowned and even unknown and that very few people are using. These apps can be very small and my not fall under your IT management system framework. These systems create huge levels of risk due to limited visibility.

      For example, unapproved (shadow IT) file sharing or cloud storage applications would be unknown and unowned.

      1.1.4 Record your scope and boundaries

      Estimated Time: 30-60 minutes

      1. Divide into groups and give each group member a handful of sticky notes. Ask them to write down as many items as possible for the organization that could fall under one of the scope buckets.
      2. Collect each group’s responses and discuss the sticky notes and the rationale for including them. Discuss your security-related locations, data, people, and technologies, and define their scope and boundaries.
        • Careful attention should be paid to any elements of the strategy that are not in scope.
      3. Discuss and aggregate all responses as to what will be in scope of the security strategy and what will not be. Record these in the Information Security Requirements Gathering Tool.

      A screenshot of ‘Scope and Boundaries,’ part of the ‘Information Security Requirements Gathering Tool.’

      1.2 Conduct a risk assessment

      Estimated Time: 1-3 hours

      1. As a group, review the questions on the Risk Assessment tab of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following risk elements:
        • Threats
        • Assets
        • Vulnerabilities (people, systems, supply chain)
        • Historical security incidents

      Input

      • List of organizational assets
      • Historical data on information security incidents

      Output

      • Completed risk assessment

      Materials

      • Information Security Pressure Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Risk Management

      Download the Information Security Pressure Analysis Tool

      1.2.1 Complete the risk assessment questionnaire

      Estimated Time: 60-90 minutes

      1. Review each question in the questionnaire and provide the most appropriate response using the drop-down list.
        • If you are unsure of the answer, consult with subject matter experts to obtain the required data.
        • Otherwise, provide your best estimation
      2. When providing responses for the historical incident questions, only count incidents that had a sizeable impact on the business.

      A screenshot of the ‘Organizational Security Risk Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      Info-Tech Insight

      Understanding your organization’s security risks is critical to identifying the most appropriate level of investment into your security program. Organizations with more security risks will need more a mature security program to mitigate those risks.

      1.2.2 Review the results of the risk assessment

      Estimated Time: 30 minutes

      1. Once you have completed the risk assessment, you can review the output on the Results tab.
      2. If required, the weightings of each of the risk elements can be customized on the Weightings tab.
      3. Once you have reviewed the results, copy your risk assessment diagram into the Information Security Strategy Communication Deck.

      A screenshot showing sample results of the ‘Organizational Risk Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      It is important to remember that the assessment measures inherent risk, meaning the risk that exists prior to the implementation of security controls. Your security controls will be assessed later as part of the gap analysis.

      1.3 Conduct pressure analysis

      Estimated Time: 1-2 hours

      1. As a group, review the questions on the Pressure Analysis tab of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following pressure elements:
        • Compliance and oversight
        • Customer expectations
        • Business expectations
        • IT expectations

      Input

      • Information on various pressure elements within the organization

      Output

      • Completed pressure analysis

      Materials

      • Information Security Pressure Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Business Leaders
      • Compliance

      Download the Information Security Pressure Analysis Tool

      Risk tolerance considerations

      At this point, we want to frame risk tolerance in terms of business impact. Meaning, what kinds of impacts to the business would we be able to tolerate and how often? This will empower future risk decisions by allowing the impact of a potential event to be assessed, then compared against the formalized tolerance. We will consider impact from three perspectives:

      F

      Functional Impact

      The disruption or degradation of business/organizational processes.

      I

      Informational Impact

      The breach of confidentiality, privacy, or integrity of data/information.

      R

      Recoverability Impact

      The disruption or degradation of the ability to return to conditions prior to a security incident.

      Consider these questions:

      Questions to ask

      Description

      Is there a hard-dollar impact from downtime?

      This refers to when revenue or profits are directly impacted by a business disruption. For example, when an online ordering system is compromised and shut down, it affects sales, and therefore, revenue.

      Is regulatory compliance a factor?

      Depending on the circumstances of the vulnerabilities, it can be a violation of compliance obligations that would cause significant fines.

      Are any critical services dependent on this asset?

      Functional dependencies are sometimes not obvious, and assets that appear marginal can have huge impacts on critical services.

      Is there a health or safety risk?

      Some operations are critical to health and safety. For example, medical organizations have operations that are necessary to ensure uninterrupted critical health services. An exploited vulnerability that impacts these operations can have life and death consequences.

      ANALYST PERSPECTIVE

      It is crucial to keep in mind that you care about a risk scenario impact to the main business processes.

      For example, imagine a complete functional loss of the corporate printers. For most businesses, even the most catastrophic loss of printer function will have a small impact on their ability to carry out the main business functions.

      On the flip side, even a small interruption to email or servers could have a large functional impact on business processes.

      Risk tolerance descriptions

      High

      • Organizations with high risk tolerances are often found in industries with limited security risk, such as Construction, Agriculture and Fishing, or Mining.
      • A high risk tolerance may be appropriate for organizations that do not rely on highly sensitive data, have limited compliance obligations, and where their customers do not demand strong security controls. Organizations that are highly focused on innovation and rapid growth may also tend towards a higher risk tolerance.
      • However, many organizations adopt a high risk tolerance by default simply because they have not adequately assessed their risks.

      Moderate

      • Organizations with medium risk tolerances are often found in industries with moderate levels of security risk, such as Local Government, Education, or Retail and Wholesale
      • A medium risk tolerance may be appropriate for organizations that store and process some sensitive data, have a modest number of compliance obligations, and where customer expectations for security tend to be implicit rather than explicit.

      Low

      • Organizations with low risk tolerances are often found in industries with elevated security risk, such as Financial Services, Federal Governments, or Defense Contractors.
      • A low risk tolerance may be appropriate for organizations that store very sensitive data, process high-value financial transactions, are highly regulated, and where customers demand strong security controls.
      • Some organizations claim to have a low risk tolerance, but in practice will often allow business units or IT to accept more security risk than would otherwise be permissible. A strong information security program will be required to manage risks to an acceptable level.

      1.4.1 Complete the risk tolerance questionnaire

      Estimated Time: 30-60 minutes

      1. In a group discussion, review the low-, medium-, and high-impact scenarios and examples for each impact category. Ensure that everyone has a consistent understanding of the scenarios.
      2. For each impact type, use the frequency drop-down list to identify the maximum frequency that the organization could tolerate for the event scenarios, considering:
        • The current frequency with which the scenarios are occurring in your organization may be a good indication of your tolerance. However, keep in mind that you may be able to tolerate these incidents happening more frequently than they do.
        • Hoping is not the same as tolerating. While everyone hopes that high-impact incidents never occur, carefully consider whether you could tolerate them occurring more frequently.

      A screenshot showing the ‘Organizational Security Risk Tolerance Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      1.4.2 Review the results of the risk tolerance analysis

      Estimated Time: 30 minutes

      1. Once you have completed the risk tolerance exercise, you can review the output on the Results tab.
      2. If required, the weightings of each of the impact types can be customized on the Weightings tab.
      3. Once you have reviewed the results, copy your risk tolerance diagram into the Information Security Strategy Communication Deck.

      A screenshot showing the results of the 'Information Security Risk Tolerance Assessment,' part of the ‘Information Security Pressure Analysis Tool.’

      A low risk tolerance will require a stronger information security program to ensure that operational security risk in the organization is minimized. If this tool reports that your risk tolerance is low, it is recommended that you review the results with your senior stakeholders to ensure agreement and support for the security program.

      1.5 Establish your target state

      Estimated Time: 30-60 minutes

      1. As a group, review the overall results of the requirements gathering exercise:
        • Business goals cascade
        • Compliance obligations
        • Scope
      2. Review the overall results of the risk assessment, pressure analysis, and risk tolerance exercises.
      3. Conduct a group discussion to arrive at a consensus of what the ideal target state for the information security program should look like.
        • Developing mission and vision statements for security may be useful for focusing the group.
        • This discussion should also consider the desired time frame for achieving the target state.

      Download the Information Security Pressure Analysis Tool

      Input

      • Information security requirements (goals cascade, compliance obligations, scope)
      • Risk assessment
      • Pressure analysis
      • Risk tolerance

      Output

      • Completed information security target state

      Materials

      Participants

      • Security Team
      • IT Leadership
      • Risk Management
      • Business Leaders
      • Compliance

      Understanding security target states

      Maturity models are very effective for determining information security target states. This table provides general descriptions for each maturity level. As a group, consider which description most accurately reflects the ideal target state for information security in your organization.

      1. AD HOC

        Initial/Ad hoc security programs are reactive. Lacking strategic vision, these programs are less effective and less responsive to the needs of the business.
      2. DEVELOPING

        Developing security programs can be effective at what they do but are not holistic. Governance is largely absent. These programs tend to rely on the talents of individuals rather than a cohesive plan.
      3. DEFINED

        A defined security program is holistic, documented, and proactive. At least some governance is in place, however, metrics are often rudimentary and operational in nature. These programs still often rely on best practices rather than strong risk management.
      4. MANAGED

        Managed security programs have robust governance and metrics processes. Management and board-level metrics for the overall program are produced. These are reviewed by business leaders and drive security decisions. More mature risk management practices take the place of best practices.
      5. OPTIMIZED

        An optimized security program is based on strong risk management practices, including the production of key risk indicators (KRIs). Individual security services are optimized using key performance indicators (KPIs) that continually measure service effectiveness and efficiency.

      1.5.1 Review the results of the target state recommendation

      Estimated Time: 30-60 minutes

      1. Based upon your risk assessment, pressure analysis, and risk tolerance, the Information Security Pressure Analysis Tool will provide a recommended information security target state.
      2. With your group, review the recommendation against your expectations.
      3. If required, the weightings of each of the factors can be customized on the Weightings tab.
      4. Once you have reviewed the results, copy your target state diagram into the Information Security Strategy Communication Deck.

      A screenshot showing the results of the ‘Information Security Target State,’ part of the ‘Information Security Pressure Analysis Tool.’

      Info-Tech Insight

      Higher target states require more investment to attain. It is critical to ensure that all key stakeholders agree on the security target state. If you set a target state that aims too high, you may struggle to gain support and funding for the strategy. Taking this opportunity to ensure alignment from the start will pay off dividends in future.

      1.5.2 Review and adjust risk and pressure weightings

      Estimated Time: 30 minutes

      1. If the results of your risk assessment, pressure analysis, risk tolerance, or target state do not match your expectations, you may need to review and adjust the weightings for the elements within one or more of these areas.
      2. On the Weightings tab, review each of the strategic categories and adjust the weights as required.
        • Each domain is weighted to contribute to your overall pressure score based on the perceived importance of the domain to the organization.
        • The sum of all weights for each category must add up to 100%.

      A screenshot showing the results of the weightings given to each factor in a category, part of the ‘Information Security Pressure Analysis Tool.’

      Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research group

      Below are some of the primary requirements that influenced CSC’s initial strategy development.

      External Pressure

      Pressure Level: High

      • Highly regulated industries, such as Finance, experience high external pressure.
      • Security pressure was anticipated to increase over the following three years due to an increase in customer requirement.

      Obligations

      Regulatory: Numerous regulations and compliance requirements as a financial institution (PCI, FFIEC guidance).

      Customer: Implicitly assumes personal, financial, and health information will be kept secure.

      Risk Tolerance

      Tolerance Level: Low

      1. Management: Are risk averse and have high visibility into information security.
      2. Multiple locations controlled by a central IT department decreased the organization’s risk tolerance.

      Summary of Security Requirements

      Define and implement dynamic information security program that understands and addresses the business’ inherent pressure, requirements (business, regulatory, and customer), and risk tolerance.

      Phase 2

      Build a Gap Initiative Strategy

        Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

        Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

        Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

        Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

        This phase will walk you through the following activities:

      • 2.1 Review Info-Tech’s framework.
      • 2.2 Assess your current state of security against your target state.
      • 2.3 Identify actions required to close gaps.

      2.1 Review the Info-Tech framework

      Estimated Time: 30-60 minutes

      1. As a group, have the security team review the security framework within the Information Security Gap Analysis Tool.
      2. Customize the tool as required using the instructions on the following slides.

      Input

      • Information security requirements
      • Security target state

      Output

      • Customized security framework

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team

      Download the Information Security Gap Analysis Tool

      Understand the Info-Tech framework

      Info-Tech’s security framework uses a best-of-breed approach to leverage and align with most major security standards, including:

      • ISO 27001/27002
      • COBIT
      • Center for Internet Security (CIS) Critical Controls
      • NIST Cybersecurity Framework
      • NIST SP 800-53
      • NIST SP 800-171

      A diagram depicting Info-Tech’s best-of-breed security framework.

      A best-of-breed approach ensures holistic coverage of your information security program while refraining from locking you in to a specific compliance standard.

      2.1.1 Configure the Information Security Gap Analysis Tool

      Estimated Time: 30 minutes

      Review the Setup tab of the Information Security Gap Analysis Tool. This tab contains several configurable settings that should be customized to your organization. For now, the three settings you will need to modify are:

      • The security target state. Enter the target state from your Information Security Pressure Analysis Tool. If you do not enter a target state, the tool will default to a target of 3 (Defined).
      • Your Security Alignment Goals (from your Information Security Requirements Gathering Tool).
      • The starting year for your security roadmap.

      A screenshot showing the ‘Setup’ tab of the ‘Information Security Gap Analysis Tool.’

      2.2 Assess current state of security

      Estimated Time: 8-16 hours

      1. Using the Information Security Gap Analysis Tool, review each of the controls in the Gap Analysis tab.
      2. Follow the instructions on the next slides to complete your current state and target state assessment.
      3. For most organizations, multiple internal subject matter experts will need to be consulted to complete the assessment.

      Input

      • Security target state
      • Information on current state of security controls, including sources such as audit findings, vulnerability and penetration test results, and risk registers

      Output

      • Gap analysis

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management

      Download the Information Security Gap Analysis Tool

      Example maturity levels

      To help determine appropriate current and target maturity levels, refer to the example below for the control “Email communication is filtered for spam and potential malicious communications.”

      AD HOC 01

      There is no centrally managed spam filter. Spam may be filtered by endpoint email clients.

      DEVELOPING 02

      There is a secure email gateway. However, the processes for managing it are not documented. Administrator roles are not well defined. Minimal fine-tuning is performed, and only basic features are in use.

      DEFINED 03

      There is a policy and documented process for email security. Roles are assigned and administrators have adequate technical training. Most of the features of the solution are being used. Rudimentary reports are generated, and some fine-tuning is performed.

      MANAGED 04

      Metrics are produced to measure the effectiveness of the email security service. Advanced technical features of the solution have been implemented and are regularly fine-tuned based on the metrics.

      OPTIMIZED 05

      There is a dedicated email security administrator with advanced technical training. Custom filters are developed to further enhance security, based on relevant cyber threat intelligence. Email security metrics feed key risk indicators that are reported to senior management.

      2.2.1 Conduct current state assessment

      Estimated Time: 8-16 hours

      1. Carefully review each of the controls in the Gap Analysis tab. For each control, indicate the current maturity level using the drop-down list.
        • You should only use “N/A” if you are confident that the control is not required in your organization.
        • For example, if your organization does not perform any software development then you can select “N/A” for any controls related to secure coding practices.
      2. Provide comments to describe your current state. This step is optional but recommended as it may be important to record this information for future reference.
      3. Select the target maturity for the control. The tool will default to the target state for your security program, but this can be overridden using the drop-down list.

      2.2.1 Conduct current state assessment

      Estimated Time: 8-16 hours

      1. Carefully review each of the controls in the Gap Analysis tab. For each control, indicate the current maturity level using the drop-down list.
        • You should only use “N/A” if you are confident that the control is not required in your organization. For example, if your organization does not perform any software development then you can select “N/A” for any controls related to secure coding practices.
      2. Provide comments to describe your current state. This step is optional but recommended as it may be important to record this information for future reference.
      3. Select the target maturity for the control. The tool will default to the target state for your security program, but this can be overridden using the drop-down list.

      A screenshot showing the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Review the Gap Analysis Dashboard

      Use the Gap Assessment Dashboard to map your progress. As you fill out the Gap Analysis Tool, check with the Dashboard to see the difference between your current and target state.

      Use the color-coded legend to see how large the gap between your current and target state is. The legend can be customized further if desired.

      Security domains that appear white have not yet been assessed or are rated as “N/A.”

      2.2.3 Identify actions required to close gaps

      Estimated Time: 4-8 hours

      1. Using the Information Security Gap Analysis Tool, review each of the controls in the Gap Analysis tab.
      2. Follow the instructions on the next slides to identify gap closure actions for each control that requires improvement.
      3. For most organizations, multiple internal subject matter experts will need to be consulted to complete the assessment.

      Input

      • Security control gap information

      Output

      • Gap closure action list

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management

      Download the Information Security Gap Analysis Tool

      2.3.1 Identify gap closure actions

      Estimated Time: 4-8 hours

      1. For each of the controls where there is a gap between the current and target state, a gap closure action should be identified:
        • Review the example actions and copy one or more of them if appropriate. Otherwise, enter your own gap closure action.
      2. Identify whether the action should be managed as a task or as an initiative. Most actions should be categorized as an initiative. However, it may be more appropriate to categorize them as a task when:
        1. They have no costs associated with them
        2. They require a low amount of initial effort to implement and no ongoing effort to maintain
        3. They can be accomplished independently of other tasks

      A screenshot showing gap closure actions, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Considerations for gap closure actions

      • In small groups, have participants ask, “what would we have to do to achieve the target state?” Document these in the Gap Closure Actions column.
      • The example gap closure actions may be appropriate for your organization, but do not simply copy them without considering whether they are right for you.
      • Not all gaps will require their own action. You can enter one action that may address multiple gaps.
      • If you find that many of your actions are along the lines of “investigate and make recommendations,” you should consider using the estimated gap closure percentage column to track the fact that these gaps will not be fully closed by the actions.

      A screenshot showing considerations for gap closure actions, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      2.3.2 Define gap closure action effectiveness

      Estimated Time: 1-2 hours

      For each of the gap closure actions, optionally enter an estimated gap closure percentage to indicate how effective the action will be in fully closing the gap.

      • For instance, an action to “investigate solutions and make recommendations” will not fully close the gap.
      • This is an optional step but will be helpful to understand how much progress towards your security target state you will make based on your roadmap.
      • If you do not fill in this column, the tool will assume that your actions will fully close all gaps.

      A screenshot showing considerations for estimated gap closure percentage, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Completing this step will populate the “Security Roadmap Progression” diagram in the Results tab, which will provide a graphic illustration of how close to your target state you will get based upon the roadmap.

      Phase 3

      Prioritize Initiatives and Build Roadmap

      Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

      Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

      Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

      Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      • 3.1 Define tasks and initiatives.
      • 3.2 Define cost, effort, alignment, and security benefit of each initiative.
      • 3.3 Prioritize initiatives.
      • 3.4 Build the prioritized security roadmap

      3.1 Define tasks and initiatives

      Estimated Time: 2-4 hours

      1. As a group, review the gap actions identified in the Gap Analysis tab.
      2. Using the instructions on the following slides, finalize your task list.
      3. Using the instructions on the following slides, review and consolidate your initiative list.

      Input

      • Gap analysis

      Output

      • List of tasks and initiatives

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.1.1 Finalize your task list

      Estimated Time: 1-2 hours

      1. Obtain a list of all your task actions by filtering on the Action Type column in the Gap Analysis tab.
      2. Paste the list into the table on the Task List tab.
        • Use Paste Values to retain the table formatting
      3. Enter a task owner and due date for each task. Without accountability, it is too easy to fall into complacency and neglect these tasks.

      A screenshot showing the 'Task List' tab of the 'Information Security Gap Analysis Tool.'

      Info-Tech Insight

      Tasks are not meant to be managed to the same degree that initiatives will be. However, they are still important. It is recommended that you develop a process for tracking these tasks to completion.

      3.1.2 Consolidate your gap closure actions into initiatives

      Estimated Time: 2-3 hours

      1. Once you have finalized your task list, you will need to consolidate your list of initiative actions. Obtain a list of all your initiative actions by filtering on the Action Type column in the Gap Analysis tab.
      2. Create initiatives on the Initiative List tab. While creating initiatives, consider the following:
        • As much as possible, it is recommended that you consolidate multiple actions into a single initiative. Reducing the total number of initiatives will allow for more efficient management of the overall roadmap.
        • Start by identifying areas of commonality between gap closure actions, for instance:
          • Group all actions within a security domain into a single initiative.
          • Group together similar actions, such as all actions that require updating policies.
          • Consider combining actions that have inter-dependencies.
        • While it is recommended that you consolidate actions as much as possible, some actions should become initiatives on their own. This will be appropriate when:
          • The action is time sensitive and consolidating it with other actions will cause scheduling issues.
          • Actions that could otherwise be consolidated have different business sponsors or owners and need to be kept separate for funding or accountability reasons.
      3. Link the initiative actions on the Gap Analysis tab using the drop-down list in the Initiative Name column.

      Initiative consolidation example

      In the example below, we see three gap closure actions within the Security Culture and Awareness domain being consolidated into a single initiative “Develop security awareness program.”

      We can also see one gap closure action within the same domain being grouped with two actions from the Security Policies domain into another initiative “Update security policies.”

      Info-Tech Insight

      As you go through this exercise, you may find that some actions that you previously categorized as tasks could be consolidated into an initiative.

      A screenshot showing how six sample gap closure actions can be distilled into two gap closure initiatives. Part of the 'Information Security Gap Analysis Tool.'

      3.1.3 Finalize your initiative list

      Estimated Time: 30 minutes

      1. Review your final list of initiatives and make any required updates.
      2. Optionally, add a description or paste in a list of the individual gap closure actions that are associated with the initiative. This will make it easier to perform the cost and benefit analysis.
      3. Use the drop-down list to indicate which of the security alignment goals most appropriately reflects the objectives of the initiative. If you are unsure, use the legend next to the table to find the primary security domain associated with the initiative and then select the recommended security alignment goal.
        • This step is important to understand how the initiative supports the business goals identified earlier.

       A screenshot showing the primary security alignment goal, part of the 'Initiative List' tab of the 'Information Security Gap Analysis Tool.'

      3.2 Conduct cost/ benefit analysis

      Estimated Time: 1-2 hours

      1. As a group, define the criteria to be used to conduct the cost/benefit analysis, following the instructions on the next slide.
      2. Assign costing and benefits information for each initiative.
      3. Define dependencies or business impacts if they will help with prioritization.

      Input

      • Gap analysis
      • Initiative list

      Output

      • Completed cost/benefit analysis for initiative list

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.2.1 Define costing criteria

      Estimated Time: 30 minutes

      1. On the Setup tab of the Information Security Gap Analysis Tool, enter high, medium, and low ranges for initial and ongoing costs and efforts.
        1. Initial costs are one-time, upfront capital investments (e.g. hardware and software costs, project-based consulting fees, training).
        2. Ongoing cost is any annually recurring operating expenses that are new budgetary costs (e.g. licensing, maintenance, subscription fees).
        3. Initial staffing in hours is total time in person hours required to complete a project. It is not total elapsed time but dedicated time. Consider time required to gather requirements and to design, test, and implement the solution.
        4. Ongoing staffing in FTEs is the ongoing average effort required to support that initiative after implementation.
      2. In addition to ranges, provide an average for each. These will be used to calculate estimated total costs for the roadmap.

      A screenshot showing the initiative costs for estimation, part of the 'Setup' tab of the 'Information Security Gap Analysis Tool.' The range of costs is labeled with an arrow with number 1 on it, and the average cost per initiative is labeled with an arrow with number 2 on it.

      Make sure that your ranges allow for differentiation between initiatives to enable prioritization. For instance, if you set your ranges too low, all your initiatives will be assessed as high cost, providing no help when you must prioritize them.

      3.2.2 Define benefits criteria

      Estimated Time: 30 minutes

      1. On the Setup tab of the Information Security Gap Analysis Tool, enter high, medium, and low values for the Alignment with Business Benefit.
        • This variable is meant to capture how well each initiative aligns with organizational goals and objectives.
        • By default, this benefit is linked directly to business goals through the primary and secondary security alignment goals. This allows the tool to automatically calculate the benefit based on the security alignment goals associated with each initiative.
        • If you change these values, you may need to override the calculated values in the prioritization tab.
      2. Enter a high, medium, and low value for the Security Benefit.
        • This variable is meant to capture the relative security benefit or risk reduction being provided by the gap initiative.
        • By default, this benefit is linked to security risk reduction.

      A screenshot showing the initiative benefits for estimation, part of the 'Setup' tab of the 'Information Security Gap Analysis Tool.'

      Some organizations prefer to use the “Security Benefit” criteria to demonstrate how well each initiative supports specific compliance goals.

      3.2.3 Complete the cost/benefit analysis

      Estimated Time: 1-2 hours

      1. On the Prioritization tab, use the drop-down lists to enter the estimated costs and efforts for each initiative, using the criteria defined earlier.
        • If you have actual costs available, you can optionally enter them under the Detailed Cost Estimates columns.
      2. Enter the estimated benefits, also using the criteria defined earlier.
        • The Alignment with Business benefit will be automatically populated, but you can override this value using the drop-down list if desired.

      A screenshot showing the estimated cost, estimated effort, and estimated benefits section, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' Estimated cost and estimated effort are labeled with an arrow with number 1 on it, and estimated benefits is labeled with an arrow with a number 2 on it.

      3.2.4 Optionally enter detailed cost estimates

      Estimated Time: 30 minutes

      1. For each initiative, the tool will automatically populate the Detailed Cost Estimates and Detailed Staffing Estimates columns using the averages that you provided in steps 3.2.1 and 3.2.2. However, if you have more detailed data about the costs and effort requirements for an initiative, you can override the calculated data by manually entering it into these columns. For example:
        • You are planning to subscribe to a security awareness vendor, and you have a quote from them specifying that the initial cost will be $75,000.
        • You have defined your “Medium” cost range as being “$10-100K”, so you select medium as your initial cost for this initiative in step 3.2.3. As you defined the average for medium costs as being $50,000, this is what the tool will put into the detailed cost estimate.
        • You can override this average by entering $75,000 as the initial cost in the detailed cost estimate column.

      A screenshot showing the detailed cost estimates and detailed staffing estimates columns, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' These columns are labeled with an arrow with a number 1 on it.

      Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research Group

      A chart titled 'Framework Components,' displaying how the Credit Service Company profiled in the case study performed a current state assessment, created gap initiatives, and prioritized gap initiatives.

      3.3 Prioritize initiatives

      Estimated Time: 2-3 hours

      1. As a group, review the results of the cost/benefit analysis. Optionally, complete the Other Considerations columns in the Prioritization tab:
        • Dependencies can refer to other initiatives on the list or any other dependency that relates to activities or projects within the organization.
        • Business impacts can be helpful to document as they may require additional planning and communication that could impact initiative timelines.
      2. Follow step 3.3.1 to create an effort map with the results of the cost/benefit analysis.
      3. Follow step 3.3.2 to assign initiatives into execution waves.

      Input

      • Gap analysis
      • Initiative list
      • Cost/benefit analysis

      Output

      • Prioritized list of initiatives

      Materials

      • Information Security Gap Analysis Tool
      • Whiteboard

      Participants

      • Security Team
      • IT Leadership
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.3.1 Create effort map

      Estimated Time: 30 minutes

      1. On a whiteboard, draw the quadrant diagram shown.
      2. Create sticky notes for each initiative on your initiative list.
      3. For each initiative, use the “Cost/Effort Rating” and the “Benefit Rating” calculated on the Prioritization tab to place the corresponding sticky note onto the diagram.

      An effort map is a tool used for the visualization of a cost/benefit analysis. It is a quadrant output that visually shows how your gap initiatives were prioritized. In this example, the initiative “Update Security Policies” was assessed as low cost/effort (3) and high benefit (10).

      An image showing how 'update security policies,' as ranked on a cost/effort and benefit quadrant, translates to a cost/effort and benefit rating on the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.'

      3.3.2 Assign initiatives to execution waves

      Estimated Time: 60 minutes

      1. Using sticky flip chart sheets, create four sheets and label them according to the four execution waves:
        • MUST DO – These are initiatives that need to get moving right away. They may be quick wins, items with critical importance, or foundational projects upon which many other initiatives depend.
        • SHOULD DO – These are important initiatives that need to get done but cannot launch immediately due to budget constraints, dependencies, or business impacts that require preparation.
        • COULD DO – Initiatives that have merit but are not a priority.
        • WON’T DO – Initiatives where the costs outweigh the benefits.
      2. Using the further instructions on the following slides, move the initiative sticky notes from your effort map into the waves.

      Considerations for prioritization

      • Starting from the top right of the effort map, begin pulling stickies off and putting them in the appropriate roadmap category.
      • Keep dependencies in mind. If an important initiative depends on a low-priority one being completed first, then pull dependent initiatives up the list.
      • It may be helpful to think of each wave as representing a specific time frame (e.g. wave 1 = first year of your roadmap, wave 2 = year two, wave 3 = year three).

      Info-Tech Insight

      Use an iterative approach. Most organizations tend to put too many initiatives into wave 1. Be realistic about what you can accomplish and take several passes at the exercise to achieve a balance.

      An image showing how to map the sticky notes from a sample exercise, as placed on a cost/effort and benefit quadrant, into waves.

      3.3.3 Finalize prioritization

      Estimated Time: 30 minutes

      1. Once you have completed placing your initiative sticky notes into the waves, update the Prioritization tab with the Roadmap Wave column.
      2. Optionally, use the Roadmap Sub-Wave column to prioritize initiatives within a single wave.
        • This will allow you more granular control over the final prioritization, especially where dependencies require extra granularity.

      Any initiatives that are currently in progress should be assigned to Wave 0.

      An image showing the roadmap wave and roadmap sub-wave sections, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' Roadmap wave is labeled with an arrow with a number 1 on it, and roadmap sub-wave is labeled with an arrow with a number 2 on it.

      3.4 Build roadmap

      Estimated Time: 1-3 hours

      1. As a group, follow step 3.4.1 to create your roadmap by scheduling initiatives into the Gantt chart within the Information Security Gap Analysis Tool.
      2. Review the roadmap for resourcing conflicts and adjust as required.
      3. Review the final cost and effort estimates for the roadmap.

      Input

      • Gap analysis
      • Cost/benefit analysis
      • Prioritized initiative list
      • (Optional) List of other non-security IT and business projects

      Output

      • Security strategic roadmap

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.4.1 Schedule initiatives using the Gantt chart

      Estimated Time: 1-2 Hours

      1. On the Gantt Chart tab for each initiative, enter an owner (the individual who will be primarily responsible for execution).
      2. Additionally, enter a start month and year for the initiative and the expected duration in months.
        • You can filter the Wave column to only see specific waves at any one time to assist with the scheduling.
        • You do not need to schedule Wave 4 initiatives as the expectation is that these initiatives will not be done.

      Info-Tech Insight

      Use the Owner column to help identify resourcing constraints. If a single individual is responsible for many different initiatives that are planned to start at the same time, consider staggering those initiatives.

      An image showing the owner and planned start sections, part of the 'Security Roadmap Gantt Chart' tab of the 'Information Security Gap Analysis Tool.' The owner column is labeled with an arrow with a 1 on it, and the planned start column is labeled with an arrow with a 2 on it.

      3.4.2 Review your roadmap

      Estimated Time: 30-60 minutes

      1. When you have completed the Gantt chart, as a group review the overall roadmap to ensure that it is reasonable for your organization. Consider the following:
        • Do you have other IT or business projects planned during this time frame that may impact your resourcing or scheduling?
        • Does your organization have regular change freezes throughout the year that will impact the schedule?
        • Do you have over-subscribed resources? You can filter the list on the Owner column to identify potential over-subscription of resources.
        • Have you considered any long vacations, sabbaticals, parental leaves, or other planned longer-term absences?
        • Are your initiatives adequately aligned to your budget cycle? For instance, if you have an initiative that is expected to make recommendations for capital expenditure, it must be completed prior to budget planning.

      A screenshot image showing parts of the 'Security Roadmap Gantt Chart' tab with sample data in it. Taken from the 'Information Security Gap Analysis Tool.'

      3.4.3 Review your expected roadmap progression

      Estimated Time: 30 minutes

      1. If you complete the optional exercise of filling in the Estimated Gap Closure Percentage column on the Gap Analysis tab, the tool will generate a diagram showing how close to your target state you can expect to get based on the tasks and initiatives in your roadmap. You can review this diagram on the Results tab.
        • Remember that this Expected Maturity at End of Roadmap score assumes that you will complete all tasks and initiatives (including all Wave 4 initiatives).
      2. Copy the diagram into the Information Security Strategy Communication Deck.

      Info-Tech Insight

      Often, internal stakeholders will ask the question “If we do everything on this roadmap, will we be at our target state?” This diagram will help answer that question.

      A screenshot image showing the 'Expected Security Roadmap Progression' with sample data in it. Part of the 'Results' tab of the 'Information Security Gap Analysis Tool.'

      3.4.4 Review your cost/effort estimates table

      Estimated Time: 30 minutes

      1. Once you have completed your roadmap, review the total cost/effort estimates. This can be found in a table on the Results tab. This table will provide initial and ongoing costs and staffing requirements for each wave. This also includes the total three-year investment. In your review consider:
        • Is this investment realistic? Will completion of your roadmap require adding more staff or funding than you otherwise expected?
        • If the investment seems unrealistic, you may need to revisit some of your assumptions, potentially reducing target levels or increasing the amount of time to complete the strategy.
        • This table provides you with the information to have important conversations with management and stakeholders
      2. When you have completed your review, copy the table into the Information Security Strategy Communication Deck.

      A screenshot image showing the 'Information Security Roadmap Cost/Effort Estimates,' part of the 'Results' tab of the 'Information Security Gap Analysis Tool.'

      Phase 4

      Execute and Maintain

      Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

      Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

      Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

      Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      • 4.1 Build your security strategy communication deck.
      • 4.2 Develop a security charter.
      • 4.3 Execute on your roadmap.

      4.1 Build your communication deck

      Estimated Time: 1-3 hours

      1. As a group, review the Information Security Strategy Communication Deck.
      2. Follow the instructions within the template and on the next few slides to customize the template with the results of your strategic roadmap planning.

      Input

      • Completed Security Requirements Gathering Tool
      • Completed Security Pressure Analysis Tool
      • Completed Security Gap Analysis Tool

      Output

      • Information Security Strategy Communication Deck

      Materials

      • Information Security Strategy Communication Deck

      Participants

      • Security Team
      • IT Leadership

      Download the Information Security Gap Analysis Tool

      4.1.1 Customize the Communication Deck

      Estimated Time: 1-2 hours

      1. When reviewing the Information Security Strategy Communication Deck, you will find slides that contain instructions within green text boxes. Follow the instructions within the boxes, then delete the boxes.
        • Most slides only require that you copy and paste screenshots or tables from your tools into the slides.
        • However, some slides require that you customize or add text explanations that need to reflect your unique organization.
        • It is recommended that you pay attention to the Next Steps slide at the end of the deck. This will likely have a large impact on your audience.
      2. Once you have customized the existing slides, you may wish to add additional slides. For instance, you may wish to add more context to the risk assessment or pressure analysis diagrams or provide details on high-priority initiatives.

      An image showing the 'Business Goals Cascade,' part of the 'Information Security Strategy Communication Deck.' A green box on top of the screenshot instructs you to 'Paste your goals cascade from the Information Security Requirements Gathering Tool here.'

      Consider developing multiple versions of the deck for different audiences. Senior management may only want an executive summary, whereas the CIO may be more interested in the methodology used to develop the strategy.

      Communication considerations

      Developing an information security strategy is only half the job. For the strategy to be successful, you will need to garner support from key internal stakeholders. These may include the CIO, senior executives, and business leaders. Without their support, your strategy may never get the traction it needs. When building your communication deck and planning to present to these stakeholders, consider the following:

      • Gaining support from stakeholders requires understanding their needs. Before presenting to a new audience, carefully consider their priorities and tailor your presentation to address them.
      • Use the communication deck to clarify the business context and how your initiatives that will support business goals.
      • When presenting to senior stakeholders, anticipate what questions they might ask and be sure to prepare answers in advance. Always be prepared to speak to any data point within the deck.
      • If you are going to present your strategy to a group and you anticipate that one or more members of that group may be antagonistic, seek out an opportunity to speak to them before the meeting and address their concerns one on one.

      If you have already fully engaged your key stakeholders through the requirements gathering exercises, presenting the strategy will be significantly easier. The stakeholders will have already bought in to the business goals, allowing you to show how the security strategy supports those goals.

      Info-Tech Insight

      Reinforce the concept that a security strategy is an effort to enable the organization to achieve its core mission and goals and to protect the business only to the degree that the business demands. It is important that stakeholders understand this point.

      4.2 Develop a security charter

      Estimated Time: 1-3 hours

      1. As a group, review the Information Security Charter.
      2. Customize the template as required to reflect your information security program. It may include elements such as:
        • A mission and vision statement for information security in your organization
        • The objectives and scope of the security program
        • A description of the security principles upon which your program is built
        • High-level roles and responsibilities for information security within the organization

      Input

      • Completed Security Requirements Gathering Tool
      • Completed Security Pressure Analysis Tool
      • Completed Security Gap Analysis Tool

      Output

      • Information security charter

      Materials

      • Information Security Charter

      Participants

      • Security Team

      Download the Information Security Gap Analysis Tool

      4.2.1 Customize the Information Security Charter

      Estimated Time: 1-3 hours

      1. Involve the stakeholders that were present during Phase 1 activities to allow you to build a charter that is truly reflective of your organization.
      2. The purpose of the security charter is too:
        • Establish a mandate for information security within the organization.
        • Communicate executive commitment to risk and information security management.
        • Outline high-level responsibilities for information security within the organization.
        • Establish awareness of information security within the organization.

      A screenshot of the introduction of the 'Information Security Charter' template.

      A security charter is a formalized and defined way to document the scope and purpose of your security program. It will define security governance and allow it to operate efficiently through your mission and vision.

      4.3 Execute on your roadmap

      1. Executing on your information security roadmap will require coordinated effort by multiple teams within your organization. To ensure success, consider the following recommendations:
        1. If you have a project management office, leverage them to help apply formal project management methodologies to your initiatives.
        2. Develop a process to track the tasks on your strategy task list. Because these will not be managed as formal initiatives, it will be easy to lose track of them.
        3. Develop a schedule for regular reporting of progress on the roadmap to senior management. This will help hold yourself and others accountable for moving the project forward.
      2. Plan to review and update the strategy and roadmap on a regular basis. You may need to add, change, or remove initiatives as priorities shift.

      Input

      • Completed Security Gap Analysis Tool

      Output

      • Execution of your strategy and roadmap

      Materials

      • Information Security Gap Analysis Tool
      • Project management tools as required

      Participants

      • Security Team
      • Project Management Office
      • IT and Corporate Teams, as required

      Info-Tech Insight

      Info-Tech has many resources that can help you quickly and effectively implement most of your initiatives. Talk to your account manager to learn more about how we can help your strategy succeed.

      Summary of Accomplishment

      Knowledge Gained

      • Knowledge of organizational pressures and the drivers behind them
      • Insight into stakeholder goals and obligations
      • A defined security risk tolerance information and baseline
      • Comprehensive knowledge of security current state and summary initiatives required to achieve security objectives

      Deliverables Completed

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Information Security Program Gap Analysis Tool

      Use our best-of-breed security framework to perform a gap analysis between your current and target states.

      Information Security Requirements Gathering Tool

      Define the business, customer, and compliance alignment for your security program.

      Related Info-Tech Research

      Develop a Security Operations Strategy

      A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyberthreats, and guiding continuous improvement.

      This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

      Implement a Security Governance and Management Program

      Your security governance and management program needs to be aligned with business goals to be effective.

      This approach also helps to provide a starting point to develop a realistic governance and management program.

      This project will guide you through the process of implementing and monitoring a security governance and management program that prioritizes security while keeping costs to a minimum.

      Align Your Security Controls to Industry Frameworks for Compliance

      Don’t reinvent the wheel by reassessing your security program using a new framework.

      Instead, use the tools in this blueprint to align your current assessment outcomes to required standards.

      Bibliography

      “2015 Cost of Data Breach Study: United States.” Sponsored by IBM. Ponemon Institute, May 2015. Web.

      “2016 Cost of Cyber Crime Study & the Risk of Business Innovation.” Ponemon Institute, Oct. 2016. Web. 25 Oct. 2016.

      “2016 Cost of Data Breach Study: Global Analysis.” Ponemon Institute, June 2016. Web. 26 Oct. 2016.

      “2016 Data Breach Investigations Report.” Verizon, 2016. Web. 25 Oct. 2016.

      “2016 NowSecure Mobile Security Report.” NowSecure, 2016. Web. 5 Nov. 2016.

      “2017 Cost of Cyber Crime Study.” Ponemon Institute, Oct. 2017. Web.

      “2018 Cost of Data Breach Study: Global Overview.” Ponemon Institute, July 2018. Web.

      “2018 Data Breach Investigations Report.” Verizon, 2018. Web. Oct. 2019.

      “2018 Global State of Information Security Survey.” CSO, 2017. Web.

      “2018 Thales Data Threat Report.” Thales eSecurity, 2018. Web.

      “2019 Data Breach Investigations Report.” Verizon, 2020. Web. Feb. 2020.

      “2019 Global Cost of a Data Breach Study.” Ponemon Institute, Feb. 2020. Web.

      “2019 The Cost of Cyber Crime Study.” Accenture, 2019. Web Jan 2020.

      “2020 Thales Data Threat Report Global Edition.” Thales eSecurity, 2020. Web. Mar. 2020.

      Ben Salem, Malek. “The Cyber Security Leap: From Laggard to Leader.” Accenture, 2015. Web. 20 Oct. 2016.

      “Cisco 2017 Annual Cybersecurity Report.” Cisco, Jan. 2017. Web. 3 Jan. 2017.

      “Cyber Attack – How Much Will You Lose?” Hewlett Packard Enterprise, Oct. 2016. Web. 3 Jan. 2017.

      “Cyber Crime – A Risk You Can Manage.” Hewlett Packard Enterprise, 2016. Web. 3 Jan. 2017.

      “Global IT Security Risks Survey.” Kaspersky Lab, 2015. Web. 20 October 2016.

      “How Much Is the Data on Your Mobile Device Worth?” Ponemon Institute, Jan. 2016. Web. 25 Oct. 2016.

      “Insider Threat 2018 Report.” CA Technologies, 2018. Web.

      “Kaspersky Lab Announces the First 2016 Consumer Cybersecurity Index.” Press Release. Kaspersky Lab, 8 Sept. 2016. Web. 3 Jan. 2017.

      “Kaspersky Lab Survey Reveals: Cyberattacks Now Cost Large Businesses an Average of $861,000.” Press Release. Kaspersky Lab, 13 Sept. 2016. Web. 20 Oct. 2016.

      “Kaspersky Security Bulletin 2016.” Kaspersky Lab, 2016. Web. 25 Oct. 2016.

      “Managing Cyber Risks in an Interconnected World: Key Findings From the Global State of Information Security Survey 2015.” PwC, 30 Sept. 2014. Web.

      “Measuring Financial Impact of IT Security on Business.” Kaspersky Lab, 2016. Web. 25 Oct. 2016.

      “Ponemon Institute Releases New Study on How Organizations Can Leapfrog to a Stronger Cyber Security Posture.” Ponemon Institute, 10 Apr. 2015. Web. 20 Oct. 2016.

      “Predictions for 2017: ‘Indicators of Compromise’ Are Dead.” Kaspersky Lab, 2016. Web. 4 Jan. 2017.

      “Take a Security Leap Forward.” Accenture, 2015. Web. 20 Oct. 2016.

      “Trends 2016: (In)security Everywhere.” ESET Research Laboratories, 2016. Web. 25 Oct. 2016.

      Research Contributors

      • Peter Clay, Zeneth Tech Partners, Principal
      • Ken Towne, Zeneth Tech Partners, Security Architect
      • Luciano Siqueria, Road Track, IT Security Manager
      • David Rahbany, The Hain Celestial Group, Director IT Infrastructure
      • Rick Vadgama, Cimpress, Head of Information Privacy and Security
      • Doug Salah, Wabtec Corp, Manager of Information Security and IT Audit
      • Peter Odegard, Children’s Hospitals and Clinics, Information Security Officer
      • Trevor Butler, City of Lethbridge, Information Technology General Manager
      • Shane Callahan, Tractor Supply, Director of Information Security
      • Jeff Zalusky, Chrysalis, President/CEO
      • Candy Alexander, Independent Consultant, Cybersecurity and Information Security Executive
      • Dan Humbert, YMCA of Central Florida, Director of Information Technology
      • Ron Kirkland, Crawford & Co, Manager ICT Security & Customer Service
      • Jason Bevis – FireEye, Senior Director Orchestration Product Management - Office of the CTO
      • Joan Middleton, Village of Mount Prospect, IT Director
      • Jim Burns, Great America Financial Services, Vice President Information Technology
      • Ryan Breed, Hudson’s Bay, Information Security Analyst
      • James Fielder, Farm Credit Services – Central Illinois, Vice President of Information Systems

      Exit Plans: Escape from the black hole

      • Large vertical image:
      • member rating overall impact: Highly Valued
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      In early April, I already wrote about exit plans and how they are the latest burning platform.

      As of the end of May 2025, we have both Microsoft and Google reassuring European clients about their sovereign cloud solutions. There are even air-gapped options for military applications. These messages come as a result of the trade war between the US and the rest of the world.

      There is also the other, more mundane example of over-reliance on a single vendor: the Bloomberg-terminal outage of May 21st, 2025. That global outage severely disrupted financial markets. It caused traders to lose access to real-time data, analytics, and pricing information for approximately 90 minutes. This widespread system failure delayed critical government bond auctions in the UK, Portugal, Sweden, and the EU.

      It serves as a reminder of the heavy reliance on the Bloomberg Terminal, which is considered an industry standard despite its high annual cost. While some Bloomberg services like instant messaging remained functional, allowing limited communication among traders, the core disruption led to significant frustration and slowed down trading activities.

      You want to think about this for a moment. Bloomberg is, just like Google and Microsoft are, cornerstones in their respective industries. MS, Google, and Amazon even in many more industries. 

      So the issue goes beyond the “panic of the day.” Every day, there will be some announcement that sends markets reeling and companies fearing. Granted, the period we go through today can have grave consequences, but at the same time, it may be over in the coming months or years.

      Contractual cover

      Let's take a step back and see if we can locate the larger issue at stake. I dare to say that the underlying issue is trust. We are losing trust in one another at a fast pace. Not between business partners, meaning companies who are, in a transaction or relationship, are more or less equal. Regardless of their geolocation, people are keen to do business together in a predictable, mutually beneficial way. And as long as that situation is stable, there is little need, beyond compliance and normal sound practices, to start to distrust each other.

      Trouble brews when other factors come into play. I want to focus on two of them in this article.

      1. Market power
      2. Government interference

      Market Power

      The past few years have seen a large increase in power of the cloud computing platforms. The pandemic of 2019 through to 2023 changed our way of working and gave a big boost to these platforms. Of course, they were already establishing their dominance in the early 2010s.

      Amazon launched SQS in 2004 with S3 (storage)  and EC2 (compute) in 2006. Azure launched in 2008 as a PaaS platform for .NET developers, and became really available in 2010. Since then, it grew into the IaaS (infrastructure as a service) platform we know today. Google's Cloud Platform (GCP) launched in 2008 and added components such as BigQuery, Compute Engine and Storage in the 2010s.

      Since the pandemic, we've seen another boost to their popularity. These platforms solidified their lead through several vectors:

      • Remote working
      • Business continuity and resilience promises
      • Acceleration of digital transformation
      • Scalability
      • Cost optimization 

      Companies made decisions on these premises. A prime example is the use of native cloud functions. These make life easier for developers. Native functions allow for serverless functionality to be made available to clients, and to do so in a non-infra-based way. It gives the impression of less complexity to the management. They are also easily scalable. 

      This comes at a cost, however. The cost is vendor lock-in. And with vendor lock-in, comes increased pricing power for the vendor.

      For a long time, it seems EU companies' attitude was: “It won't be such an issue, after all, there are multiple cloud vendors and if all else fails, we just go back.” The reality is much starker, I suspect that cloud providers with this level of market power will increase their pricing significantly.

       Government interference

      in come two elements:

      • EU laws
      • US laws and unpredictability
      EU laws

       The latest push to their market power came as an unintended consequence of EU Law: DORA. That EU law requires companies to have testable exit plans in place. But it goes well beyond this. The EU has increased the regulatory burden on companies significantly. BusinessEurope, a supranational organization, estimates that in the past five years, the Eu managed to release over 13,000 legislative acts. This is compared to 3,500 in the US.

      Coming back to DORA, this law requires EU companies to actually test their exit plans and show proof of it to the EU ESAs (European Supervisory Agency).  The reaction I have seen in industry representative organizations is complacency. 

      The cost of compliance is significant; hence, companies try to limit their exposure to the law as much as possible. They typically do this by limiting the applicability scope of the law to their business, based on the wording of the law. And herein lies the trap. This is not lost on the IT providers. They see that companies do the heavy lifting for them. What do I mean by that?  Several large providers are looked at by the EU as systemic providers. They fall under direct supervision by the ESAs. 

      For local EU providers, it is what it is, but for non-EU providers, they get to show their goodwill, using sovereign IT services.  I will come back to this in the next point, US unpredictability and laws. But the main point is: we are giving them more market power, and we have less contractual power. Why? Because we are showing them that we will go to great lengths to keep using their services.

      US laws and unpredictability

      US companies must comply with US law. So far, so good. Current US legislation also already requires US companies to share data on non-US citizens.

      • Foreign Intelligence Surveillance Act (FISA), particularly Section 702
      • The CLOUD (Clarifying Lawful Overseas Use of Data) Act of 2018
      • The USA PATRIOT Act (specifically relevant sections like 215 and 314(a)/314(b))
      • Executive Order 14117 and related DOJ Final Rule (Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern)

      This last one is of particular concern. Not so much because of its contents, but because it is an Executive Order.

      We know that the current (May 2025) US government mostly works through executive orders. Let's not forget that executive orders are a legitimate way to implement policy, This means that the US government could use access to cloud services as a lever to obtain more favorable trade rules.

      The EU responds to this (the laws and executive order) by implementing several sovereignty countermeasures like GDPR, DORA, Digital markets Act (DMA), Data Governance Act (DGA), Cybersecurity Act and the upcoming European Health Data Act (EHDS). This is called the “Brussels Effect.”

      EU Answers

      Europe is also investing in several strategic initiatives such as

      This points to a new dynamic between the EU and the US, EU-based companies simply cannot trust their US counterparts anymore to the degree they could before. The sad thing is, that there is no difference on the interpersonal level. It is just that companies must comply with their respective laws.

      Hence, Microsoft, Google, and AWS and any other US provider cannot legally provide sovereign cloud services. In a strict legal sense, Microsoft and Google cannot absolutely guarantee that they can completely insulate EU companies and citizens from all US law enforcement requests for data, despite their robust efforts and sovereign cloud offerings. This is because they are US companies, subject to US law and US jurisdiction. The CLOUD act and FISA section 702 compel US companies to comply. 

      Moreover, there is the nature of sovereign cloud offerings:

      • Increased Control, Not Absolute Immunity: Services like Microsoft's EU Data Boundary and Google's Cloud for Sovereignty are designed to provide customers with greater control over data residency, administrative access (e.g., limiting access to EU-based personnel), and encryption keys
      • Customer-Managed Keys (CMEK): If an EU customer controls their encryption keys, and the data remains encrypted at rest and in transit, it theoretically makes it harder for the cloud provider to provide plaintext data if compelled. However, metadata and other operational data might still be accessible, and the extent to which US authorities could compel a US company to decrypt data remains a point of contention and legal ambiguity.
      • Partnerships and Local Entities: Some “sovereign cloud” models involve partnerships with local EU entities (e.g., Google's partnership with S3NS in France, or Microsoft's with Capgemini and Orange). While this might create a legal buffer, if the core cloud infrastructure and controlling entity are still ultimately US-based, the risk of US legal reach persists.
      • “Limited Security Instances”: Even with the EU Data Boundary, Microsoft explicitly states, “in limited security instances that require a coordinated global response, essential data may be transferred with robust protections that safeguard customer data.” This phrasing acknowledges that some data may still leave the EU boundary under certain circumstances.

       And lastly, there are the legal challenges to the EU data privacy Framework (DPF)

      • Ongoing Scrutiny: The DPF is the current legal basis for EU-US data transfers, but it is under continuous scrutiny and is highly likely to face further legal challenges in the CJEU (a “Schrems III” case is widely anticipated). This uncertainty means that the current framework's longevity and robustness are not guaranteed.
      • Fundamental Conflict: The core legal conflict between the broad scope of US surveillance laws and the EU's fundamental right to privacy has not been fully resolved by the DPF, according to many EU legal experts and privacy advocates.

      This all means that while the cloud providers are doing everything they can, and I'm assuming they are acting in good faith. The fact that they are US entities means however that they are subject to all US legislation and executive orders.  And we cannot trust this last part. Again, this is why the EU is pursuing its digital sovereignty initiatives and why some highly sensitive EU public sector entities are gravitating towards truly EU-owned and operated cloud solutions.

      Bankruptcy

      If your provider goes bankrupt, you do not have a leg to stand on. Most jurisdictions, including the EU and US, have the following elements regarding bankruptcy:

      • Automatic Stay: Upon a bankruptcy filing (in most jurisdictions, including the US and EU), an “automatic stay” is immediately imposed. This is a court order that stops most collection activities against the debtor. For you as a customer, this can mean you might be prevented from:

        • Terminating the contract immediately, even if your contract allows it.
        • Initiating legal proceedings against the provider.
        • Trying to recover your data directly without court permission.
      • Debtor's Estate and Creditor Priority

        • Property of the Estate: All the bankrupt provider's assets become part of the “bankruptcy estate,” to be managed by a court-appointed trustee or receiver. The crucial question becomes: Is your data considered the property of the estate, or does ownership remain unequivocally with you? While most cloud contracts explicitly state that the customer owns their data, a bankruptcy court might still view the possession of that data by the provider as an asset of the estate, potentially subject to monetization to pay off creditors.
        • Secured vs. Unsecured Creditors: You, as a customer seeking to retrieve your data or continue services, are likely to be an “unsecured creditor.” Secured creditors (e.g., banks with liens on assets) get paid first. Your claim for data or service continuity will be far down the priority list, meaning you might recover little, if anything, in compensation.
      • Executory contracts and the Trustee's power
        • Assumption or Rejection: Bankruptcy law generally allows the trustee (or debtor in possession in a Chapter 11 case) to assume (continue) or reject (terminate) “executory contracts” – those where both parties still have significant performance obligations.
        • Trustee's Discretion: The trustee will make this decision based on what benefits the bankruptcy estate and the creditors. If your contract is loss-making for the provider, or if continuing it is not in the best interest of the creditors, the trustee can reject it, even if it has a termination clause unfavorable to them.
        • No Customer Right to Demand Continuation: You typically cannot compel the trustee to continue the service if they choose to reject the contract. Your recourse would then be a claim for damages, which, as noted, is usually a low-priority claim.
      • The practical challenges of data retrieval
          • Even if your contract has strong data return clauses, the practicalities of a bankrupt provider make enforcement difficult. The provider's staff might be laid off, systems might be shut down, and there might be no one left with the technical knowledge or resources to facilitate data export. Not to mention that the trustee may simply refuse to honor the agreement (which is completely within the legal rights of the trustee.)
          • The receiver's priority is liquidation and asset sale, not customer service. They may limit data export speeds or volumes, or prioritize the sale of the business, which might include your data, making retrieval a slow and arduous process.

      Conclusion

      So, while I understand the wait and see stance in regard to exit plans, given where we are, it is in my opinion the wrong thing to do. Companies must make actionable exit plans and prepare beforehand for the exit. That means that you have to:

      1. Design your architecture so that you can port your applications to somewhere else.
      2. Prioritize your data portability and data ownership.
      3. Develop and practice your exit strategy and plans.
      4. Maintain your in-house expertise, especially for all critical business services.
      5. Continuously monitor your vendors and update your risk assessments.

        If you want more detailed steps on how to get there, feel free to contact me.

      Design and Build an Effective Contract Lifecycle Management Process

      • Buy Link or Shortcode: {j2store}214|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $5,039 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Your vendor contracts are unorganized and held in various cabinets and network shares. There is no consolidated list or view of all the agreements, and some are misplaced or lost as coworkers leave.
      • The contract process takes a long time to complete. Coworkers are unsure who should be reviewing and approving them.
      • You are concerned that you are not getting favorable terms with your vendors and not complying with your agreement commitments.
      • You are unsure what risks your organization could be exposed to in your IT vendor contacts. These could be financial, legal, or security risks and/or compliance requirements.

      Our Advice

      Critical Insight

      • Focus on what’s best for you. There are two phases to CLM. All stages within those phases are important, but choose to improve the phase that can be most beneficial to your organization in the short term. However, be sure to include reviewing risk and monitoring compliance.
      • Educate yourself. Understand the stages of CLM and how each step can rely on the previous one, like a stepping-stone model to success.
      • Consider the overall picture. Contract lifecycle management is the sum of many processes designed to manage contracts end to end while reducing corporate risk, improving financial savings, and managing agreement obligations. It can take time to get CLM organized and working efficiently, but then it will show its ROI and continuously improve.

      Impact and Result

      • Understand how to identify and mitigate risk to save the organization time and money.
      • Gain the knowledge required to implement a CLM that will be beneficial to all business units.
      • Achieve measurable savings in contract time processing, financial risk avoidance, and dollar savings.
      • Effectively review, store, manage, comply with, and renew agreements with a collaborative process

      Design and Build an Effective Contract Lifecycle Management Process Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how a contract management system will save money and time and mitigate contract risk, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Master the operational framework of contract lifecycle management.

      Understand how the basic operational framework of CLM will ensure cost savings, improved collaboration, and constant CLM improvement.

      • Design and Build an Effective Contract Lifecycle Management Process – Phase 1: Master the Operational Framework of CLM
      • Existing CLM Process Worksheet
      • Contract Manager

      2. Understand the ten stages of contract lifecycle management.

      Understand the two phases of CLM and the ten stages that make up the entire process.

      • Design and Build an Effective Contract Lifecycle Management Process – Phase 2: Understand the Ten Stages of CLM
      • CLM Maturity Assessment Tool
      • CLM RASCI Diagram
      [infographic]

      Workshop: Design and Build an Effective Contract Lifecycle Management Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Your CLM Process and Learn the Basics

      The Purpose

      Identify current CLM processes.

      Learn the CLM operational framework.

      Key Benefits Achieved

      Documented overview of current processes and stakeholders.

      Activities

      1.1 Review and capture your current process.

      1.2 Identify current stakeholders.

      1.3 Learn the operational framework of CLM.

      1.4 Identify current process gaps.

      Outputs

      Existing CLM Process Worksheet

      2 Learn More and Plan

      The Purpose

      Dive into the two phases of CLM and the ten stages of a robust system.

      Key Benefits Achieved

      A deep understanding of the required components/stages of a CLM system.

      Activities

      2.1 Understand the two phases of CLM.

      2.2 Learn the ten stages of CLM.

      2.3 Assess your CLM maturity state.

      2.4 Identify and assign stakeholders.

      Outputs

      CLM Maturity Assessment

      CLM RASCI Diagram

      Further reading

      Design and Build an Effective Contract Lifecycle Management Process

      Mitigate risk and drive value through robust best practices for contract lifecycle management.

      Our understanding of the problem

      This Research Is Designed For:

      • The CIO who depends on numerous key vendors for services
      • The CIO or Project Manager who wants to maximize the value delivered by vendors
      • The Director or Manager of an existing IT procurement or vendor management team
      • The Contracts Manager or Legal Counsel whose IT department holds responsibility for contracts, negotiation, and administration

      This Research Will Help You:

      • Implement and streamline the contract management process, policies, and procedures
      • Baseline and benchmark existing contract processes
      • Understand the importance and value of contract lifecycle management (CLM)
      • Minimize risk, save time, and maximize savings with vendor contracts

      This Research Will Also Assist

      • IT Service Managers
      • IT Procurement
      • Contract teams
      • Finance and Legal departments
      • Senior IT leadership

      This Research Will Help Them

      • Understand the required components of a CLM
      • Establish the current CLM maturity level
      • Implement a new CLM process
      • Improve on an existing or disparate process

      ANALYST PERSPECTIVE

      "Contract lifecycle management (CLM) is a vital process for small and enterprise organizations alike. Research shows that all organizations can benefit from a contract management process, whether they have as few as 25 contracts or especially if they have contracts numbering in the hundreds.

      A CLM system will:

      • Save valuable time in the entire cycle of contract/agreement processes.
      • Save the organization money, both hard and soft dollars.
      • Mitigate risk to the organization.
      • Avoid loss of revenue.

      If you’re not managing your contracts, you aren’t capitalizing on your investment with your vendors and are potentially exposing your organization to contract and monetary risk."

      - Ted Walker
      Principal Research Advisor, Vendor Management Practice
      Info-Tech Research Group

      Executive Summary

      Situation

      • Most organizations have vendor overload and even worse, no defined process to manage the associated contracts and agreements. To manage contracts, some vendor management offices (VMOs) use a shared network drive to store the contracts and a spreadsheet to catalog and manage them. Yet other less-mature VMOs may just rely on a file cabinet in Procurement and a reminder in someone’s calendar about renewals. These disparate processes likely cost your organization time spent finding, managing, and renewing contracts, not to mention potential increases in vendor costs and risk and the inability to track contract obligations.

      Complication

      • Contract lifecycle management (CLM) is not an IT buzzword, and it’s rarely on the top-ten list of CIO concerns in most annual surveys. Until a VMO gets to a level of maturity that can fully develop a CLM and afford the time and costs of doing so, there can be several challenges to developing even the basic processes required to store, manage, and renew IT vendor contracts. As is always an issue in IT, budget is one of the biggest obstacles in implementing a standard CLM process. Until senior leadership realizes that a CLM process can save time, money, and risk, getting mindshare and funding commitment will remain a challenge.

      Resolution

      • Understand the immediate benefits of a CLM process – even a basic CLM implementation can provide significant cost savings to the organization; reduce time spent on creating, negotiating, and renewing contracts; and help identify and mitigate risks within your vendor contracts.
      • Budgets don’t always need to be a barrier to a standard CLM process. However, a robust CLM system can provide significant savings to the organization.

      Info-Tech Insight

      • If you aren’t managing your contracts, you aren’t capitalizing on your investments.
      • Even a basic CLM process with efficient procedures will provide savings and benefits.
      • Not having a CLM process may be costing your organization money, time, and exposure to unmitigated risk.

      What you can gain from this blueprint

      Why Create a CLM

      • Improved contract organization
      • Centralized and manageable storage/archives
      • Improved vendor compliance
      • Risk mitigation
      • Reduced potential loss of revenue

      Knowledge Gained

      • Understanding of the value and importance of a CLM
      • How CLM can impact many departments within the organization
      • Who should be involved in the CLM steps and processes
      • Why a CLM is important to your organization
      • How to save time and money by maximizing IT vendor contracts
      • How basic CLM policies and procedures can be implemented without costly software expenditure

      The Outcome

      • A foundation for a CLM with best-practice processes
      • Reduced exposure to potential risks within vendor contracts
      • Maximized savings with primary vendors
      • Vendor compliance and corporate governance
      • Collaboration, transparency, and integration with business units

      Contract management: A case study

      CASE STUDY
      Industry Finance and Banking
      Source Apttus

      FIS Global

      The Challenge

      FIS’ business groups were isolated across the organization and used different agreements, making contract creation a long, difficult, and manual process.

      • Customers frustrated by slow and complicated contracting process
      • Manual contract creation and approval processes
      • Sensitive contract data that lacked secure storage
      • Multiple agreements managed across divisions
      • Lack of central repository for past contracts
      • Inconsistent and inaccessible

      The Solution: Automating and Streamlining the Contract Management Process

      A robust CLM system solved FIS’ various contract management needs while also providing a solution that could expand into full quote-to cash in the future.

      • Contract lifecycle management (CLM)
      • Intelligent workflow approvals (IWA)
      • X-Author for Excel

      Customer Results

      • 75% cycle time reduction
      • $1M saved in admin costs per year
      • 49% increase in sales proposal volume
      • Automation on one standard platform and solution
      • 55% stronger compliance management
      • Easy maintenance for various templates
      • Ability to quickly absorb new contracts and processes via FIS’s ongoing acquisitions

      Track the impact of CLM with these metrics

      Dollars Saved

      Upfront dollars saved

      • Potential dollars saved from avoiding unfavorable terms and conditions
      • Incentives that encourage the vendor to act in the customer’s best interest
      • Secured commitments to provide specified products and services at firm prices
      • Cost savings related to audits, penalties, and back support
      • Savings from discounts found

      Time Saved

      Time saved, which can be done in several areas

      • Defined and automated approval flow process
      • Preapproved contract templates with corporate terms
      • Reduced negotiation times
      • Locate contracts in minutes

      Pitfalls Avoided

      Number of pitfalls found and avoided, such as

      • Auto-renewal
      • Inconsistencies between sections and documents
      • Security and data not being deleted upon termination
      • Improper licensing

      The numbers are compelling

      71%

      of companies can’t locate up to 10% of their contracts.

      Source: TechnologyAdvice, 2019

      9.2%

      of companies’ annual revenue is lost because of poor contract management practices.

      Source: IACCM, 2019

      60%

      still track contracts in shared drives or email folders.

      Source: “State of Contract Management,” SpringCM, 2018

      CLM blueprint objectives

      • To provide a best-practice process for managing IT vendor contract lifecycles through a framework that organizes from the core, analyzes each step in the cycle, has collaboration and governance attached to each step, and integrates with established vendor management practices within your organization.
      • CLM doesn’t have to be an expensive managed database system in the cloud with fancy dashboards. As long as you have a defined process that has the framework steps and is followed by the organization, this will provide basic CLM and save the organization time and money over a short period of time.
      • This blueprint will not delve into the many vendors or providers of CLM solutions and their methodologies. However, we will discuss briefly how to use our framework and contract stages in evaluating a potential solution that you may be considering.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Design and Build an Effective CLM Process – project overview

      1. Master the Operational Framework

      2. Understand the Ten Stages of CLM

      Best-Practice Toolkit

      1.1 Understand the operational framework components.

      1.2 Review your current framework.

      1.3 Create a plan to implement or enhance existing processes.

      2.1 Understand the ten stages of CLM.

      2.2 Review and document your current processes.

      2.3 Review RASCI chart and assign internal ownership.

      2.4 Create an improvement plan.

      2.5 Track changes for measurable ROI.

      Guided Implementations
      • Review existing processes.
      • Understand what CLM is and why the framework is essential.
      • Create an implementation or improvement plan.
      • Review the ten stages of CLM.
      • Complete CLM Maturity Assessment.
      • Create a plan to target improvement.
      • Track progress to measure savings.
      Onsite Workshop

      Module 1: Review and Learn the Basics

      • Review and capture your current processes.
      • Learn the basic operational framework of contract management.

      Module 2 Results:

      • Understand the ten stages of effective CLM.
      • Create an improvement or implementation plan.
      Phase 1 Outcome:
      • A full understanding of what makes a comprehensive contract management system.
      Phase 2 Outcome:
      • A full understanding of your current CLM processes and where to focus your efforts for improvement or implementation.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2
      Activities

      Task – Review and Learn the Basics

      Task – Learn More and Plan

      1.1 Review and capture your current process.

      1.2 Identify current stakeholders.

      1.3 Learn the operational framework of contract lifecycle management.

      1.4 Identify current process gaps.

      2.1 Understand the two phases of CLM.

      2.2 Learn the ten stages of CLM.

      2.3 Assess your CLM maturity.

      2.4 Identify and assign stakeholders.

      2.5 Discuss ROI.

      2.6 Summarize and next steps.

      Deliverables
      1. Internal interviews with business units
      2. Existing CLM Process Worksheet
      1. CLM Maturity Assessment
      2. RASCI Diagram
      3. Improvement Action Plan

      PHASE 1

      Master the Operational Framework of Contract Lifecycle Management

      Design and Build an Effective CLM Process

      Phase 1: Master the Operational Framework of Contract Lifecycle Management

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
      2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Master the Operational Framework of Contract Lifecycle Management
      Proposed Time to Completion: 1-4 weeks

      Step 1.1: Document your Current CLM Process

      Step 1.2: Read and Understand the Operational Framework

      Step 1.3: Review Solution Options

      Start with an analyst kick-off call:

      • Understand what your current process(es) is for each stage
      • Do a probative review of any current processes
      • Interview stakeholders for input

      Review findings with analyst:

      • Discuss the importance of the framework as the core of your plan
      • Review the gaps in your existing process
      • Understand how to prioritize next steps towards a CLM

      Finalize phase deliverable:

      • Establish ownership of the framework
      • Prioritize improvement areas or map out how your new CLM will look

      Then complete these activities…

      • Document the details of your process for each stage of CLM

      With these tools & templates:

      • Existing CLM Process Worksheet

      Phase 1 Results:

      • A full understanding of what makes a comprehensive contract management system.

      What Is Contract Lifecycle Management?

      • Every contract has a lifecycle, from creation to time and usage to expiration. Organizations using a legacy or manual contract management process usually ask, “What is contract lifecycle management and how will it benefit my business?”
      • Contract lifecycle management (CLM) creates a process that manages each contract or agreement. CLM eases the challenges of managing hundreds or even thousands of important business and IT contracts that affect the day-to-day business and could expose the organization to vendor risk.
      • Managing a few contracts is quite easy, but as the number of contracts grows, managing each step for each contract becomes increasingly difficult. Ultimately, it will get to a point where managing contracts properly becomes very difficult or seemingly impossible.

      That’s where contract lifecycle management (CLM) comes in.

      CLM can save money and improve revenue by:

      • Improving accuracy and decreasing errors through standardized contract templates and approved terms and conditions that will reduce repetitive tasks.
      • Securing contracts and processes through centralized software storage, minimizing risk of lost or misplaced contracts due to changes in physical assets like hard drives, network shares, and file cabinets.
      • Using policies and procedures that standardize, organize, track, and optimize IT contracts, eliminating time spent on creation, approvals, errors, and vendor compliance.
      • Reducing the organization’s exposure to risks and liability.
      • Having contracts renewed on time without penalties and with the most favorable terms for the business.

      The Operational Framework of Contract Lifecycle Management

      Four Components of the Operational Framework

      1. Organization
      2. Analysis
      3. Collaboration and Governance
      4. Integration/Vendor Management
      • By organizing at the core of the process and then analyzing each stage, you will maximize each step of the CLM process and ensure long-term contract management for the organization.
      • Collaboration and governance as overarching policies for the system will provide accountability to stakeholders and business units.
      • Integration and vendor management are encompassing features in a well-developed CLM that add visibility, additional value, and savings to the entire organization.

      Info-Tech Best Practice

      Putting a contract manager in place to manage the CLM project will accelerate the improvements and provide faster returns to the organizations. Reference Info-Tech’s Contract Manager Job Description template as needed.

      The operational framework is key to the success, return on investment (ROI), cost savings, and customer satisfaction of a CLM process.

      This image depicts Info-Tech's Operational Framework.  It consists of a series of five concentric circles, with each circle a different colour.  On the outer circle, is the word Integration.  The next outermost circle has the words Collaboration and Governance.  The next circle has no words, the next circle has the word Analysis, and the very centre circle has the word Organization.

      1. Organization

      • Every enterprise needs to organize its contract documents and data in a central repository so that everyone knows where to find the golden source of contractual truth.
      • This includes:
        • A repository for storing and organizing contract documents.
        • A data dictionary for describing the terms and conditions in a consistent, normalized way.
        • A database for persistent data storage.
        • An object model that tracks changes to the contract and its prevailing terms over time.

      Info-Tech Insight

      Paper is still alive and doing very well at slowing down the many stages of the contract process.

      2. Analysis

      Most organizations analyze their contracts in two ways:

      • First, they use reporting, search, and analytics to reveal risky and toxic terms so that appropriate operational strategies can be implemented to eliminate, mitigate, or transfer the risk.
      • Second, they use process analytics to reveal bottlenecks and points of friction as contracts are created, approved, and negotiated.

      3. Collaboration

      • Throughout the contract lifecycle, teams must collaborate on tasks both pre-execution and post-execution.
      • This includes document collaboration among several different departments across an enterprise.
      • The challenge is to make the collaboration smooth and transparent to avoid costly mistakes.
      • For some contracting tasks, especially in regulated industries, a high degree of control is required.
      • In these scenarios, the organization must implement controlled systems that restrict access to certain types of data and processes backed up with robust audit trails.

      4. Integration

      • For complete visibility into operational responsibilities, relationships, and risk, an organization must integrate its golden contract data with other systems of record.
      • An enterprise contracts platform must therefore provide a rich set of APIs and connectors so that information can be pushed into or pulled from systems for enterprise resource planning (ERP), customer relationship management (CRM), supplier relationship management (SRM), document management, etc.

      This is the ultimate goal of a robust contract management system!

      Member Activity: Document Current CLM Processes

      1.1 Completion Time: 1-5 days

      Goal: Document your existing CLM processes (if any) and who owns them, who manages them, etc.

      Instructions

      Interview internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and/or Procurement to understand what’s currently in place.

      1. Use the Existing CLM Process Worksheet to capture and document current CLM processes.
      2. Establish what processes, procedures, policies, and workflows, if any, are in place for pre-execution (Phase 1) contract stages.
      3. Do the same for post-execution (Phase 2) stages.
      4. Use this worksheet as reference for assessments and as a benchmark for improvement review six to 12 months later.
      This image contains a screenshot of Info-Tech's Existing CLM Process Discovery Worksheet

      INPUT

      • Internal information from all CLM stakeholders

      OUTPUT

      • A summary of processes and owners currently in place

      Materials

      • Existing CLM processes from interviews

      Participants

      • Finance, Legal, CIO, VMO, Sales, Procurement

      PHASE 2

      Understand the Ten Stages of Contract Lifecycle Management

      Design and Build an Effective CLM Process

      Phase 1: Master the Operational Framework of Contract Lifecycle Management

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
      2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Understand the Ten Stages of Contract Lifecycle Management

      Proposed Time to Completion: 1-10 weeks

      Step 2.1: Assess CLM Maturity

      Step 2.2: Complete a RASCI Diagram

      Start with an analyst kick-off call:

      • Review the importance of assessing the maturity of your current CLM processes
      • Discuss interview process for internal stakeholders
      • Use data from the Existing CLM Process Worksheet

      Review findings with analyst:

      • Review your maturity results
      • Identify stages that require immediate improvement
      • Prioritize improvement or implementation of process

      Then complete these activities…

      • Work through the maturity assessment process
      • Answer the questions in the assessment tool
      • Review the summary tab to learn where to focus improvement efforts

      Then complete these activities…

      • Using maturity assessment and existing process data, establish ownership for each process stage
      • Fill in the RASCI Chart based on internal review or existing processes

      With these tools & templates:

      • CLM Maturity Assessment Tool

      With these tools & templates:

      • CLM RASCI Diagram

      Phase 2 Results & Insights:

      • A full understanding of your current CLM process and where improvement is required
      • A mapping of stakeholders for each stage of the CLM process

      The Ten Stages of Contract Lifecycle Management

      There are ten key stages of contract lifecycle management.

      The steps are divided into two phases, pre-execution and post-execution.

        Pre-Execution (Phase 1)

      1. Request
      2. Create
      3. Review Risk
      4. Approve
      5. Negotiate
      6. Sign
      7. Post-Execution (Phase 2)

      8. Capture
      9. Manage
      10. Monitor Compliance
      11. Optimize

      Ten Process Stages Within the CLM Framework

      This image contains the CLM framework from earlier in the presentation, with the addition of the following ten steps: 1. Request; 2. Create Contract; 3. Review Risk; 4. Approve; 5. Negotiate; 6. Sign; 7. Capture; 8. Manage; 9. Monitor Compliance; 10. Optimize.

      Stage 1: Request or Initiate

      Contract lifecycle management begins with the contract requesting process, where one party requests for or initiates the contracting process and subsequently uses that information for drafting or authoring the contract document. This is usually the first step in CLM.

      Requests for contracts can come from various sources:

      • Business units within the organization
      • Vendors presenting their contract, including renewal agreements
      • System- or process-generated requests for renewal or extension

      At this stage, you need to validate if a non-disclosure agreement (NDA) is currently in place with the other party or is required before moving forward. At times, adequate NDA components could be included within the contract or agreement to satisfy corporate confidentiality requirements.

      Stage 1: Request or Initiate

      Stage Input

      • Information about what the contract needs to contain, such as critical dates, term length, coverage, milestones, etc.
      • Some organizations require that justification and budget approval be provided at this stage.
      • Request could come from a vendor as a pre-created contract.
      • Best practices recommend that a contract request form or template is used to standardize all required information.

      Stage Output

      • Completed request form, stored or posted with all details required to move forward to risk review and contract creation.
      • Possible audit trails.

      Stage 2: Create Contract

      • At the creation or drafting stage, the document is created, generated, or provided by the vendor. The document will contain all clauses, scope, terms and conditions, and pricing as required.
      • In some cases, a vendor-presented contract that is already prepared will go through an internal review or redlining process by the business unit and/or Legal.
      • Both internal and external review and redlining are included in this stage.
      • Also at this stage, the approvers and signing authorities are identified and added to the contract. In addition, some audit trail features may be added.

      Info-Tech Best Practice

      For a comprehensive list of terms and conditions, see our Software Terms & Conditions Evaluation Tool within Master Contract Review and Negotiation for Software Agreements.

      Stage 2: Create Contract

      Stage Input

      • Contract request form, risk review/assessment.
      • Vendor- or contractor-provided contract/agreement, either soft copy, electronic form, or more frequently, “clickwrap” web-posted document.
      • Could also include a renewal notification from a vendor or from the CLM system or admin.

      Stage Output

      • Completed draft contract or agreement, typically in a Microsoft Word or Adobe PDF format with audit trail or comment tracking.
      • Redlined document for additional revision and or acceptance.
      • Amendment or addendum to existing contract.

      Stage 3: Review Risk 1 of 2

      The importance of risk review can not be understated. The contract or agreement must be reviewed by several stakeholders who can identify risks to the organization within the contract.

      Three important definitions:

      1. Risk is the potential for a negative outcome. A risk is crossing the street while wearing headphones and selecting the next track to play on your smartphone. A negative outcome is getting hit by an oncoming person who, unremarkably, was doing something similar at the same time.
      2. Risk mitigation is about taking the steps necessary to minimize both the likelihood of a risk occurring – look around both before and while crossing the street – and its impact if it does occur – fall if you must, but save the smartphone!
      3. Contract risk is about any number of situations that can cause a contract to fail, from trivially – the supplier delivers needed goods late – to catastrophically – the supplier goes out of business without having delivered your long-delayed orders.

      Stage 3: Review Risk 2 of 2

      • Contracts must be reviewed for business terms and conditions, potential risk situations from a financial or legal perspective, business commitments or obligations, and any operational concerns.
      • Mitigating contract risk requires a good understanding of what contracts are in place, how important they are to the success of the organization, and what data they contain.

      Collectively, this is known as contract visibility.

      • Risk avoidance and mitigation are also a key component in the ROI of a CLM system and should be tracked for analysis.
      • Risk-identifying forms or templates can be used to maintain consistency with corporate standards.

      Stage 3: Review Risk

      Stage Input

      • All details of the proposed contract so that a proper risk analysis can be done as well as appropriate review with stakeholders, including:
        • Finance
        • Legal
        • Procurement
        • Security
        • Line-of-business owner
        • IT stakeholders

      Stage Output

      • A list of identified concerns that could expose the business unit or organization.
      • Recommendations to minimize or eliminate identified risks.

      Stage 4: Approve

      The approval stage can be a short process if policies and procedures are already in place. Most organizations will have defined delegation of authority or approval authority depending on risk, value of the contract, and other corporate considerations.

      • Defined approval levels should be known within the organization and can be applied to the approval workflow, expediting the approval of drafted terms, conditions, changes, and cost/spend within the contract internally.
      • Tracking and flexibility needs to considered in the approval process.
      • Gates need to be in place to ensure that a required approver has approved the contract before it moves to the next approver.
      • Flexibility is needed in some situations for ad hoc approval tasks and should include audit trail as required.
      • Approvers can include business units, Finance, Legal, Security, and C-level leaders

      Stage 4: Approve

      Stage Input

      • Complete draft contract with all terms and conditions (T&Cs) and approval trail.
      • Amendment or addendum to existing contract.

      Stage Output

      • Approved draft contract ready to move to the next step of negotiating with the vendor.
      • Approved amendment or addendum to existing or renewal agreement.

      Stage 5: Negotiate

      • At this stage, there should be an approved draft of the contract that can be presented to the other party or vendor for review.
      • Typically organizations will negotiate their larger deals for terms and conditions with the goal of balancing the contractual allocation of risk with the importance of the vendor or agreement and its value to the business.
      • Several people on either side are typically involved and will discuss legal and commercial terms of the contract. Throughout the process, negotiators may leverage a variety of tools, including playbooks with preferred and fallback positions, clause libraries, document redlines and comparisons, and issue lists.
      • Audit trails or tracking of changes and acceptances is an important part of this stage. Tracking will avoid duplication and lost or missed changes and will speed up the entire process.
      • A final, clean document is created at this point and readied for execution.

      Stage 5: Negotiate

      Stage Input

      • Approved draft contract ready to move to the next step of negotiating with the vendor.
      • Approved amendment or addendum to existing or renewal agreement.

      Stage Output

      • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

      Info-Tech Insight

      Saving the different versions of a contract during negotiations will save time, provide reassurance of agreed terms as you move through the process, and provide reference for future negotiations with the vendor.

      Stage 6: Sign or Execute

      • At this stage in the process, all the heavy lifting in a contract’s creation is complete. Now it’s signature time.
      • To finalize the agreement, both parties need to the sign the final document. This can be done by an in-person wet ink signature or by what is becoming more prevalent, digital signature through an e-signature process.
      • Once complete, the final executed documents are exchanged or received electronically and then retained by each party.

      Stage 6: Sign or Execute

      Stage Input

      • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

      Stage Output

      • An executed contract or amendment ready to move to the next stage of CLM, capturing in the repository.

      Info-Tech Best Practice

      Process flow provisions should made for potential rejection of the contract by signatories, looping the contract back to the appropriate stage for rework or revision.

      Stage 7: Capture in Database/Repository 1 of 2

      • This is one of the most important stages of a CLM process. Executed agreements need to be stored in a single manageable, searchable, reportable, and centralized repository.
      • All documents should to be captured electronically, reviewed for accuracy, and then posted to the CLM repository.
      • The repository can be in various formats depending on the maturity, robustness, and budget of the CLM program.

      Most repositories are some type of database:

      • An off-the-shelf product
      • A PaaS cloud-based solution
      • A homegrown, internally developed database
      • An add-on module to your ERP system

      Stage 7: Capture in Database/Repository 2 of 2

      Several important features of an electronic repository should be considered:

      • Consistent metadata tagging of clauses, terms, conditions, dates, etc.
      • Centralized summary view of all contracts
      • Controlled access for those who need to review and manage the contracts

      Establishing an effective repository will be key to providing measurable value to the organization and saving large amounts of time for the business unit.

      Info-Tech Insight

      Planning for future needs by investing a little more money into a better, more robust repository could pay bigger dividends to the VMO and organization while providing a higher ROI over time as advanced functionality is deployed.

      Stage 8: Manage

      • Once an agreement is captured in the repository, it needs to be managed from both an operational and a commitment perspective.
      • Through a summary view or master list, contracts need to be operationally managed for end dates and renewals, vendor performance, discounts, and rebates.
      • Managing contracts for commitment and compliance will ensure all contract requirements, rights, service-level agreements (SLAs), and terms are fulfilled. This will eliminate the high costs of missed SLAs, potential breaches, or missed renewals.
      • Managing contracts can be improved by adding metadata to the records that allow for easier search and retrieval of contracts or even proactive notification.
      • The repository management features can and should be available to business stakeholders, or reporting from a CLM admin can also alert stakeholders to renewals, pricing, SLAs, etc.
      • Also important to this stage is reporting. This can be done by an admin or via a self-serve feature for stakeholders, or it could even be automated.

      Stage 9: Monitor Compliance 1 of 2

      • At this stage, the contracts or agreements need to be monitored for the polices within them and the purpose for which they were signed.
      • This is referred to as obligation management and is a key step to providing savings to the organization and mitigating risk.
      • Many contracts contain commitments by each party. These can include but are not limited to SLAs, service uptime targets, user counts, pricing threshold discounts and rebates, renewal notices to vendors, and training requirements.
      • All of these obligations within the contracts should be summarized and monitored to ensure that all commitments are delivered on. Managing obligations will mitigate risks, maximize savings and rebates to the organization, and minimize the potential for a breach within the contract.

      Stage 9: Monitor Compliance 2 of 2

      • Monitoring and measuring vendor commitments and performance will also be a key factor in maximizing the benefits of the contract through vendor accountability.
      • Also included in this stage is renewal and/or disposition of the contract. If renewal is due, it should go back to the business unit for submission to the Stage 1: Request process. If the business unit is not going to renew the contract, the contract must be tagged and archived for future reference.

      Stage 10: Optimize

      • The goal of this stage is to improve the other stages of the process as well as evaluate how each stage is integrating with the core operational framework processes.
      • With more data and improved insight into contractual terms and performance, a business can optimize its portfolio for better value, greater savings, and lower-risk outcomes.
      • For high-performance contract teams, the goal is a continuous feedback loop between the contract portfolio and business performance. If, for example, the data shows that certain negotiation issues consume a large chunk of time but yield no measurable difference in risk or performance, you may tweak the playbook to remedy those issues quickly.

      Additional optimization tactics:

      • Streamlining contract renewals with auto-renew
      • Predefined risk review process or template, continuous review/improvement of negotiation playbook
      • Better automation or flow of approval process
      • Better signature delegation process if required
      • Improving repository search with metadata tagging
      • Automating renewal tracking or notice process
      • Tracking the time a contract spends in each stage

      Establish Your Current CLM Maturity Position

      • Sometimes organizations have a well-defined pre-execution process but have a poor post-signature process.
      • Identifying your current processes or lack thereof will provide you with a starting point in developing a plan for your CLM. It’s possible that most of the stages are there and just need some improvements, or maybe some are missing and need to be implemented.
      • It’s not unusual for organizations to have a manual pre-execution process and an automated backend repository with compliance and renewal notices features.

      Info-Tech Best Practice

      Use the CLM Maturity Assessment Tool to outline where your organization is at each stage of the process.

      Member Activity: Assess Current CLM Maturity

      2.1 Completion Time 1-2 days

      Goal: Identify and measure your existing CLM processes, if any, and provide a maturity value to each stage. The resulting scores will provide a maturity assessment of your CLM.

      Instructions

      1. Use the Existing CLM Process Worksheet to document current CLM processes.
      2. Using the CLM worksheet info, answer the questions in the CLM Maturity Assessment Tool.
      3. Review the results and scores on Tab 3 to see where you need to focus your initial improvements.
      4. Save the initial assessment for future reference and reassess in six to 12 months to measure progress.

      This image contains a screenshot from Info-Tech's CLM Maturity Assessment Tool.

      INPUT

      • Internal information from all CLM stakeholders

      OUTPUT

      • A summary of processes and owners currently in place in the organization

      Materials

      • Existing CLM processes from interviews

      Participants

      • Finance, Legal, CIO, VMO, Sales, Procurement

      Member Activity: Complete RASCI Chart

      2.2 Completion Time 2-6 hours

      Goal: Identify who in your organization is primarily accountable and involved in each stage of the CLM process.

      Instructions

      Engage internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and Procurement as required to validate who should be involved in each stage.

      1. Using the information collected from internal reviews, assign a level in the CLM RASCI Diagram to each team member.
      2. Use the resulting RASCI diagram to guide you through developing or improving your CLM stages.

      This image contains a screenshot from Info-Tech's CLM RASCI Diagram.

      INPUT

      • Internal interview information

      OUTPUT

      • Understanding of who is involved in each CLM stage

      Materials

      • Interview data
      • RASCI Diagram

      Participants

      • Finance, Legal, CIO, VMO, Sales, Procurement

      Applying CLM Framework and Stages to Your Organization

      • Understand what CLM process you currently do or do not have in place.
      • Review implementation options: automated, semi-automated, and manual solutions.
      • If you are improving an existing process, focus on one phase at a time, perfect it, and then move to the other phase. This can also be driven by budget and time.
      • Create a plan to start with and then move to automating or semi-automating the stages.
      • Building onto or enhancing an existing system or processes can be a cost-effective method to produce near-term measurable savings
      • Focus on one phase at a time, then move on to the other phase.
      • While reviewing implementation of or improvements to CLM stages, be sure to track or calculate the potential time and cost savings and risk mitigation. This will help in any required business case for a CLM.

      CLM: An ROI Discussion 1 of 2

      • ROI can be easier to quantify and measure in larger organizations with larger CLM, but ROI metrics can be obtained regardless of the company or CLM size.
      • Organizations recognize their ROI through gains in efficiency across the entire business as well as within individual departments involved in the contracting process. They also do so by reducing the risk associated with decentralized and insecure storage of and access to their contracts, failure to comply with terms of their contracts, and missing deadlines associated with contracts.

      Just a few of the factors to consider within your own organization include:

      • The number of people inside and outside your company that touch your contracts.
      • The number of hours spent weekly, monthly, and annually managing contracts.
      • Potential efficiencies gained in better managing those contracts.
      • The total number of contracts that exist at any given time.
      • The average value and total value of those contract types.
      • The potential risk of being in breach of any of those contracts.
      • The number of places contracts are stored.
      • The level of security that exists to prevent unauthorized access.
      • The potential impact of unauthorized access to your sensitive contract data.

      CLM: An ROI Discussion 2 of 2

      Decision-Maker Apprehensions

      Decision-maker concerns arise from a common misunderstanding – that is, a fundamental failure to appreciate the true source of contract management value. This misunderstanding goes back many years to the time when analysts first started to take an interest in contract management and its automation. Their limited experience (primarily in retail and manufacturing sectors) led them to think of contract management as essentially an administrative function, primarily focused on procurement of goods. In such environments, the purpose of automation is focused on internal efficiency, augmented by the possibility of savings from reduced errors (e.g. failing to spot a renewal or expiry date) or compliance (ensuring use of standard terms).

      Today’s CLM systems and processes can provide ROI in several areas in the business.

      Info-Tech Insight

      Research on ROI of CLM software shows significant hard cost savings to an organization. For example, a $10 million company with 300 contracts valued at $3 million could realize savings of $83,400 and avoid up to $460,000 in lost revenues. (Derived from: ACCDocket, 2018)

      Additional Considerations 1 of 2

      Who should own and/or manage the CLM process within an organization? Legal, VMO, business unit, Sales?

      This is an often-discussed question. Research suggests that there is no definitive answer, as there are several variables.

      Organizations needs to review what makes the best business sense for them based on several considerations and then decide where CLM belongs.

      • Business unit budgets and time management
      • Available Administration personnel and time
      • IT resources
      • Security and access concerns
      • Best fit based on organizational structure

      35% of law professionals feel contract management is a legal responsibility, while 45% feel it’s a business responsibility and a final 20% are unsure where it belongs. (Source: “10 Eye-Popping Contract Management Statistics,” Apttus, 2018)

      Additional Considerations 2 of 2

      What type of CLM software or platform should we use?

      This too is a difficult question to answer definitively. Again, there are several variables to consider. As well, several solutions are available, and this is not a one-size-fits-all scenario.

      As with who should own the CLM process, organizations must review the various CLM software solutions available that will meet their current and future needs and then ask, “What do we need the system to do?”

      • Do you build a “homegrown” solution?
      • Should it be an add-on module to the current ERP or CRM system?
      • Is on-premises more suitable?
      • Is an adequate off-the-shelf (OTS) solution available?
      • What about the many cloud offerings?
      • Is there a basic system to start with that can expand as you grow?

      Info-Tech Insight

      When considering what type of solution to choose, prioritize what needs to been done or improved. Sometimes solutions can be deployed in phases as an “add-on” type modules.

      Summary of Accomplishment

      Knowledge Gained

      • Documented current CLM process
      • Core operational framework to build a CLM process on
      • Understanding of best practices required for a sustainable CLM

      Processes Optimized

      • Internal RASCI process identified
      • Existing internal stage improvements
      • Internal review process for risk mitigation

      Deliverables Completed

      • Existing CLM Processes Worksheet
      • CLM Maturity Assessment
      • CLM RASCI Chart
      • CLM improvement plan

      Project Step Summary

      Client Project: CLM Assessment and Improvement Plan

      1. Set your goals – what do you want to achieve in your CLM project?
      2. Assess your organization’s current CLM position in relation to CLM best practices and stages.
      3. Map your organization’s RASCI structure for CLM.
      4. Identify opportunities for stage improvements or target all low stage assessments.
      5. Prioritize improvement processes.
      6. Track ROI metrics.
      7. Develop a CLM implementation or improvement plan.

      Info-Tech Insight

      This project can fit your organization’s schedule:

      • Do-it-yourself with your team.
      • Remote delivery (Info-Tech Guided Implementation).

      CLM Blueprint Summary and Conclusion

      • Contract management is a vital component of a responsible VMO that will benefit all business units in an organization, save time and money, and reduce risk exposure.
      • A basic well-deployed and well-managed CLM will provide ROI in the short term.
      • Setting an improvement plan with concise improvements and potential cost savings based on process improvements will help your business case for CLM get approval and leadership buy-in.
      • Educating and aligning all business units and stakeholders to any changes to CLM processes will ensure that cost savings and ROI are achieved.
      • When evaluating a CLM software solution, use the operational framework and the ten process stages in this blueprint as a reference guide for CLM vendor functionality and selection.

      Related Info-Tech Research

      Master Contract Review and Negotiation

      Optimize spend with significant cost savings and negotiate from a position of strength.

      Manage Your Vendors Before They Manage You

      Maximize the value of vendor relationships.

      Bibliography

      Burla, Daniel. “The Must Know Of Transition to Dynamics 365 on Premise.” Sherweb, 14 April 2017. Web.

      Anand, Vishal, “Strategic Considerations in Implementing an End-to-End Contract Lifecycle Management Solution.” DWF Mindcrest, 20 Aug. 2016. Web.

      Alspaugh, Zach. “10 Eye-Popping Contract Management Statistics from the General Counsel’s Technology Report.” Apttus, 23 Nov. 2018. Web.

      Bishop, Randy. “Contract Management is not just a cost center.” ContractSafe, 9 Sept. 2019. Web.

      Bryce, Ian. “Contract Management KPIs - Measuring What Matters.” Gatekeeper, 2 May 2019. Web.

      Busch, Jason. “Contract Lifecycle Management 101.” Determine. 4 Jan. 2018. Web.

      “Contract Management Software Buyer's Guide.” TechnologyAdvice, 5 Aug. 2019. Web.

      Dunne, Michael. “Analysts Predict that 2019 will be a Big Year for Contract Lifecycle Management.” Apttus, 19 Nov. 2018. Web.

      “FIS Case Study.” Apttus, n.d. Web.

      Gutwein, Katie. “3 Takeaways from the 2018 State of Contract Management Report.” SpringCM, 2018. Web.

      “IACCM 2019 Benchmark Report.” IAACM, 4 Sept. 2019. Web.

      Linsley, Rod. “How Proverbial Wisdom Can Help Improve Contract Risk Mitigation.” Gatekeeper, 2 Aug. 2019. Web.

      Mars, Scott. “Contract Management Data Extraction.” Exari, 20 June 2017. Web.

      Rodriquez, Elizabeth. “Global Contract Life-Cycle Management Market Statistics and Trends 2019.” Business Tech Hub, 17 June 2017. Web.

      “State of Contract Management Report.” SpringCM, 2018. Web.

      Teninbaum, Gabriel, and Arthur Raguette. “Realizing ROI from Contract Management Technology.” ACCDocket.com, 29 Jan. 2018. Web.

      Wagner, Thomas. “Strategic Report on Contract Life cycle Management Software Market with Top Key Players- IBM Emptoris, Icertis, SAP, Apttus, CLM Matrix, Oracle, Infor, Newgen Software, Zycus, Symfact, Contract Logix, Coupa Software.” Market Research, 21 June 2019. Web.

      “What is Your Contract Lifecycle Management (CLM) Persona?” Spend Matters, 19 Oct. 2017. Web.

      Identify and Build the Data & Analytics Skills Your Organization Needs

      • Buy Link or Shortcode: {j2store}301|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some common obstacles that could prevent you from identifying and building the data & analytics skills your organization needs include:

      • Lack of resources and knowledge to secure professionals with the right mix of D&A skills and right level of experience/skills
      • Lack of well-formulated and robust data strategy
      • Underestimation of the value of soft skills

      Our Advice

      Critical Insight

      Skill deficiency is frequently stated as a roadblock to realizing corporate goals for data & analytics. Soft skills and technical skills are complementary, and data & analytics teams need a combination of both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization’s data strategy to ensure the right skills are available at the right time and minimize pertinent risks.

      Impact and Result

      Follow Info-Tech's advice on the roles and skills needed to support your data & analytics strategic growth objectives and how to execute an actionable plan:

      • Define the skills required for each essential data & analytics role.
      • Identify the roles and skills gaps in alignment with your current data strategy.
      • Establish an action plan to close the gaps and reduce risks.

      Identify and Build the Data & Analytics Skills Your Organization Needs Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Build the Data & Analytics Skills Your Organization Needs Deck – Use this research to assist you in identifying and building roles and skills that are aligned with the organization’s data strategy.

      To generate business value from data, data leaders must first understand what skills are required to achieve these goals, identify the current skill gaps, and then develop skills development programs to enhance the relevant skills. Use Info-Tech's approach to identify and fill skill gaps to ensure you have the right skills at the right time.

      • Identify and Build the Data & Analytics Skills Your Organization Needs Storyboard

      2. Data & Analytics Skills Assessment and Planning Tool – Use this tool to help you identify the current and required level of competency for data & analytics skills, analyze gaps, and create an actionable plan.

      Start with skills and roles identified as the highest priority through a high-level maturity assessment. From there, use this tool to determine whether the organization’s data & analytics team has the key role, the right combination of skill sets, and the right level competency for each skill. Create an actionable plan to develop skills and fill gaps.

      • Data & Analytics Skills Assessment and Planning Tool
      [infographic]

      Further reading

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      Analyst Perspective

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      In today's changing environment, data & analytics (D&A) teams have become an essential component, and it is critical for organizations to understand the skill and talent makeup of their D&A workforce. Chief data & analytics officers (CDAOs) or other equivalent data leaders can train current data employees or hire proven talent and quickly address skills gaps.

      While developing technical skills is critical, soft skills are often left underdeveloped, yet lack of such skills is most likely why the data team would face difficulty moving beyond managing technology and into delivering business value.

      Follow Info-Tech's methodology to identify and address skills gaps in today's data workplace. Align D&A skills with your organization's data strategy to ensure that you always have the right skills at the right time.

      Ruyi Sun
      Research Specialist,
      Data & Analytics, and Enterprise Architecture
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some critical challenges organizations with skills deficiencies might face include:

      • Time loss due to delayed progress and reworking of initiatives
      • Poor implementation quality and low productivity
      • Reduced credibility of data leader and data initiatives

      Common Obstacles

      Some common obstacles that could prevent you from identifying and building the data and analytics (D&A) skills your organization needs are:

      • Lack of resources and knowledge to secure professionals with the right mixed D&A skills and the right experience/skill level
      • Lack of well-formulated and robust data strategy
      • Neglecting the value of soft skills and placing all your attention on technical skills

      Info-Tech's Approach

      Follow Info-Tech's guidance on the roles and skills required to support your D&A strategic growth objectives and how to execute an actionable plan:

      • Define skills required for each essential data and analytics role
      • Identify roles and skills gap in alignment with your current data strategy
      • Establish action plan to close the gaps and reduce risks

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills required by your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      The rapidly changing environment is impacting the nature of work

      Scarcity of data & analytics (D&A) skills

      • Data is one of the most valuable organizational assets, and regardless of your industry, data remains the key to informed decision making. More than 75% of businesses are looking to adopt technologies like big data, cloud computing, and artificial intelligence (AI) in the next five years (World Economic Forum, 2023). As organizations pivot in response to industry disruptions and technological advancements, the nature of work is changing, and the demand for data expertise has grown.
      • Despite an increasing need for data expertise, organizations still have trouble securing D&A roles due to inadequate upskilling programs, limited understanding of the skills required, and more (EY, 2022). Notably, scarce D&A skills have been critical. More workers will need at least a base level of D&A skills to adequately perform their jobs.

      Stock image of a data storage center.

      Organizations struggle to remain competitive when skills gaps aren't addressed

      Organizations identify skills gaps as the key barriers preventing industry transformation:

      60% of organizations identify skills gaps as the key barriers preventing business transformation (World Economic Forum, 2023)

      43% of respondents agree the business area with the greatest need to address potential skills gaps is data analytics (McKinsey & Company, 2020)

      Most organizations are not ready to address potential role disruptions and close skills gaps:

      87% of surveyed companies say they currently experience skills gaps or expect them within a few years (McKinsey & Company, 2020)

      28% say their organizations make effective decisions on how to close skills gaps (McKinsey & Company, 2020)

      Neglecting soft skills development impedes CDOs/CDAOs from delivering value

      According to BearingPoint's CDO survey, cultural challenges and limited data literacy are the main roadblocks to a CDO's success. To drill further into the problem and understand the root causes of the two main challenges, conduct a root cause analysis (RCA) using the Five Whys technique.

      Bar Chart of 'Major Roadblocks to the Success of a CDO' with 'Limited data literacy' at the top.
      (Source: BearingPoint, 2020)

      Five Whys RCA

      Problem: Poor data literacy is the top challenge CDOs face when increasing the value of D&A. Why?

      • People that lack data literacy find it difficult to embrace and trust the organization's data insights. Why?
      • Data workers and the business team don't speak the same language. Why?
      • No shared data definition or knowledge is established. Over-extensive data facts do not drive business outcomes. Why?
      • Leaders fail to understand that data literacy is more than technical training, it is about encompassing all aspects of business, IT, and data. Why?
      • A lack of leadership skills prevents leaders from recognizing these connections and the data team needing to develop soft skills.

      Problem: Cultural challenge is one of the biggest obstacles to a CDO's success. Why?

      • Decisions are made from gut instinct instead of data-driven insights, thus affecting business performance. Why?
      • People within the organization do not believe that data drives operational excellence, so they resist change. Why?
      • Companies overestimate the organization's level of data literacy and data maturity. Why?
      • A lack of strategies in change management, continuous improvement & data literacy for data initiatives. Why?
      • A lack of expertise/leaders possessing these relevant soft skills (e.g. change management, etc.).

      As organizations strive to become more data-driven, most conversations around D&A emphasize hard skills. Soft skills like leadership and change management are equally crucial, and deficits there could be the root cause of the data team's inability to demonstrate improved business performance.

      Data cannot be fully leveraged without a cohesive data strategy

      Business strategy and data strategy are no longer separate entities.

      • For any chief data & analytics officer (CDAO) or equivalent data leader, a robust and comprehensive data strategy is the number one tool for generating measurable business value from data. Data leaders should understand what skills are required to achieve these goals, consider the current skills gap, and build development programs to help employees improve those skills.
      • Begin your skills development programs by ensuring you have a data strategy plan prepared. A data strategy should never be formulated independently from the business. Organizations with high data maturity will align such efforts to the needs of the business, making data a major part of the business strategy to achieve data centricity.
      • Refer to Info-Tech's Build a Robust and Comprehensive Data Strategy blueprint to ensure data can be leveraged as a strategic asset of the organization.

      Diagram of 'Data Strategy Maturity' with two arrangements of 'Data Strategy' and 'Business Strategy'. One is 'Aligned', the other is 'Data Centric.'

      Info-Tech Insight

      The process of achieving data centricity requires alignment between the data and business teams, and that requires soft skills.

      Follow Info-Tech's methodology to identify the roles and skills needed to execute a data strategy

      1. Define Key Roles and Skills

        Digital Leadership Skills, Soft Skills, Technical Skills
        Key Output
        • Defined essential competencies, responsibilities for some common data roles
      2. Uncover the Skills Gap

        Data Strategy Alignment, High-Level Data Maturity Assessment, Skills Gap Analysis
        Key Output
        • Data roles and skills aligned with your current data strategy
        • Identified current and target state of data skill sets
      3. Build an Actionable Plan

        Initiative Priority, Skills Growth Feasibility, Hiring Feasibility
        Key Output
        • Identified action plan to address the risk of data skills deficiency

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Research benefits

      Member benefits

      • Reduce time spent defining the target state of skill sets.
      • Gain ability to reassess the feasibility of execution on your data strategy, including resources and timeline.
      • Increase confidence in the data leader's ability to implement a successful skills development program that is aligned with the organization's data strategy, which correlates directly to successful business outcomes.

      Business benefits

      • Reduce time and cost spent hiring key data roles.
      • Increase chance of retaining high-quality data professionals.
      • Reduce time loss for delayed progress and rework of initiatives.
      • Optimize quality of data initiative implementation.
      • Improve data team productivity.

      Insight summary

      Overarching insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Phase 1 insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Phase 2 insight

      Understanding and knowing your organization's data maturity level is a prerequisite to assessing your current skill and determining where you must align in the future.

      Phase 3 insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A.

      While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      Tactical insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is four to six calls over the course of two to three months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Understand common data & analytics roles and skills, and your specific objectives and challenges. Call #2: Assess the current data maturity level and competency of skills set. Identify the skills gap. Call #3: Identify the relationship between current initiatives and capabilities. Initialize the corresponding roadmap for the data skills development program.

      Call #4: (follow-up call) Touching base to follow through and ensure that benefits have received.

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 1

      Define Key Roles and Skills

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 1.1 Review D&A Skill & Role List in Data & Analytics Assessment and Planning Tool

      This phase involves the following participants:

      • Data leads

      Key resources for your data strategy: People

      Having the right role is a key component for executing effective data strategy.

      D&A Common Roles

      • Data Steward
      • Data Custodian
      • Data Owner
      • Data Architect
      • Data Modeler
      • Artificial Intelligence (AI) and Machine Learning (ML) Specialist
      • Database Administrator
      • Data Quality Analyst
      • Security Architect
      • Information Architect
      • System Architect
      • MDM Administrator
      • Data Scientist
      • Data Engineer
      • Data Pipeline Developer
      • Data Integration Architect
      • Business Intelligence Architect
      • Business Intelligence Analyst
      • ML Validator

      AI and ML Specialist is projected to be the fastest-growing occupation in the next five years (World Economic Forum, 2023).

      While tech roles take an average of 62 days to fill, hiring a senior data scientist takes 70.5 days (Workable, 2019). Start your recruitment cycle early for this demand.

      D&A Leader Roles

      • Chief Data Officer (CDO)/Chief Data & Analytics Officer (CDAO)
      • Data Governance Lead
      • Data Management Lead
      • Information Security Lead
      • Data Quality Lead
      • Data Product Manager
      • Master Data Manager
      • Content and Record Manager
      • Data Literacy Manager

      CDOs act as impactful change agents ensuring that the organization's data management disciplines are running effectively and meeting the business' data needs. Only 12.0% of the surveyed organizations reported having a CDO as of 2012. By 2022, this percentage had increased to 73.7% (NewVantage Partners, 2022).

      Sixty-five percent of respondents said lack of data literacy is the top challenge CDOs face today (BearingPoint, 2020). It has become imperative for companies to consider building a data literacy program which will require a dedicated data literacy team.

      Key resources for your data strategy: Skill sets

      Distinguish between the three skills categories.

      • Soft Skills

        Soft skills are described as power skills regarding how you work, such as teamwork, communication, and critical thinking.
      • Digital Leadership Skills

        Not everyone working in the D&A field is expected to perform advanced analytical tasks. To thrive in increasingly data-rich environments, however, every data worker, including leaders, requires a basic technological understanding and skill sets such as AI, data literacy, and data ethics. These are digital leadership skills.
      • Technical Skills

        Technical skills are the practical skills required to complete a specific task. For example, data scientists and data engineers require programming skills to handle and manage vast amounts of data.

      Info-Tech Insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Soft skills aren't just nice to have

      They're a top asset in today's data workplace.

      Leadership

      • Data leaders with strong leadership abilities can influence the organization's strategic execution and direction, support data initiatives, and foster data cultures. Organizations that build and develop leadership potential are 4.2 times more likely to financially outperform those that do not (Udemy, 2022).

      Business Acumen

      • The process of deriving conclusions and insights from data is ultimately utilized to improve business decisions and solve business problems. Possessing business acumen helps provide the business context and perspectives for work within data analytics fields.

      Critical Thinking

      • Critical thinking allows data leaders at every level to objectively assess a problem before making judgment, consider all perspectives and opinions, and be able to make decisions knowing the ultimate impact on results.

      Analytical Thinking

      • Analytical thinking remains the most important skill for workers in 2023 (World Economic Forum, 2023). Data analytics expertise relies heavily on analytical thinking, which is the process of breaking information into basic principles to analyze and understand the logic and concepts.

      Design Thinking & Empathy

      • Design thinking skills help D&A professionals understand and prioritize the end-user experience to better inform results and assist the decision-making process. Organizations with high proficiency in design thinking are twice as likely to be high performing (McLean & Company, 2022).

      Learning Focused

      • The business and data analytics fields continue to evolve rapidly, and the skills, especially technical skills, must keep pace. Learning-focused D&A professionals continuously learn, expanding their knowledge and enhancing their techniques.

      Change Management

      • Change management is essential, especially for data leaders who act as change agents developing and enabling processes and who assist others with adjusting to changes with cultural and procedural factors. Organizations with high change management proficiency are 2.2 times more likely to be high performing (McLean & Company, 2022).

      Resilience

      • Being motivated and adaptable is essential when facing challenges and high-pressure situations. Organizations highly proficient in resilience are 1.8 times more likely to be high performing (McLean & Company, 2022).

      Managing Risk & Governance Mindset

      • Risk management ability is not limited to highly regulated institutions. All data workers must understand risks from the larger organizational perspective and have a holistic governance mindset while achieving their individual goals and making decisions.

      Continuous Improvement

      • Continuously collecting feedback and reflecting on it is the foundation of continuous improvement. To uncover and track the lessons learned and treat them as opportunities, data workers must be able to discover patterns and connections.

      Teamwork & Collaboration

      • Value delivery in a data-centric environment is a team effort, requiring collaboration across the business, IT, and data teams. D&A experts with strong collaborative abilities can successfully work with other teams to achieve shared objectives.

      Communication & Active Listening

      • This includes communicating with relevant stakeholders about timelines and expectations of data projects and associated technology and challenges, paying attention to data consumers, understanding their requirements and needs, and other areas of interest to the organization.

      Technical skills for everyday excellence

      Digital Leadership Skills

      • Technological Literacy
      • Data and AI Literacy
      • Cloud Computing Literacy
      • Data Ethics
      • Data Translation

      Data & Analytics Technical Competencies

      • Data Mining
      • Programming Languages (Python, SQL, R, etc.)
      • Data Analysis and Statistics
      • Computational and Algorithmic Thinking
      • AI/ML Skills (Deep Learning, Computer Vision, Natural Language Processing, etc.)
      • Data Visualization and Storytelling
      • Data Profiling
      • Data Modeling & Design
      • Data Pipeline (ETL/ELT) Design & Management
      • Database Design & Management
      • Data Warehouse/Data Lake Design & Management

      1.1 Review D&A Skill & Role List in the Data & Analytics Assessment and Planning Tool

      Sample of Tab 2 in the Data & Analytics Assessment and Planning Tool.

      Tab 2. Skill & Role List

      Objective: Review the library of skills and roles and customize them as needed to align with your organization's language and specific needs.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 2

      Uncover the Skills Gap

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 2.1 High-level assessment of your present data management maturity
      • 2.2 Interview business and data leaders to clarify current skills availability
      • 2.3 Use the Data & Analytics Assessment and Planning Tool to Identify your skills gaps

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Identify skills gaps across the organization

      Gaps are not just about assigning people to a role, but whether people have the right skill sets to carry out tasks.

      • Now that you have identified the essential skills and roles in the data workplace, move to Phase 2. This phase will help you understand the required level of competency, assess where the organization stands today, and identify gaps to close.
      • Using the Data & Analytics Assessment and Planning Tool, start with areas that are given the highest priority through a high-level maturity assessment. From there, three levels of gaps will be found: whether people are assigned to a particular position, the right combination of D&A skill sets, and the right competency level for each skill.
      • Lack of talent assigned to a position

      • Lack of the right combination of D&A skill sets

      • Lack of appropriate competency level

      Info-Tech Insight

      Understanding your organization's data maturity level is a prerequisite to assessing the skill sets you have today and determining where you need to align in the future.

      2.1 High-level assessment of your present data management maturity

      Identifying and fixing skills gaps takes time, money, and effort. Focus on bridging the gap in high-priority areas.

      Input: Current state capabilities, Use cases (if applicable), Data culture diagnostic survey results (if applicable)
      Output: High-level maturity assessment, Prioritized list of data management focused area
      Materials: Data Management Assessment and Planning Tool (optional), Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Objectives:

      Prioritize these skills and roles based on your current maturity levels and what you intend to accomplish with your data strategy.

      Steps:

      1. (Optional Step) Refer to the Build a Robust and Comprehensive Data Strategy blueprint. You can assess your data maturity level using the following frameworks and methods:
        • Review current data strategy and craft use cases that represent high-value areas that must be addressed for their teams or functions.
        • Use the data culture assessment survey to determine your organization's data maturity level.
      2. (Optional Step) Refer to the Create a Data Management Roadmap blueprint and Data Management Assessment and Planning Tool to dive deep into understanding and assessing capabilities and maturity levels of your organization's data management enablers and understanding your priority areas and specific gaps.
      3. If you have completed Data Management Assessment and Planning Tool, fill out your maturity level scores for each of the data management practices within it - Tab 3 (Current-State Assessment). Skip Tab 4 (High-Level Maturity Assessment).
      4. If you have not yet completed Data Management Assessment and Planning Tool, skip Tab 3 and continue with Tab 4. Assign values 1 to 3 for each capability and enabler.
      5. You can examine your current-state data maturity from a high level in terms of low/mid/high maturity using either Tabs 3 or 4.
      6. Suggested focus areas along the data journey:
        • Low Maturity = Data Strategy, Data Governance, Data Architecture
        • Mid Maturity = Data Literacy, Information Management, BI and Reporting, Data Operations Management, Data Quality Management, Data Security/Risk Management
        • High Maturity = MDM, Data Integration, Data Product and Services, Advanced Analytics (ML & AI Management).

      Download the Data & Analytics Assessment and Planning Tool

      2.2 Interview business and data leaders to clarify current skills availability

      1-2 hours per interview

      Input: Sample questions targeting the activities, challenges, and opportunities of each unit
      Output: Identified skills availability
      Materials: Whiteboard/Flip charts, Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. Conduct a deep-dive interview with each key data initiative stakeholder (data owners, SMEs, and relevant IT/Business department leads) who can provide insights on the skill sets of their team members, soliciting feedback from business and data leaders about skills and observations of employees as they perform their daily tasks.
      2. Populate a current level of competency for each skill in the Data & Analytics Assessment and Planning Tool in Tabs 5 and 6. Having determined your data maturity level, start with the prioritized data management components (e.g. if your organization sits at low data maturity level, start with identifying relevant positions and skills under data governance, data architecture, and data architecture elements).
      3. More detailed instructions on how to utilize the workbook are at the next activity.

      Key interview questions that will help you :

      1. Do you have personnel assigned to the role? What are their primary activities? Do the personnel possess the soft and technical skills noted in the workbook? Are you satisfied with their performance? How would you evaluate their degree of competency on a scale of "vital, important, nice to have, or none"? The following aspects should be considered when making the evaluation:
        • Key Performance Indicators (KPIs): Business unit data will show where the organization is challenged and will help identify potential areas for development.
        • Project Management Office: Look at successful and failed projects for trends in team traits and competencies.
        • Performance Reviews: Look for common themes where employees excel or need to improve.
        • Focus Groups: Speak with a cross section of employees to understand their challenges.
      2. What technology is currently used? Are there requirements for new technology to be bought and/or optimized in the future? Will the workforce need to increase their skill level to carry out these activities with the new technology in place?

      Download the Data & Analytics Assessment and Planning Tool

      2.3 Use the Data & Analytics Assessment and Planning Tool to identify skills gaps

      1-3 hours — Not everyone needs the same skill levels.

      Input: Current skills competency, Stakeholder interview results and findings
      Output: Gap identification and analysis
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads

      Instruction:

      1. Select your organization's data maturity level in terms of Low/Mid/High in cell A6 for both Tab 5 (Soft Skills Assessment) and Tab 6 (Technical Skills Assessment) to reduce irrelevant rows.
      2. Bring together key business stakeholders (data owners, SMEs, and relevant IT custodians) to determine whether the data role exists in the organization. If yes, assign a current-state value from “vital, important, nice to have, or none” for each skill in the assessment tool. Info-Tech has specified the desired/required target state of each skill set.
      3. Once you've assigned the current-state values, the tool will automatically determine whether there is a gap in skill set.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 3

      Build an Actionable Plan

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 3.1 Use the Data & Analytics Assessment and Planning Tool to build your actionable roadmap

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Determine next steps and decision points

      There are three types of internal skills development strategies

      • There are three types of internal skills development strategies organizations can use to ensure the right people with the right abilities are placed in the right roles: reskill, upskill, and new hire.
      1. Reskill

        Reskilling involves learning new skills for a different or newly defined position.
      2. Upskill

        Upskilling involves building a higher level of competency in skills to improve the worker's performance in their current role.
      3. New hire

        New hire involves hiring workers who have the essential skills to fill the open position.

      Info-Tech Insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A. While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      How to determine when to upskill, reskill, or hire to meet your skills needs

      Reskill

      Reskilling often indicates a change in someone's career path, so this decision requires a goal aligned with both individuals and the organization to establish a mutually beneficial situation.

      When making reskilling decisions, organizations should also consider the relevance of the skill for different positions. For example, data administrators and data architects have similar skill sets, so reskilling is appropriate for these employees.

      Upskill

      Upskilling tends to focus more on the soft skills necessary for more advanced positions. A data strategy lead, for example, might require design thinking training, which enables leaders to think from different perspectives.

      Skill growth feasibility must also be considered. Some technical skills, particularly those involving cutting-edge technologies, require continual learning to maintain operational excellence. For example, a data scientist may require AI/ML skills training to incorporate use of modern automation technology.

      New Hire

      For open positions and skills that are too resource-intensive to reskill or upskill, it makes sense to recruit new employees. Consider, however, time and cost feasibility of hiring. Some positions (e.g. senior data scientist) take longer to fill. To minimize risks, coordinate with your HR department and begin recruiting early.

      Data & Analytics skills training

      There are various learning methods that help employees develop priority competencies to achieve reskilling or upskilling.

      Specific training

      The data team can collaborate with the human resources department to plan and develop internal training sessions aimed at specific skill sets.

      This can also be accomplished through external training providers such as DCAM, which provides training courses on data management and analytics topics.

      Formal education program

      Colleges and universities can equip students with data analytics skills through formal education programs such as MBAs and undergraduate or graduate degrees in Data Science, Machine Learning, and other fields.

      Certification

      Investing time and effort to obtain certifications in the data & analytics field allows data workers to develop skills and gain recognition for continuous learning and self-improvement.

      AWS Data Analytics and Tableau Data Scientist Certification are two popular data analytics certifications.

      Online learning from general providers

      Some companies offer online courses in various subjects. Coursera and DataCamp are two examples of popular providers.

      Partner with a vendor

      The organization can partner with a vendor who brings skills and talents that are not yet available within the organization. Employees can benefit from the collaboration process by familiarizing themselves with the project and enhancing their own skills.

      Support from within your business

      The data team can engage with other departments that have previously done skills development programs, such as Finance and Change & Communications, who may have relevant resources to help you improve your business acumen and change management skills.

      Info-Tech Insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Data & Analytics skills reinforcement

      Don't assume learners will immediately comprehend new knowledge. Use different methods and approaches to reinforce their development.

      Innovation Space

      • Skills development is not a one-time event, but a continuous process during which innovation should be encouraged. A key aspect of being innovative is having a “fail fast” mentality, which means collecting feedback, recognizing when something isn't working, encouraging experimentation, and taking a different approach with the goal of achieving operational excellence.
      • Human-centered design (HCD) also yields innovative outcomes with a people-first focus. When creating skills development programs for various target groups, organizations should integrate a human-centered approach.

      Commercial Lens

      • Exposing people to a commercial way of thinking can add long-term value by educating people to act in the business' best interest and raising awareness of what other business functions contribute. This includes concepts such as project management, return on investment (ROI), budget alignment, etc.

      Checklists/Rubrics

      • Employees should record what they learn so they can take the time to reflect. A checklist is an effective technique for establishing objectives, allowing measurement of skills development and progress.

      Buddy Program

      • A buddy program helps employees gain and reinforce knowledge and skills they have learned through mutual support and information exchange.

      Align HR programs to support skills integration and talent recruitment

      With a clear idea of skills needs and an executable strategy for training and reinforcing of concepts, HR programs and processes can help the data team foster a learning environment and establish a recruitment plan. The links below will direct you to blueprints produced by McLean & Company, a division of Info-Tech Research Group.

      Workforce Planning

      When integrating the skills of the future into workforce planning, determine the best approach for addressing the identified talent gaps – whether to build, buy, or borrow.

      Integrate the future skills identified into the organization's workforce plan.

      Talent Acquisition

      In cases where employee development is not feasible, the organization's talent acquisition strategy must focus more on buying or borrowing talent. This will impact the TA process. For example, sourcing and screening must be updated to reflect new approaches and skills.

      If you have a talent acquisition strategy, assess how to integrate the new roles/skills into recruiting.

      Competencies/Succession Planning

      Review current organizational core competencies to determine if they need to be modified. New skills will help inform critical roles and competencies required in succession talent pools.

      If no competency framework exists, use McLean & Company's Develop a Comprehensive Competency Framework blueprint.

      Compensation

      Evaluate modified and new roles against the organization's compensation structure. Adjust them as necessary. Look at market data to understand compensation for new roles and skills.

      Reassess your base pay structure according to market data for new roles and skills.

      Learning and Development

      L&D plays a huge role in closing the skills gap. Build L&D opportunities to support development of new skills in employees.

      Design an Impactful Employee Development Program to build the skills employees need in the future.

      3.1 Use the Data & Analytics Assessment and Planning Tool to build an actionable plan

      1-3 hours

      Input: Roles and skills required, Key decision points
      Output: Actionable plan
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. On Tab 7 (Next Steps & Decision Points), you will find a list of tasks that correspond to roles that where there is a skills gap.
      2. Customize this list of tasks initiatives according to your needs.
      3. The Gantt chart, which will be generated automatically after assigning start and finish dates for each activity, can be used to structure your plan and guarantee that all the main components of skills development are addressed.

      Sample of Tab 7 in the Data & Analytics Assessment and Planning Tool.

      Download the Data & Analytics Assessment and Planning Tool

      Related Info-Tech Research

      Sample of the Create a Data Management Roadmap blueprint.

      Create a Data Management Roadmap

      • This blueprint will help you design a data management practice that will allow your organization to use data as a strategic enabler.

      Stock image of a person looking at data dashboards on a tablet.

      Build a Robust and Comprehensive Data Strategy

      • Put a strategy in place to ensure data is available, accessible, well-integrated, secured, of acceptable quality, and suitably visualized to fuel organization-wide decision making. Start treating data as strategic and corporate asset.

      Sample of the Foster Data-Driven Culture With Data Literacy blueprint.

      Foster Data-Driven Culture With Data Literacy

      • By thoughtfully designing a data literacy training program appropriate to the audience's experience, maturity level, and learning style, organizations build a data-driven and engaged culture that helps them unlock their data's full potential and outperform other organizations.

      Research Authors and Contributors

      Authors:

      Name Position Company
      Ruyi Sun Research Specialist Info-Tech Research Group

      Contributors:

      Name Position Company
      Steve Wills Practice Lead Info-Tech Research Group
      Andrea Malick Advisory Director Info-Tech Research Group
      Annabel Lui Principal Advisory Director Info-Tech Research Group
      Sherwick Min Technical Counselor Info-Tech Research Group

      Bibliography

      2022 Workplace Learning Trends Report.” Udemy, 2022. Accessed 20 June 2023.

      Agrawal, Sapana, et al. “Beyond hiring: How companies are reskilling to address talent gaps.” McKinsey & Company, 12 Feb. 2020. Accessed 20 June 2023.

      Bika, Nikoletta. “Key hiring metrics: Useful benchmarks for tech roles.” Workable, 2019. Accessed 20 June 2023.

      Chroust, Tomas. “Chief Data Officer – Leaders of data-driven enterprises.” BearingPoint, 2020. Accessed 20 June 2023.

      “Data and AI Leadership Executive Survey 2022.” NewVantage Partners, Jan 2022. Accessed 20 June 2023.

      Dondi, Marco, et al. “Defining the skills citizens will need in the future world of work.” McKinsey & Company, June 2021. Accessed 20 June 2023.

      Futschek, Gerald. “Algorithmic Thinking: The Key for Understanding Computer Science.” Lecture Notes in Computer Science, vol. 4226, 2006.

      Howard, William, et al. “2022 HR Trends Report.” McLean & Company, 2022. Accessed 20 June 2023.

      “Future of Jobs Report 2023.” World Economic Forum, May 2023. Accessed 20 June 2023.

      Knight, Michelle. “What is Data Ethics?” Dataversity, 19 May 2021. Accessed 20 June 2023.

      Little, Jim, et al. “The CIO Imperative: Is your technology moving fast enough to realize your ambitions?” EY, 22 Apr. 2022. Accessed 20 June 2023.

      “MDM Roles and Responsibilities.” Profisee, April 2019. Accessed 20 June 2023.

      “Reskilling and Upskilling: A Strategic Response to Changing Skill Demands.” TalentGuard, Oct. 2019. Accessed 20 June 2023.

      Southekal, Prashanth. “The Five C's: Soft Skills That Every Data Analytics Professional Should Have.” Forbes, 17 Oct. 2022. Accessed 20 June 2023.

      Improve Application Development Throughput

      • Buy Link or Shortcode: {j2store}151|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $59,399 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • The business is demanding more features at an increasing pace. It is expecting your development teams to keep up with its changing needs while maintaining high quality.
      • However, your development process is broken. Tasks are taking significant time to complete, and development handoffs are not smooth.

      Our Advice

      Critical Insight

      • Lean development is independent of your software development lifecycle (SDLC) methodology. Lean development practices can be used in both Agile and Waterfall teams.
      • Lean isn’t about getting rid of sound development processes. Becoming lean means fine-tuning the integration of core practices like coding and testing.
      • Lean thinking motivates automation. By focusing on optimizing the development process, automation becomes a logical and necessary step toward greater maturity and improved throughput.

      Impact and Result

      • Gain a deep understanding of lean principles and associated behaviors. Become familiar with the core lean principles and the critical attitudes and mindsets required by lean. Understand how incorporating DevOps and Agile principles can help your organization.
      • Conduct a development process and tool review. Use a value-stream analysis of your current development process and tools to reveal bottlenecks and time-consuming or wasteful tasks. Analyze these insights to identify root causes and the impact to product delivery.
      • Incorporate the right tools and practices to become more lean. Optimize the key areas where you are experiencing the most pain and consuming the most resources. Look at how today’s best development and testing practices (e.g. version control, branching) and tools (e.g. automation, continuous integration) can improve the throughput of your delivery pipeline.

      Improve Application Development Throughput Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should make development teams leaner, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Conduct a current state analysis

      Acquire a holistic perspective of the development team, process, and tools to identify the bottlenecks and inefficiency points that are significantly delaying releases.

      • Improve Application Development Throughput – Phase 1: Conduct a Current State Analysis
      • Lean Implementation Roadmap Template
      • Lean Development Readiness Assessment

      2. Define the lean future state

      Identify the development guiding principles and artifact management practices and build automation and continuous integration processes and tools that best fit the context and address the organization’s needs.

      • Improve Application Development Throughput – Phase 2: Define the Lean Future State

      3. Create an implementation roadmap

      Prioritize lean implementation initiatives in a gradual, phased approach and map the critical stakeholders in the lean transformation.

      • Improve Application Development Throughput – Phase 3: Create an Implementation Roadmap
      [infographic]

      Workshop: Improve Application Development Throughput

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Conduct a Current State Analysis

      The Purpose

      Assess the current state of your development environment.

      Select a pilot project to demonstrate the value of your optimization.

      Key Benefits Achieved

      Realization of the root causes behind the bottlenecks and inefficiencies in your current development process.

      Valuation of your current development tools.

      Selection of a pilot project that will be used to gather the metrics in order obtain buy-in for wider optimization initiatives.

      Activities

      1.1 Assess your readiness to transition to lean development.

      1.2 Conduct a SWOT analysis and value-stream assessment of your current development process.

      1.3 Evaluate your development tools.

      1.4 Select a pilot project.

      Outputs

      Lean development readiness assessment

      Current state analysis of development process

      Value assessment of existing development tools

      Pilot project selection

      2 Define Your Lean Future State

      The Purpose

      Establish your development guiding principles.

      Enhance the versioning and management of your development artifacts.

      Automatically build and continuously integrate your code.

      Key Benefits Achieved

      Grounded and well-understood set of guiding principles that are mapped to development tasks and initiatives.

      Version control strategy of development artifacts, including source code, adapted to support lean development.

      A tailored approach to establish the right environment to support automated build, testing, and continuous integration tools.

      Activities

      2.1 Assess your alignment to the lean principles.

      2.2 Define your lean development guiding principles.

      2.3 Define your source code branching approach.

      2.4 Define your build automation approach.

      2.5 Define your continuous integration approach.

      Outputs

      Level of alignment to lean principles

      Development guiding principles

      Source code branching approach

      Build automation approach.

      Continuous integration approach

      3 Create Your Implementation Roadmap

      The Purpose

      Prioritize your optimization initiatives to build an implementation roadmap.

      Identify the stakeholders of your lean transformation.

      Key Benefits Achieved

      Phased implementation roadmap that accommodates your current priorities, constraints, and enablers.

      Stakeholder engagement strategy to effectively demonstrate the value of the optimized development environment.

      Activities

      3.1 Identify metrics to gauge the success of your lean transformation.

      3.2 List and prioritize your implementation steps.

      3.3 Identify the stakeholders of your lean transformation.

      Outputs

      List of product, process, and tool metrics

      Prioritized list of tasks to optimize your development environment

      Identification of key stakeholders

      Negotiate SaaS Agreements That Are Built to Last

      • Buy Link or Shortcode: {j2store}137|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $72,298 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
      • SaaS solutions bring forth a unique form of “switching costs” that can make a decision to migrate solutions financially, technically, and politically painful.

      Our Advice

      Critical Insight

      • Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software and SaaS contract review.
      • Focus on the terms and conditions, not just the price.
      • Learning to negotiate is crucial.

      Impact and Result

      • Take control of your SaaS contract negotiations from the beginning.
      • Look at your contract holistically to find cost savings.
      • Guide communication between vendors and your organization for the duration of contract negotiations.
      • Redline the terms and conditions of your SaaS contract.
      • Prioritize crucial terms and conditions to negotiate.

      Negotiate SaaS Agreements That Are Built to Last Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to redline and negotiate a SaaS agreement, review Info-Tech’s methodology, and understand the different ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gather requirements

      Build and manage the stakeholder team, and then document the business use case.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 1: Gather Requirements
      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator

      2. Redline contract

      Redline the proposed SaaS contract.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 2: Redline Contract
      • SaaS Terms and Conditions Evaluation Tool

      3. Negotiate contract

      Create a thorough negotiation plan.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 3: Negotiate Contract
      • SaaS Contract Negotiation Terms Prioritization Checklist
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook
      [infographic]

      Workshop: Negotiate SaaS Agreements That Are Built to Last

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Collect and Review Data

      The Purpose

      Assemble documentation.

      Key Benefits Achieved

      Understand current position before going forward.

      Activities

      1.1 Assemble existing contracts.

      1.2 Document their strategic and tactical objectives.

      1.3 Identify current status of the vendor relationship and any historical context.

      1.4 Clarify goals for ideal future state.

      Outputs

      Business Use Case.

      2 Define the Business Use Case and Build a Stakeholder Team

      The Purpose

      Define the business use case and build a stakeholder team.

      Key Benefits Achieved

      Create a business use case to document functional and non-functional requirements.

      Build an internal cross-functional stakeholder team to negotiate the contract.

      Activities

      2.1 Establish a negotiation team and define roles.

      2.2 Write a communication plan.

      2.3 Complete a business use case.

      Outputs

      RASCI Matrix

      Communications Plan

      SaaS TCO Calculator

      Business Use Case

      3 Redline the Contract

      The Purpose

      Examine terms and conditions and prioritize for negotiation.

      Key Benefits Achieved

      Discover cost savings.

      Improve agreement terms.

      Prioritize terms for negotiation.

      Activities

      3.1 Review general terms and conditions.

      3.2 Review license and application specific terms and conditions.

      3.3 Match to business and technical requirements.

      3.4 Redline the agreement.

      Outputs

      SaaS Terms and Conditions Evaluation Tool

      SaaS Contract Negotiation Terms Prioritization Checklist

      4 Build a Negotiation Strategy

      The Purpose

      Create a negotiation strategy.

      Key Benefits Achieved

      Controlled communication established.

      Negotiation tactics chosen.

      Negotiation timeline plotted.

      Activities

      4.1 Review vendor and application specific negotiation tactics.

      4.2 Build negotiation strategy.

      Outputs

      Contract Negotiation Tactics Playbook

      Controlled Vendor Communications Letter

      Key Vendor Fiscal Year End Calendar

      Implement DevOps Practices That Work

      • Buy Link or Shortcode: {j2store}155|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $42,916 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices are critical for business value delivery.
      • Organizations are looking to DevOps as an approach to rapidly deliver changes, but they often lack the foundations to use DevOps effectively.

      Our Advice

      Critical Insight

      Even in a highly tool-centric view, it is the appreciation of DevOps core principles that will determine your success in implementing its practices.

      Impact and Result

      • Understand the basics of DevOps-related improvements.
      • Assess the health and conduciveness of software delivery process through Info-Tech Research Group’s MATURE framework.

      Implement DevOps Practices That Work Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement DevOps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Examine your current state

      Understand the current state of your software delivery process and categorize existing challenges in it.

      • DevOps Readiness Survey

      2. MATURE your delivery lifecycle

      Brainstorm solutions using Info-Tech Research Group’s MATURE framework.

      • DevOps Roadmap Template

      3. Choose the right metrics and tools for your needs

      Identify metrics that are insightful and valuable. Determine tools that can help with DevOps practices implementation.

      • DevOps Pipeline Maturity Assessment

      4. Select horizons for improvement

      Lay out a schedule for enhancements for your software process to make it ready for DevOps.

      [infographic]

      Workshop: Implement DevOps Practices That Work

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Examine Your Current State

      The Purpose

      Set the context for improvement.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals that people can align to.

      Activities

      1.1 Review the outcome of the DevOps Readiness Survey.

      1.2 Articulate the current-state delivery process.

      1.3 Categorize existing challenges using PEAS.

      Outputs

      Baseline assessment of the organization’s readiness for introducing DevOps principles in its delivery process

      A categorized list of challenges currently evident in the delivery process

      2 MATURE Your Delivery Lifecycle

      The Purpose

      Brainstorm solutions using the MATURE framework.

      Key Benefits Achieved

      Collaborative list of solutions to challenges that are restricting/may restrict adoption of DevOps in your organization.

      Activities

      2.1 Brainstorm solutions for identified challenges.

      2.2 Understand different DevOps topologies within the context of strong communication and collaboration.

      Outputs

      A list of solutions that will enhance the current delivery process into one which is influenced by DevOps principles

      (Optional) Identify a team topology that works for your organization.

      3 Choose the Right Metrics and Tools for Your Needs

      The Purpose

      Select metrics and tools for your DevOps-inspired delivery pipeline.

      Key Benefits Achieved

      Enable your team to select the right metrics and tool chain that support the implementation of DevOps practices.

      Activities

      3.1 Identify metrics that are sensible and provide meaningful insights into your organization’s DevOps transition.

      3.2 Determine the set of tools that satisfy enterprise standards and can be used to implement DevOps practices.

      3.3 (Optional) Assess DevOps pipeline maturity.

      Outputs

      A list of metrics that will assist in measuring the progress of your organization’s DevOps transition

      A list of tools that meet enterprise standards and enhance delivery processes

      4 Define Your Release, Communication, and Next Steps

      The Purpose

      Build a plan laying out the work needed to be done for implementing the necessary changes to your organization.

      Key Benefits Achieved

      Roadmap of steps to take in the coming future.

      Activities

      4.1 Create a roadmap for future-state delivery process.

      Outputs

      Roadmap for future-state delivery process

      Knowledge Management

      • Buy Link or Shortcode: {j2store}33|cart{/j2store}
      • Related Products: {j2store}33|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $10,000
      • member rating average days saved: 2
      • Parent Category Name: People and Resources
      • Parent Category Link: /people-and-resources
      Mitigate Key IT Employee Knowledge Loss

      State of Hybrid Work in IT

      • Buy Link or Shortcode: {j2store}551|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select

      Hybrid work is here, but there is no consensus among industry leaders on how to do it right. IT faces the dual challenge of supporting its own employees while enabling the success of the broader organization. In the absence of a single best practice to adopt, how can IT departments make the right decisions when it comes to the new world of hybrid?

      Our Advice

      Critical Insight

      • Don’t make the mistake of emulating the tech giants, unless they are your direct competition. Instead, look to organizations that have walked your path in terms of scope, organizational goals, industry, and organizational structure. Remember, your competitors are not just those who compete for the same customers but also those who compete for your employees.
      • Hybrid and remote teams require more attention, connection, and leadership from managers. The shift from doing the day-to-day to effectively leading is critical for the success of nontraditional work models. As hybrid and remote work become engrained in society, organizations must ensure that the concept of the “working manager” is as obsolete as the rotary telephone.

      Impact and Result

      Read this concise report to learn:

      • What other IT organizations are doing in the new hybrid world.
      • How hybrid has impacted infrastructure, operations, and business relations.
      • How to succeed at building a highly effective hybrid team.
      • How Info-Tech can help you make hybrid an asset for your IT department.

      State of Hybrid Work in IT Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. State of Hybrid Work in IT: A Trend Report – A walkthrough of the latest data on the impact of the hybrid work revolution in IT.

      Read this report to learn how IT departments are using the latest trends in hybrid work for greater IT effectiveness. Understand what work models are best for IT, how IT can support a remote organization, and how hybrid work changes team dynamics.

      • State of Hybrid Work in IT: A Trends Report

      Infographic

      Further reading

      State of Hybrid Work in IT: A Trend Report

      When tech giants can’t agree and best practices change by the minute, forge your own path to your next normal.

      Hybrid is here. Now how do we do this?

      The pandemic has catapulted hybrid work to the forefront of strategic decisions an organization needs to make. According to our State of Hybrid Work in IT survey conducted in July of 2022, nearly all organizations across all industries are continuing some form of hybrid or remote work long-term (n=518). Flexible work location options are the single greatest concern for employees seeking a new job. IT departments are tasked with not only solving hybrid work questions for their own personnel but also supporting a hybrid-first organization, which means significant changes to technology and operations.

      Faced with decisions that alter the very foundation of how an organization functions, IT leaders are looking for best practices and coming up empty. The world of work has changed quickly and unexpectedly. If you feel you are “winging it” in the new normal, you are not alone.

      95% of organizations are continuing some form of hybrid or remote work.

      n=518

      47% of respondents look at hybrid work options when evaluating a new employer, vs. 46% who look at salary.

      n=518

      Hybrid work model decision tree

      Your organization, your employees, your goals – your hybrid work

      The days of a “typical” workplace have passed. When it comes to the new world of hybrid work, there is no best-of-breed example to follow.

      Among the flood of contradictory decisions made by industry leaders, your IT organization must forge its own path, informed by the needs of your employees and your organizational goals.

      All IT work models can support the broader organization. However, IT is more effective in a hybrid work mode.

      Stay informed on where your industry is headed, but learn from, rather than follow, industry leaders.

      All industries reported primarily using partial, balanced & full hybrid work models.

      All industries reported some fully remote work, ranging from 2-10% of organizations surveyed.

      Construction and healthcare & life sciences did not require any fully in-office work. Other industries, between 1-12% required fully in-office work.

      The image contains a screenshot of the Enablement of Organizational Goals.

      Move beyond following tech giants

      The uncomfortable truth about hybrid work is that there are many viable models, and the “best of breed” depends on who you ask. In the post-pandemic workspace, for every work location model there is an industry leader that has made it functional. And yet this doesn’t mean that every model will be viable for your organization.

      In the absence of a single best practice, rely on an individualized cost-benefit assessment rooted in objective feasibility criteria. Every work model – whether it continues your status quo or overhauls the working environment – introduces risk. Only in the context of your particular organization does that risk become quantifiable.

      Don’t make the mistake of emulating the tech giants, unless they are your direct competition. Instead, look to organizations that have walked your path in terms of scope, organizational goals, industry, and organizational structure.

      External

      Internal

      Political

      Economic

      Social

      Technological

      Legal

      Environmental

      Operations

      Culture

      Resources

      Risk

      Benefit

      Employee Preferences

      Comparative

      Your competitors

      Info-Tech Insight

      Remember, your competitors are not just those who compete for the same customers but also those who compete for your employees.

      IT must balance commitments to both the organization and its employees

      IT has two roles: to effectively support the broader organization and to function effectively within the department. It therefore has two main stakeholder relationships: the organization it supports and the employees it houses. Hybrid work impacts both. Don't make the mistake of overweighting one relationship at the expense of the other. IT will only function effectively when it addresses both.

      Track your progress with the right metrics

      IT and the organization

      • Business satisfaction with IT
      • Perception of IT value

      Diagnostic tool: Business Vision

      IT and its employees

      • Employee engagement

      Diagnostic tool:
      Employee Engagement Surveys

      This report contains:

      1. IT and the Organization
        1. IT Effectiveness
          in a Hybrid World
        2. The Impact of Hybrid on Infrastructure & Operations
      2. IT and Its Employees
        1. What Hybrid Means for the IT Workforce
        2. Leadership for Hybrid IT Teams

      This report is based on organizations like yours

      The image contains graphs that demonstrate demographics of organizations.

      This report is based on organizations like yours

      The image contains two graphs that demonstrate a breakdown of departments in an organization.

      This report is based on organizations like yours

      The image contains two graphs that demonstrate the workforce type and operating budget.


      This report is based on organizations like yours

      The image contains two graphs that demonstrate organization maturity and effectiveness score.

      At a high level, hybrid work in IT is everywhere

      INDUSTRY

      • Arts & Entertainment (including sports)
      • Retail & Wholesale
      • Utilities
      • Transportation & Warehousing
      • Not-for-Profit (incl. professional associations)
      • Education
      • Professional Services
      • Manufacturing
      • Media, Information, Telecom & Technology
      • Construction
      • Gaming & Hospitality
      • Government
      • Healthcare & Life Sciences
      • Financial Services (incl. banking & insurance)

      ORGANIZATIONAL SIZE

      Small

      <100

      Medium

      101-5,000

      Large

      >5,000

      Employees

      POSITION LEVEL

      • Executive
      • Director
      • Supervisor/Manager
      • Student/Contractor/Team Member

      100% of industries, organizational sizes, and position levels reported some form of hybrid or remote work.

      Work model breakdown at the respondent level

      5% 21% 30% 39% 5%

      No Remote
      Work

      Partial Hybrid

      Balanced Hybrid

      Full Hybrid

      Full Remote

      Work

      n=516

      Industry lens: Work location model

      The image contains a screenshot of a graph that demonstrates the work location model with the work model breakdown at the respondent level.

      Percentage of IT roles currently in a hybrid or remote work arrangement

      The image contains a screenshot of two graphs that demonstrate the percentage of IT roles currently in a hybrid or remote work arrangement.

      Work location model by organization size

      The image contains a screenshot of a graph that demonstrates work location model by organization size.

      Hybrid work options

      The image contains a screenshot of two pie graphs that demonstrate hybrid work options.

      Expense reimbursement

      28% 27% 22% 26% 13% 4%

      None

      Internet/home phone

      Just internet

      Home office setup

      Home utilities

      Other

      NOTES

      n=518

      Home office setup: One-time lump-sum payment

      Home utilities: Gas, electricity, lights, etc.

      Other: Office supplies, portion of home rent/mortgage payments, etc.

      01 TECHNOLOGY

      IT and the Organization

      Section 1

      The promise of hybrid work for IT department effectiveness and the costs of making it happen

      In this section:

      1. IT Effectiveness in a Hybrid World
      2. The Impact of Hybrid on Infrastructure & Operations

      Hybrid work models in IT bolster effectiveness

      IT’s effectiveness, meaning its ability to enable organizational goal attainment, is its ultimate success metric. In the post-pandemic world, this indicator is intimately tied to IT’s work location model, as well as IT’s ability to support the work location model used by the broader organization.

      In 2022, 90% of organizations have embraced some form of hybrid work (n=516). And only a small contingent of IT departments have more than 90% of roles still working completely in office, with no remote work offered (n=515).

      This outcome was not unexpected, given the unprecedented success of remote work during the pandemic. However, the implications of this work model were far less certain. Would productivity remain once the threat of layoffs had passed? Would hybrid work be viable in the long term, once the novelty wore off? Would teams be able to function collaboratively without meeting face to face? Would hybrid allow a great culture
      to continue?

      All signs point to yes. For most IT departments, the benefits of hybrid work outweigh its costs. IT is significantly more effective when some degree of remote or hybrid work is present.

      The image contains a screenshot of a graph on how hybrid work models in IT bolster effectiveness.

      n=518

      Remote Work Effectiveness Paradox

      When IT itself works fully onsite, lower effectiveness is reported (6.2). When IT is tasked with supporting fully, 100% remote organizations (as opposed to being fully remote only within IT), lower effectiveness is reported then as well (5.9). A fully remote organization means 100% virtual communication, so the expectations placed on IT increase, as do the stakes of any errors. Of note, hybrid work models yield consistent effectiveness scores when implemented at both the IT and organizational levels.

      IT has risen to the challenge of hybrid

      Despite the challenges initially posed by hybrid and remote organizations, IT has thrived through the pandemic and into this newly common workplace.

      Most organizations have experienced an unchanged or increased level of service requests and incidents. However, for the majority of organizations, service desk support has maintained (58%) or improved (35%). Only 7% of IT organizations report decreased service desk support.

      Is your service desk able to offer the same level of support compared to the pre-pandemic/pre-hybrid work model?

      The image contains a screenshot of a graph that demonstrates service desk levels.

      How has the volume of your service requests/incidents changed?

      The image contains a screenshot of a graph that demonstrates volume of service requests/incidents changed.

      Has hybrid work impacted your customer satisfaction scores?

      The image contains a graph that demonstrates if hybrid work impacted customer satisfaction scores.

      Industry lens: Volume of service requests

      It is interesting to note that service request volumes have evolved similarly across industries, mirroring the remarkable consistency with which hybrid work has been adopted across disparate fields, from construction to government.

      Of note are two industries where the volume of service requests mostly increased: government and media, information, telecom & technology.

      With the global expansion of digital products and services through the pandemic, it’s no surprise to see volumes increase for media, information, telecom & technology. With government, the shift from on premises to rapid and large-scale hybrid or remote work for administrative and knowledge worker roles likely meant additional support from IT to equip employees and end users with the necessary tools to carry out work offsite.

      How has the volume of your service requests/incidents changed?

      The image contains a screenshot of a graph that demonstrates the volume of service requests/incidents changed.

      The transition to hybrid was worth the effort

      Hybrid and remote work have been associated with greater productivity and organizational benefits since before the pandemic. During emergency remote work, doubts arose about whether productivity would be maintained under such extreme circumstances and were quickly dispelled. The promise of remote productivity held up.

      Now, cautiously entering a “new normal,” the question has emerged again. Will long-term hybrid work bring the same benefits?

      The expectations have held up, with hybrid work benefits ranging from reduced facilities costs to greater employee performance.

      Organizational hybrid work may place additional strain on IT,
      but it is clear IT can handle the challenge. And when it does,
      the organizational benefits are tremendous.

      88% of respondents reported increased or consistent Infrastructure & Operations customer satisfaction scores.

      What benefits has the organization achieved as a result of moving to a hybrid work model?

      The image contains a bar graph that demonstrates the benefits of a hybrid work model.

      n=487

      Hybrid has sped up modernization of IT processes and infrastructure

      Of the organizations surveyed, the vast majority reported significant changes to both the process and the technology side of IT operations. Four key processes affected by the move to hybrid were:

      • Incident management
      • Service request support
      • Asset management
      • Change management

      Within Infrastructure & Operations, the area with the greatest degree
      of change was network architecture (reported by 44% of respondents), followed closely by service desk (41%) and recovery workspaces and mitigations (40%).

      63% of respondents reported changes to conference room technology to support hybrid meetings.

      n=496

      IT Infrastructure & Operations changes, upgrades, and modernization

      The image contains a screenshot of a bar graph that demonstrates IT Infrastructure & Operations Changes, Upgrades, and Modernizations.

      What process(es) had the highest degree of change in response to supporting hybrid work?

      The image contains a screenshot of a bar graph that demonstrates the highest degree of change in response to supporting hybrid work.

      Hybrid has permanently changed deployment strategy

      Forty-five percent of respondents reported significant changes to deployment as a result of hybrid work, with an additional 42% reporting minor changes. Only 13% of respondents stated that their deployment processes remained unchanged following the shift to hybrid work.

      With the ever-increasing globalization of business, deployment modernization practices such as the shift to zero touch are no longer optional or a bonus. They are a critical part of business operation that bring efficiency benefits beyond just supporting hybrid work.

      The deployment changes brought on by hybrid span across industries. Even in manufacturing, with the greatest proportion of respondents reporting “no change” to deployment practices (33%), most organizations experienced some degree of change.

      Has a hybrid work model led you to make any changes to your deployment, such as zero touch, to get equipment to end users?

      The image contains a graph to demonstrate if change was possible with hybrid models.

      Industry lens: Deployment changes

      Has a hybrid work model led you to make any changes to your deployment, such as zero touch, to get equipment to end users?

      The image contains a screenshot of a graph that demonstrates deployment changes at an industry lens.

      Hybrid work has accelerated organizational digitization

      Over half of respondents reported significantly decreased reliance on printed copies as a result of hybrid. While these changes were on the horizon for many organizations even before the pandemic, the necessity of keeping business operations running during lockdowns meant that critical resources could be invested in these processes. As a result, digitization has leapt forward.

      This represents an opportunity for businesses to re-evaluate their relationships with printing vendors. Resources spent on printing can be reduced or reallocated, representing additional savings as a result of moving to hybrid. Additionally, many respondents report a willingness – and ability – from vendors to partner with organizations in driving innovation and enabling digitization.

      With respect to changes pertaining to hard copies/printers as a result of your hybrid work model:

      The image contains a screenshot of a bar graph that demonstrates how hybrid work has accelerated organizational digitization.

      Hybrid work necessitates network and communications modernization

      The majority (63%) of respondents reported making significant changes to conference room technology as a result of hybrid work. A significant proportion (30%) report that such changes were not needed, but this includes organizations who had already set up remote communication.

      An important group is the remaining 8% of respondents, who cite budgetary restrictions as a key barrier in making the necessary technology upgrades. Ensure the business case for communication technology appropriately reflects the impact of these upgrades, and reduce the impact of legacy technology where possible:

      • Recognize not just meeting efficiency but also the impact on culture, engagement, morale, and external and internal clients.
      • Connect conference room tech modernization to the overall business goals and work it into the IT strategy.
      • Leverage the scheduling flexibility available in hybrid work arrangements to reduce reliance on inadequate conference technology by scheduling in-person meetings where possible and necessary.

      Have you made changes/upgrades
      to the conference room technology to support hybrid meetings?
      (E.g. Some participants joining remotely, some participants present in a conference room)

      The image contains a screenshot of a graph that demonstrates if network and communications modernization was needed.

      How we can help

      Metrics

      Resources

      Create a Work-From-Anywhere IT Strategy

      Stabilize Infrastructure & Operations During Work-From-Anywhere

      Sustain Work-From-Home in the New Normal

      Establish a Communication & Collaboration Systems Strategy

      Modernize the Network

      Simplify Remote Deployment With Zero-Touch Provisioning

      For a comprehensive list of resources, visit
      Info-Tech’s Hybrid Workplace Research Center

      02 PEOPLE

      IT and Its Employees

      Section 2

      Cultivate the dream team in a newly hybrid world

      In this section:

      1. What Hybrid Means for the IT Workforce
      2. Leadership for IT Hybrid Teams

      Hybrid means permanent change to how IT hires

      Since before the pandemic, the intangibles of having a job that works with your lifestyle have been steadily growing in importance. Considerations like flexible work options, work-life balance, and culture are more important to employees now than they were two years ago, and employers must adapt.

      Salary alone is no longer enough to recruit the best talent, nor is it the key to keeping employees engaged and productive. Hybrid work options are the single biggest concern for IT professionals seeking new employment, just edging out salary. This means employers must not offer just some work flexibility but truly embrace a hybrid environment.

      The image contains a screenshot of several graphs that compare results from 2019 to 2021 on what is important to employees.

      What are you considering when looking at a potential employer?

      The image contains a screenshot of a bar graph that demonstrates what needs to be considered when looking at a potential employer.

      A recession may not significantly impact hybrid work decisions overall

      Declining economic conditions suggest that a talent market shift may be imminent. Moving toward a recession may mean less competition for top talent, but this doesn't mean hybrid will be left behind as a recruitment tactic.

      Just over half of IT organizations surveyed are considering expanding hybrid work or moving to fully remote work even in a recession. Hybrid work is a critical enabler of organizational success when resources are scarce, due to the productivity benefits and cost savings it has demonstrated. Organizations that recognize this and adequately invest in hybrid tools now will have equipped themselves with an invaluable tool for weathering a recession storm, should one come.

      What impact could a potential recession in the coming year have on your decisions around your work location?

      The image contains a screenshot of a graph that demonstrates the potential impact of a recession.

      Hybrid work may help small organizations in a declining economy

      The potential for a recession has a greater impact on the workforce decisions of small organizations. They likely face greater financial pressures than medium and large-sized organizations, pressures that could necessitate halting recruitment efforts or holding firm on current salaries and health benefits.

      A reliance on intangible benefits, like the continuation of hybrid work, may help offset some of negative effects of such freezes, including the risk of lower employee engagement and productivity. Survey respondents indicated that hybrid work options (47%) were slightly more important to them than salary/compensation (46%) and significantly more important than benefits (29%), which could work in favor of small organizations in keeping the critical employees needed to survive an economic downturn.

      Small

      Medium Large
      90% 82% 66%

      Currently considering some form of hiring/salary freeze or cutbacks, if a recession occurs

      NOTES

      n=520

      Small: <101 employees

      Medium: 101-5000 employees

      Large: >5,000 employees

      Hybrid mitigates the main challenge of remote work

      One advantage of hybrid over remote work is the ability to maintain an in-office presence, which provides a failsafe should technology or other barriers stand in the way of effective distance communication. To take full advantage of this, teams should coordinate tasks with location, so that employees get the most out of the unique benefits of working in office and remotely.

      Activities to prioritize for in-office work:

      • Collaboration and brainstorming
      • Team-building activities
      • Introductions and onboarding

      Activities to prioritize for remote work:

      • Individual focus time

      As a leader, what are your greatest concerns with hybrid work?

      The image contains a bar graph that demonstrates concerns about hybrid work as an employer.

      Hybrid necessitates additional effort by managers

      When it comes to leading a hybrid team, there is no ignoring the impact of distance on communication and team cohesion. Among leaders’ top concerns are employee wellbeing and the ability to pick up on signs of demotivation among team members.

      The top two tactics used by managers to mitigate these concerns center on increasing communication:

      • Staying available through instant messaging.
      • Increasing team meetings.

      Tactics most used by highly effective IT departments

      The image contains a screenshot of tactics most used by highly effective IT departments.

      Team success is linked to the number of tools at the manager’s disposal

      The most effective hybrid team management tools focus on overcoming the greatest obstacle introduced by remote work: barriers to communication and connection.

      The most effective IT organizations use a variety of tactics. For managers looking to improve hybrid team effectiveness, the critical factor is less the tactic used and more the ability to adapt their approach to their team’s needs and incorporate team feedback. As such, IT effectiveness is linked to the total number of tactics used by managers.

      IT department effectiveness

      The image contains a screenshot of a graph that demonstrates IT department effectiveness.

      Autonomy is key to hybrid team success

      Not all hybrid work models are created equal. IT leaders working with hybrid teams have many decisions to make, from how many days will be spent in and out of office to how much control employees get over which days they work remotely.

      Employee and manager preferences are largely aligned regarding the number of days spent working remotely or onsite: Two to three days in office is the most selected option for both groups, although overall manager preferences lean slightly toward more time spent in office.

      Comparison of leader and employee preference for days in-office

      The image contains a screenshot of a graph that compares leader and employee preference for days in-office.

      Do employees have a choice in the days they work in office/offsite?

      The image contains a screenshot of a graph that demonstrates if employees have a choice in the days they work in office or offsite.

      For most organizations, employees get a choice of which days they spend working remotely. This autonomy can range from complete freedom to a choice between several pre-approved days depending on team scheduling needs.

      Work is still needed to increase autonomy in hybrid teams

      Organizations’ success in establishing hybrid team autonomy varies greatly post pandemic. Responses are roughly equally split between staff feeling more, less, or the same level of autonomy as before the pandemic. Evaluated in the context of most organizations continuing a hybrid approach, this leads to the conclusion that not all hybrid implementations are being conducted equally effectively when it comes to employee empowerment.

      As an employee, how much control do you have over the decisions related to where, when, and how you work currently?

      The image contains a screenshot of a graph that demonstrates autonomy in hybrid teams.

      Connectedness in hybrid teams lags behind

      A strong case can be made for fostering autonomy and empowerment on hybrid teams. Employees who report lower levels of control than before the pandemic also report lower engagement indicators, such as trust in senior leadership, motivation, and intention to stay with the organization. On the other hand, employees experiencing increased levels of control report gains in these areas.

      The only exception to these gains is the sense of team connectedness, which employees experiencing more control report as lower than before the pandemic. A greater sense of connectedness among employees reporting decreased control may be related to more mandatory in-office time or a sense of connection over shared team-level disengagement.

      These findings reinforce the need for hybrid teams to invest in team building and communication practices and confirm that significant benefits are to be had when a sense of autonomy can be successfully instilled.

      Employees who experience less control than before the pandemic report lowered engagement indicators ... except sense of connectedness

      The image contains a screenshot of a graph that demonstrates less control, means lowered engagement.

      Employees who experience more control than before the pandemic report increased engagement indicators ... except sense of connectedness

      The image contains a screenshot of a graph that demonstrates more control, means increased engagement.

      Case study: Hybrid work at Microsoft Canada

      The Power of Intentionality

      When the pandemic hit, technology was not in question. Flexible work options had been available and widely used, and the technology to support them was in place.

      The leadership team turned their focus to ensuring their culture survived and thrived. They developed a laser-focused approach for engaging their employees by giving their leaders tools to hold conversations. The dialogue was ongoing to allow the organization to adapt to the fast pace of changing conditions.

      Every tactic, plan, and communication started with the question, “What outcome are we striving for?”

      With a clear outcome, tools were created and leaders supported to drive the desired outcome.

      “We knew we had the technology in place. Our concern was around maintaining our strong culture and ensuring continued engagement and connection with our employees.”

      Lisa Gibson, Chief of Staff, Microsoft Canada

      How we can help

      Metrics

      Resources

      Webinar: Effectively Manage Remote Teams

      Build a Better Manager: Manage Your People

      Info-Tech Leadership Training

      Adapt Your Onboarding Process to a Virtual Environment

      Virtual Meeting Primer

      For a comprehensive list of resources, visit
      Info-Tech’s Hybrid Workplace Research Center

      Recommendations

      The last two years have been a great experiment, but it’s not over.

      BE INTENTIONAL

      • Build a team charter on how and when to communicate.
      • Create necessary tools/templates.

      INVOLVE EMPLOYEES

      • Conduct surveys and focus groups.
        Have conversations to understand sentiment.

      ALLOW CHOICE

      • Provide freedom for employees to have some level of choice in hybrid arrangements.

      BE TRANSPARENT

      • Disclose the rationale.
      • Share criteria and decision making.

      Info-Tech Insight

      Hybrid and remote teams require more attention, connection, and leadership from managers. The shift from doing the day-to-day to effectively leading is critical for the success of nontraditional work models. As hybrid and remote work become engrained in society, organizations must ensure that the concept of the “working manager” is as obsolete as the rotary telephone.

      Bibliography

      “8 Unexpected Benefits of Online Learning for Development.” Center for Creative Leadership (CCL), 14 Oct. 2020. Accessed 5 Nov. 2021.
      “2021 Global Workplace Report.” NTT, 2021. Accessed 6 July 2022.
      “Advantages of Online Learning for Leadership Development: What Our Research Says.” CCL, 8 Dec. 2020. 5 Nov. 2021.
      “Annual Work Trend Index Report – Great Expectations: Making Hybrid Work Work.” Microsoft WorkLab, 2022. Accessed 6 July 2022.
      Aten, Jason. “Google’s Employees Return to the Office Today. This Former Exec Says Hybrid Work Won’t Last.” Inc.Com, 4 April 2022. Web.
      Bariso, Justin. “Google Spent 2 Years Researching What Makes a Great Remote Team. It Came Up With These 3 Things.” Inc.Com, 8 April 2019. Web.
      Berger, Chloe. “What Is ‘Hybrid Guilt’? Going to Office Part-Time May Be Worst Option.” Fortune, 22 Aug. 2022. Web.
      Brodkin, Jon. “After Remote-Work Ultimatum, Musk Reveals Plan to Cut 10% of Tesla Jobs.” Ars Technica, 3 June 2022. Web.
      Brown, Brené, host. “Brené with Scott Sonenshein on Why We’ll Never Be the Same Again (and Why It’s Time to Talk About It).” Dare to Lead with Brené Brown, 11 April 2022. Brené Brown, https://brenebrown.com/podcast/why-well-never-be-the-same-again-and-why-its-time-to-talk-about-it/.
      Burgess, Mark. “Most Asset Managers Operating Under Hybrid Work Model: Survey.” Advisor’s Edge, 13 Sept. 2022. Web.
      Caminiti, Susan. “Workers Want Hybrid but Say It’s Exhausting Them. Here’s How Companies Can Fix That.” CNBC, 8 Feb. 2022. Web.
      Capossela, Chris. “The next Chapter of Our Hybrid Workplace: Update on Our Washington State Work Sites.” The Official Microsoft Blog, 14 Feb. 2022. Web.
      Carrigan, John. “Meta Embraces ‘Work From Anywhere’ Ahead of Return to Office.” Human Resources Director, 25 March 2022. Web.
      Chaturvedi, H., and Ajoy Kumar Dey. The New Normal: Reinventing Professional Life and Familial Bonding in the Post COVID 19 Era. Bloomsbury Publishing, 2021.
      Commonwealth of Massachusetts. “Alternative Work Options.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
      Commonwealth of Massachusetts. “Hybrid Work for Commonwealth Employees.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
      “COVID-19 and the Future of Business.” IBM, 21 Sept. 2020. Web.
      Daniel, Will. “The Layoffs at Tesla Show That White-Collar Workers Are Screwed, Hedge Funder Famous from ‘The Big Short’ Predicts.” Fortune, 29 June 2022. Web.
      D’Auria, Gemma, and Aaron De Smet. “Leadership in a Crisis: Responding to Coronavirus.” McKinsey, 16 March 2020. Web.
      Dave, Paresh. “Google Mandates Workers Back to Silicon Valley, Other Offices from April 4.” Reuters, 3 March. 2022. Web.
      Delaney, Kevin. “What We Know Now About the Business Impact of Hybrid Work.” Time, 6 Sept. 2022. Web.
      Dobson, Sarah. “Legal Considerations for Hybrid Work.” Canadian HR Reporter, 15 Sept. 2022. Web.
      Dondo, Jean. “Hybrid Work Is the Way for More Than a Quarter of Canadian Investment Firms.” Wealth Professional, 14 Sept. 2022. Web.
      Elias, Jennifer. “Twitter to Reopen Offices March 15, Though Remote Work Remains an Option.” CNBC, 3 March 2022. Web.
      Esade Business & Law School. “Leadership After Covid-19: Learning To Navigate The Unknown Unknowns.” Forbes, 30 March 2021. Web.
      “Famous Companies Without Offices.” The Hoxton Mix, 19 Oct. 2021. Web.
      Gerdeman, Dina. “COVID Killed the Traditional Workplace. What Should Companies Do Now?” HBS Working Knowledge, 8 March 2021. Web.
      Gleason, Mike. “Apple’s Hybrid Work Plans Draw Worker Pushback.” SearchUnifiedCommunications, TechTarget, 24 Aug. 2022. Web.
      Gleeson, Brent. “13 Tips For Leading And Managing Remote Teams.” Forbes, 26 Aug. 2020. Web.
      Gratton, Lynda. “How to Do Hybrid Right.” Harvard Business Review, 1 May 2021. Web.
      “Guide: Understand team effectiveness.” re:Work, Google, n.d. Accessed 5 Nov. 2021.
      Hardy, Karen. “Your Business Has Decided on Hybrid Work… Now What?” CIO, 12 Sept. 2022. Web.
      Hirsch, Arlene S. “How to Boost Employee Performance in a Hybrid Work Environment.” SHRM, 6 Sept. 2022. Web.
      “How to Get Hybrid Work Right.” CBRE Canada, 14 June 2022. Web.
      “Hybrid Work: When Freedom Benefits from Rules.” Audi, 12 Sept. 2022. Accessed 18 Sept. 2022.
      “Hybrid Workplace | Global Culture Report.” O.C. Tanner, 2022, Web.
      “Intel Is Hiring for Various Roles with Temporary Remote Work Benefits.” SightsIn Plus, 11 June 2022. Web.
      Iyer, Viswanathan. “Council Post: Hybrid Work: Beyond The Point Of No Return.” Forbes, 14 Sept. 2022. Web.
      Johnson, Ricardo. “Securing Hybrid Work All Starts with Zero-Trust.” SC Media, 29 Aug. 2022. Web.
      Jones, Jada. “The Rules of Work Are Changing, and Hybrid Work Is Winning.” ZDNET, 1 Sept. 2022. Web.
      Kowitt, Beth. “Inside Google’s Push to Nail Hybrid Work and Bring Its 165,000-Person Workforce Back to the Office Part-Time.” Fortune, 17 May 2022. Web.
      Kumra, Gautam, and Diaan-Yi Lin. “The Future of (Hybrid) Work.” McKinsey, 2 Sept. 2022. Web.
      Lagowska, Urszula, et al. “Leadership under Crises: A Research Agenda for the Post-COVID-19 Era.” Brazilian Administration Review, vol. 17, no. 2, Aug. 2020. Web.
      Larson, Barbara Z., et al. “A Guide to Managing Your (Newly) Remote Workers.” Harvard Business Review, 18 March 2020. Web.
      “Leadership During COVID-19: Resources for Times of Uncertainty.” CCL, n.d. Accessed 5 Nov. 2021.
      “Managing Remote Employees: How to Lead From a Distance.” CCL, 7 April 2020. Accessed 5 Nov. 2021.
      “Managing Remote Teams.” Know Your Team, n.d. Web. Accessed 5 Nov. 2021.
      Mayhem, Julian. “Virtual Leadership - Essential Skills for Managing Remote Teams.” VirtualSpeech, 4 Nov. 2020. Web.
      McKendrick, Joe. “Keeping Hybrid Workers In Sync, Digitally And In-Person.” Forbes, 22 Aug. 2022. Web.
      McKenna, Karissa, et al. “Webinar: Build Leadership Skills for the New World of Work.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
      Mearian, Lucas. “Microsoft Edges Back to ‘Normal’ with Workplace Reopening Plan.” Computerworld, 14 Feb. 2022. Web.
      “Meta Careers.” Meta, n.d. Accessed 17 Sept. 2022.
      Miller, Mark. “5 Tips to Make Your Hybrid Work Model More Effective.” Entrepreneur, 25 Aug. 2022. Web.
      Nica, Irina. “How to Manage a Remote Team: 14 Effective Tips for Your Business.” Business 2 Community, 8 July 2021. Web.
      O’Halloran, Joe. “Organisations Struggle to Support IT in a Hybrid Work Model.” ComputerWeekly.com, 17 June 2022. Web.
      Ong, Ivan. “Council Post: Why Hybrid Work Is The Way To Go.” Forbes, 12 Sept. 2022. Web.
      Osborne, Charlie. “The End of Fully Remote Work? Google Begins Shift to the Hybrid Office.” ZDNet. 3 March 2022. Web.
      Pazzanese, Christina. “Back to Office? Stay Remote? Go Hybrid?” Harvard Gazette, 24 Aug. 2022. Web.
      “PinFlex.” Pinterest Careers, n.d. Accessed 17 Sept. 2022.
      Rand, Ben. “Does Hybrid Work Actually Work? Insights from 30,000 Emails.” Harvard Business School – Working Knowledge, 6 Sept. 2022. Web.
      “Remote Locations, Working with Flexibility.” Amazon.jobs, n.d. Accessed 17 Sept. 2022.
      Renjen, Punit. “The Heart of Resilient Leadership: Responding to COVID-19.” Deloitte Insights, 16 March 2020. Web.
      Shih, Clara. “Keeping Hybrid Employees Engaged.” Harvard Business Review, 11 Aug. 2022. Web.
      Singerman, Michelle. “Is the Hybrid Work Model Working? CPAs Spill the Beans.” Chartered Professional Accountants Canada, 24 Aug. 2022. Web.
      Stern, Stefan. “Hybrid Working: Why the Office-Home Balance Is Still a Challenge.” Financial Times, 4 Sept. 2022.
      Subramaniam, Vanmala, et al. “Ready to Go Back to the Office? Employers and Workers Are Divided over the Fate of Remote Work.” The Globe and Mail, 1 Sept. 2022. Web.
      Tong, Goh Chiew. “Inflation and Hybrid Work ‘skyrocketed’ Demand for Flexible Workspace, WeWork Says.” CNBC, 6 Sept. 2022. Web.
      Tsipursky, Gleb. “Commentary: The Psychology behind Why Some Leaders Are Resisting a Hybrid Work Model.” Fortune, 8 June 2021. Web.
      Turner, Jack. “Tesla Doubles Down on Remote Working Ban, Tracks Office Attendance.” Tech.Co, 3 July 2022. Web.
      “Virtual Leadership Styles for Remote Businesses.” Maryville Online, 4 Feb. 2021. Web.
      “Webinar: How Leaders Can Build Organizational Resilience.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
      “Why GitLab Uses the Term All-Remote to Describe Its 100% Remote Workforce.” GitLab, 2022. Accessed 17 Sept. 2022.
      Wigert, Ben, and Sangeeta Agrawal. “Returning to the Office: The Current, Preferred and Future State of Remote Work.” Gallup, 31 Aug. 2022. Web.
      Wingard, Jason. “Elon Musk’s Big Bet Against Remote Work: Will Tesla Win?” Forbes, 4 June 2022. Web.

      Create a Service Management Roadmap

      • Buy Link or Shortcode: {j2store}394|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $71,003 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Our Advice

      Critical Insight

      • Having effective service management practices in place will allow you to pursue activities, such as innovation, and drive the business forward.
      • Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value.
      • Providing consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Impact and Result

      • Understand the foundational and core elements that allow you to build a successful service management practice focused on outcomes.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s current state, identify the gaps, and create a roadmap for success.
      • Increase business and customer satisfaction by delivering services focused on creating business value.

      Create a Service Management Roadmap Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why many service management maturity projects fail to address foundational and core elements, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      Kick-off the project and complete the project charter.

      • Create a Service Management Roadmap – Phase 1: Launch Project
      • Service Management Roadmap Project Charter

      2. Assess the current state

      Determine the current state for service management practices.

      • Create a Service Management Roadmap – Phase 2: Assess the Current State
      • Service Management Maturity Assessment Tool
      • Organizational Change Management Capability Assessment Tool
      • Service Management Roadmap Presentation Template

      3. Build the roadmap

      Build your roadmap with identified initiatives.

      • Create a Service Management Roadmap – Phase 3: Identify the Target State

      4. Build the communication slide

      Create the communication slide that demonstrates how things will change, both short and long term.

      • Create a Service Management Roadmap – Phase 4: Build the Roadmap
      [infographic]

      Workshop: Create a Service Management Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Service Management

      The Purpose

      Understand service management.

      Key Benefits Achieved

      Gain a common understanding of service management, the forces that impact your roadmap, and the Info-Tech Service Management Maturity Model.

      Activities

      1.1 Understand service management.

      1.2 Build a compelling vision and mission.

      Outputs

      Constraints and enablers chart

      Service management vision, mission, and values

      2 Assess the Current State of Service Management

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand attitudes, behaviors, and culture.

      Understand governance and process ownership needs.

      Understand strengths, weaknesses, opportunities, and threats.

      Defined desired state.

      Activities

      2.1 Assess cultural ABCs.

      2.2 Assess governance needs.

      2.3 Perform SWOT analysis.

      2.4 Define desired state.

      Outputs

      Cultural improvements action items

      Governance action items

      SWOT analysis action items

      Defined desired state

      3 Continue Current-State Assessment

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand the current maturity of service management processes.

      Understand organizational change management capabilities.

      Activities

      3.1 Perform service management process maturity assessment.

      3.2 Complete OCM capability assessment.

      3.3 Identify roadmap themes.

      Outputs

      Service management process maturity activities

      OCM action items

      Roadmap themes

      4 Build Roadmap and Communication Tool

      The Purpose

      Use outputs from previous steps to build your roadmap and communication one-pagers.

      Key Benefits Achieved

      Easy-to-understand roadmap one-pager

      Communication one-pager

      Activities

      4.1 Build roadmap one-pager.

      4.2 Build communication one-pager.

      Outputs

      Service management roadmap

      Service management roadmap – Brought to Life communication slide

      Further reading

      Create a Service Management Roadmap

      Implement service management in an order that makes sense.

      ANALYST PERSPECTIVE

      "More than 80% of the larger enterprises we’ve worked with start out wanting to develop advanced service management practices without having the cultural and organizational basics or foundational practices fully in place. Although you wouldn’t think this would be the case in large enterprises, again and again IT leaders are underestimating the importance of cultural and foundational aspects such as governance, management practices, and understanding business value. You must have these fundamentals right before moving on."

      Tony Denford,

      Research Director – CIO

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • Senior IT Management

      This Research Will Help You:

      • Create or maintain service management (SM) practices to ensure user-facing services are delivered seamlessly to business users with minimum interruption.
      • Increase the level of reliability and availability of the services provided to the business and improve the relationship and communication between IT and the business.

      This Research Will Also Assist

      • Service Management Process Owners

      This Research Will Help Them:

      • Formalize, standardize, and improve the maturity of service management practices.
      • Identify new service management initiatives to move IT to the next level of service management maturity.

      Executive summary

      Situation

      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Complication

      • IT organizations want to be seen as strategic partners, but they fail to address the cultural and organizational constraints.
      • Without alignment with the business goals, services often fail to provide the expected value.
      • Traditional service management approaches are not adaptable for new ways of working.

      Resolution

      • Follow Info-Tech’s methodology to create a service management roadmap that will help guide the optimization of your IT services and improve IT’s value to the business.
      • The blueprint will help you right-size your roadmap to best suit your specific needs and goals and will provide structure, ownership, and direction for service management.
      • This blueprint allows you to accurately identify the current state of service management at your organization. Customize the roadmap and create a plan to achieve your target service management state.

      Info-Tech Insight

      Having effective service management practices in place will allow you to pursue activities such as innovation and drive the business forward. Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value. Consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Poor service management manifests in many different pains across the organization

      Immaturity in service management will not result in one pain – rather, it will create a chaotic environment for the entire organization, crippling IT’s ability to deliver and perform.

      Low Service Management Maturity

      These are some of the pains that can be attributed to poor service management practices.

      • Frequent service-impacting incidents
      • Low satisfaction with the service desk
      • High % of failed deployments
      • Frequent change-related incidents
      • Frequent recurring incidents
      • Inability to find root cause
      • No communication with the business
      • Frequent capacity-related incidents

      And there are many more…

      Mature service management practices are a necessity, not a nice-to-have

      Immature service management practices are one of the biggest hurdles preventing IT from reaching its true potential.

      In 2004, PwC published a report titled “IT Moves from Cost Center to Business Contributor.” However, the 2014-2015 CSC Global CIO Survey showed that a high percentage of IT is still considered a cost center.

      And low maturity of service management practices is inhibiting activities such as agility, DevOps, digitalization, and innovation.

      A pie chart is shown that is titled: Where does IT sit? The chart has 3 sections. One section represents IT and the business have a collaborative partnership 28%. The next section represents at 33% where IT has a formal client/service provider relationship with the business. The last section has 39% where IT is considered as a cost center.
      Source: CSC Global CIO Survey: 2014-2015 “CIOs Emerge as Disruptive Innovators”

      39%: Resources are primarily focused on managing existing IT workloads and keeping the lights on.

      31%: Too much time and too many resources are used to handle urgent incidents and problems.

      There are many misconceptions about what service management is

      Misconception #1: “Service management is a process”

      Effective service management is a journey that encompasses a series of initiatives that improves the value of services delivered.

      Misconception #2: “Service Management = Service Desk”

      Service desk is the foundation, since it is the main end-user touch point, but service management is a set of people and processes required to deliver business-facing services.

      Misconception #3: “Service management is about the ITSM tool”

      The tool is part of the overall service management program, but the people and processes must be in place before implementing.

      Misconception #4: “Service management development is one big initiative”

      Service management development is a series of initiatives that takes into account an organization’s current state, maturity, capacities, and objectives.

      Misconception #5: “Service management processes can be deployed in any order, assuming good planning and design”

      A successful service management program takes into account the dependencies of processes.

      Misconception #6: “Service management is resolving incidents and deploying changes”

      Service management is about delivering high-value and high-quality services.

      Misconception #7: “Service management is not the key determinant of success”

      As an organization progresses on the service management journey, its ability to deliver high-value and high-quality services increases.

      Misconception #8: “Resolving Incidents = Success”

      Preventing incidents is the name of the game.

      Misconception #9: “Service Management = Good Firefighter”

      Service management is about understanding what’s going on with user-facing services and proactively improving service quality.

      Misconception #10: “Service management is about IT and technical services (e.g. servers, network, database)”

      Service management is about business/user-facing services and the value the services provide to the business.

      Service management projects often don’t succeed because they are focused on process rather than outcomes

      Service management projects tend to focus on implementing process without ensuring foundational elements of culture and management practices are strong enough to support the change.

      1. Aligning your service management goals with your organizational objectives leads to better understanding of the expected outcomes.
      2. Understand your customers and what they value, and design your practices to deliver this value.

      3. IT does not know what order is best when implementing new practices or process improvements.
      4. Don't run before you can walk. Fundamental practices must reach the maturity threshold before developing advanced practices. Implement continuous improvement on your existing processes so they continue to support new practices.

      5. IT does not follow best practices when implementing a practice.
      6. Our best-practice research is based on extensive experience working with clients through advisory calls and workshops.

      Info-Tech can help you create a customized, low-effort, and high-value service management roadmap that will shore up any gaps, prove IT’s value, and achieve business satisfaction.

      Info-Tech’s methodology will help you customize your roadmap so the journey is right for you

      With Info-Tech, you will find out where you are, where you want to go, and how you will get there.

      With our methodology, you can expect the following:

      • Eliminate or reduce rework due to poor execution.
      • Identify dependencies/prerequisites and ensure practices are deployed in the correct order, at the correct time, and by the right people.
      • Engage all necessary resources to design and implement required processes.
      • Assess current maturity and capabilities and design the roadmap with these factors in mind.

      Doing it right the first time around

      You will see these benefits at the end

        ✓ Increase the quality of services IT provides to the business.

        ✓ Increase business satisfaction through higher alignment of IT services.

        ✓ Lower cost to design, implement, and manage services.

        ✓ Better resource utilization, including staff, tools, and budget.

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Follow our model and get to your target state

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The canopy of the tree are labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Each step along the way, Info-Tech has the tools to help you

      Phase 1: Launch the Project

      Assemble a team with the right talent and vision to increase the chances of project success.

      Phase 2: Assess Current State

      Understand where you are currently on the service management journey using the maturity assessment tool.

      Phase 3: Build Roadmap

      Based on the assessments, build a roadmap to address areas for improvement.

      Phase 4: Build Communication slide

      Based on the roadmap, define the current state, short- and long-term visions for each major improvement area.

      Info-Tech Deliverables:

      • Project Charter
      • Assessment Tools
      • Roadmap Template
      • Communication Template

      CIO call to action

      Improving the maturity of the organization’s service management practice is a big commitment, and the project can only succeed with active support from senior leadership.

      Ideally, the CIO should be the project sponsor, even the project leader. At a minimum, the CIO needs to perform the following activities:

      1. Walk the talk – demonstrate personal commitment to the project and communicate the benefits of the service management journey to IT and the steering committee.
      2. Improving or adopting any new practice is difficult, especially for a project of this size. Thus, the CIO needs to show visible support for this project through internal communication and dedicated resources to help complete this project.

      3. Select a senior, capable, and results-driven project leader.
      4. Most likely, the implementation of this project will be lengthy and technical in some nature. Therefore, the project leader must have a good understanding of the current IT structure, senior standing within the organization, and the relationship and power in place to propel people into action.

      5. Help to define the target future state of IT’s service management.
      6. Determine a realistic target state for the organization based on current capability and resource/budget restraints.

      7. Conduct periodic follow-up meetings to keep track of progress.
      8. Reinforce or re-emphasize the importance of this project to the organization through various communication channels if needed.

      Stabilizing your environment is a must before establishing any more-mature processes

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • The business landscape was rapidly changing for this manufacturer and they wanted to leverage potential cost savings from cloud-first initiatives and consolidate multiple, self-run service delivery teams that were geographically dispersed.

      Solution

      Original Plan

      • Consolidate multiple service delivery teams worldwide and implement service portfolio management.

      Revised Plan with Service Management Roadmap:

      • Markets around the world had very different needs and there was little understanding of what customers value.
      • There was also no understanding of what services were currently being offered within each geography.

      Results

      • Plan was adjusted to understand customer value and services offered.
      • Services were then stabilized and standardized before consolidation.
      • Team also focused on problem maturity and drove a continuous improvement culture and increasing transparency.

      MORAL OF THE STORY:

      Understanding the value of each service allowed the organization to focus effort on high-return activities rather than continuous fire fighting.

      Understand the processes involved in the proactive phase

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • Services were fairly stable, but there were significant recurring issues for certain services.
      • The business was not satisfied with the service quality for certain services, due to periodic availability and reliability issues.
      • Customer feedback for the service desk was generally good.

      Solution

      Original Plan

      • Review all service desk and incident management processes to ensure that service issues were handled in an effective manner.

      Revised Plan with Service Management Roadmap:

      • Design and deploy a rigorous problem management process to determine the root cause of recurring issues.
      • Monitor key services for events that may lead to a service outage.

      Results

      • Root cause of recurring issues was determined and fixes were deployed to resolve the underlying cause of the issues.
      • Service quality improved dramatically, resulting in high customer satisfaction.

      MORAL OF THE STORY:

      Make sure that you understand which processes need to be reviewed in order to determine the cause for service instability. Focusing on the proactive processes was the right answer for this company.

      Have the right culture and structure in place before you become a service provider

      CASE STUDY

      Industry: Healthcare

      Source:Journal of American Medical Informatics Association

      Challenge

      • The IT organization wanted to build a service catalog to demonstrate the value of IT to the business.
      • IT was organized in technology silos and focused on applications, not business services.
      • IT services were not aligned with business activities.
      • Relationships with the business were not well established.

      Solution

      Original Plan

      • Create and publish a service catalog.

      Revised Plan: with Service Management Roadmap:

      • Establish relationships with key stakeholders in the business units.
      • Understand how business activities interface with IT services.
      • Lay the groundwork for the service catalog by defining services from the business perspective.

      Results

      • Strong relationships with the business units.
      • Deep understanding of how business activities map to IT services.
      • Service definitions that reflect how the business uses IT services.

      MORAL OF THE STORY:

      Before you build and publish a service catalog, make sure that you understand how the business is using the IT services that you provide.

      Calculate the benefits of using Info-Tech’s methodology

      To measure the value of developing your roadmap using the Info-Tech tools and methodology, you must calculate the effort saved by not having to develop the methods.

      A. How much time will it take to develop an industry-best roadmap using Info-Tech methodology and tools?

      Using Info-Tech’s tools and methodology you can accurately estimate the effort to develop a roadmap using industry-leading research into best practice.

      B. What would be the effort to develop the insight, assess your team, and develop the roadmap?

      This metric represents the time your team would take to be able to effectively assess themselves and develop a roadmap that will lead to service management excellence.

      C. Cost & time saving through Info-Tech’s methodology

      Measured Value

      Step 1: Assess current state

      Cost to assess current state:

      • 5 Directors + 10 Managers x 10 hours at $X an hour = $A

      Step 2: Build the roadmap

      Cost to create service management roadmap:

      • 5 Directors + 10 Managers x 8 hours at $X an hour = $B

      Step 3: Develop the communication slide

      Cost to create roadmaps for phases:

      • 5 Directors + 10 Managers x 6 hours at $X an hour = $C

      Potential financial savings from using Info-Tech resources:

      Estimated cost to do “B” – (Step 1 ($A) + Step 2 ($B) + Step 3 ($C)) = $Total Saving

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Create a Service Management Roadmap – project overview


      Launch the project

      Assess the current state

      Build the roadmap

      Build communication slide

      Best-Practice Toolkit

      1.1 Create a powerful, succinct mission statement

      1.2 Assemble a project team with representatives from all major IT teams

      1.3 Determine project stakeholders and create a communication plan

      1.4 Establish metrics to track the success of the project

      2.1 Assess impacting forces

      2.2 Build service management vision, mission, and values

      2.3 Assess attitudes, behaviors, and culture

      2.4 Assess governance

      2.5 Perform SWOT analysis

      2.6 Identify desired state

      2.7 Assess SM maturity

      2.8 Assess OCM capabilities

      3.1 Document overall themes

      3.2 List individual initiatives

      4.1 Document current state

      4.2 List future vision

      Guided Implementations

      • Kick-off the project
      • Build the project team
      • Complete the charter
      • Understand current state
      • Determine target state
      • Build the roadmap based on current and target state
      • Build short- and long-term visions and initiative list

      Onsite Workshop

      Module 1: Launch the project

      Module 2: Assess current service management maturity

      Module 3: Complete the roadmap

      Module 4: Complete the communication slide

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Activities

      Understand Service Management

      1.1 Understand the concepts and benefits of service management.

      1.2 Understand the changing impacting forces that affect your ability to deliver services.

      1.3 Build a compelling vision and mission for your service management program.

      Assess the Current State of Your Service Management Practice

      2.1 Understand attitudes, behaviors, and culture.

      2.2 Assess governance and process ownership needs.

      2.3 Perform SWOT analysis.

      2.4 Define the desired state.

      Complete Current-State Assessment

      3.1 Conduct service management process maturity assessment.

      3.2 Identify organizational change management capabilities.

      3.3 Identify themes for roadmap.

      Build Roadmap and Communication Tool

      4.1 Build roadmap one-pager.

      4.2 Build roadmap communication one-pager.

      Deliverables

      1. Constraints and enablers chart
      2. Service management vision, mission, and values
      1. Action items for cultural improvements
      2. Action items for governance
      3. Identified improvements from SWOT
      4. Defined desired state
      1. Service Management Process Maturity Assessment
      2. Organizational Change Management Assessment
      1. Service management roadmap
      2. Roadmap Communication Tool in the Service Management Roadmap Presentation Template

      PHASE 1

      Launch the Project

      Launch the project

      This step will walk you through the following activities:

      • Create a powerful, succinct mission statement based on your organization’s goals and objectives.
      • Assemble a project team with representatives from all major IT teams.
      • Determine project stakeholders and create a plan to convey the benefits of this project.
      • Establish metrics to track the success of the project.

      Step Insights

      • The project leader should have a strong relationship with IT and business leaders to maximize the benefit of each initiative in the service management journey.
      • The service management roadmap initiative will touch almost every part of the organization; therefore, it is important to have representation from all impacted stakeholders.
      • The communication slide needs to include the organizational change impact of the roadmap initiatives.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch the Project

      Step 1.1 – Kick-off the Project

      Start with an analyst kick-off call:

      • Identify current organization pain points relating to poor service management practices
      • Determine high-level objectives
      • Create a mission statement

      Then complete these activities…

      • Identify potential team members who could actively contribute to the project
      • Identify stakeholders who have a vested interest in the completion of this project

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Step 1.2 – Complete the Charter

      Review findings with analyst:

      • Create the project team; ensure all major IT teams are represented
      • Review stakeholder list and identify communication messages

      Then complete these activities…

      • Establish metrics to complete project planning
      • Complete the project charter

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Use Info-Tech’s project charter to begin your initiative

      1.1 Service Management Roadmap Project Charter

      The Service Management Roadmap Project Charter is used to govern the initiative throughout the project. It provides the foundation for project communication and monitoring.

      The template has been pre-populated with sample information appropriate for this project. Please review this sample text and change, add, or delete information as required.

      The charter includes the following sections:

      • Mission Statement
      • Goals & Objectives
      • Project Team
      • Project Stakeholders
      • Current State (from phases 2 & 3)
      • Target State (from phases 2 & 3)
      • Target State
      • Metrics
      • Sponsorship Signature
      A screenshot of Info-Tech's Service Management Roadmap Project Charter is shown.

      Use Info-Tech’s ready-to-use deliverable to customize your mission statement

      Adapt and personalize Info-Tech’s Service Management Roadmap Mission Statement and Goals & Objectives below to suit your organization’s needs.

      Goals & Objectives

      • Create a plan for implementing service management initiatives that align with the overall goals/objectives for service management.
      • Identify service management initiatives that must be implemented/improved in the short term before deploying more advanced initiatives.
      • Determine the target state for each initiative based on current maturity and level of investment available.
      • Identify service management initiatives and understand dependencies, prerequisites, and level of effort required to implement.
      • Determine the sequence in which initiatives should be deployed.
      • Create a detailed rollout plan that specifies initiatives, time frames, and owners.
      • Engage the right teams and obtain their commitment throughout both the planning and assessment of roadmap initiatives.
      • both the planning and assessment of roadmap initiatives. Obtain support for the completed roadmap from executive stakeholders.

      Example Mission Statement

      To help [Organization Name] develop a set of service management practices that will better address the overarching goals of the IT department.

      To create a roadmap that sequences initiatives in a way that incorporates best practices and takes into consideration dependencies and prerequisites between service management practices.

      To garner support from the right people and obtain executive buy-in for the roadmap.

      Create a well-balanced project team

      The project leader should be a member of your IT department’s senior executive team with goals and objectives that will be impacted by service management implementation. The project leader should possess the following characteristics:

      Leader

      • Influence and impact
      • Comprehensive knowledge of IT and the organization
      • Relationship with senior IT management
      • Ability to get things done

      Team Members

      Identify

      The project team members are the IT managers and directors whose day-to-day lives will be impacted by the service management roadmap and its implementation. The service management initiative will touch almost every IT staff member in the organization; therefore, it is important to have representatives from every single group, including those that are not mentioned. Some examples of individuals you should consider for your team:

      • Service Delivery Managers
      • Director/Manager of Applications
      • Director/Manager of Infrastructure
      • Director/Manager of Service Desk
      • Business Relationship Managers
      • Project Management Office

      Engage & Communicate

      You want to engage your project participants in the planning process as much as possible. They should be involved in the current-state assessment, the establishment of goals and objectives, and the development of your target state.

      To sell this project, identify and articulate how this project and/or process will improve the quality of their job. For example, a formal incident management process will benefit people working at the service desk or on the applications or infrastructure teams. Helping them understand the gains will help to secure their support throughout the long implementation process by giving them a sense of ownership.

      The project stakeholders should also be project team members

      When managing stakeholders, it is important to help them understand their stake in the project as well as their own personal gain that will come out of this project.

      For many of the stakeholders, they also play a critical role in the development of this project.

      Role & Benefits

      • CIO
      • The CIO should be actively involved in the planning stage to help determine current and target stage.

        The CIO also needs to promote and sell the project to the IT team so they can understand that higher maturity of service management practices will allow IT to be seen as a partner to the business, giving IT a seat at the table during decision making.

      • Service Delivery Managers/Process Owners
      • Service Delivery Managers are directly responsible for the quality and value of services provided to the business owners. Thus, the Service Delivery Managers have a very high stake in the project and should be considered for the role of project leader.

        Service Delivery Managers need to work closely with the process owners of each service management process to ensure clear objectives are established and there is a common understanding of what needs to be achieved.

      • IT Steering Committee
      • The Committee should be informed and periodically updated about the progress of the project.

      • Manager/Director – Service Desk
      • The Manager of the Service Desk should participate closely in the development of fundamental service management processes, such as service desk, incident management, and problem management.

        Having a more established process in place will create structure, governance, and reduce service desk staff headaches so they can handle requests or incidents more efficiently.

      • Manager/Director –Applications & Infrastructure
      • The Manager of Applications and Infrastructure should be heavily relied on for their knowledge of how technology ties into the organization. They should be consulted regularly for each of the processes.

        This project will also benefit them directly, such as improving the process to deploy a fix into the environment or manage the capacity of the infrastructure.

      • Business Relationship Manager
      • As the IT organization moves up the maturity ladder, the Business Relationship Manager will play a fundamental role in the more advanced processes, such as business relationship management, demand management, and portfolio management.

        This project will be an great opportunity for the Business Relationship Manager to demonstrate their value and their knowledge of how to align IT objectives with business vision.

      Ensure you get the entire IT organization on board for the project with a well-practiced change message

      Getting the IT team on board will greatly maximize the project’s chance of success.

      One of the top challenges for organizations embarking on a service management journey is to manage the magnitude of the project. To ensure the message is not lost, communicate this roadmap in two steps.

      1. Communicate the roadmap initiative

      The most important message to send to the IT organization is that this project will benefit them directly. Articulate the pains that IT is currently experiencing and explain that through more mature service management, these pains can be greatly reduced and IT can start to earn a place at the table with the business.

      2. Communicate the implementation of each process separately

      The communication of process implementation should be done separately and at the beginning of each implementation. This is to ensure that IT staff do not feel overwhelmed or overloaded. It also helps to keep the project more manageable for the project team.

      Continuously monitor feedback and address concerns throughout the entire process

      • Host lunch and learns to provide updates on the service management initiative to the entire IT team.
      • Understand if there are any major roadblocks and facilitate discussions on how to overcome them.

      Articulate the service management initiative to the IT organization

      Spread the word and bring attention to your change message through effective mediums and organizational changes.

      Key aspects of a communication plan

      The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

      In addition, it is important to know who will deliver the message (delivery strategy). You need IT executives to deliver the message – work hard on obtaining their support as they are the ones communicating to their staff and should be your project champions.

      Anticipate organizational changes

      The implementation of the service management roadmap will most likely lead to organizational changes in terms of structure, roles, and responsibilities. Therefore, the team should be prepared to communicate the value that these changes will bring.

      Communicating Change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • What are we trying to achieve?
      • How often will we be updated?

      The Qualities of Leadership: Leading Change

      Create a project communication plan for your stakeholders

      This project cannot be successfully completed without the support of senior IT management.

      1. After the CIO has introduced this project through management meetings or informal conversation, find out how each IT leader feels about this project. You need to make sure the directors and managers of each IT team, especially the directors of application and infrastructure, are on board.
      2. After the meeting, the project leader should seek out the major stakeholders (particularly the heads of applications and infrastructure) and validate their level of support through formal or informal meetings. Create a list documenting the major stakeholders, their level of support, and how the project team will work to gain their approval.
      3. For each identified stakeholder, create a custom communication plan based on their role. For example, if the director of infrastructure is not a supporter, demonstrate how this project will enable them to better understand how to improve service quality. Provide periodic reporting or meetings to update the director on project progress.

      INPUT

      • A collaborative discussion between team members

      OUTPUT

      • Thorough briefing for project launch
      • A committed team

      Materials

      • Communication message and plan
      • Metric tracking

      Participants

      • Project leader
      • Core project team

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      1.2

      A screenshot of activity 1.2 is shown.

      Assemble the project team

      Create a project team with representatives from all major IT teams. Engage and communicate to the project team early and proactively.

      1.3

      A screenshot of activity 1.3 is shown.

      Identify project stakeholders and create a communication plan

      Info-Tech will help you identify key stakeholders who have a vested interest in the success of the project. Determine the communication message that will best gain their support.

      1.4

      A screenshot of activity 1.4 is shown.

      Use metrics to track the success of the project

      The onsite analyst will help the project team determine the appropriate metrics to measure the success of this project.

      PHASE 2

      Assess Your Current Service Management State

      Assess your current state

      This step will walk you through the following activities:

      • Use Info-Tech’s Service Management Maturity Assessment Tool to determine your overall practice maturity level.
      • Understand your level of completeness for each individual practice.
      • Understand the three major phases involved in the service management journey; know the symptoms of each phase and how they affect your target state selection.

      Step Insights

      • To determine the real maturity of your service management practices, you should focus on the results and output of the practice, rather than the activities performed for each process.
      • Focus on phase-level maturity as opposed to the level of completeness for each individual process.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Determine Your Service Management Current State

      Step 2.1 – Assess Impacting Forces

      Start with an analyst kick-off call:

      • Discuss the impacting forces that can affect the success of your service management program
      • Identify internal and external constraints and enablers
      • Review and interpret how to leverage or mitigate these elements

      Then complete these activities…

      • Present the findings of the organizational context
      • Facilitate a discussion and create consensus amongst the project team members on where the organization should start

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.2 – Build Vision, Mission, and Values

      Review findings with analyst:

      • Review your service management vision and mission statement and discuss the values

      Then complete these activities…

      • Socialize the vision, mission, and values to ensure they are aligned with overall organizational vision. Then, set the expectations for behavior aligned with the vision, mission, and values

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.3 – Assess Attitudes, Behaviors, and Culture

      Review findings with analyst:

      • Discuss tactics for addressing negative attitudes, behaviors, or culture identified

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.4 – Assess Governance Needs

      Review findings with analyst:

      • Understand the typical types of governance structure and the differences between management and governance
      • Choose the management structure required for your organization

      Then complete these activities…

      • Determine actions required to establish an effective governance structure and add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.5 – Perform SWOT Analysis

      Review findings with analyst:

      • Discuss SWOT analysis results and tactics for addressing within the roadmap

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.6 – Identify Desired State

      Review findings with analyst:

      • Discuss desired state and commitment needed to achieve aspects of the desired state

      Then complete these activities…

      • Use the desired state to critically assess the current state of your service management practices and whether they are achieving the desired outcomes
      • Prep for the SM maturity assessment

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.7 – Perform SM Maturity Assessment

      Review findings with analyst:

      • Review and interpret the output from your service management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Service Management Maturity Assessment

      Step 2.8 – Review OCM Capabilities

      Review findings with analyst:

      • Review and interpret the output from your organizational change management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Organizational Change Management Assessment

      Understand and assess impacting forces – constraints and enablers

      Constraints and enablers are organizational and behavioral triggers that directly impact your ability and approach to establishing Service Management practices.

      A model is shown to demonstrate the possibe constraints and enablers on your service management program. It incorporates available resources, the environment, management practices, and available technologies.

      Effective service management requires a mix of different approaches and practices that best fit your organization. There’s not a one-size-fits-all solution. Consider the resources, environment, emerging technologies, and management practices facing your organization. What items can you leverage or use to mitigate to move your service management program forward?

      Use Info-Tech’s “Organizational Context” template to list the constraints and enablers affecting your service management

      The Service Management Roadmap Presentation Template will help you understand the business environment you need to consider as you build out your roadmap.

      Discuss and document constraints and enablers related to the business environment, available resources, management practices, and emerging technologies. Any constraints will need to be addressed within your roadmap and enablers should be leveraged to maximize your results.


      Screenshot of Info-Tech's Service Management Roadmap Presentation Template is shown.

      Document constraints and enablers

      1. Discuss and document the constrains and enablers for each aspect of the management mesh: environment, resources, management practices, or technology.
      2. Use this as a thought provoker in later exercises.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Organizational context constraints and enablers

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Build compelling vision and mission statements to set the direction of your service management program

      While you are articulating the vision and mission, think about the values you want the team to display. Being explicit can be a powerful tool to create alignment.

      A vision statement describes the intended state of your service management organization, expressed in the present tense.

      A mission statement describes why your service management organization exists.

      Your organizational values state how you will deliver services.

      Use Info-Tech’s “Vision, Mission, and Values” template to set the aspiration & purpose of your service management practice

      The Service Management Roadmap Presentation Template will help you document your vision for service management, the purpose of the program, and the values you want to see demonstrated.

      If the team cannot gain agreement on their reason for being, it will be difficult to make traction on the roadmap items. A concise and compelling statement can set the direction for desired behavior and help team members align with the vision when trying to make ground-level decisions. It can also be used to hold each other accountable when undesirable behavior emerges. It should be revised from time to time, when the environment changes, but a well-written statement should stand the test of time.

      A screenshot of the Service Management Roadmap Presentation Temaplate is shown. Specifically it is showing the section on the vision, mission, and values results.

      Document your organization’s vision, mission , and values

      1. Vision: Identify your desired target state, consider the details of that target state, and create a vision statement.
      2. Mission: Consider the fundamental purpose of your SM program and craft a statement of purpose.
      3. Values: As you work through the vision and mission, identify values that your organization prides itself in or has the aspiration for.
      4. Discuss common themes and then develop a concise vision statement and mission statement that incorporates the group’s ideas.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Vision statement
      • Mission statement
      • Organizational values

      Materials

      • Whiteboards or flip charts
      • Sample vision and mission statements

      Participants

      • All stakeholders
      • Senior leadership

      Understanding attitude, behavior, and culture

      Attitude

      • What people think and feel. It can be seen in their demeanor and how they react to change initiatives, colleagues, and users.

      Any form of organizational change involves adjusting people’s attitudes, creating buy-in and commitment. You need to identify and address attitudes that can lead to negative behaviors and actions or that are counter-productive. It must be made visible and related to your desired behavior.

      Behaviour

      • What people do. This is influenced by attitude and the culture of the organization.

      To implement change within IT, especially at a tactical level, both IT and organizational behavior needs to change. This is relevant because people don’t like to change and will resist in an active or passive way unless you can sell the need, value, and benefit of changing their behavior.

      Culture

      • The accepted and understood ways of working in an organization. The values and standards that people find normal and what would be tacitly identified to new resources.

      The organizational or corporate “attitude,” the impact on employee behavior and attitude is often not fully understood. Culture is an invisible element, which makes it difficult to identify, but it has a strong impact and must be addressed to successfully embed any organizational change or strategy.

      Culture is a critical and under-addressed success factor

      43% of CIOs cited resistance to change as the top impediment to a successful digital strategy.

      CIO.com

      75% of organizations cannot identify or articulate their culture or its impact.

      Info-Tech

      “Shortcomings in organizational culture are one of the main barriers to company success in the digital age.”

      McKinsey – “Culture for a digital age”

      Examples of how they apply

      Attitude

      • “I’ll believe that when I see it”
      • Positive outlook on new ideas and changes

      Behaviour

      • Saying you’ll follow a new process but not doing so
      • Choosing not to document a resolution approach or updating a knowledge article, despite being asked

      Culture

      • Hero culture (knowledge is power)
      • Blame culture (finger pointing)
      • Collaborative culture (people rally and work together)

      Why have we failed to address attitude, behavior, and culture?

        ✓ While there is attention and better understanding of these areas, very little effort is made to actually solve these challenges.

        ✓ The impact is not well understood.

        ✓ The lack of tangible and visible factors makes it difficult to identify.

        ✓ There is a lack of proper guidance, leadership skills, and governance to address these in the right places.

        ✓ Addressing these issues has to be done proactively, with intent, rigor, and discipline, in order to be successful.

        ✓ We ignore it (head in the sand and hoping it will fix itself).

      Avoidance has been a common strategy for addressing behavior and culture in organizations.

      Use Info-Tech’s “Culture and Environment” template to identify cultural constraints that should be addressed in roadmap

      The Service Management Roadmap Presentation Template will help you document attitude, behavior, and culture constraints.

      Discuss as a team attitudes, behaviors, and cultural aspects that can either hinder or be leveraged to support your vision for the service management program. Capture all items that need to be addressed in the roadmap.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically showing the culture and environment slide.

      Document your organization’s attitudes, behaviors, and culture

      1. Discuss and document positive and negative aspects of attitude, behavior, or culture within your organization.
      2. Identify the items that need to be addressed as part of your roadmap.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Culture and environment worksheet

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      The relationship to governance

      Attitude, behavior, and culture are still underestimated as core success factors in governance and management.

      Behavior is a key enabler of good governance. Leading by example and modeling behavior has a cascading impact on shifting culture, reinforcing the importance of change through adherence.

      Executive leadership and governing bodies must lead and support cultural change.

      Key Points

      • Less than 25% of organizations have formal IT governance in place (ITSM Tools).
      • Governance tends to focus on risk and compliance (controls), but forgets the impact of value and performance.

      Lack of oversight often limits the value of service management implementations

      Organizations often fail to move beyond risk mitigation, losing focus of the goals of their service management practices and the capabilities required to produce value.

      Risk Mitigation

      • Stabilize IT
      • Service Desk
      • Incident Management
      • Change Management

      Gap

      • Organizational alignment through governance
      • Disciplined focus on goals of SM

      Value Production

      • Value that meets business and consumer needs

      This creates a situation where service management activities and roadmaps focus on adjusting and tweaking process areas that no longer support how the organization needs to work.

      How does establishing governance for service management provide value?

      Governance of service management is a gap in most organizations, which leads to much of the failure and lack of value from service management processes and activities.

      Once in place, effective governance enables success for organizations by:

      1. Ensuring service management processes improve business value
      2. Measuring and confirming the value of the service management investment
      3. Driving a focus on outcome and impact instead of simply process adherence
      4. Looking at the integrated impact of service management in order to ensure focused prioritization of work
      5. Driving customer-experience focus within organizations
      6. Ensuring quality is achieved and addressing quality impacts and dependencies between processes

      Four common service management process ownership models

      Your ownership structure largely defines how processes will need to be implemented, maintained, and improved. It has a strong impact on their ability to integrate and how other teams perceive their involvement.

      An organizational structure is shown. In the image is an arrow, with the tip facing in the right direction. The left side of the arrow is labelled: Traditional, and the right side is labelled: Complex. The four models are noted along the arrow. Starting on the left side and going to the right are: Distributed Process Ownership, Centralized Process Ownership, Federated Process Ownership, and Service Management Office.

      Most organizations are somewhere within this spectrum of four core ownership models, usually having some combination of shared traits between the two models that are closest to them on the scale.

      Info-Tech Insight

      The organizational structure that is best for you depends on your needs, and one is not necessarily better than another. The next four slides describe when each ownership level is most appropriate.

      Distributed process ownership

      Distributed process ownership is usually evident when organizations initially establish their service management practices. The processes are assigned to a specific group, who assumes some level of ownership over its execution.

      The distributed process ownership model is shown. CIO is listed at the top with four branches leading out from below it. The four branches are labelled: Service Desk, Operations, Applications, and Security.

      Info-Tech Insight

      This model is often a suitable approach for initial implementations or where it may be difficult to move out of siloes within the organization’s structure or culture.

      Centralized process ownership

      Centralized process ownership usually becomes necessary for organizations as they move into a more functional structure. It starts to drive management of processes horizontally across the organization while still retaining functional management control.

      A centralized process ownership model is shown. The CIO is at the top and the following are branches below it: Service Manager, Support, Middleware, Development, and Infrastructure.

      Info-Tech Insight

      This model is often suitable for maturing organizations that are starting to look at process integration and shared service outcomes and accountability.

      Federated process ownership

      Federated process ownership allows for global control and regional variation, and it supports product orientation and Agile/DevOps principles

      A federated process ownership model is shown. The Sponsor/CIO is at the top, with the ITSM Executive below it. Below that level is the: Process Owner, Process Manager, and Process Manager.

      Info-Tech Insight

      Federated process ownership is usually evident in organizations that have an international or multi-regional presence.

      Service management office (SMO)

      SMO structures tend to occur in highly mature organizations, where service management responsibility is seen as an enterprise accountability.

      A service management office model is shown. The CIO is at the top with the following branches below it: SMO, End-User Services, Infra., Apps., and Architecture.

      Info-Tech Insight

      SMOs are suitable for organizations with a defined IT and organizational strategy. A SMO supports integration with other enterprise practices like enterprise architecture and the PMO.

      Determine which process ownership and governance model works best for your organization

      The Service Management Roadmap Presentation Template will help you document process ownership and governance model

      Example:

      Key Goals:

        ☐ Own accountability for changes to core processes

        ☐ Understand systemic nature and dependencies related to processes and services

        ☐ Approve and prioritize improvement and CSI initiatives related to processes and services

        ☐ Evaluate success of initiative outcomes based on defined benefits and expectations

        ☐ Own Service Management and Governance processes and policies

        ☐ Report into ITSM executive or equivalent body

      Membership:

        ☐ Process Owners, SM Owner, Tool Owner/Liaison, Audit

      Discuss as a team which process ownership model works for your organization. Determine who will govern the service management practice. Determine items that should be identified in your roadmap to address governance and process ownership gaps.

      Use Info-Tech’s “SWOT” template to identify strengths, weaknesses, opportunities & threats that should be addressed

      The Service Management Roadmap Presentation Template will help you document items from your SWOT analysis.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically the SWOT section is shown.

      Brainstorm the strengths, weaknesses, opportunities, and threats related to resources, environment, technology, and management practices. Add items that need to be addressed to your roadmap.

      Perform a SWOT analysis

      1. Brainstorm each aspect of the SWOT with an emphasis on:
      • Resources
      • Environment
      • Technologies
      • Management Practices
    • Record your ideas on a flip chart or whiteboard.
    • Add items to be addressed to the roadmap.
    • INPUT

      • A collaborative discussion

      OUTPUT

      • SWOT analysis
      • Priority items identified

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Indicate desired maturity level for your service management program to be successful

      Discuss the various maturity levels and choose a desired level that would meet business needs.

      The desired maturity model is depicted.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Desired state of service management maturity

      Materials

      • None

      Participants

      • All stakeholders

      Use Info-Tech’s Service Management Process Maturity Assessment Tool to understand your current state

      The Service Management Process Maturity Assessment Tool will help you understand the true state of your service management.

      A screenshot of Info-Tech's Service Management Process Assessment Tool is shown.

      Part 1, Part 2, and Part 3 tabs

      These three worksheets contain questions that will determine the overall maturity of your service management processes. There are multiple sections of questions focused on different processes. It is very important that you start from Part 1 and continue the questions sequentially.

      Results tab

      The Results tab will display the current state of your service management processes as well as the percentage of completion for each individual process.

      Complete the service management process maturity assessment

      The current-state assessment will be the foundation of building your roadmap, so pay close attention to the questions and answer them truthfully.

      1. Start with tab 1 in the Service Management Process Maturity Assessment Tool. Remember to read the questions carefully and always use the feedback obtained through the end-user survey to help you determine the answer.
      2. In the “Degree of Process Completeness” column, use the drop-down menu to input the results solicited from the goals and objectives meeting you held with your project participants.
      3. A screenshot of Info-Tech's Service Management Process Assessment Tool is shown. Tab 1 is shown.
      4. Host a meeting with all participants following completion of the survey and have them bring their results. Discuss in a round-table setting, keeping a master sheet of agreed upon results.

      INPUT

      • Service Management Process Maturity Assessment Tool questions

      OUTPUT

      • Determination of current state

      Materials

      • Service Management Process Maturity Assessment Tool

      Participants

      • Project team members

      Review the results of your current-state assessment

      At the end of the assessment, the Results tab will have action items you could perform to close the gaps identified by the process assessment tool.

      A screenshot of Info-Tech's Service Management Process Maturity Assessment Results is shown.

      INPUT

      • Maturity assessment results

      OUTPUT

      • Determination of overall and individual practice maturity

      Materials

      • Service Management Maturity Assessment Tool

      Participants

      • Project team members

      Use Info-Tech’s OCM Capability Assessment tool to understand your current state

      The Organizational Change Management Capabilities Assessment tool will help you understand the true state of your organizational change management capabilities.

      A screenshot of Info-Tech's Organizational Change Management Capabilities Assessment

      Complete the Capabilities tab to capture the current state for organizational change management. Review the Results tab for interpretation of the capabilities. Review the Recommendations tab for actions to address low areas of maturity.

      Complete the OCM capability assessment

      1. Open Organizational Change Management Capabilities Assessment tool.
      2. Come to consensus on the most appropriate answer for each question. Use the 80/20 rule.
      3. Review result charts and discuss findings.
      4. Identify roadmap items based on maturity assessment.

      INPUT

      • A collaborative discussion

      OUTPUT

      • OCM Assessment tool
      • OCM assessment results

      Materials

      • OCM Capabilities Assessment tool

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      2.2

      A screenshot of activity 2.2 is shown.

      Complete the assessment

      With the project team in the room, go through all three parts of the assessment with consideration of the feedback received from the business.

      2.3

      A screenshot of activity 2.3 is shown.

      Interpret the results of the assessment

      The Info-Tech onsite analyst will facilitate a discussion on the overall maturity of your service management practices and individual process maturity. Are there any surprises? Are the results reflective of current service delivery maturity?

      PHASE 3

      Build Your Service Management Roadmap

      Build Roadmap

      This step will walk you through the following activities:

      • Document your vision and mission on the roadmap one-pager.
      • Using the inputs from the current-state assessments, identify the key themes required by your organization.
      • Identify individual initiatives needed to address key themes.

      Step Insights

      • Using the Info-Tech thought model, address foundational gaps early in your roadmap and establish the management methods to continuously make them more robust.
      • If any of the core practices are not meeting the vision for your service management program, be sure to address these items before moving on to more advanced service management practices or processes.
      • Make sure the story you are telling with your roadmap is aligned to the overall organizational goals.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Determine Your Service Management Target State

      Step 3.1 – Document the Overall Themes

      Start with an analyst kick-off call:

      • Review the outputs from your current-state assessments to identify themes for areas that need to be included in your roadmap

      Then complete these activities…

      • Ensure foundational elements are solid by adding any gaps to the roadmap
      • Identify any changes needed to management practices to ensure continuous improvement

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 3.2 – Determine Individual Initiatives

      Review findings with analyst:

      • Determine the individual initiatives needed to close the gaps between the current state and the vision

      Then complete these activities…

      • Finalize and document roadmap for executive socialization

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Identify themes that can help you build a strong foundation before moving to higher level practices

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The top most branches of the tree is labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Use Info-Tech’s “Service Management Roadmap” template to document your vision, themes and initiatives

      The Service Management Roadmap Presentation Template contains a roadmap template to help communicate your vision, themes to be addressed, and initiatives

      A screenshot of Info-Tech's Service Management Roadmap template is shown.

      Working from the lower maturity items to the higher value practices, identify logical groupings of initiatives into themes. This will aid in communicating the reasons for the needed changes. List the individual initiatives below the themes. Adding the service management vision and mission statements can help readers understand the roadmap.

      Document your service management roadmap

      1. Document the service management vision and mission on the roadmap template.
      2. Identify, from the assessments, areas that need to be improved or implemented.
      3. Group the individual initiatives into logical themes that can ease communication of what needs to happen.
      4. Document the individual initiatives.
      5. Document in terms that business partners and executive sponsors can understand.

      INPUT

      • Current-state assessment outputs
      • Maturity model

      OUTPUT

      • Service management roadmap

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of activity 3.1 is shown.

      Identify themes to address items from the foundational level up to higher value service management practices

      Identify easily understood themes that will help others understand the expected outcomes within your organization.

      A screenshot of activity 3.2 is shown.

      Document individual initiatives that contribute to the themes

      Identify specific activities that will close gaps identified in the assessments.

      PHASE 2

      Build Communication Slide

      Complete your service management roadmap

      This step will walk you through the following activities:

      • Use the current-state assessment exercises to document the state of your service management practices. Document examples of the behaviors that are currently seen.
      • Document the expected short-term gains. Describe how you want the behaviors to change.
      • Document the long-term vision for each item and describe the benefits you expect to see from addressing each theme.

      Step Insights

      • Use the communication template to acknowledge the areas that need to be improved and paint the short- and long-term vision for the improvements to be made through executing the roadmap.
      • Write it in business terms so that it can be used widely to gain acceptance of the upcoming changes that need to occur.
      • Include specific areas that need to be fixed to make it more tangible.
      • Adding the values from the vision, mission, and values exercise can also help you set expectations about how the team will behave as they move towards the longer-term vision.

      Phase 4 Outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build the Service Management Roadmap

      Step 4.1: Document the Current State

      Start with an analyst kick-off call:

      • Review the pain points identified from the current state analysis
      • Discuss tactics to address specific pain points

      Then complete these activities…

      • Socialize the pain points within the service delivery teams to ensure nothing is being misrepresented
      • Gather ideas for the future state

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 4.2: List the Future Vision

      Review findings with analyst:

      • Review short- and long-term vision for improvements for the pain points identified in the current state analysis

      Then complete these activities…

      • Prepare to socialize the roadmap
      • Ensure long-term vision is aligned with organizational objectives

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Use Info-Tech’s “Service Management Roadmap – Brought to Life” template to paint a picture of the future state

      The Service Management Roadmap Presentation Template contains a communication template to help communicate your vision of the future state

      A screenshot of Info-Tech's Service Management Roadmap - Brought to Life template

      Use this template to demonstrate how existing pain points to delivering services will improve over time by painting a near- and long-term picture of how things will change. Also list specific initiatives that will be launched to affect the changes. Listing the values identified in the vision, mission, and values exercise will also demonstrate the team’s commitment to changing behavior to create better outcomes.

      Document your current state and list initiatives to address them

      1. Use the previous assessments and feedback from business or customers to identify current behaviors that need addressing.
      2. Focus on high-impact items for this document, not an extensive list.
      3. An example of step 1 and 2 are shown.
      4. List the initiatives or actions that will be used to address the specific pain points.

      An example of areas for improvement.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      Document your future state

      An example of document your furture state is shown.

      1. For each pain point document the expected behaviors, both short term and longer term.
      2. Write in terms that allow readers to understand what to expect from your service management practice.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation Template

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is shown.

      Identify the pain points and initiatives to address them

      Identify items that the business can relate to and initiatives or actions to address them.

      4.2

      A screenshot of activity 4.2 is shown.

      Identify short- and long-term expectations for service management

      Communicate the benefits of executing the roadmap both short- and long-term gains.

      Research contributors and experts

      Photo of Valence Howden

      Valence Howden, Principal Research Director, CIO Practice

      Info-Tech Research Group

      Valence helps organizations be successful through optimizing how they govern, design, and execute strategies, and how they drive service excellence in all work. With 30 years of IT experience in the public and private sectors, he has developed experience in many information management and technology domains, with focus in service management, enterprise and IT governance, development and execution of strategy, risk management, metrics design and process design, and implementation and improvement.

      Photo of Graham Price

      Graham Price, Research Director, CIO Practice

      Info-Tech Research Group

      Graham has an extensive background in IT service management across various industries with over 25 years of experience. He was a principal consultant for 17 years, partnering with Fortune 500 clients throughout North America, leveraging and integrating industry best practices in IT service management, service catalog, business relationship management, IT strategy, governance, and Lean IT and Agile.

      Photo of Sharon Foltz

      Sharon Foltz, Senior Workshop Director

      Info-Tech Research Group

      Sharon is a Senior Workshop Director at Info-Tech Research Group. She focuses on bringing high value to members via leveraging Info-Tech’s blueprints and other resources enhanced with her breadth and depth of skills and expertise. Sharon has spent over 15 years in various IT roles in leading companies within the United States. She has strong experience in organizational change management, program and project management, service management, product management, team leadership, strategic planning, and CRM across various global organizations.

      Related Info-Tech Research

      Build a Roadmap for Service Management Agility

      Extend the Service Desk to the Enterprise

      Bibliography

      • “CIOs Emerge as Disruptive Innovators.” CSC Global CIO Survey: 2014-2015. Web.
      • “Digital Transformation: How Is Your Organization Adapting?” CIO.com, 2018. Web.
      • Goran, Julie, Laura LaBerge, and Ramesh Srinivasan. “Culture for a digital age.” McKinsey, July 2017. Web.
      • The Qualities of Leadership: Leading Change. Cornelius & Associates, 14 April 2012.
      • Wilkinson, Paul. “Culture, Ethics, and Behavior – Why Are We Still Struggling?” ITSM Tools, 5 July 2018. Web.

      Develop a COVID-19 Pandemic Response Plan

      • Buy Link or Shortcode: {j2store}420|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • IT departments are being asked to rapidly ramp up work-from-home capabilities and other business process workarounds.
      • Crisis managers are experiencing a pandemic more severe than what they’ve managed in the past.
      • Organizations are scrambling to determine how they can keep their businesses running through this pandemic.

      Our Advice

      Critical Insight

      • Obstacles to working from home go beyond internet speed and needing a laptop. Business input is critical to uncover unexpected obstacles.
      • IT needs to address a range of issues from security risk to increased service desk demand from users who don’t normally work from home.
      • Resist the temptation to bypass IT processes – your future-self will thank you for tracking all those assets about to go out the door.

      Impact and Result

      • Start with crisis management fundamentals – identify crisis management roles and exercise appropriate crisis communication.
      • Prioritize business processes and work-from-home requirements. Not everyone can be set up on day one.
      • Don’t over-complicate your work-from-home deployment plan. A simple spreadsheet (see the Work-from-Home Requirements Tool) to track requirements can be very effective.

      Develop a COVID-19 Pandemic Response Plan Research & Tools

      Start here

      Stay up to date on COVID-19 and the resources available to you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a COVID-19 Pandemic Response Plan Storyboard

      1. Manage the pandemic crisis

      Identify key roles and immediate steps to manage this crisis.

      • Pandemic Response Plan Example

      2. Create IT’s plan to support the pandemic response plan

      Plan the deployment of a work-from-home initiative.

      • Work-From-Home Requirements Tool
      [infographic]

      Optimize Lead Generation With Lead Scoring

      • Buy Link or Shortcode: {j2store}557|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Prospective buyer traffic into digital marketing platforms has exploded.
      • Many freemium/low-cost digital marketing platforms lack lead scoring and nurturing functionality.
      • As a result, the volume of unqualified leads being delivered to outbound sellers has increased dramatically.
      • This has reduced sales productivity, frustrated prospective buyers, and raised the costs of lead generation.

      Our Advice

      Critical Insight

      • Lead scoring is a must-have capability for high-tech marketers.
      • Without lead scoring, marketers will see increased costs of lead generation and decreased SQL-to-opportunity conversion rates.
      • Lead scoring increases sales productivity and shortens sales cycles.

      Impact and Result

      • Align Marketing, Sales, and Inside Sales on your ideal customer profile.
      • Re-evaluate the assets and activities that compose your current lead generation engine.
      • Develop a documented methodology to ignore, nurture, or contact right away the leads in your marketing pipeline.
      • Deliver more qualified leads to sellers, raising sales productivity and marketing/lead-gen ROI.

      Optimize Lead Generation With Lead Scoring Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize lead generation with lead scoring, review SoftwareReviews Advisory’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive aligned vision for lead scoring

      Outline your plan, form your team, and plan marketing tech stack support.

      • Optimize Lead Generation With Lead Scoring – Phase 1: Drive an Aligned Vision for Lead Scoring

      2. Build and test your lead scoring model

      Set lead flow thresholds, define your ideal customer profile and lead generation engine components, and weight, score, test, and refine them.

      • Optimize Lead Generation With Lead Scoring – Phase 2: Build and Test Your Lead Scoring Model
      • Lead Scoring Workbook

      3. Apply your model to marketing apps and go live with better qualified leads

      Apply your lead scoring model to your lead management app, test it, validate the results with sellers, apply advanced methods, and refine.

      • Optimize Lead Generation With Lead Scoring – Phase 3: Apply Your Model to Marketing Apps and Go Live With Better Qualified Leads
      [infographic]

      Workshop: Optimize Lead Generation With Lead Scoring

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Drive Aligned Vision for Lead Scoring

      The Purpose

      Drive an aligned vision for lead scoring.

      Key Benefits Achieved

      Attain an aligned vision for lead scoring.

      Identify the steering committee and project team and clarify their roles and responsibilities.

      Provide your team with an understanding of how leads score through the marketing funnel.

      Activities

      1.1 Outline a vision for lead scoring.

      1.2 Identify steering committee and project team members.

      1.3 Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.

      1.4 Align on marketing pipeline terminology.

      Outputs

      Steering committee and project team make-up

      Direction on tech stack to support lead generation

      Marketing pipeline definitions alignment

      2 Buyer Journey and Lead Generation Engine Mapping

      The Purpose

      Define the buyer journey and map the lead generation engine.

      Key Benefits Achieved

      Align the vision for your target buyer and their buying journey.

      Identify the assets and activities that need to compose your lead generation engine.

      Activities

      2.1 Establish a buyer persona.

      2.2 Map your buyer journey.

      2.3 Document the activities and assets of your lead generation engine.

      Outputs

      Buyer persona

      Buyer journey map

      Lead gen engine assets and activities documented

      3 Build and Test Your Lead Scoring Model

      The Purpose

      Build and test your lead scoring model.

      Key Benefits Achieved

      Gain team alignment on how leads score and, most importantly, what constitutes a sales-accepted lead.

      Develop a scoring model from which future iterations can be tested.

      Activities

      3.1 Understand the Lead Scoring Grid and set your thresholds.

      3.2 Identify your ideal customer profile, attributes, and subattribute weightings – run tests.

      Outputs

      Lead scoring thresholds

      Ideal customer profile, weightings, and tested scores

      Test profile scoring

      4 Align on Engagement Attributes

      The Purpose

      Align on engagement attributes.

      Key Benefits Achieved

      Develop a scoring model from which future iterations can be tested.

      Activities

      4.1 Weight the attributes of your lead generation engagement model and run tests.

      4.2 Apply weightings to activities and assets.

      4.3 Test engagement and profile scenarios together and make any adjustments to weightings or thresholds.

      Outputs

      Engagement attributes and weightings tested and complete

      Final lead scoring model

      5 Apply Model to Your Tech Platform

      The Purpose

      Apply the model to your tech platform.

      Key Benefits Achieved

      Deliver better qualified leads to Sales.

      Activities

      5.1 Apply model to your marketing management/campaign management software and test the quality of sales-accepted leads in the hands of sellers.

      5.2 Measure overall lead flow and conversion rates through your marketing pipeline.

      5.3 Apply lead nurturing and other advanced methods.

      Outputs

      Model applied to software

      Better qualified leads in the hands of sellers

      Further reading

      Optimize Lead Generation With Lead Scoring

      In today’s competitive environment, optimizing Sales’ resources by giving them qualified leads is key to B2B marketing success.

      EXECUTIVE BRIEF

      Analyst Perspective

      Improve B2B seller win rates with a lead scoring methodology as part of your modern lead generation engine.

      The image contains a picture of Jeff Golterman.

      As B2B organizations emerge from the lowered demands brought on by COVID-19, they are eager to convert marketing contacts to sales-qualified leads with even the slightest signal of intent, but many sales cycles are wasted when sellers receive unqualified leads. Delivering highly qualified leads to sellers is still more art than science, and it is especially challenging without a way to score a contact profile and engagement. While most marketers capture some profile data from contacts, many will pass a contact over to Sales without any engagement data or schedule a demo with a contact without any qualifying profile data. Passing unqualified leads to Sales suboptimizes Sales’ resources, raises the costs per lead, and often results in lost opportunities. Marketers need to develop a lead scoring methodology that delivers better qualified leads to Field Sales scored against both the ideal customer profile (ICP) and engagement that signals lower-funnel buyer interest. To be successful in building a compelling lead scoring solution, marketers must work closely with key stakeholders to align the ICP asset/activity with the buyer journey. Additionally, working early in the design process with IT/Marketing Operations to implement lead management and analytical tools in support will drive results to maximize lead conversion rates and sales wins.

      Jeff Golterman

      Managing Director

      SoftwareReviews Advisory

      Executive Summary

      Your Challenge

      The affordability and ease of implementation of digital marketing tools have driven global adoption to record levels. While many marketers are fine-tuning the lead generation engine components of email, social media, and web-based advertising to increase lead volumes, just 32% of companies pass well-qualified leads over to outbound marketers or sales development reps (SDRs). At best, lead gen costs stay high, and marketing-influenced win rates remain suboptimized. At worst, marketing reputation suffers when poorly qualified leads are passed along to sellers.

      Common Obstacles

      Most marketers lack a methodology for lead scoring, and some lack alignment among Marketing, Product, and Sales on what defines a qualified lead. In their rush to drive lead generation, marketers often fail to “define and align” on the ICP with stakeholders, creating confusion and wasted time and resources. In the rush to adopt B2B marketing and sales automation tools, many marketers have also skipped the important steps to 1) define the buyer journey and map content types to support, and 2) invest in a consistent content creation and sourcing strategy. The wrong content can leave prospects unmotivated to engage further and cause them to seek alternatives.

      Info-Tech’s Approach

      To employ lead scoring effectively, marketers need to align Sales, Marketing, and Product teams on the definition of the ICP and what constitutes a Sales-accepted lead. The buyer journey needs to be mapped in order to identify the engagement that will move a lead through the marketing lead generation engine. Then the project team can score prospect engagement and the prospect profile attributes against the ICP to arrive at a lead score. The marketing tech stack needs to be validated to support lead scoring, and finally Sales needs to sign off on results.

      SoftwareReviews Advisory Insight:

      Lead scoring is a must-have capability for high-tech marketers. Without lead scoring, marketers will see increased costs of lead gen, decreased SQL to opportunity conversion rates, decreased sales productivity, and longer sales cycles.

      Who benefits from a lead scoring project?

      This Research Is Designed for:

      • Marketers and especially campaign managers who are:
        • Looking for a more precise way to score leads and deploy outbound marketing resources to optimize contacts-to-MQL conversion rates.
        • Looking for a more effective way to profile contacts raised by your lead gen engine.
        • Looking to use their lead management software to optimize lead scoring.
        • Starting anew to strengthen their lead generation engine and want examples of a typical engine, ways to identify buyer journey, and perform lead nurturing.

      This Research Will Help You:

      • Explain why having a lead scoring methodology is important.
      • Identify a methodology that will call for identifying an ICP against which to score prospect profiles behind each contact that engages your lead generation engine.
      • Create a process of applying weightings to score activities during contact engagement with your lead generation engine. Apply both scores to arrive at a contact/lead score.
      • Compare your current lead gen engine to a best-in-class example in order to identify gaps and areas for improvement and exploration.

      This Research Will Also Assist:

      • CMOs, Marketing Operations leaders, heads of Product Marketing, and regional Marketing leads who are stakeholders in:
        • Finding alternatives to current lead scoring approaches.
          • Altering current or evaluating new marketing technologies to support a refreshed lead scoring approaches.

      This Research Will Help Them:

      • Align stakeholders on an overall program of identifying target customers, building common understanding of what constitutes a qualified lead, and determining when to use higher-cost outbound marketing resources.
      • Deploy high-value applications that will improve core marketing metrics.

      Insight summary

      Continuous adjustment and improvement of your lead scoring methodology is critical for long-term lead generation engine success.

      • Building a highly functioning lead generation engine is an ongoing process and one that requires continual testing of new asset types, asset design, and copy variations. Buyer profiles change over time as you launch new products and target new markets.
      • Pass better qualified leads to Field Sales and improve sales win rates by taking these crucial steps to implement a better lead generation engine and a lead scoring methodology:
        • Make the case for lead scoring in your organization.
        • Establish trigger points that separate leads to ignore, nurture, qualify, or outreach/contact.
        • Identify your buyer journey and ICP through collaboration among Sales, Marketing, and Product.
        • Assess each asset and activity type across your lead generation engine and apply a weighting for each.
        • Test lead scenarios within our supplied toolkit and with stakeholders. Adjust weightings and triggers that deliver lead scores that make sense.
        • Work with IT/Marketing Operations to emulate your lead scoring methodology within your marketing automation/campaign management application.
        • Explore advanced methods including nurturing.
      • Use the Lead Scoring Workbook collaboratively with other stakeholders to design your own methodology, test lead scenarios, and build alignment across the team.

      Leading marketers who successfully implement a lead scoring methodology develop it collaboratively with stakeholders across Marketing, Sales, and Product Management. Leaders will engage Marketing Operations, Sales Operations, and IT early to gain support for the evaluation and implementation of a supporting campaign management application and for analytics to track lead progress throughout the Marketing and Sales funnels. Leverage the Marketing Lead Scoring Toolkit to build out your version of the model and to test various scenarios. Use the slides contained within this storyboard and the accompanying toolkit as a means to align key stakeholders on the ICP and to weight assets and activities across your marketing lead generation engine.

      What is lead scoring?

      Lead scoring weighs the value of a prospect’s profile against the ICP and renders a profile score. The process then weighs the value of the prospects activities against the ideal call to action (CTA) and renders an activity score. Combining the profile and activity scores delivers an overall score for the value of the lead to drive the next step along the overall buyer journey.

      EXAMPLE: SALES MANAGEMENT SOFTWARE

      • For a company that markets sales management software the ideal buyer is the head of Sales Operations. While the ICP is made up of many attributes, we’ll just score one – the buyer’s role.
      • If the prospect/lead that we wish to score has an executive title, the lead’s profile scores “High.” Other roles will score lower based on your ICP. Alongside role, you will also score other profile attributes (e.g. company size, location).
      • With engagement, if the prospect/lead clicked on our ideal CTA, which is “request a proposal,” our engagement would score high. Other CTAs would score lower.
      The image contains a screenshot of two examples of lead scoring. One example demonstrates. Profile Scoring with Lead Profile, and the second image demonstrates Activity Scoring and Lead Engagement.

      SoftwareReviews Advisory Insight:

      A significant obstacle to quality lead production is disagreement on or lack of a documented definition of the ideal customer profile. Marketers successful in lead scoring will align key stakeholders on a documented definition of the ICP as a first step in improving lead scoring.

      Use of lead scoring is in the minority among marketers

      The majority of businesses are not practicing lead scoring!

      Up to 66% of businesses don’t practice any type of lead scoring.

      Source: LeadSquared, 2014

      “ With lead scoring, you don’t waste loads of time on unworthy prospects, and you don’t ignore people on the edge of buying.”

      Source: BigCommerce

      “The benefits of lead scoring number in the dozens. Having a deeper understanding of which leads meet the qualifications of your highest converters and then systematically communicating with them accordingly increases both ongoing engagement and saves your internal team time chasing down inopportune leads.”

      – Joey Strawn, Integrated Marketing Director, in IndustrialMarketer.com

      Key benefit: sales resource optimization

      Many marketing organizations send Sales too many unqualified leads

      • Leads – or, more accurately, contacts – are not all qualified. Some are actually nothing more than time-wasters for sellers.
      • Leading marketers peel apart a contact into at least two dimensions – “who” and “how interested.”
        • The “who” is compared to the ICP and given a score.
        • The “how interested” measures contact activity – or engagement – within our lead gen engine and gives it a score.
      • Scores are combined; a contact with a low score is ignored, medium is nurtured, and high is sent to sellers.
      • A robust ICP, together with engagement scoring and when housed within your lead management software, prioritizes for marketers which contacts to nurture and gets hot leads to sellers more quickly.

      Optimizing Sales Resources Using Lead Scoring

      The image contains a screenshot of a graph to demonstrate optimizing sales resources with lead scoring.

      Lead scoring drives greater sales effectiveness

      When contacts are scored as “qualified leads” and sent to sellers, sales win rates and ROI climb

      • Contacts can be scored properly once marketers align with Sales on the ICP and work closely with colleagues in areas like product marketing and field marketing to assign weightings to lead gen activities.
      • When more qualified leads get into the hands of the salesforce, their win rates improve.
      • As win rates improve, and sellers are producing more wins from the same volume of leads, sales productivity improves and ROI on the marketing investment increases.

      “On average, organizations that currently use lead scoring experience a 77% lift in lead generation ROI, over organizations that do not currently use lead scoring.”

      – MarketingSherpa, 2012

      Average Lead Generation ROI by Use of Lead Scoring

      The image contains a screenshot of a graph to demonstrate the average lead generation ROI by using of lead scoring. 138% are currenting using lead scoring, and 78% are not using lead scoring.
      Source: 2011 B2B Marketing Benchmark Survey, MarketingSherpa
      Methodology: Fielded June 2011, N=326 CMOs

      SoftwareReviews’ Lead Scoring Approach

      1. Drive Aligned Vision for Lead Scoring

      2. Build and Test Your Lead Scoring Model

      3. Apply to Your Tech Platform and Validate, Nurture, and Grow

      Phase
      Steps

      1. Outline a vision for lead scoring and identify stakeholders.
      2. Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.
      3. Align on marketing pipeline terminology, buyer persona and journey, and lead gen engine components.
      1. Understand the Lead Scoring Grid and establish thresholds.
      2. Collaborate with stakeholders on your ICP, apply weightings to profile attributes and values, and test your model.
      3. Identify the key activities and assets of your lead gen engine, weight attributes, and run tests.
      1. Apply model to your marketing management software.
      2. Test quality of sales-accepted leads by sellers and measure conversion rates through your marketing pipeline.
      3. Apply advanced methods such as lead nurturing.

      Phase Outcomes

      1. Steering committee and stakeholder selection
      2. Stakeholder alignment
      3. Team alignment on terminology
      4. Buyer journey map
      5. Lead gen engine components and asset types documented
      1. Initial lead-stage threshold scores
      2. Ideal customer profile, weightings, and tested scores
      3. Documented activities/assets across your lead generation engine
      4. Test results to drive adjusted weightings for profile attributes and engagement
      5. Final model to apply to marketing application
      1. Better qualified leads in the hands of sellers
      2. Advanced methods to nurture leads

      Key Deliverable: Lead Scoring Workbook

      The workbook walks you through a step-by-step process to:

      • Identify your team.
      • Identify the lead scoring thresholds.
      • Define your IPC.
      • Weight the activities within your lead generation engine.
      • Run tests using lead scenarios.

      Tab 1: Team Composition

      Consider core functions and form a cross-functional lead scoring team. Document the team’s details here.

      The image contains a screenshot of the Lead Scoring Workbook, Tab 1.

      Tab 2: Threshold Setting

      Set your initial threshold weightings for profile and engagement scores.

      The image contains a screenshot of the Lead Scoring Workbook, Tab 2.

      Tab 3:

      Establish Your Ideal Customer Profile

      Identify major attributes and attribute values and the weightings of both. You’ll eventually score your leads against this ICP.

      Record and Weight Lead Gen Engine Activities

      Identify the major activities that compose prospect engagement with your lead gen engine. Weight them together as a team.

      Test Lead Profile Scenarios

      Test actual lead profiles to see how they score against where you believe they should score. Adjust threshold settings in Tab 2.

      Test Activity Engagement Scores

      Test scenarios of how contacts navigate your lead gen engine. See how they score against where you believe they should score. Adjust thresholds on Tab 2 as needed.

      Review Combined Profile and Activity Score

      Review the combined scores to see where on your lead scoring matrix the lead falls. Make any final adjustments to thresholds accordingly.

      The image contains screenshots of the Lead Scoring Workbook, Tab 3.

      Several ways we help you build your lead scoring methodology

      DIY Toolkit Guided Implementation Workshop Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      • Begin your project using the step-by-step process outlined in this blueprint.
      • Leverage the accompanying workbook.
      • Launch inquiries with the analyst who wrote the research.
      • Kick off your project with an inquiry with the authoring analyst and your engagement manager.
      • Additional inquiries will guide you through each step.
      • Leverage the blueprint and toolkit.
      • Reach out to your engagement manager.
      • During a half-day workshop the authoring analyst will guide you and your team to complete your lead scoring methodology.
      • Reach out to your engagement manager.
      • We’ll lead the engagement to structure the process, gather data, interview stakeholders, craft outputs, and organize feedback and final review.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Collaborate on vision for lead scoring and the overall project.

      Call #2: Identify the steering committee and the rest of the team.

      Call #3: Discuss app/tech stack support for lead scoring. Understand key marketing pipeline terminology and the buyer journey.

      Call #4: Discuss your ICP, apply weightings, and run test scenarios.

      Call #5: Discuss and record lead generation engine components.

      Call #6: Understand the Lead Scoring Grid and set thresholds for your model.

      Call #7: Identify your ICP, apply weightings to attributes, and run tests.

      Call #8: Weight the attributes of engagement activities and run tests. Review the application of the scoring model on lead management software.

      Call #9: Test quality of sales-accepted leads in the hands of sellers. Measure lead flow and conversion rates through your marketing pipeline.

      Call #10: Review progress and discuss nurturing and other advanced topics.

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.

      Workshop Overview

      Accelerate your project with our facilitated SoftwareReviews Advisory workshops

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Drive Aligned Vision for Lead Scoring

      Buyer Journey and Lead Gen Engine Mapping

      Build and Test Your Lead Scoring Model

      Align on Engagement Attributes

      Apply to Your Tech Platform

      Activities

      1.1 Outline a vision for lead scoring.

      1.2 Identify steering committee and project team members.

      1.3 Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.

      1.4 Align on marketing pipeline terminology.

      2.1 Establish a buyer persona (if not done already).

      2.2 Map your buyer journey.

      2.3 Document the activities and assets of your lead gen engine.

      3.1 Understand Lead Scoring Grid and set your thresholds.

      3.2 Identify ICP attribute and sub-attribute weightings. Run tests.

      4.1 Weight the attributes of your lead gen engagement model and run tests.

      4.2 Apply weightings to activities and assets.

      4.3 Test engagement and profile scenarios together and adjust weightings and thresholds as needed.

      5.1 Apply model to your campaign management software and test quality of sales-accepted leads in the hands of sellers.

      5.2. Measure overall lead flow and conversion rates through your marketing pipeline.

      5.3 Apply lead nurturing and other advanced methods.

      Deliverables

      1. Steering committee & project team composition
      2. Direction on tech stack to support lead gen
      3. Alignment on marketing pipeline definitions
      1. Buyer (persona if needed) journey map
      2. Lead gen engine assets and activities documented
      1. Lead scoring thresholds
      2. ICP, weightings, and tested scores
      3. Test profile scoring
      1. Engagement attributes and weightings tested and complete
      2. Final lead scoring model
      1. Model applied to your marketing management/ campaign management software
      2. Better qualified leads in the hands of sellers

      Phase 1

      Drive an Aligned Vision for Lead Scoring

      Phase 1

      Phase 2

      Phase 3

      1.1 Establish a cross-functional vision for lead scoring

      1.2 Asses your tech stack for lead scoring (optional)

      1.3 Catalog your buyer journey and lead gen engine assets

      2.1 Start building your lead scoring model

      2.2 Identify and verify your IPC and weightings

      2.3 Establish key lead generation activities and assets

      3.1 Apply model to your marketing management software

      3.2 Test the quality of sales-accepted leads

      3.3 Apply advanced methods

      This phase will walk you through the following activities:

      • Solidify your vision for lead scoring.
      • Achieve stakeholder alignment.
      • Assess your tech stack.

      This phase involves the following stakeholders:

      • Field Marketing/Campaign Manager
      • CMO
      • Product Marketing
      • Product Management
      • Sales Leadership/Sales Operations
      • Inside Sales leadership
      • Marketing Operations/IT
      • Digital Platform leadership

      Step 1.1

      Establish a Cross-Functional Vision for Lead Scoring

      Activities

      1.1.1 Identify stakeholders critical to success

      1.1.2 Outline the vision for lead scoring

      1.1.3 Select your lead scoring team

      This step will walk you through the following activities:

      • Discuss the reasons why lead scoring is important.
      • Review program process.
      • Identify stakeholders and team.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Stakeholder alignment on vision of lead scoring
      • Stakeholders described and team members recorded
      • A documented buyer journey and map of your current lead gen engine

      1.1.1 Identify stakeholders critical to success

      1 hour

      1. Meet to identify the stakeholders that should be included in the project’s steering committee.
      2. Finalize selection of steering committee members.
      3. Contact members to ensure their willingness to participate.
      4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results
      Input Output
      • Stakeholder interviews
      • List of business process owners (lead management, inside sales lead qualification, sales opportunity management, marketing funnel metric measurement/analytics)
      • Lead generation/scoring stakeholders
      • Steering committee members
      Materials Participants
      • N/A
      • Initiative Manager
      • CMO, Sponsoring Executive
      • Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others)
      • Marketing Applications Director
      • Senior Digital Business Analyst

      SoftwareReviews Advisory Insight:

      B2B marketers that lack agreement among Marketing, Sales, Inside Sales, and lead management supporting staff of what constitutes a qualified lead will squander precious time and resources throughout the customer acquisition process.

      1.1.2 Outline the vision for lead scoring

      1 hour

      1. Convene a meeting of the steering committee and initiative team members who will be involved in the lead scoring project.
      • Using slides from this blueprint, understand the definition of lead scoring, the value of lead scoring to the organization, and the overall lead scoring process.
      • Understand the teams’ roles and responsibilities and help your Marketing Operations/IT colleagues understand some of the technical requirements needed to support lead scoring.
      • This is important because as the business members of the team are developing the lead scoring approach on paper, the technical team can begin to evaluate lead management apps within which your lead scoring model will be brought to life.
      Input Output
      • Slides to explain lead scoring and the lead scoring program
      • An understanding of the project among key stakeholders
      Materials Participants
      • Slides taken from this blueprint. We suggest slides from the Executive Brief (slides 3-16) and any others depending on the team’s level of familiarity.
      • Initiative Manager
      • CMO, Sponsoring Executive
      • Departmental leads from Sales, Marketing, Product Marketing, Product Management (and others)
      • Marketing Applications Director
      • Senior Digital Business Analyst

      SoftwareReviews Advisory Insight:

      While SMBs can implement some form of lead scoring when volume is very low and leads can be scored by hand, lead scoring and effective lead management cannot be performed without investment in digital platforms and lead management software and integration with customer relationship management (CRM) applications in the hands of inside and field sales staff. Marketers should plan and budget for the right combination of applications and tools to be in place for proper lead management.

      Lead scoring stakeholders

      Developing a common stakeholder understanding of the ICP, the way contact profiles are scored, and the way activities and asset engagement in your lead generation engine are scored will strengthen alignment between Marketing, Sales and Product Management.

      Title

      Key Stakeholders Within a Lead Generation/Scoring Initiative

      Lead Scoring Sponsor

      • Owns the project at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CMO, VP of Marketing, CEO (in SMB providers)

      Lead Scoring Initiative Manager

      • Typically a senior member of the marketing team
      • Responsible for preparing and managing the project plan and monitoring the project team’s progress
      • Marketing Manager or a field marketing team member who has strong program management skills, has run large-scale B2B generation campaigns, and is familiar with the stakeholder roles and enabling technologies

      Business Leads

      • Works alongside the lead scoring initiative manager to ensure that the strategy is aligned with business needs
      • In this case, likely to be a marketing lead
      • Marketing Director

      Digital, Marketing/Sales Ops/IT Team

      • Composed of individuals whose application and technology tools knowledge and skills are crucial to lead generation success
      • Responsible for understanding the business requirements behind lead generation and the requirements in particular to support lead scoring and the evaluation, selection, and implementation of the supporting tech stack – apps, website, analytics, etc.
      • Project Manager, Business Lead, CRM Manager, Integration Manager, Marketing Application SMEs, Sales Application

      Steering Committee

      • Composed of C-suite/management-level individuals who act as the lead generation process decision makers
      • Responsible for validating goals and priorities, defining the scope, enabling adequate resourcing, and managing change especially among C-level leaders in Sales & Product
      • Executive Sponsor, Project Sponsor, CMO, Business Unit SMEs

      SoftwareReviews Advisory Insight:

      Marketers managing the lead scoring initiative must include Product Marketing, Sales, Inside Sales, and Product Management. And given that world-class B2B lead generation engines cannot run without technology enablement, Marketing Operations/IT – those that are charged with enabling marketing and sales – must also be part of the decision making and implementation process of lead scoring and lead generation.

      1.1.3 Select your lead scoring team

      30 minutes

      1. The CMO and other key stakeholders should discuss and determine who will be involved in the lead scoring project.
      • Business leaders in key areas – Product Marketing, Field Marketing, Digital Marketing, Inside Sales, Sales, Marketing Ops, Product Management, and IT – should be involved.
    • Document the members of your lead scoring team in tab 1 of the Lead Scoring Workbook.
      • The size of the team will vary depending on your initiative and size of your organization.
      InputOutput
      • Stakeholders
      • List of lead scoring team members
      MaterialsParticipants
      • Lead Scoring Workbook
      • Initiative Manager
      • CMO, Sponsoring Executive
      • Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others)
      • Marketing Applications Director
      • Senior Digital Business Analyst

      Download the Lead Scoring Workbook

      Lead scoring team

      Consider the core team functions when composing the lead scoring team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned lead management/scoring strategy. Don’t let your core team become too large when trying to include all relevant stakeholders. Carefully limit the size of the team to enable effective decision making while still including functional business units.

      Required Skills/Knowledge

      Suggested Team Members

      Business

      • Understanding of the customer
      • Understanding of brand
      • Understanding of multichannel marketing: email, events, social
      • Understanding of lead qualification
      • Field Marketing/Campaign Lead
      • Product Marketing
      • Sales Manager
      • Inside Sales Manager
      • Content Marketer/Copywriter

      IT

      • Campaign management application capabilities
      • Digital marketing
      • Marketing and sales funnel Reporting/metrics
      • Marketing Application Owners
      • CRM/Sales Application Owners
      • Marketing Analytics Owners
      • Digital Platform Owners

      Other

      • Branding/creative
      • Social
      • Change management
      • Creative Director
      • Social Media Marketer

      Step 1.2 (Optional)

      Assess Your Tech Stack for Lead Scoring

      Our model assumes you have:

      1.2.1 A marketing application/campaign management application in place that accommodates lead scoring.

      1.2.2 Lead management software integrated with the sales automation/CRM tool in the hands of Field Sales.

      1.2.3 Reporting/analytics that spans the entire lead generation pipeline/funnel.

      Refer to the following three slides if you need guidance in these areas.

      This step will walk you through the following activities:

      • Confirm that you have your tech stack in place.
      • Set up an inquiry with an Info-Tech analyst should you require guidance on evaluating lead pipeline reporting, CRM, or analytics applications.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Understanding of what new application and technology support is required to support lead scoring.

      SoftwareReviews Advisory Insight:

      Marketers that collaborate closely with Marketing Ops/IT early in the process of lead scoring design will be best able to assess whether current marketing applications and tools can support a full lead scoring capability.

      1.2.1 Plan technology support for marketing management apps

      Work with Marketing Ops and IT early to evaluate application enablement for lead management, including scoring

      A thorough evaluation takes months – start early

      • Work closely with Marketing Operations (or the team that manages the marketing apps and digital platforms) as early as possible to socialize your approach to lead scoring.
      • Work with them on a set of updated requirements for selecting a marketing management suite or for changes to existing apps and tools to support your lead scoring approach that includes lead tracking and marketing funnel analytics.
      • Access the Info-Tech blueprint Select a Marketing Management Suite, along with analyst inquiry support during the requirements definition, vendor evaluation, and vendor selection phases. Use the SoftwareReviews Marketing Management Data Quadrant during vendor evaluation and selection.

      SoftwareReviews Marketing Management Data Quadrant

      The image contains a screenshot of the Marketing Management Data Quadrant.

      1.2.2 Plan technology support for sales opportunity management

      Work with Marketing Ops and IT early to evaluate applications for sales opportunity management

      A thorough evaluation takes months – start early

      • Work closely with Sales Operations as early as possible to socialize your approach to lead scoring and how lead management must integrate with sales opportunity management to manage the entire marketing and sales funnel management process.
      • Work with them on a set of updated requirements for selecting a sales opportunity management application that integrates with your marketing management suite or for changes to existing apps and tools to support your lead management and scoring approach that support the entire marketing and sales pipeline with analytics.

      Access the Info-Tech blueprint Select and Implement a CRM Platform, along with analyst inquiry support during the requirements definition, vendor evaluation, and vendor selection phases. Use the SoftwareReviews CRM Data Quadrant during vendor evaluation and selection.

      SoftwareReviews Customer Relationship Management Data Quadrant

      The image contains a screenshot of the SoftwareReviews Customer Relationship Management Data Quadrant.

      1.2.3 Plan analytics support for marketing pipeline analysis

      Work with Marketing Ops early to evaluate analytics tools to measure marketing and sales pipeline conversions

      A thorough evaluation takes weeks – start early

      • Work closely with Marketing and Sales Operations as early as possible to socialize your approach to measuring the lifecycle of contacts through to wins across the entire marketing and sales funnel management process.
      • Work with them on a set of updated requirements for selecting tools that can support the measurement of conversion ratios from contact to MQL, SQL, and opportunity to wins. Having this data enables you to measure improvement in component parts to your lead generation engine.
      • Access the Info-Tech blueprint Select and Implement a Reporting and Analytics Solution, along with analyst inquiry support during the requirements definition, vendor evaluation and vendor selection phases. Use the SoftwareReviews Best Business intelligence & Analytics Software Data Quadrant as well during vendor evaluation and selection.

      SoftwareReviews Business Intelligence Data Quadrant

      The image contains a screenshot of the Software Reviews Business Intelligent Quadrant.

      Step 1.3

      Catalog Your Buyer Journey and Lead Gen Engine Assets

      Activities

      1.3.1 Review marketing pipeline terminology

      1.3.2 Describe your buyer journey

      1.3.3 Describe your awareness and lead generation engine

      This step will walk you through the following activities:

      • Discuss marketing funnel terminology.
      • Describe your buyer journey.
      • Catalog the elements of your lead generation engine.

      This step involves the following participants:

      • Stakeholders

      Outcomes of this step

      • Stakeholder alignment on terminology, your buyer journey, and elements of your lead generation engine

      1.3.1 Review marketing pipeline terminology

      30 minutes

      1. We assume for this model the following:
        1. Our primary objective is to deliver more, and more-highly qualified, sales-qualified leads (SQLs) to our salesforce. The salesforce will accept SQLs and after further qualification turn them into opportunities. Sellers work opportunities and turn them into wins. Wins that had first/last touch attribution within the lead gen engine are considered marketing-influenced wins.
        2. This model assumes the existence of sales development reps (SDRs) whose mission it is to take marketing-qualified leads (MQLs) from the lead generation engine and further qualify them into SQLs.
        3. The lead generation engine takes contacts – visitors to activities, website, etc. – and scores them based on their profile and engagement. If the contact scores at or above the designated threshold, the lead generation engine rates it as an MQL and passes it along to Inside Sales/SDRs. If the contact scores above a certain threshold and shows promise, it is further nurtured. If the contact score is low, it is ignored.
      2. If an organization does not possess a team of SDRs or Inside Sales, you would adjust your version of the model to, for example, raise the threshold for MQLs, and when the threshold is reached the lead generation engine would pass the lead to Field Sales for further qualification.

      Stage

      Characteristics

      Actions

      Contact

      • Unqualified
      • No/low activity

      Nurture

      SDR Qualify

      Send to Sales

      Close

      MQL

      • Profile scores high
      • Engagement strong

      SQL

      • Profile strengthened
      • Demo/quote/next step confirmed

      Oppt’y

      • Sales acceptance
      • Sales opportunity management

      Win

      • Deal closed

      SoftwareReviews Advisory Insight:

      Score leads in a way that makes it crystal clear whether they should be ignored, further nurtured, further qualified, or go right into a sellers’ hands as a super hot lead.

      1.3.2 Describe your buyer journey

      1. Understand the concept of the buyer journey:
        1. Typically Product Marketing is charged with establishing deep understanding of the target buyer for each product or solution through a complete buyer persona and buyer journey map. The details of how to craft both are covered in the upcoming SoftwareReviews Advisory blueprint Craft a More Comprehensive Go-to-Market Strategy. However, we share our Buyer Journey Template here (on the next slide) to illustrate the connection between the buyer journey and the lead generation and scoring processes.
        2. Marketers and campaigners developing the lead scoring methodology will work closely with Product Marketing, asking them to document the buyer journey.
        3. The value of the buyer journey is to guide asset/content creation, nurturing strategy and therefore elements of the lead generation engine such as web experience, email, and social content and other elements of engagement.
        4. The additional value of having a buyer persona is to also inform the ICP, which is an essential element of lead scoring.
        5. For the purposes of lead scoring, use the template on the next slide to create a simple form of the buyer journey. This will guide lead generation engine design and the scoring of activities later in our blueprint.

      2 hours

      On the following slide:

      1. Tailor this template to suit your buyer journey. Text in green is yours to modify. Text in black is instructional.
      2. Your objective is to use the buyer journey to identify asset types and a delivery channel that once constructed/sourced and activated within your lead gen engine will support the buyer journey.
      3. Keep your buyer journey updated based on actual journeys of sales wins.
      4. Complete different buyer journeys for different product areas. Complete these collaboratively with stakeholders for alignment.

      SoftwareReviews Advisory Insight:

      Establishing a buyer journey is one of the most valuable tools that, typically, Product Marketing produces. Its use helps campaigners, product managers, and Inside and Field Sales. Leading marketers keep journeys updated based on live deals and characteristics of wins.

      Buyer Journey Template

      Personas: [Title] e.g. “BI Director”

      The image contains a screenshot of the describe persona level as an example.

      [Persona name] ([levels it includes from arrows above]) Buyer’s Journey for [solution type] Vendor Selection

      The image contains a screenshot of the Personas Type example to demonstrate a specific IT role, end use in a relevant department.

      1.3.3 Describe Your Awareness and Lead Gen Engine

      1. Understand the workings of a typical awareness and lead generation engine. Reference the image of a lead gen engine on the following slide when reviewing our guidance below:
        1. In our lead scoring example found in the Lead Scoring Workbook, tab 3, “Weight and Test,” we use a software company selling a sales automation solution, and the engagement activities match with the Typical Awareness and Lead Gen Engine found on the following slide. Our goal is to match a visual representation of a lead gen and awareness engine with the activity scoring portion of lead scoring.
        2. At the top of the Typical Awareness and Lead Generation Engine image, the activities are activated by a team of various roles: digital manager (new web pages), campaign manager (emails and paid media), social media marketer (organic and paid social), and events marketing manager (webinars).
        3. “Awareness” – On the right, the slide shows additional awareness activities driven by the PR/Corporate Comms and Analyst Relations teams.*
        4. The calls to action (CTAs) found in the outreach activities are illustrated below the timeline. The CTAs are grouped and are designed to 1) drive profile capture data via a main sales form fill, and 2) drive engagement that corresponds to the Education, Solution, and Selection buyer journey phases outlined on the prior slide. Ensure you have fast paths to get a hot lead – request a demo – directly to Field Sales when profiles score high.

      * For guidance on best practices in engaging industry analysts, contact your engagement manager to schedule an inquiry with our expert in this area. during that inquiry, we will share best practices and recommended analyst engagement models.

      Lead Scoring Workbook

      2 hours

      On the following slide:

      1. Tailor the slide to describe your lead generation engine as you will use it when you get to latter steps to describe the activities in your lead gen engine and weight them for lead scoring.
      2. Use the template to see what makes up a typical lead gen and awareness building engine. Record your current engine parts and see what you may be missing.
      3. Note: The “Goal” image in the upper right of the slide is meant as a reminder that marketers should establish a goal for SQLs delivered to Field Sales for each campaign.

      SoftwareReviews Advisory Insight:

      Marketing’s primary mission is to deliver marketing-influenced wins (MIWs) to the company. Building a compelling awareness and lead gen engine must be done with that goal in mind. Leaders are ruthless in testing – copy, email subjects, website navigation, etc. – to fine-tune the engine and staying highly collaborative with sellers to ensure high value lead delivery.

      Typical Awareness and Lead Gen Engine

      Understand how a typical lead generation engine works. Awareness activities are included as a reference. Use as a template for campaigns.

      The image contains a screenshot of a diagram to demonstrate how a lead generation engine works.

      Phase 2

      Build and Test Your Lead Scoring Model

      Phase 1

      Phase 2

      Phase 3

      1.1 Establish a cross-functional vision for lead scoring

      1.2 Asses your tech stack for lead scoring (optional)

      1.3 Catalog your buyer journey and lead gen engine assets

      2.1 Start building your lead scoring model

      2.2 Identify and verify your IPC and weightings

      2.3 Establish key lead generation activities and assets

      3.1 Apply model to your marketing management software

      3.2 Test the quality of sales-accepted leads

      3.3 Apply advanced methods

      This phase will walk you through the following activities:

      1. Understand the Lead Scoring Grid and establish thresholds.
      2. Collaborate with stakeholders on your ICP, apply weightings to profile attributes and values, and test.
      3. Identify the key activities and assets of your lead gen engine, weight attributes, and run tests.

      This phase involves the following participants:

      • Field Marketing/Campaign Manager
      • Product Marketing
      • Sales Leadership/Sales Operations
      • Inside Sales leadership
      • Marketing Operations/IT
      • Digital Platform leadership

      Step 2.1

      Start Building Your Lead Scoring Model

      Activities

      2.1.1 Understand the Lead Scoring Grid

      2.1.2 Identify thresholds

      This step will walk you through the following activities:

      • Discuss the concept of the thresholds for scoring leads in each of the various states – “ignore,” “nurture,” “qualify,” “send to sales.”
      • Open the Lead Scoring Workbook and validate your own states to suit your organization.
      • Arrive at an initial set of threshold scores.

      This step involves the following participants:

      • Stakeholders

      Outcomes of this step

      • Stakeholder alignment on stages
      • Stakeholder alignment on initial set of thresholds

      2.1.1 Understand the Lead Scoring Grid

      30 minutes

      1. Understand how lead scoring works and our grid is constructed.
      2. Understand the two important areas of the grid and the concept of how the contact’s scores will increase as follows:
        1. Profile – as the profile attributes of the contact approaches that of the ICP we want to score the contact/prospect higher. Note: Step 1.3 walks you through creating your ICP.
        2. Engagement – as the contact/prospect engages with the activities (e.g. webinars, videos, events, emails) and assets (e.g. website, whitepapers, blogs, infographics) in our lead generation engine, we want to score the contact/prospect higher. Note: You will describe your engagement activities in this step.
      3. Understand how thresholds work:
        1. Threshold percentages, when reached, trigger movement of the contact from one state to the next – “ignore,” “nurture,” “qualify with Inside Sales,” and “send to sales.”
      The image contains a screenshot of an example of the lead scoring grid, as described in the text above.

      2.1.2 Identify thresholds

      30 minutes

      We have set up a model Lead Scoring Grid – see Lead Scoring Workbook, tab 2, “Identify Thresholds.”

      Set your thresholds within the Lead Scoring Workbook:

      • Set your threshold percentages for ”Profile” and “Engagement.”
      • You will run test scenarios for each in later steps.
      • We suggest you start with the example percentages given in the Lead Scoring Workbook and plan to adjust them during testing in later steps.
      • Define the “Send to Sales,” “Qualify With Inside Sales,” “Nurture,” and “Ignore” zones.

      SoftwareReviews Advisory Insight:

      Clarify that all-important threshold for when a lead passes to your expensive and time-starved outbound sellers.

      The image contains a screenshot of the Lead Scoring Workbook, tab 2 demonstrating the Lead Scoring Grid.

      Lead Scoring Workbook

      Step 2.2

      Identify and Verify Your Ideal Customer Profile and Weightings

      Activities

      2.2.1 Identify your ideal customer profile

      2.2.2 Run tests to validate profile weightings

      This step will walk you through the following activities:

      • Identify the attributes that compose the ICP.
      • Identify the values of each attribute and their weightings.
      • Test different contact profile scenarios against what actually makes sense.
      • Adjust weightings if needed.

      This step involves the following participants:

      • Stakeholders

      Outcomes of this step

      • Stakeholder alignment on ICP
      • Stakeholder alignment on weightings given to attributes
      • Tested results to verify thresholds and cores

      2.2.1 Identify your ideal customer profile

      Collaborate with stakeholders to understand what attributes best describe your ICP. Assign weightings and subratings.

      2 hours

      1. Choose attributes such as job role, organization type, number of employees/potential seat holders, geographical location, interest area, etc., that describe the ideal profile of a target buyer. Best practice sees marketers choosing attributes based on real wins.
      2. Some marketers compare the email domain of the contact to a target list of domains. In the Lead Scoring Workbook, tab 3, “Weight and Test,” we provide an example profile for a “Sales Automation Software” ICP.
      3. Use the workbook as a template, remove our example, and create your own ICP attributes. Then weight the attributes to add up to 100%. Add in the attribute values and weight them. In the next step you will test scenarios.

      SoftwareReviews Advisory Insight:

      Marketers who align with colleagues in areas such as Product Marketing, Sales, Inside Sales, Sales Training/Enablement, and Product Managers and document the ICP give their organizations a greater probability of lead generation success.

      The image contains a screenshot of tab 3, demonstrating the weight and test with the example profile.

      Lead Scoring Workbook

      2.2.2 Run tests to validate profile weightings

      Collaborate with stakeholders to run different profile scenarios. Validate your model including thresholds.

      The image contains a screenshot of tab 3 to demonstrate the next step of running tests to validate profile weightings.

      SoftwareReviews Advisory Insight:

      Keep your model simple in the interest of fast implementation and to drive early learnings. The goal is not to be perfect but to start iterating toward success. You will update your scoring model even after going into production.

      2 hours

      1. Choose scenarios of contact/lead profile attributes by placing a “1” in the “Attribute” box shown at left.
      2. Place your estimate of how you believe the profile should score in the box to the right of “Estimated Profile State.” How does the calculated state, beneath, compare to the estimated state?
      3. In cases where the calculated state differs from your estimated state, consider weighting the profile attribute differently to match.
      4. If you find estimates and calculated states off dramatically, consider changing previously determined thresholds in tab 2, “Identify Thresholds.” Test multiple scenarios with your team.

      Lead Scoring Workbook

      Step 2.3

      Establish Key Lead Generation Activities and Assets

      Activities

      2.3.1 Establish activities, attribute values, and weights

      2.3.2 Run tests to evaluate activity ratings

      This step will walk you through the following activities:

      • Identify the activities/asset types in your lead gen engine.
      • Weight each attribute and define values to score for each one.
      • Run tests to ensure your model makes sense.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Final stakeholder alignment on which assets compose your lead generation engine
      • Scoring model tested

      2.3.1 Establish activities, attribute values, and weights

      2 hours

      1. Catalog the assets and activities that compose your lead generation engine outlined in Activity 1.3.3. Identify their attribute values and weight them accordingly.
      2. Consider weighting attributes and values according to how close that asset gets to conveying your ideal call to action. For example, if your ideal CTA is “schedule a demo” and the “click” was submitted in the last seven days, it scores 100%. Take time decay into consideration. If that same click was 60 days ago, it scores less – maybe 60%.
      3. Different assets convey different intent and therefore command different weightings; a video comparing your offering against the competition, considered a down funnel asset, scores higher than the company video, considered a top-of-the-funnel activity and “awareness.”
      The image contains a screenshot of the next step of establishing activities, attribute values, and weights.

      Lead Scoring Workbook

      2.3.2 Run tests to validate activity weightings

      Collaborate with stakeholders to run different engagement scenarios. Validate your model including thresholds.

      The image contains a screenshot of activity 2.3.2: run tests to validate activity weightings.

      SoftwareReviews Advisory Insight:

      Use data from actual closed deals and the underlying activities to build your model – nothing like using facts to inform your key decisions. Use common sense and keep things simple. Then update further when data from new wins appears.

      2 hours

      1. Test scenarios of contact engagement by placing a “1” in the “Attribute” box shown at left.
      2. Place your estimate of how you believe the engagement should score in the box to the right of “Estimated Engagement State.” How does the calculated state, beneath, compare to the estimated state?
      3. In cases where the calculated state differs from your estimated state, consider weighting the activity attribute differently to match.
      4. If you find that the estimates and calculated states are off dramatically, consider changing previously determined thresholds in tab 2, “Identify Thresholds.” Test multiple scenarios with your team.

      Lead Scoring Workbook

      Phase 3

      Apply Your Model to Marketing Apps and Go Live With Better Qualified Leads

      Phase 1

      Phase 2

      Phase 3

      1.1 Establish a cross-functional vision for lead scoring

      1.2 Asses your tech stack for lead scoring (optional)

      1.3 Catalog your buyer journey and lead gen engine assets

      2.1 Start building your lead scoring model

      2.2 Identify and verify your IPC and weightings

      2.3 Establish key lead generation activities and assets

      3.1 Apply model to your marketing management software

      3.2 Test the quality of sales-accepted leads

      3.3 Apply advanced methods

      This phase will walk you through the following activities:

      1. Apply model to your marketing management/campaign management software.
      2. Get better qualified leads in the hands of sellers.
      3. Apply lead nurturing and other advanced methods.

      This phase involves the following participants:

      • Field Marketing/Campaign Manager
      • Sales Leadership/Sales Operations
      • Inside Sales leadership
      • Marketing Operations/IT
      • Digital Platform leadership

      Step 3.1

      Apply Model to Your Marketing Management Software

      Activities

      3.1.1 Apply final model to your lead management software

      This step will walk you through the following activities:

      • Apply the details of your scoring model to the lead management software.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Marketing management software or campaign management application is now set up/updated with your lead scoring approach.

      3.1.1 Apply final model to your lead management software

      Now that your model is complete and ready to go into production, input your lead scoring parameters into your lead management software.

      The image contains a screenshot of activity 3.1.1 demonstrating tab 4 of the Lead Scoring Workbook.

      3 hours

      1. Go to the Lead Scoring Workbook, tab 4, “Model Summary” for a formatted version of your lead scoring model. Double-check print formatting and print off a copy.
      2. Use the copy of your model to show to prospective technology providers when asking them to demonstrate their lead scoring capabilities.
      3. Once you have finalized your model, use the printed output from this tab to ease your process of transposing the corresponding model elements into your lead management software.

      Lead Scoring Workbook

      Step 3.2

      Test the Quality of Sales-Accepted Leads

      Activities

      3.2.1 Achieve sales lead acceptance

      3.2.2 Measure and optimize

      This step will walk you through the following activities:

      • Suggest that the Inside Sales and Field Sales teams should assess whether to sign off on quality of leads received.
      • Campaign managers and stakeholders should now be able to track lead status more effectively.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Sales leadership should be able to sign off that leads are better qualified.
      • With marketing pipeline analytics in place, campaigners can start to measure lead flow and conversion rates.

      3.2.1 Achieve sales lead acceptance

      Collaborate with sellers to validate your lead scoring approach.

      1 hour

      1. Gather a set of SQLs – leads that have been qualified by Inside Sales and delivered to Field Sales. Have Field Sales team members convey whether these leads were properly qualified.
      2. Where leads are deemed not properly qualified, determine if the issue was a) a lack of proper qualification by the Inside Sales team, or b) the lead generation engine, which should have further nurtured the lead or ignored it outright.
      3. Work collaboratively with Inside Sales to update your lead scoring model and/or Inside Sales practice.

      Stage

      Characteristics

      Actions

      Contact

      • Unqualified
      • No/low activity

      Nurture

      SDR Qualify

      Send to Sales

      Close

      MQL

      • Profile scores high
      • Engagement strong

      SQL

      • Profile strengthened
      • Demo/quote/next step confirmed

      Oppt’y

      • Sales acceptance
      • Sales opportunity management

      Win

      • Deal closed

      SoftwareReviews Advisory Insight:

      Marketers that collaborate with Sales – and in this case, a group of sellers as a sales advisory team – well in advance of sales acceptance to design lead scoring will save time during this stage, build trust with sellers, and make faster decisions related to lead management/scoring.

      3.2.2 Measure and optimize

      Leverage analytics that help you optimize your lead scoring methodology.

      Ongoing

      1. Work with Marketing Ops/IT team to design and implement analytics that enable you to:
      2. Meet frequently with your stakeholder team to review results.
      3. Learn from the wins: see how they actually scored and adjust thresholds and/or asset/activity weightings.
      4. Learn from losses: fix ineffective scoring, activities, assets, form-fill strategies, and engagement paths.
      5. Test from both wins and losses if demographic weightings are delivering accurate scores.
      6. Analyze those high scoring leads that went right to sellers but did not close. This could point to a sales training or enablement challenge.
      The image contains a screenshot of the lead scoring dashboard.

      Analytics will also drive additional key insights across your lead gen engine:

      • Are volumes increasing or decreasing? What percentage of leads are in what status (A1-D4)?
      • What nurturing will re-engage stalled leads that score high in profile but low in engagement (A3, B3)?
      • Will additional profile data capture further qualify leads with high engagement (C1, C2)?
      • And beyond all of the above, what leads move to Inside Sales and convert to SQLs, opportunities, and eventually marketing-influenced wins?

      Step 3.3

      Apply Advanced Methods

      Activities

      3.3.1 Employ lead nurturing strategies

      3.3.2 Adjust your model over time to accommodate more advanced methods

      This step will walk you through the following activities:

      • Apply lead nurturing to your lead gen engine.
      • Adjust your engine over time with more advanced methods.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Marketers can begin to test lead nurturing strategies and other advanced methods.

      3.3.1 Employ lead nurturing strategies

      A robust content marketing competence with compelling assets and the capture of additional profile data for qualification are key elements of your nurturing strategy.

      The image contains a screenshot of the Lead Scoring Grid with a focus on Nurture.

      SoftwareReviews Advisory Insight:

      Nurturing success combines the art of crafting engaging copy/experiences and the science of knowing just where a prospect is within your lead gen engine. Great B2B marketers demonstrate the discipline of knowing when to drive engagement and/or additional profile attribute capture using intent while not losing the prospect to over-profiling.

      Ongoing

      1. The goal of lead nurturing is to move the collection of contacts/leads that are scoring, for example, in the A3, B3, C1, C2, and C3 cells into A2, B2, and B1 cells.
      2. How is this best done? To nurture leads that are A3 and B3, entice the prospect with engagement that leads to the bottom of funnel – e.g. “schedule a demo” or “schedule a consultation” via a compelling asset. See the example on the following slide.
      3. To nurture C1 and C2, we need to qualify them further, so entice with an asset that leads to deeper profile knowledge.
      4. For C3 leads, we need both profile and activity nurturing.

      Lead nurturing example

      The image contains an example of a lead nurturing example.

      SoftwareReviews Advisory Insight:

      When nurturing, choose/design content as to what “intent” it satisfies. For example, a head-to-head comparison with a key competitor signals “Selection” phase of the buyer journey. Content that helps determine what app-type to buy signals “Solution”. A company video, or a webinar replay, may mean your buyer is “educating themselves.

      3.3.2 Adjust your model over time to accommodate more advanced methods

      When getting started or within a smaller marketing team, focus on the basics outlined thus far in this blueprint. Larger and/or more experienced teams are able to employ more advanced methods.

      Ongoing

      Advanced Methods

      • Invest in technologies that interpret lead scores and trigger next-step actions, especially outreach by Inside and/or Field Sales.
      • Use the above to route into nurturing environments where additional engagement will raise scores and trigger action.
      • Recognize that lead value decays with time to time additional outreach/activities and to reduce lead scores over time.
      • Always be testing different engagement, copy, and subsequent activities to optimize lead velocity through your lead gen engine.
      • Build intent sensitivity into engagement activities; e.g. test if longer demo video engagement times imply ”contact me for a demo” via a qualification outreach. Update scores manually to drive learnings.
      • Vary engagement paths by demographics to deliver unique digital experiences. Use firmographics/email domain to drive leads through a more tailored account-based marketing (ABM) experience.
      • Reapply learnings from closed opportunities/wins to drive updates to buyer journey mapping and your ICP.

      Frequently used acronyms

      ABM

      Account-Based Marketing

      B2B

      Business to Business

      CMO

      Chief Marketing Officer

      CRM

      Customer Relationship Management

      ICP

      Ideal Customer Profile

      MIW

      Marketing-Influenced Win

      MQL

      Marketing-Qualified Lead

      SDR

      Sales Development Representative

      SQL

      Sales-Qualified Lead

      Works cited

      Arora, Rajat. “Mining the Real Gems from you Data – Lead Scoring and Engagement Scoring.” LeadSquared, 27 Sept. 2014. Web.

      Doyle, Jen. “2012 B2B Marketing Benchmark Report: Research and insights on attracting and converting the modern B2B buyer.” MarketingSherpa, 2012. Web.

      Doyle, Jen, and Sergio Balegno. “2011 MarketingSherpa B2B Marketing Benchmark Survey: Research and Insights on Elevating Marketing Effectiveness from Lead Generation to Sales Conversion.” MarketingSherpa, 2011.

      Kirkpatrick, David. “Lead Scoring: CMOs realize a 138% lead gen ROI … and so can you.” marketingsherpa blog, 26 Jan 2012. Web.

      Moser, Jeremy. “Lead Scoring Is Important for Your Business: Here’s How to Create Scoring Model and Hand-Off Strategy.” BigCommerce, 25 Feb. 2019. Web.

      Strawn, Joey. “Why Lead Scoring Is Important for B2Bs (and How You Can Implement It for Your Company.” IndustrialMarketer.com, 17 Aug. 2016. Web.

      Mitigate Machine Bias

      • Buy Link or Shortcode: {j2store}343|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $9,549 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy
      • AI is the new electricity. It is fundamentally and radically changing the fabric of our world, from the way we conduct business, to how we work and live, make decisions, and engage with each other, to how we organize our society, and ultimately, to who we are. Organizations are starting to adopt AI to increase efficiency, better engage customers, and make faster, more accurate decisions.
      • Like with any new technology, there is a flip side, a dark side, to AI – machine biases. If unchecked, machine biases replicate, amplify, and systematize societal biases. Biased AI systems may treat some of your customers (or employees) differently, based on their race, gender, identity, age, etc. This is discrimination, and it is against the law. It is also bad for business, including missed opportunities, lost consumer confidence, reputational risk, regulatory sanctions, and lawsuits.

      Our Advice

      Critical Insight

      • Machine biases are not intentional. They reflect the cognitive biases, preconceptions, and judgement of the creators of AI systems and the societal structures encoded in the data sets used for machine learning.
      • Machine biases cannot be prevented or fully eliminated. Early identification and diversity in and by design are key. Like with privacy and security breaches, early identification and intervention – ideally at the ideation phase – is the best strategy. Forewarned is forearmed. Prevention starts with a culture of diversity, inclusivity, openness, and collaboration.
      • Machine bias is enterprise risk. Machine bias is not a technical issue. It is a social, political, and business problem. Integrate it into your enterprise risk management (ERM).

      Impact and Result

      • Just because machine biases are induced by human behavior, which is also captured in data silos, they are not inevitable. By asking the right questions upfront during application design, you can prevent many of them.
      • Biases can be introduced into an AI system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used, to which assumptions are made, etc. Ask your data science team a lot of questions; leave no stone unturned.
      • Don’t wait until “Datasheets for Datasets” and “Model Cards for Model Reporting” (or similar frameworks) become standards. Start creating these documents now to identify and analyze biases in your apps. If using open-source data sets or libraries, you may need to create them yourself for now. If working with partners or using AI/ ML services, demand that they provide such information as part of the engagement. You, not your partners, are ultimately responsible for the AI-powered product or service you deliver to your customers or employees.
      • Build a culture of diversity, transparency, inclusivity, and collaboration – the best mechanism to prevent and address machine biases.
      • Treat machine bias as enterprise risk. Use your ERM to guide all decisions around machine biases and their mitigation.

      Mitigate Machine Bias Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the dark side of AI: algorithmic (machine) biases, how they emerge, why they are dangerous, and how to mitigate them. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand AI biases

      Learn about machine biases, how and where they arise in AI systems, and how they relate to human cognitive and societal biases.

      • Mitigate Machine Bias – Phase 1: Understand AI Biases

      2. Identify data biases

      Learn about data biases and how to mitigate them.

      • Mitigate Machine Bias – Phase 2: Identify Data Biases
      • Datasheets for Data Sets Template
      • Datasheets for Datasets

      3. Identify model biases

      Learn about model biases and how to mitigate them.

      • Mitigate Machine Bias – Phase 3: Identify Model Biases
      • Model Cards for Model Reporting Template
      • Model Cards For Model Reporting

      4. Mitigate machine biases and risk

      Learn about approaches for proactive and effective bias prevention and mitigation.

      • Mitigate Machine Bias – Phase 4: Mitigate Machine Biases and Risk
      [infographic]

      Workshop: Mitigate Machine Bias

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare

      The Purpose

      Understand your organization’s maturity with respect to data and analytics in order to maximize workshop value.

      Key Benefits Achieved

      Workshop content aligned to your organization’s level of maturity and business objectives.

      Activities

      1.1 Execute Data Culture Diagnostic.

      1.2 Review current analytics strategy.

      1.3 Review organization's business and IT strategy.

      1.4 Review other supporting documentation.

      1.5 Confirm participant list for workshop.

      Outputs

      Data Culture Diagnostic report.

      2 Understand Machine Biases

      The Purpose

      Develop a good understanding of machine biases and how they emerge from human cognitive and societal biases. Learn about the machine learning process and how it relates to machine bias.

      Select an ML/AI project and complete a bias risk assessment.

      Key Benefits Achieved

      A solid understanding of algorithmic biases and the need to mitigate them.

      Increased insight into how new technologies such as ML and AI impact organizational risk.

      Customized bias risk assessment template.

      Completed bias risk assessment for selected project.

      Activities

      2.1 Review primer on AI and machine learning (ML).

      2.2 Review primer on human and machine biases.

      2.3 Understand business context and objective for AI in your organization.

      2.4 Discuss selected AI/ML/data science project or use case.

      2.5 Review and modify bias risk assessment.

      2.6 Complete bias risk assessment for selected project.

      Outputs

      Bias risk assessment template customized for your organization.

      Completed bias risk assessment for selected project.

      3 Identify Data Biases

      The Purpose

      Learn about data biases: what they are and where they originate.

      Learn how to address or mitigate data biases.

      Identify data biases in selected project.

      Key Benefits Achieved

      A solid understanding of data biases and how to mitigate them.

      Customized Datasheets for Data Sets Template.

      Completed datasheet for data sets for selected project.

      Activities

      3.1 Review machine learning process.

      3.2 Review examples of data biases and why and how they happen.

      3.3 Identify possible data biases in selected project.

      3.4 Discuss “Datasheets for Datasets” framework.

      3.5 Modify Datasheets for Data Sets Template for your organization.

      3.6 Complete datasheet for data sets for selected project.

      Outputs

      Datasheets for Data Sets Template customized for your organization.

      Completed datasheet for data sets for selected project.

      4 Identify Model Biases

      The Purpose

      Learn about model biases: what they are and where they originate.

      Learn how to address or mitigate model biases.

      Identify model biases in selected project.

      Key Benefits Achieved

      A solid understanding of model biases and how to mitigate them.

      Customized Model Cards for Model Reporting Template.

      Completed model card for selected project.

      Activities

      4.1 Review machine learning process.

      4.2 Review examples of model biases and why and how they happen.

      4.3 Identify potential model biases in selected project.

      4.4 Discuss Model Cards For Model Reporting framework.

      4.5 Modify Model Cards for Model Reporting Template for your organization.

      4.6 Complete model card for selected project.

      Outputs

      Model Cards for Model Reporting Template customized for your organization.

      Completed model card for selected project.

      5 Create Mitigation Plan

      The Purpose

      Review mitigation approach and best practices to control machine bias.

      Create mitigation plan to address machine biases in selected project. Align with enterprise risk management (ERM).

      Key Benefits Achieved

      A solid understanding of the cultural dimension of algorithmic bias prevention and mitigation and best practices.

      Drafted plan to mitigate machine biases in selected project.

      Activities

      5.1 Review and discuss lessons learned.

      5.2 Create mitigation plan to address machine biases in selected project.

      5.3 Review mitigation approach and best practices to control machine bias.

      5.4 Identify gaps and discuss remediation.

      Outputs

      Summary of challenges and recommendations to systematically identify and mitigate machine biases.

      Plan to mitigate machine biases in selected project.

      Adopt an Exponential IT Mindset

      • Buy Link or Shortcode: {j2store}103|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      New technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are ushering in an exciting new era of business transformation. By adopting an exponential IT mindset, IT leaders will be able to lead the autonomization of business capabilities.

      To capitalize on this upcoming opportunity, exponential IT leaders will have to become business advisors who unlock exponential value for the business and help mitigate exponential risk.

      Adopt a renewed focus on business outcomes to achieve autonomization

      An exponential IT mindset means that IT leaders will need to take a lead role in transforming business capabilities.

      • Embrace an expanded role as business advisors: CIOs will be tasked with greater responsibility for determining business strategy alongside the C-suite.
      • Know the rewards and mitigate the risks: New value chain opportunities and efficiency gains will create significant ROI. Protect these returns by mitigating higher risks to business continuity, information security, and delivery performance.
      • Plan to fully leverage technologies such as AI: It will be integral for IT to enable autonomous technologies in this new era of exponential technology progress.

      Adopt an Exponential IT Mindset Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Adopt an Exponential IT Mindset Deck – An introduction to IT’s role in the autonomization era

      The role of IT has evolved throughout the past couple generations to enable fundamental business transformations. In the autonomization era, it will have to evolve again to lead the business through a world of exponential opportunity.

      • Adopt an Exponential IT Mindset Storyboard

      Infographic

      Further reading

      Adopt an Exponential IT Mindset

      Thrive through the next paradigm shift

      Executive Summary

      For more than 40 years, information technology has significantly transformed businesses, from the computerization of operations to the digital transformation of business models. As technological disruption accelerates exponentially, a world of exponential business opportunity is within reach.

      Newly emerging technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are enabling autonomous business capabilities.

      The role of IT has evolved throughout the past couple generations to enable business transformations. In the autonomization era, it will have to evolve again. IT will have a new mission, an adapted governance structure, innovative capabilities, and an advanced partnership model.

      CIOs embracing exponential IT require a new mindset. Their IT practices will need to progress to the top of the maturity ladder as they make business outcomes their own.

      Over the past two generations, we have witnessed major technology-driven business transformations

      1980s

      Computerization

      The use of computer devices, networks, and applications became widespread in the enterprise. The focus was on improving the efficiency of back-office tasks.

      2000s

      Digitalization

      As the world became connected through the internet, new digitally enabled business models emerged in the enterprise. Orders were now being received online, and many products and services were partially or fully digitized for online fulfillment.

      Recent pandemic measures contributed to a marked acceleration in the digitalization of organizations

      The massive disruption resulting from pandemic measures led businesses to shift to more digital interactions with customers.

      The global average share of customer interactions that are digital went from 36% in December 2019 to 58% in July 2020.

      The global average share of customer interactions that are digital went from 36% to 58% in less than a year.*

      Moreover, companies across business areas have accelerated the digitization of their offerings.

      The global average share of partially or fully digitized products went from 35% in 2019 to 55% in July 2020.

      The global average share of partially or fully digitized products went from 35% to 55% in the same period.*

      The adoption of digitalized business models has accelerated during the pandemic. Post-pandemic, it is unlikely for adoption to recede.

      With more business applications ported to the cloud and more data available online, “digital-first” organizations started to envisage a next wave of automation.

      *Source: “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever,” McKinsey & Company, 2020

      A majority of IT leaders plan to use artificial intelligence within their organizations in 2023

      In August 2022, Info-Tech surveyed 506 IT leaders and asked which tasks would involve AI in their organizations in 2023.

      Graph showing tasks that would involve AI in organizations in 2023.

      We found that 63% of IT leaders plan to use AI within their organizations to automate repetitive, low-level tasks by the end of 2023.

      With the release of the ChatGPT prototype in November 2022, setting a record for the fastest user growth (reaching 100 million active users just two months after launch), we foresee that AI adoption will accelerate significantly and its use will extend to more complex tasks.

      Newly emerging technologies and business realities are ushering in the next business transformation

      1980s

      Computerization

      2000s

      Digitalization

      2020s

      Autonomization

      As digitalization accelerates, a post-pandemic world with a largely online workforce and digitally transformed enterprise business models now enters an era where more business capabilities become autonomous, with humans at the center of a loop* that is gradually becoming larger.

      Deep Learning, Quantum Computing, 5G Networks, Robotics

      * Download Info-Tech’s CIO Trend Report 2019 – Become a Leader in the Loop

      The role of IT needs to evolve as it did through the previous two generations

      1980s

      Computerization

      IT professionals gathered functional requirements from the business to help automate back-office tasks and improve operational efficiency.

      2000s

      Digitalization

      IT professionals acquired business analysis skills and leveraged the SMAC (social, mobile, analytics, and cloud) stack to accelerate the automation of the front office and enable the digital transformation of business models.

      2020s

      Autonomization

      IT professionals will become business advisors and enable the establishment of autonomous yet differentiated business processes and capabilities.

      The autonomization era brings enormous opportunity for organizations, coupled with enormous risk

      Graph of Risk Severity versus Value Opportunity. Autonomization has a high value of opportunity and high risk severity.

      While some analysts have been quick to announce the demise of the IT department and the transition of the role of IT to the business, the budgets that CIOs control have continued to rise steadily over time.

      In a high-risk, high-reward endeavor to make business processes autonomous, the role of IT will continue to be pivotal, because while everyone in the organization will rush to seize the value opportunity, the technology risk will be left for IT to manage.

      Exponential IT represents a necessary change in a CIO’s focus to lead through the next paradigm shift

      EXPONENTIAL RISK

      Autonomous processes will integrate with human-led processes, creating risks to business continuity, information security, and quality of delivery. Supplier power will exacerbate business risks.

      EXPONENTIAL REWARD

      The efficiency gains and new value chains created through artificial intelligence, robotics, and additive manufacturing will be very significant. Most of this value will be realized through the augmentation of human labor.

      EXPONENTIAL DEMAND

      Autonomous solutions for productivity and back-office applications will eventually become commoditized and provided by a handful of large vendors. There will, however, be a proliferation of in-house algorithms and workflows to autonomize the middle and front office, offered by a busy landscape of industry-centric capability vendors.

      EXPONENTIAL IT

      Exponential IT involves IT leading the cognitive reengineering of the organization with evolved practices for:

      • IT governance
      • Asset management
      • Vendor management
      • Data management
      • Business continuity management
      • Information security management

      To succeed, IT will have to adopt different priorities in its mission, governance, capabilities, and partnerships

      Digitalization

      A Connected World

      Progressive IT

      • Mission

        Enable the digital transformation of the business
      • Governance

        Service metrics, security perimeters, business intelligence, compliance management
      • Capabilities

        Service management, business analysis, application portfolio management, data management
      • Partnerships

        Management of technology service agreements

      Autonomization

      An Exponential World

      Exponential IT

      • Mission

        Lead the business through autonomization.
      • Governance

        Outcome-based metrics, zero trust, ESG reporting, digital trust
      • Capabilities

        Experience management, business advisory, enterprise innovation, data differentiation
      • Partnerships

        Management of business capability agreements

      Fortune favors the bold: The CIO now has an opportunity to cement their role as business leader

      Levels of digital maturity.  From bottom: Unstable - inability to consistently deliver basic services, Firefighter - Reliable infrastructure and IT service desk, Trusted Operator - Enablement of business through applications and work orders, Business Partner - Effective delivery of strategic business projects, Innovator - Information and technology as a competitive advantage.

      Research has shown that companies that are more digitally mature have higher growth than the industry average. In these companies, the CIO is part of the executive management team.

      And while the role of the CIO is generally tied to their mandate within the organization, we have seen their role progress from doer to leader as IT climbs the maturity ladder.

      As companies strive to succeed in the next phase of technology-driven transformation, CIOs have an opportunity to demonstrate their business leadership. To do so, they will have to provide exceptionally mature services while owning business targets.

      Harness Configuration Management Superpowers

      • Buy Link or Shortcode: {j2store}303|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Configuration management databases (CMDB) are a lot of work to build and maintain. Starting down this process without the right tools, processes, and buy-in is a lot of work with very little reward.
      • If you decide to just build it and expect they will come, you may find it difficult to articulate the value, and you will be disappointed by the lack of visitors.
      • Relying on manual entry or automated data collection without governance may result in data you can’t trust, and if no one trusts the data, they won’t use it.

      Our Advice

      Critical Insight

      • The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Impact and Result

      • Define your use cases: Identify the use cases and prioritize those objectives into phases. Define what information will be needed to meet the use cases and how that information will be populated.
      • Understand and design the CMDB data model: Define services and undiscoverable configuration items (CI) and map them to the discoverable CIs.
      • Operationalize configuration record updates: Define data stewards and governance processes and integrate your configuration management practice with existing practices and lifecycles.

      Harness Configuration Management Superpowers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Harness Configuration Management Superpowers Deck – A step-by-step document that walks you through creating a configuration management program.

      Use this blueprint to create a configuration management program that provides immediate value.

      • Harness Configuration Management Superpowers – Phases 1-4

      2. Configuration Management Project Charter Template – A project charter template to help you build a concise document for communicating appropriate project details to stakeholders.

      Use this template to create a project charter to launch the configuration management project.

      • Configuration Management Project Charter

      3. Configuration Control Board Charter Template – A board charter template to help you define the roles and responsibilities of the configuration control board.

      Use this template to create your board charter for your configuration control board (CCB). Define roles and responsibilities and mandates for the CCB.

      • Configuration Control Board Charter

      4. Configuration Management Standard Operating Procedures (SOP) Template – An SOP template to describe processes and procedures for ongoing maintenance of the CMDB under the configuration management program.

      Use this template to create and communicate your SOP to ensure ongoing maintenance of the CMDB under the configuration management program.

      • Configuration Management Standard Operation Procedures

      5. Configuration Management Audit and Validation Checklist Template – A template to be used as a starting point to meet audit requirements under NIST and ITIL programs.

      Use this template to assess capability to pass audits, adding to the template as needed to meet internal auditors’ requirements.

      • Configuration Management Audit and Validation Checklist

      6. Configuration Management Policy Template – A template to be used for building out a policy for governance over the configuration management program.

      Use this template to build a policy for your configuration management program.

      • Configuration Management Policy

      7. Use Cases and Data Worksheet – A template to be used for validating data requirements as you work through use cases.

      Use this template to determine data requirements to meet use cases.

      • Use Cases and Data Worksheet

      8. Configuration Management Diagram Template Library – Examples of process workflows and data modeling.

      Use this library to view sample workflows and a data model for the configuration management program.

      • Configuration Management Diagram Template Library (Visio)
      • Configuration Management Diagram Template Library (PDF)

      9. Configuration Manager Job Description – Roles and responsibilities for the job of Configuration Manager.

      Use this template as a starting point to create a job posting, identifying daily activities, responsibilities, and required skills as you create or expand your configuration management program.

      • Configuration Manager

      Infographic

      Workshop: Harness Configuration Management Superpowers

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Configuration Management Strategy

      The Purpose

      Define the scope of your service configuration management project.

      Design the program to meet specific stakeholders needs

      Identify project and operational roles and responsibilities.

      Key Benefits Achieved

      Designed a sustainable approach to building a CMDB.

      Activities

      1.1 Introduction

      1.2 Define challenges and goals.

      1.3 Define and prioritize use cases.

      1.4 Identify data needs to meet these goals.

      1.5 Define roles and responsibilities.

      Outputs

      Data and reporting use cases based on stakeholder requirements

      Roles and responsibility matrix

      2 CMDB Data Structure

      The Purpose

      Build a data model around the desired use cases.

      Identify the data sources for populating the CMDB.

      Key Benefits Achieved

      Identified which CIs and relationships will be captured in the CMDB.

      Activities

      2.1 Define and prioritize your services.

      2.2 Evaluate CMDB default classifications.

      2.3 Test configuration items against existing categories.

      2.4 Build a data model diagram.

      Outputs

      List of CI types and relationships to be added to default settings

      CMDB data model diagram

      3 Processes

      The Purpose

      Key Benefits Achieved

      Built a right-sized approach to configuration record updates and data validation.

      Activities

      3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.

      3.2 Define practices for configuration baselines.

      3.3 Build a data validation and auditing plan.

      Outputs

      Documented processes and workflows

      Data validation and auditing plan

      4 Communications & Roadmap

      The Purpose

      Key Benefits Achieved

      Metrics program defined

      Communications designed

      Activities

      4.1 Define key metrics for configuration management.

      4.2 Define metrics for supporting services.

      4.3 Build configuration management policies.

      4.4 Create a communications plan.

      4.5 Build a roadmap

      Outputs

      Policy for configuration management

      Communications documents

      Roadmap for next steps

      Further reading

      Harness Configuration Management Superpowers

      Create a configuration management practice that will provide ongoing value to the organization.

      EXECUTIVE BRIEF

      Analyst Perspective

      A robust configuration management database (CMDB) can provide value to the business and superpowers to IT. It's time to invest smartly to reap the rewards.

      IT environments are becoming more and more complex, and balancing demands for stability and demands for faster change requires visibility to make the right decisions. IT needs to know their environment intimately. They need to understand dependencies and integrations and feel confident they are making decisions with the most current and accurate view.

      Solutions for managing operations rely on the CMDB to bring visibility to issues, calculate impact, and use predictive analytics to fix performance issues before they become major incidents. AIOps solutions need accurate data, but they can also help identify configuration drift and flag changes or anomalies that need investigation.

      The days of relying entirely on manual entry and updates are all but gone, as the functionality of a robust configuration management system requires daily updates to provide value. We used to rely on that one hero to make sure information was up to date, but with the volume of changes we see in most environments today, it's time to improve the process and provide superpowers to the entire IT department.

      This is a picture of Sandi Conrad

      Sandi Conrad, ITIL Managing Professional
      Principal Research Director, IT Infrastructure & Operations, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Build a configuration management database (CMDB): You need to implement a CMDB, populate it with records and relationships, and integrate it with discovery and management tools.
      • Identify the benefits of a CMDB: Too many CMDB projects fail because IT tries to collect everything. Base your data model on the desired use cases.
      • Define roles and responsibilities: Keeping data accurate and updated is difficult. Identify who will be responsible for helping

      Common Obstacles

      • Significant process maturity is required: Service configuration management (SCM) requires high maturity in change management, IT asset management, and service catalog practices.
      • Large investment: Building a CMDB takes a large amount of effort, process, and expertise.
      • Tough business case: Configuration management doesn't directly provide value to the business, but it requires a lot of investment from IT.

      Info-Tech's Approach

      • Define your scope and objectives: Identify the use cases for SCM and prioritize those objectives into phases.
      • Design the CMDB data model: Align with your existing configuration management system's data model.
      • Operationalize configuration record updates: Integrate your SCM practice with existing practices and lifecycles.

      Start small

      Scope creep is a serial killer of configuration management databases and service configuration management practices.

      Insight summary

      Many vendors are taking a CMDB-first approach to enable IT operations or sometimes asset management. It's important to ensure processes are in place immediately to ensure the data doesn't go stale as additional modules and features are activated.

      Define processes early to ensure success

      The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Identify use cases

      The initial use case will be the driving force behind the first assessment of return on investment (ROI). If ROI can be realized early, momentum will increase, and the team can build on the initial successes.

      If you don't see value in the first year, momentum diminishes and it's possible the project will never see value.

      Keep the initial scope small and focused

      Discovery can collect a lot of data quickly, and it's possible to be completely overwhelmed early in the process.

      Build expertise and troubleshoot issues with a smaller scope, then build out the process.

      Minimize customizations

      Most CMDBs have classes and attributes defined as defaults. Use of the defaults will enable easier implementation and faster time to value, especially where automations and integrations depend on standard terms for field mapping.

      Automate as much as possible

      In large, complex environments, the data can quickly become unmanageable. Use automation as much as possible for discovery, dependency mapping, validation, and alerts. Minimize the amount of manual work but ensure everyone is aware of where and how these manual updates need to happen to see continual value.

      Info-Tech's Harness Configuration Management Superpowers.

      Configuration management will improve functionality of all surrounding processes

      A well-functioning CMDB empowers almost all other IT management and governance practices.

      Service configuration management is about:

      • Building a system of record about IT services and the components that support those services.
      • Continuously reconciling and validating information to ensure data accuracy.
      • Ensuring the data lifecycle is defined and well understood and can pass data and process audits.
      • Accessing information in a variety of ways to effectively serve IT and the business.
      An image of Info-Tech's CMDB Configuration Management tree, breaking down aspects into the following six categories: Strategic Partner; Service Provider; Proactive; Stabilize; Core; and Foundational.

      Configuration management most closely impacts these practices

      Info-Tech Research Group sees a clear relationship.

      When an IT department reports they are highly effective at configuration management, they are much more likely to report they are highly effective at these management and governance processes:

      The following management and governance processes are listed: Quality Management; Asset Management; Performance Measurement; Knowledge Management; Release Management; Incident and Problem Management; Service Management; Change Management.

      The data is clear

      Service configuration management is about more than just doing change management more effectively.

      Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=684 organizations, 2019 to July 2022.

      Make the case to use configuration management to improve IT operations

      Consider the impact of access to data for informing innovations, optimization efforts, and risk assessments.

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      75%

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      42%

      of publicly reported outages were due to software or configuration issues. (1)

      58%

      of networking-related IT outages were due to configuration and change management failure.(1)

      It doesn't have to be that way!

      Enterprise-grade IT service management (ITSM) tools require a CMDB for the different modules to work together and to enable IT operations management (ITOM), providing greater visibility.

      Decisions about changes can be made with accurate data, not guesses.

      The CMDB can give the service desk fast access to helpful information about the impacted components, including a history of similar incidents and resolutions and the relationship between the impacted components and other systems and components.

      Turn your team into IT superheroes.

      CMDB data makes it easier for IT Ops groups to:

      • Avoid change collisions.
      • Eliminate poor changes due to lack of visibility into complex systems.
      • Identify problematic equipment.
      • Troubleshoot incidents.
      • Expand the services provided by tier 1 and through automation.

      Benefits of configuration management

      For IT

      • Configuration management will supercharge processes that have relied on inherent knowledge of the IT environment to make decisions.
      • IT will more quickly analyze and understand issues and will be positioned to improve and automate issue identification and resolution.
      • Increase confidence and reduce risks for decisions involving release and change management with access to accurate data, regardless of the complexity of the environment.
      • Reduce or eliminate unplanned work related to poor outcomes due to decisions made with incorrect or incomplete data.

      For the Business

      • Improve strategic planning for business initiatives involving IT solutions, which may include integrations, development, or security concerns.
      • More quickly deploy new solutions or updates due to visibility into complex environments.
      • Enable business outcomes with reliable and stable IT systems.
      • Reduce disruptions caused by planning without accurate data and improve resolution times for service interruptions.
      • Improve access to reporting for budgeting, showbacks, and chargebacks as well as performance metrics.

      Measure the value of this blueprint

      Fast-track your planning and increase the success of a configuration management program with this blueprint

      Workshop feedback
      8.1/10

      $174,000 savings

      30 average days saved

      Guided Implementation feedback

      8.7/10

      $31,496 average savings

      41 average days saved

      "The workshop was well run, with good facilitation, and gained participation from even the most difficult parts of the audience. The best part of the experience was that if I were to find myself in the same position in the future, I would repeat the workshop."

      – University of Exeter

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Prioritize services and use cases.

      Call #3: Identify data needed to meet goals.

      Call #4: Define roles and responsibilities.

      Call #5: Define and prioritize your services.

      Call #6: Evaluate and test CMDB default classifications.

      Call #7: Build a data model diagram.

      Call #8: Define processes for onboarding, offboarding, and maintaining data.

      Call #9: Discuss configuration baselines.

      Call #10: Build a data validation and audit plan.

      Call #11: Define key metrics.

      Call #12: Build a configuration management policy and communications plan.

      Call #13: Build a roadmap.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 9 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4

      Configuration Management Strategy

      CMDB Data Structure

      Process Design

      Communications & Roadmap

      Activities
      • Introduction
      • Define challenges and goals.
      • Define and prioritize use cases.
      • Identify data needed to meet goals.
      • Define roles and responsibilities.
      • Define and prioritize your services.
      • Evaluate CMDB default classifications.
      • Test configuration items against existing categories.
      • Build a data model diagram.
      • Define processes for onboarding, offboarding, and maintaining data in the CMDB.
      • Define practices for configuration baselines.
      • Build a data validation and auditing plan.
      • Define key metrics for configuration management.
      • Define metrics for supporting services.
      • Build configuration management policies.
      • Create a communications plan.
      • Build a roadmap.

      Deliverables

      • Roles and responsibility matrix
      • Data and reporting use cases based on stakeholder requirements
      • List of CI types and relationships to be added to default settings
      • CMDB data model diagram
      • Documented processes and workflows
      • Data validation and auditing plan
      • Policy for configuration management
      • Roadmap for next steps
      • Communications documents

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Configuration Management Project Charter

      Detail your approach to building an SCM practice and a CMDB.

      Screenshot from the Configuration Management Project Charter

      Use Cases and Data Worksheet

      Capture the action items related to your SCM implementation project.

      Screenshot from the Use Cases and Data Worksheet

      Configuration Manager Job Description

      Use our template for a job posting or internal job description.

      Screenshot from the Configuration Manager Job Description

      Configuration Management Diagram Template Library

      Use these diagrams to simplify building your SOP.

      Screenshot from the Configuration Management Diagram Template Library

      Configuration Management Policy

      Set expectations for configuration control.

      screenshot from the Configuration Management Policy

      Configuration Management Audit and Validation Checklist

      Use this framework to validate controls.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Configuration Control Board Charter

      Define the board's responsibilities and meeting protocols.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Key deliverable:

      Configuration Management Standard Operating Procedures Template

      Outlines SCM roles and responsibilities, the CMDB data model, when records are expected to change, and configuration baselines.

      Four Screenshots from the Configuration Management Standard Operating Procedures Template

      Phase 1

      Configuration Management Strategy

      Strategy Data Structure Processes Roadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Scope
      • Use Cases
      • Reports and Analytics

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • SCM project sponsor

      Harness Service Configuration Management Superpowers

      Establish clear definitions

      Ensure everyone is using the same terms.

      Term Definition
      Configuration Management

      The purpose of configuration management is to:

      • "Ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. This includes information on how CIs are configured and the relationships between them" (AXELOS).
      • "Provide sufficient information about service assets to enable the service to be effectively managed. Assess the impact of changes and deal with service incidents" (ISACA, 2018).
      Configuration Management System (CMS) A set of tools and databases used to manage, update, and present data about all configuration items and their relationships. A CMS may maintain multiple federated CMDBs and can include one or many discovery and dependency mapping tools.
      Configuration Management Database (CMDB) A repository of configuration records. It can be as simple as a spreadsheet or as complex as an integrated database populated through multiple autodiscovery tools.
      Configuration Record Detailed information about a configuration item.
      Configuration Item (CI)

      "Any component that needs to be managed in order to deliver an IT service" (AXELOS).

      These components can include everything from IT services and software to user devices, IT infrastructure components, and documents (e.g. maintenance agreements).
      Attributes Characteristics of a CI included in the configuration record. Common attributes include name, version, license expiry date, location, supplier, SLA, and owner.
      Relationships Information about the way CIs are linked. A CI can be part of another CI, connect to another CI, or use another CI. A CMDB is significantly more valuable when relationships are recorded. This information allows CMDB users to identify dependencies between components when investigating incidents, performing root-cause analysis, assessing the impact of changes before deployment, and much more.

      What is a configuration management database (CMDB)?

      The CMDB is a system of record of your services and includes a record for everything you need to track to effectively manage your IT services.

      Anything that is tracked in your CMDB is called a configuration item (CI). Examples of CIs include:

      • User-Facing Services
      • IT-Facing Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      Other systems of record can refer to CIs, such as:

      • Ticket database: Tickets can refer to which CI is impacted by an incident or provided as part of a service request.
      • Asset management database (AMDB): An IT asset is often also a CI. By associating asset records with CI records, you can leverage your IT asset data in your reporting.
      • Financial systems: If done well, the CMDB can supercharge your IT financial cost model.

      CMDBs can allow you to:

      • Query multiple databases simultaneously (so long as you have the CI name field in each database).
      • Build automated workflows and chatbots that interact with data across multiple databases.
      • More effectively identify the potential impact of changes and releases.

      Do not confuse asset with configuration

      Asset and configuration management look at the same world through different lenses

      • IT asset management (ITAM) tends to focus on each IT asset in its own right: assignment or ownership, lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations with other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they may use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.

      A comparison between Asset and Configuration Management Databases

      *Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.

      Start with ITIL 4 guiding principles to make your configuration management project valuable and realistic

      Focus on where CMDB data will provide value and ensure the cost of bringing that data in will be reasonable for its purpose. Your end goal should be not just to build a CMDB but to use a CMDB to manage workload and workflows and manage services appropriately.

      Focus on value

      Include only the relevant information required by stakeholders.

      Start where you are

      Use available sources of information. Avoid adding new sources and tools unless they are justified.

      Progress iteratively with feedback

      Regularly review information use and confirm its relevance, adjusting the CMDB scope if needed.

      Collaborate and promote visibility

      Explain and promote available sources of configuration information and the best ways to use them, then provide hints and tips for more efficient use.

      Think and work holistically

      Consider other sources of data for decision making. Do not try to put everything in the CMDB.

      Keep it simple and practical

      Provide relevant information in the most convenient way; avoid complex interfaces and reports.

      Optimize and automate

      Continually optimize resource-consuming practice activities. Automate CDMB verification, data collection, relationship discovery, and other activities.

      ITIL 4 guiding principles as described by AXELOS

      Step 1.1

      Identify use cases and desired benefits for service configuration management

      Activities

      1.1.1 Brainstorm data collection challenges

      1.1.2 Define goals and how you plan to meet them

      1.1.3 Brainstorm and prioritize use cases

      1.1.4 Identify the data needed to reach your goals

      1.1.5 Record required data sources

      This step will walk you through the following aspects of a configuration management system:

      • Scope
      • Use cases

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project sponsor
      • Project manager

      Identify potential obstacles in your organization to building and maintaining a CMDB

      Often, we see multiple unsuccessful attempts to build out a CMDB, with teams eventually losing faith and going back to spreadsheets. These are common obstacles:

      • Significant manual data collection, which is rarely current and fully accurate.
      • Multiple discovery solutions creating duplicate records, with no clear path to deduplicate records.
      • Manual dependency mapping that isn't accurate because it's not regularly assessed and updated.
      • Hybrid cloud and on-premises environment with discovery solutions only partially collecting as the right discovery and dependency mapping solutions aren't in place.
      • Dynamic environments (virtual, cloud, or containers) that may exist for a very short time, but no one knows how they should be managed.
      • Lack of expertise to maintain and update the CMDB or lack of an assigned owner for the CMDB. If no one owns the process and is assigned as a steward of data, it will not be maintained.
      • Database that was designed with other purposes in mind and is heavily customized, making it difficult to use and maintain.

      Understanding the challenges to accessing and maintaining quality data will help define the risks created through lack of quality data.

      This knowledge can drive buy-in to create a configuration management practice that benefits the organization.

      1.1.1 Brainstorm data collection challenges

      Involve stakeholders.
      Allot 45 minutes for this discussion.

      1. As a group, brainstorm the challenges you have with data:
      2. Accuracy and trustworthiness: What challenges do you have with getting accurate data on IT services and systems?
        1. Access: Where do you have challenges with getting data to people when they need it?
        2. Manually created data: Where are you relying on data that could be automatically collected?
        3. Data integration: Where do you have issues with integrating data from multiple sources?
        4. Impact: What is the result of these challenges?
      3. Group together these challenges into similar issues and identify what goals would help overcome them.
      4. Record these challenges in the Configuration Management Project Charter, section 1.2: Project Purpose.

      Download the Configuration Management Project Charter

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Info-Tech Maturity Ladder

      Identify your current and target state

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      Data collection and validation is fully automated

      Integrated with several IT processes

      Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      • Data collection and validation is fully automated
      • Integrated with several IT processes
      • Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      A tower is depicted, with arrows pointing to Current (orange) and Target(blue)

      Define goals for your CMDB to ensure alignment with all stakeholders

      • How are business or IT goals being hindered by not having the right data available?
      • If the business isn't currently asking for service-based reporting and accountability, start with IT goals. This will help to develop goals that will be most closely aligned to the IT teams' needs and may help incentivize the right behavior in data maintenance.
      • Configuration management succeeds by enabling its stakeholders to achieve their outcomes. Set goals for configuration management based on the most important outcomes expected from this project. Ask your stakeholders:
        1. What are the business' or IT's planned transformational initiatives?
        2. What are your highest priority goals?
        3. What should the priorities of the configuration management practice be?
      • The answers to these questions will shape your approach to configuration management. Direct input from your leadership and executives, or their delegates, will help ensure you're setting a solid foundation for your practice.
      • Identify which obstacles will need to be overcome to meet these goals.

      "[T]he CMDB System should be viewed as a 'system of relevance,' rather than a 'single source of truth.' The burdens of relevance are at once less onerous and far more meaningful in terms of action, analysis, and automation. While 'truth' implies something everlasting or at least stable, relevance suggests a far more dynamic universe."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al

      Identify stakeholders to discuss what they need from a CMDB; business and IT needs will likely differ

      Define your audience to determine who the CMDB will serve and invite them to these conversations. The CMDB can aid the business and IT and can be structured to provide dashboards and reports for both.

      Nondiscoverable configuration items will need to be created for both audiences to organize CIs in a way that makes sense for all uses.

      Integrations with other systems may be required to meet the needs of your audience. Note integrations for future planning.

      Business Services

      Within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      Technical Services

      Connect to IT Finance for:

      • Service-based consumption and costing
      • Financial awareness through showback
      • Financial recovery through chargeback
      • Support IT strategy through financial transparency
      • Cost optimization
      • Reporting for depreciation, location-related taxation, and capitalization (may also use asset management for these)

      Intersect with IT Processes to:

      • Reduce time to restore services through incident management
      • Improve stability through change management
      • Reduce outages through problem management
      • Optimize assets through IT asset management
      • Provide detailed reporting for audit/governance, risk, and compliance

      1.1.2 Define goals and how you plan to meet them

      Involve stakeholders.

      Allot 45 minutes for this discussion.

      As a group, identify current goals for building and using a CMDB.

      Why are we doing this?

      • How do you hope to use the data within the CMDB?
      • What processes will be improved through use of this data and what are the expected outcomes?

      How will we improve the process?

      • What processes will be put in place to ensure data integrity?
      • What tools will be put in place to improve the methods used to collect and maintain data?

      Record these goals in the Configuration Management Project Charter, section 1.3: Project Objectives.

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      It's easy to think that if you build it, they will come, but CMDBs rarely succeed without solid use cases

      Set expectations for your organization that defined and fulfilled use cases will factor into prioritization exercises, functional plans, and project milestones to achieve ROI for your efforts.

      A good use case:

      • Justifies resource allocation
      • Gains funding for the right tools
      • Builds stakeholder support
      • Drives interest and excitement
      • Gains support from anyone in a position to help build out and validate the data
      • Helps to define success

      In the book CMDB Systems, Making Change Work in the Age of Cloud and Agile, authors Drogseth, Sturm, and Twing describe the secrets of success:

      A documented evaluation of CMDB System vendors showed that while most "best case" ROI fell between 6 and 9 months for CMDB deployments, one instance delivered ROI for a significant CMDB investment in as little as 2 weeks!

      If there's a simple formula for quick time to value for a CMDB System, it's the following:

      Mature levels of process awareness
      + Strong executive level support
      + A ready and willing team with strongly supportive stakeholders
      + Clearly defined and ready phase one use case
      + Carefully selected, appropriate technologies

      All this = Powerful early-phase CMDB System results

      Define and prioritize use cases for how the CMDB will be used to drive value

      The CMDB can support several use cases and may require integration with various modules within the ITSM solution and integration with other systems.

      Document the use cases that will drive your CMDB to relevance, including the expected benefits for each use case.

      Identify the dependencies that will need to be implemented to be successful.

      Define "done" so that once data is entered, verified, and mapped, these use cases can be realized.

      "Our consulting experience suggests that more than 75% of all strategic initiatives (CMDB or not) fail to meet at least initial expectations across IT organizations. This is often due more to inflated expectations than categorical failure."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al.

      This image demonstrates how CMBD will be used to drive value.

      After identifying use cases, determine the scope of configuration items required to feed the use cases

      On-premises software and equipment will be critical to many use cases as the IT team and partners work on network and data-center equipment, enterprise software, and integrations through various means, including APIs and middleware. Real-time and near real-time data collection and validation will ensure IT can act with confidence.

      Cloud use can include software as a service (SaaS) solutions as well as infrastructure and platform as a service (IaaS and PaaS), and this may be more challenging for data collection. Tools must be capable of connecting to cloud environments and feeding the information back into the CMDB. Where on-premises and cloud applications show dependencies, you might need to validate data if multiple discovery and dependency mapping solutions are used to get a complete picture. Tagging will be crucial to making sense of the data as it comes into the CMDB.

      In-house developed software would be beneficial to have in the CMDB but may require more manual work to identify and classify once discovered. A combination of discovery and tagging may be beneficial to input and classification.

      Highly dynamic environments may require data collection through integration with a variety of solutions to manage and record continuous deployment models and verifications, or they may rely on tags and activity logs to record historical activity. Work with a partner who specializes in CI/CD to help architect this use case.

      Containers will require an assessment of the level of detail required. Determine if the container is a CI and if the content will be described as attributes. If there is value to your use case to map the contents of each container as separate CIs within the container CI, then you can map to that level of detail, but don't map to that depth unless the use case calls for it.

      Internet of Things (IoT) devices and applications will need to match a use case as well. IoT device asset data will be useful to track within an asset database but may have limited value to add to a CMDB. If there are connections between IoT applications and data warehouses, the dependencies should likely be mapped to ensure continued dataflow.

      Out of scope

      A single source of data is highly beneficial, but don't make it a catchall for items that are not easily stored in a CMDB.

      Source code should be stored in a definitive media library (DML). Code can be linked to the CMDB but is generally too big to store in a CMDB and will reduce performance for data retrieval.

      Knowledge articles and maintenance checklists are better suited to a knowledge base. They can also be linked to the CDMB if needed but this can get messy where many-to-many relationships between articles and CIs exist.

      Fleet (transportation) assets and fixed assets should be in fleet management systems and accounting systems, respectively. Storing these types of data in the CMDB doesn't provide value to the support process.

      1.1.3 Brainstorm and prioritize use cases

      Which IT practices will you supercharge?

      Focus on improving both operations and strategy.

      1. Brainstorm the list of relevant use cases. What do you want to do with the data from the CMDB? Consider:
        1. ITSM management and governance practices
        2. IT operations, vendor orchestration, and service integration and management (SIAM) to improve vendor interactions
        3. IT finance and business service reporting needs
      2. Identify which use cases are part of your two- to three-year plan, including the purpose for adding configuration data into that process. Prioritize one or two of these use cases to accomplish in your first year.
      3. Identify dependencies to manage as part of the solution and define a realistic timeline for implementing integrations, modules, or data sources.
      4. Document this table in the Configuration Management Project Charter, section 2.2: Use Cases.
      Audience Use Case Goal/Purpose Project/Solution Dependencies Proposed Timeline Priority
      • IT
      • Change Management

      Stabilize the process by seeing:

      Change conflict reporting

      Reports of CI changes without change records

      System availability

      RFC mapping requires discovered CIs

      RFC review requires criticality, technical and business owners

      Conflict reporting requires dependency mapping

      • Discovery and manual information entered by October
      • Dependency mapping implemented by December

      High

      Determine what additional data will be needed to achieve your use cases

      Regardless of which use cases you are planning to fulfill with the CMDB, it is critical to not add data and complexity with the plan of resolving every possible inquiry. Ensure the cost and effort of bringing in the data and maintaining it is justified. The complexity of the environment will impact the complexity of data sources and integrations for discovery and dependency mapping.

      Before bringing in new data, consider:

      • Is this information available in other maintained databases now?
      • Will this data be critical for decision making? If it is nice to have or optional, can it be automatically moved into the database and maintained using existing integrations?
      • Is there a cost to bringing the data into the CMDB and maintaining it? Is that cost reasonable for its purpose?
      • How frequently will this information be accessed, and can it be updated in an adequate cadence to meet these needs?
      • When does this information need to be available?

      Info-Tech Insight

      If data will be used only occasionally upon request, determine if it will be more efficient to maintain it or to retrieve it from the CMDB or another data source as needed.

      Remember, within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      1.1.4 Expand your use cases by identifying the data needed to reach your goals

      Involve stakeholders.

      Allot 60 minutes for this discussion.

      Review use cases and their goals.

      Identify what data will be required to meet those goals and determine whether it will be mandatory or optional/nice-to-have information.

      Identify sources of data for each type of data. Color code or sort.

      Italicize data points that can be automatically discovered.

      Gain consensus on what information will be manually entered.

      Record the data in the Use Cases and Data Worksheet.

      Download the Use Cases and Data Worksheet

      Input

      Output

      • None
      • List of data requirements
      MaterialsParticipants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Use Cases and Data Worksheet
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Use discovery and dependency mapping tools to automatically update the CMDB

      Avoid manual data entry whenever possible.

      Consider these features when looking at tools:

      • Application dependency mapping: Establishing and tracking the relationships and dependencies between system components, applications, and IT services. The ideal tool will be able to generate maps automatically.
      • Agentless and agent discovery: Scanning systems with both agent and agentless approaches. Agent-based scanning provides comprehensive information on applications used in individual endpoints, which is helpful in minimizing its IT footprint. However, agents require endpoint access. Agentless-based scanning provides a broader and holistic view of deployed applications without the need to install an agent on end devices, which can be good enough for inventory awareness.
      • Data export capability: Easy exporting of application inventory information to be used in reports and other tools.
      • Dashboards and chart visualization: Detailed list of the application inventory, including version number, number of users, licenses, deployment location, and other application details. These details will inform decision makers of each application's health and its candidacy for further rationalization activities.
      • Customizable scanning scripts: Tailor your application discovery approach by modifying the scripts used to scan your systems.
      • Integration with third-party tools: Easy integration with other systems with out-of-the-box plugins or customizable APIs.

      Determine which data collection methods will be used to populate the CMDB

      The effort-to-value ratio is an important factor in populating a CMDB. Manual efforts require a higher process focus, more intensive data validation, and a constant need to remind team members to act on every change.

      Real-Time Data AIOps continual scans Used for event and incident management
      Near Real-Time Data Discovery and dependency mapping run on a regular cycle Used for change and asset management
      Historical Data Activity log imports, manual data entry Used for IT finance, audit trail
      • Determine what amount of effort is appropriate for each data grouping and use case. As decisions are made to expand data within the CMDB, the effort-to-value ratio should always factor in. To be usable, data must be accurate, and every piece of data that needs to be manually entered runs the risk of becoming obsolete.
      • Identify which data sources will bring in each type of data. Where there is a possibility of duplicate records being created, one of the data sources will need to be identified as the primary.
      • If the decision is to manually enter configuration items early in the process, be aware that automation may create duplicates of the CIs that will need to be deduplicated at some point in the process to make the information more usable.
      • Typically, items are discovered, validated, then mapped, but there will be variations depending on the source.
      • Active Directory or LDAP may be used to bring users and technicians into the CMDB. Data may be imported from spreadsheets. Identify efforts where data cleanup may have to happen before transferring into the CMDB.
      • Identify how often manual imports will need to be conducted to make sure data is usable.

      Identify other nondiscoverable data that will need to be added to or accessed by the CMDB

      Foundational data, such as technicians, end users and approvers, roles, location, company, agency, department, building, or cost center, may be added to tables that are within or accessed by the CMDB. Work with your vendor to understand structure and where this information resides.

      • These records can be imported from CSV files manually, but this will require manual removal or edits as information changes.
      • Integration with the HRIS, Active Directory, or LDAP will enable automatic updates through synchronization or scheduled imports.
      • If synchronization is fully enabled, new data can be added and removed from the CMDB automatically.
      • Identify which nondiscoverable attributes will be needed, such as system criticality, support groups, groups it is managed by, location.
      • If partially automating the process, identify where manual updates will need to occur.
      • If fully automating the process, notifications will need to be set up when business owner or product or technical owner fields become empty to prompt defining a replacement within the CMDB.
      • Determine who will manage these updates.
      • Work with your CMDB implementation vendor to determine the best option for bringing this information in.

      1.1.5 Record required data sources

      Allot 15 minutes for this discussion.

      1. Where do you track the work involved in providing services? Typically, your ticket database tracks service requests and incidents. Additional data sources can include:
        • Enterprise resource planning tools for tracking purchase orders
        • Project management information system for tracking tasks
      2. What trusted data sources exist for the technology that supports these services? Examples include:
        • Management tools (e.g. Microsoft Endpoint Configuration Manager)
        • Architectural diagrams and network topology diagrams
        • IT asset management database
        • Spreadsheets
        • Other systems of record
      3. What other data sources can help you gather the data you identified in activity 1.1.4?
      4. Record the relevant data sources for each use case in the Configuration Management Standard Operating Procedures, section 6: Data Collection and Updates.

      Info-Tech Insight

      Improve the trustworthiness of your CMDB as a system of record by relying on data that is already trusted.

      Input

      Output

      • Use cases
      • List of data requirements
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT and business service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Step 1.2

      Define roles and responsibilities

      Activities

      1.2.1 Record the project team and stakeholders

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      This step will walk you through the following aspects of a configuration management system:

      • Roles and responsibilities

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Identify the roles you need in your SCM project

      Determine which roles will need to be involved in the initial project and how to source these roles.

      Leadership Roles
      Oversee the SCM implementation

      1. Configuration Manager – The practice owner for SCM. This is a long-term role.
      2. Configuration Control Board (CCB) Chair – An optional role that oversees proposed alterations to configuration plans. If a CCB is implemented, this is a long-term role.
      3. Project Sponsor or Program Sponsor – Provides the necessary resources for building the CMDB and SCM practices.
      4. Architecture Roles
        Plan the program to build strong foundation
        1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
        2. Requirements Analyst – Gathers and manages the requirements for CM.
        3. Process Engineer – Defines, documents, and implements the entire process.

      Architecture Roles
      Plan the program to build strong foundation

      1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
      2. Requirements Analyst – Gathers and manages the requirements for CM.
      3. Process Engineer – Defines, documents, and implements the entire process.

      Engineer Roles
      Implement the system

      1. Logical Database Analyst (DBA) Designs the structure to hold the configuration management data and oversees implementation.
      2. Communications and Trainer – Communicates the goals and functions of CM and teaches impacted users the how and why of the process and tools.

      Administrative Roles
      Permanent roles involving long-term ownership

      1. Technical Owner – The system administrator responsible for their system's uptime. These roles usually own the data quality for their system.
      2. Configuration Management Integrator – Oversees regular transfer of data into the CMDB.
      3. Configuration Management Tool Support – Selects, installs, and maintains the CM tool.
      4. Impact Manager – Analyzes configuration data to ensure relationships between CIs are accurate; conducts impact analysis.

      1.2.1 Record the project team and stakeholders

      Allocate 25 minutes to this discussion.

      1. Record the project team.
        1. Identify the project manager who will lead this project.
        2. Identify key personnel that will need to be involved in design of the configuration management system and processes.
        3. Identify where vendors/outsourcers may be required to assist with technical aspects.
        4. Document the project team in the Configuration Management Project Charter, section 1.1: Project Team.
      1. Record a list of stakeholders.
        1. Identify stakeholders internal and external to IT.
        2. Build the stakeholder profile. For each stakeholder, identify their role, interest in the project, and influence on project success. You can score these criteria high/medium/low or score them out of ten.
        3. If managed service providers will need to be part of the equation, determine who will be the liaison and how they will provide or access data.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Management Project Charter
      • List of project stakeholders and participants
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Even with full automation, this cannot be a "set it and forget it" project if it is to be successful long-term

      Create a team to manage the process and data updates and to ensure data is always usable.

      • Services may be added and removed.
      • Technology will change as technical debt is reduced.
      • Vendors may change as contract needs develop.
      • Additional use cases may be introduced by IT and the business as approaches to management evolve.
      • AIOps can reduce the level of effort and improve visibility as configuration items change from the baseline and notifications are automated.
      • Changes can be checked against requests for changes through automated reconciliations, but changes will still need to be investigated where they do not meet expectations.
      • Manual data changes will need to be made regularly and verified.

      "We found that everyone wanted information from the CMDB, but no one wanted to pay to maintain it. People pointed to the configuration management team and said, 'It's their responsibility.'

      Configuration managers, however, cannot own the data because they have no way of knowing if the data is accurate. They can own the processes related to checking accuracy, but not the data itself."
      – Tim Mason, founding director at TRM Associates
      (Excerpt from Viewpoint: Focus on CMDB Leadership)

      Include these roles in your CMDB practice to ensure continued success and continual improvement

      These roles can make up the configuration control board (CCB) to make decisions on major changes to services, data models, processes, or policies. A CCB will be necessary in complex environments.

      Configuration Manager

      This role is focused on ensuring everyone works together to build the CMDB and keep it up to date. The configuration manager is responsible to:

      • Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement.
      • Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings.
      • Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions.
      • Audit data quality to ensure it is valid, is current, and meets defined standards.
      • Evaluate and recommend tools to support processes, data collection, and integrations.
      • Ensure configuration management processes interface with all other service and business management functions to meet use cases.
      • Report on configuration management performance and take appropriate action on process adherence and quality issues.

      Configuration Librarian

      This role is most important where manual data entry is prevalent and where many nonstandard configurations are in place. The librarian role is often held by the tool administrator. The librarian focuses specifically on data within the CMDB, including:

      • Manual updates to configuration data.
      • CMDB data verification on a regular schedule.
      • Processing ad hoc requests for data.

      Product/Service/Technical Owners

      The product or technical owner will validate information is correctly updating and reflects the existing data requirements as new systems are provisioned or as existing systems change.

      Interfacing Practice Owners

      All practice owners, such as change manager, incident manager, or problem manager, must work with the configuration team to ensure data is usable for each of the use cases they are responsible for.

      Download the Configuration Manager job description

      Assign configuration management responsibilities and accountabilities

      Align authority and accountability.

      • A RACI exercise will help you discuss and document accountability and responsibility for critical configuration management activities.
      • When responsibility and accountability are not well documented, it's often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your configuration management procedures.

      Responsible: The person who actually gets the job done.
      Different roles may be responsible for different aspects of the activity relevant to their role.

      Accountable: The one role accountable for the activity (in terms of completion, quality, cost, etc.)
      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      Consulted: Those who need the opportunity to provide meaningful input at certain points in the activity; typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you'll add to a process.

      Informed: Those who receive information regarding the task but do not need to provide feedback.
      Information might relate to process execution, changes, or quality.

      Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Determine what roles will be in place in your organization and who will fulfill them, and create your RACI chart to reflect what makes sense for your organization. Additional roles may be involved where there is complexity.

      R = responsible, A = accountable, C = consulted, I = informed CCB Configuration Manager Configuration Librarian Technical Owner(s) Interfacing Practice Owners Tool Administrator
      Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement. A R
      Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings. A R
      Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions. A R
      Audit data quality to ensure it is valid, is current, and meets defined standards. A,R
      Evaluate and recommend tools to support processes, data collection, and integrations. A,R
      Ensure configuration management processes interface with all other service and business management functions to meet use cases. A
      Report on configuration management performance and take appropriate action on process adherence and quality issues. A
      Make manual updates to configuration data. A
      Conduct CMDB data verification on a regular schedule. A
      Process ad hoc requests for data. A
      Enter new systems into the CMDB. A R
      Update CMDB as systems change. A R
      Identify new use cases for CMDB data. R A
      Validate data meets the needs for use cases and quality. R A
      Design reports to meet use cases. R
      Ensure integrations are configured as designed and are functional. R

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Allot 60 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 4.1: Responsibility Matrix. In the RACI chart, review the top row of roles. Smaller organizations may not need a configuration control board, in which case the configuration manager may have more authority.
      2. Modify or expand the process tasks in the left column as needed.
      3. For each role, identify what that person is responsible for, accountable for, consulted on, or informed of. Fill out each column.
      4. Document in the SOP. Schedule a time to share the results with organization leads.
      5. Distribute the chart among all teams in your organization.
      6. Describe additional roles as needed in the documentation.
      7. Add accountabilities and responsibilities for the CCB into the Configuration Control Board Charter.
      8. If appropriate, add auxiliary roles to the Configuration Management Standard Operating Procedures, section 4.2: Configuration Management Auxiliary Role Definitions.

      Notes:

      1. Assign one Accountable for each task.
      2. Have one or more Responsible for each task.
      3. Avoid generic responsibilities such as "team meetings."
      4. Keep your RACI definitions in your documents for quick reference.

      Refer back to the RACI chart when building out the communications plan to ensure accountable and responsible team members are on board and consulted and informed people are aware of all changes.

      Input

      Output

      • Task assignments
      • RACI chart with roles and responsibilities
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures, RACI chart
      • Configuration Control Board Charter, Responsibilities section
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 2

      Configuration Management Data Model

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Data Model
      • Customer-Facing and Supporting Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • CM project manager

      Step 2.1

      Build a framework for CIs and relationships

      Activities

      Document services:

      2.1.1 Define and prioritize your services

      2.1.2 Test configuration items against existing categories

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      This step will walk you through the following aspects of a configuration management system:

      • Data model
      • Configuration items
      • Relationships

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • Project manager

      Making sense of data daily will be key to maintaining it, starting with services

      As CIs are discovered and mapped, they will automatically map to each other based on integrations, APIs, queries, and transactions. However, CIs also need to be mapped to a conceptional model or service to present the service and its many layers in an easily consumable way.

      These services will need to be manually created or imported into the CMDB and manually connected to the application services. Services can be mapped to technical or business services or both.

      If business services reporting has been requested, talk to the business to develop a list of services that will be required. Use terms the business will be expecting and identify which applications and instances will be mapped to those services.

      If IT is using the CMDB to support service usage and reporting, develop the list of IT services and identify which applications and instances will be mapped to those services.

      This image show the relationship between Discoverable and Nondiscoverable CIs. The discoverable CIs are coloured in purple, and the nondiscoverables are blue.

      Work with your stakeholders to ensure catalog items make sense to them

      There isn't a definitive right or wrong way to define catalog items. For example, the business and IT could both reference application servers, but only IT may need to see technical services broken down by specific locations or device types.

      Refer back to your goals and use cases to think through how best to meet those objectives and determine how to categorize your services.

      Define the services that will be the top-level, nondiscoverable services, which will group together the CIs that make up the complete service. Identify which application(s) will connect into the technical service.

      When you are ready to start discovery, this list of services will be connected to the discovered data to organize it in a way that makes sense for how your stakeholders need to see the data.

      While working toward meeting the goals of the first few use cases, you will want to keep the structure simple. Once processes are in place and data is regularly validated, complexities of different service types and names can be integrated into the data.

      This image show the relationship between Discoverable and Nondiscoverable CIs. Both Discoverable and nondiscoverable CIs are blue.

      Application Service(blue); Technical Service(Purple); IT Shared Services(Orange); Billable Services(green); Service Portfolio(red)

      Define the service types to manage within the CMDB to logically group CIs

      Determine which method of service groupings will best serve your audience for your prioritized use cases. This will help to name your service categories. Service types can be added as the CMDB evolves and as the audience changes.

      Application Service

      Technical Service

      IT Shared Services

      Billable Services

      Service Portfolio

      A set of interconnected applications and hosts configured to offer a service to the organization.

      Example: Financial application service, which may include email, web server, application server, databases, and middleware.

      A logical grouping of CIs based on common criteria.

      Example: Toronto web services, which may include several servers, web applications, and databases.

      A logical grouping of IT and business services shared and used across the organization.

      Example: VoIP/phone services or networking or security services.

      A group of services that will be billed out to departments or customers and would require logical groupings to enable invoicing.

      A group of business and technical service offerings with specific performance reporting levels. This may include multiple service levels for different customer audiences for the same service.

      2.1.1 Define and prioritize your services

      Prioritize your starting point. If multiple audiences need to be accommodated, work with one group at a time.

      Timing: will vary depending on number of services, and starting point

      1. Create your list of services, referencing an existing service catalog, business continuity or disaster recovery plan, list of applications, or brainstorming sessions. Use the terminology that makes the most sense for the audience and their reporting requirements.
      2. If this list is already in place, assess for relevance and reduce the list to only those services that will be managed through the CMDB.
      3. Determine what data will be relevant for each service based on the exercises done in 1.1.4 and 1.1.5. For example, if priority was a required attribute for use case data, ensure each service lists the priority of that service.
      4. For each of these, identify the supporting services. These items can come from your technical service catalog or list of systems and software.
      5. Document this table in the Use Cases and Data Worksheet, tab 3: Service Catalog.

      Service Record Example

      Service: Email
      Supporting Services: M365, Authentication Services

      Service Attributes

      Availability: 24/7 (99.999%)
      Priority: Critical
      Users: All
      Used for: Collaboration
      Billable: Departmental
      Support: Unified Support Model, Account # 123456789

      The CMDB will be organized by services and will enable data analysis through multiple categorization schemes

      To extract maximum service management benefit from a CMDB, the highest level of CI type should be a service, as demonstrated below. While it is easier to start at the system or single-asset level, taking the service mapping approach will provide you with a useful and dynamic view of your IT environment as it relates to the services you offer, instead of a static inventory of components.

      Level 1: Services

      • Business Service Offering: A business service is an IT service that supports a business process, or a service that is delivered to business customers. Business service offerings typically are bound by service-level agreements.
      • IT Service Offering: An IT service supports the customer's business processes and is made up of people, processes, and technology. IT service offerings typically are bound by service-level agreements.

      Level 2: Infrastructure CIs

      • IT Component Set: An IT service offering consists of one of more sets of IT components. An IT component set allows you to group or bundle IT components with other components or groupings.
      • IT Component: An IT system is composed of one or more supporting components. Many components are shared between multiple IT systems.

      Level 3: Supporting CIs

      • IT Subcomponent: Any IT asset that is uniquely identifiable and a component of an IT system.
      • IT components can have subcomponents, and those components can have subcomponents, etc.

      Two charts, showing Enterprise Architect Model and Configuration Service Model. Each box represents a different CI.

      Assess your CMDB's standard category offerings against your environment, with a plan to minimize customization

      Standard categorization schemes will allow for easier integration with multiple tools and reporting and improve results if using machine learning to automate categorization. If the CMDB chosen includes structured categories, use that as your starting point and focus only on gaps that are not addressed for CIs unique to your environment.

      There is an important distinction between a class and a type. This concept is foundational for your configuration data model, so it is important that you understand it.

      • Types are general groupings, and the things within a type will have similarities. For attributes that you want to collect on a type, all children classes and CIs will have those attribute fields.
      • Classes are a more specific grouping within a type. All objects within a class will have specific similarities. You can also use subclasses to further differentiate between CIs.
      • Individual CIs are individual instances of a class or subclass. All objects in a class will have the same attribute fields and behave the same, although the values of their attributes will likely differ.
      • Attributes may be discovered or nondiscoverable and manually added to CIs. The attributes are properties of the CI such as serial number, version, memory, processor speed, or asset tag.

      Use inheritance structures to simplify your configuration data model.

      An example CM Data Model is depicted.

      Assess the list of classes of configuration items against your requirements

      Types are general groupings, and the things within a type will have similarities. Each type will have its own table within the CMDB. Classes within a type are a more specific grouping of configuration items and may include subclasses.

      Review your vendor's CMDB documentation. Find the list of CI types or classes. Most CMDBs will have a default set of classes, like this standard list. If you need to build your own, use the table below as a starting point. Define anything required for unique classes. Create a list and consult with your installation partner.

      Sample list of classes organized by type

      Types Services Network Hardware Storage Compute App Environment Documents
      Classes
      • Application Service
      • Technical Service
      • IT Shared Service
      • Billable Service
      • Service Portfolio
      • Switch
      • Router
      • Firewall
      • Modem
      • SD-WAN
      • Load Balancer
      • UPS
      • Computer
      • Laptop
      • Server
      • Tablet
      • Database
      • Network-Attached Storage
      • Storage Array Network
      • Blob
      • Operating System
      • Hypervisor
      • Virtual Server
      • Virtual Desktop
      • Appliance
      • Virtual Application
      • Enterprise Application
      • Line of Business Application Software
      • Development
      • Test
      • Production
      • Contract
      • Business Impact Analysis
      • Requirements

      Review relationships to determine which ones will be most appropriate to map your dependencies

      Your CMDB should include multiple relationship types. Determine which ones will be most effective for your environment and ensure everyone is trained on how to use them. As CIs are mapped, verify they are correct and only manually map what is incorrect or not mapping through automation.

      Manually mapping CMDB relationships may be time consuming and prone to error, but where manual mapping needs to take place, ensure the team has a common view of the dependency types available and what is important to map.

      Use automated mapping whenever possible to improve accuracy, provide functional visualizations, and enable dynamic updates as the environment changes.

      Where a dependency maps to external providers, determine where it makes sense to discover and map externally provided CIs.

      • Only connect where there is value in mapping to vendor-owned systems.
      • Only connect where data and connections can be trusted and verified.

      Most common dependency mapping types

      A list of the most common dependency mapping types.

      2.1.2 Test configuration items against existing categories

      Time to complete: 1-2 hours

      1. Select a service to test.
      2. Identify the various components that make up the service, focusing on configuration items, not attributes
      3. Categorize configuration items against types and classes in the default settings of the CMDB.
      4. Using the default relationships within the CMDB, identify the relationships between the configuration items.
      5. Identify types, classes, and relationships that do not fit within the default settings. Determine if there are common terms for these items or determine most appropriate name.
      6. Validate these exceptions with the publisher.
      7. Document exceptions in the Configuration Management Standard Operating Procedures, Appendix 2: Types and Classes of Configuration Items
      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of categories to add to the CMDB solution.
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      A charter will set the tone for meetings, ensure purpose is defined and meeting cadence is set for regular reviews.

      1. Open the Configuration Control Board Charter. Review the document and modify as appropriate for your CCB. This will include:
        • Purpose and mandate of the committee – Reference objectives from the project charter.
        • Team composition – Determine the right mix of team members. A team of six to ten people can provide a good balance between having a variety of opinions and getting work done.
        • Voting option – Determine the right quorum to approve changes.
        • Responsibilities – List responsibilities, starting with RACI chart items.
        • Authority – Define the control board's span of control.
        • Governing laws and regulations – List any regulatory requirements that will need to be met to satisfy your auditors.
        • Meeting preparation – Set expectations to ensure meetings are productive.
      2. Distribute the charter to CCB members.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Control Board Charter
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Assess the default list of statuses for each state

      Align this list with your CMDB

      Minimize the number of customizations that will make it difficult to update the platform.

      1. Review the default status list within the tool.
      2. Identify which statuses will be most used. Write a definition for each status.
      3. Update this list as you update process documentation in Step 3.1. After initial implementation, this list should only be modified through change enablement.
      4. Record this list of statuses in the Configuration Management Standard Operating Procedures, Appendix 4: Statuses
      State Status Description
      Preparation Ordered Waiting delivery from the vendor
      In Planning Being created
      Received Vendor has delivered the item, but it is not ready for deployment
      Production In Stock Available to be deployed
      In Use Deployed
      On Loan Deployed to a user on a temporary basis
      For Removal Planning to be phased out but still deployed to an end user
      Offline In Transit Moving to a new location
      Under Maintenance Temporarily offline while a patch or change is applied
      Removed Decommissioned Item has been retired and is no longer in production
      Disposed Item has been destroyed and we are no longer in possession of it
      Lost Item has been lost
      Stolen Item has been stolen

      Step 2.2

      Document statuses, attributes, and data sources

      Activities

      2.2.1 Follow the packet and map out the in-scope services and data centers

      2.2.2 Build data model diagrams

      2.2.3 Determine access rights for your data

      This step will walk you through the following aspects of a configuration management system:

      • Statuses
      • Attributes for each class of CI

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Outcomes of this step

      • Framework for approaching CI statuses
      • Attributes for each class of CI
      • Data sources for those attributes

      Service mapping approaches

      As you start thinking about dependency mapping, it's important to understand the different methods and how they work, as well as your CMDB's capabilities. These approaches may be all in the same tool, or the tool may only have the top-down options.

      Top down, most common

      Pattern-based

      Most common option, which includes indicators of connections such as code, access rights, scripting, host discovery, and APIs.

      Start with pattern-based, then turn on traffic-based for more detail. This combination will provide the most accuracy.

      Traffic-based

      Map against traffic patterns involving connection rules to get more granular than pattern-based.

      Traffic-based can add a lot of overhead with extraneous data, so you may not want to run it continuously.

      Tag-based

      Primarily used for cloud, containers, and virtual machines and will attach the cloud licenses to their dependent services and any related CIs.

      Tags work well with cloud but will not have the same hierarchical view as on-premises dependency mapping.

      Machine learning

      Machine learning will look for patterns in the traffic-based connections, match CIs to categories and help organize the data.

      Machine learning (ML) may not be in every solution, but if you have it, use it. ML will provide many suggestions to make the life of the data manager easier.

      Model hierarchy

      Automated data mapping will be helpful, but it won't be foolproof. It's critical to understand the data model to validate and map nondiscoverable CIs correctly.

      The framework consists of the business, enterprise, application, and implementation layers.

      The business layer encodes real-world business concepts via the conceptual model.

      The enterprise layer defines all enterprise data assets' details and their relationships.

      The application layer defines the data structures as used by a specific application.

      The implementation layer defines the data models and artifacts for use by software tools.

      An example of Model Hierarchy is depicted.

      Learn how to create data models with Info-Tech's blueprint Create and Manage Enterprise Data Models

      2.2.1 Follow the packet and map out the in-scope services and data centers

      Reference your network topology and architecture diagrams.

      Allot 1 hour for this activity.

      1. Start with a single service that is well understood and documented.
      2. Identify the technical components (hardware and applications) that make up the service.
      3. Determine if there is a need to further break down services into logical service groupings. For example, the email service to the right is broken down into authentication and mail flow.
      4. If you don't have a network diagram to follow, create a simple one to identify workflows within the service and components the service uses.
      5. Record the apps and underlying components in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      This information will be used for CM project planning and validating the contents of the CMDB.

      an example of a Customer-facing service is shown, for Email sample topology.

      Download the Configuration Management Diagram Template Library to see an example.

      Build your configuration data model

      Rely on out-of-the-box functionality where possible and keep a narrow focus in the early implementation stages.

      1. If you have an enterprise architecture, then your configuration management data model should align with it.
      2. Keep a narrow focus in the early implementation stages. Don't fill up your CMDB until you are ready to validate and fix the data.
      3. Rely on out-of-the-box (OOTB) functionality where possible. If your configuration management database (CMDB) and platform do not have a data model OOTB, then rely on a publicly available data model.
      4. Map your business or IT service offering to the first few layers.

      Once this is built out in the system, you can let the automated dependency mapping take over, but you will still need to validate the accuracy of the automated mapping and investigate anything that is incorrect.

      Sample Configuration Data Model

      Every box represents a CI, and every line represents a relationship

      A sample configuration Data model is shown.

      Example: Data model and CMDB visualization

      Once the data model is entered into the CMDB, it will provide a more dynamic and complex view, including CIs shared with other services.

      An example of a Data Model Exercise

      CMDB View

      An example of a CMDB View of the Data Model Exercise

      2.2.2 Build data model diagrams

      Visualize the expected CI classes and relationships.

      Allot 45 minutes.

      1. Identify the different data model views you need. Use multiple diagrams to keep the information simple to read and understand. Common diagrams include:
        1. Network level: Outline expected CI classes and relationships at the network level.
        2. Application level: Outline the expected components and relationships that make up an application.
        3. Services level: Outline how business capability CIs and service CIs relate to each other and to other types of CIs.
      1. Use boxes to represent CI classes.
      2. Use lines to represent relationships. Include details such as:
        1. Relationship name: Write this name on the arrow.
        2. Direction: Have an arrow point to each child.

      Review samples in Configuration Management Diagram Template Library.
      Record these diagrams in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of additions of categories to add to the CMDB solution.
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Download the Configuration Management Diagram Template Library to see examples.

      Determine governance for data security, access, and validation

      Align CMDB access to the organization's access control policy to maintain authorized and secure access for legitimate staff performing their role.

      Data User Type Access Role
      Data consumers
      • View-only access
      • Will need to view and use the data but will not need to make modifications to it
      • Service desk
      • Change manager
      • Major incident manager
      • Finance
      CMDB owner
      • Read/write access with the ability to update and validate data as needed
      • Configuration manager
      Domain owner
      • Read/write access for specific domains
      • Data owner within their domain, which includes validating that data is in the database and that it is correctly categorized.
      • Enterprise architect
      • Application owner
      Data provider
      • Read/write access for specific domains
      • Ensures automated data has been added and adds nondiscoverable assets and attributes as needed
      • Server operations
      • Database management
      • Network teams
      CMDB administrator
      • View-only access for data
      • Will need to have access for modifying the structure of the product, including adding fields, as determined by the CCB
      • ITSM tool administrator

      2.2.3 Determine access rights for your data

      Allot 30 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 5: Access Rights.
      2. Review the various roles from an access perspective.
        1. Who needs read-only access?
        2. Who needs read/write access?
        3. Should there be restrictions on who can delete data?
      1. Fill in the chart and communicate this to your CMDB installation vendor or your CMDB administrator.
      Input

      Output

      • Task assignments
      • Access rights and roles
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 3

      Configuration Record Updates

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • ITSM Practices and Workflows
      • Discovery and Dependency Mapping Tools
      • Auditing and Data Validation Practices

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • IT audit

      Harness Service Configuration Management Superpowers

      Step 3.1

      Keep CIs and relationships up to date through lifecycle process integrations

      Activities

      3.1.1 Define processes to bring new services into the CMDB

      3.1.2 Determine when each type of CI will be created in the CMDB

      3.1.3 Identify when each type of CI will be retired in the CMDB

      3.1.4 Record when and how attributes will change

      3.1.5 Institute configuration control and configuration baselines

      This step will walk you through the following aspects of a configuration management system:

      1. ITSM Practices and Workflows
      2. Discovery and Dependency Mapping Tools

      This phase involves the following participants:

      1. IT service owners
      2. Enterprise architects
      3. Practice owners and managers
      4. SCM practice manager
      5. Project manager

      Outcomes of this step

      • List of action items for updating interfacing practices and processes
      • Identification of where configuration records will be manually updated

      Incorporate CMDB updates into IT operations

      Determine which processes will prompt changes to the CMDB data

      Onboard new services - Offboard Redundant Services. Onboard new CIs - Offboard Redundant CIs; Maintain CIs - Update Attributes.

      Change enablement

      Identify which process are involved in each stage of data input, maintenance, and removal to build out a process for each scenario.

      Project management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Deployment management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Service management

      Formalize the process for adding new services to the CMDB

      As new services and products are introduced into the environment, you can improve your ability to correctly cost the service, design integrations, and ensure all operational capabilities are in place, such as data backup and business continuity plans.
      In addition, attributes such as service-level agreements (SLAs), availability requirements, and product, technical, and business owners should be documented as soon as those new systems are made live.

      • Introduce the technical team and CCB to the product early to ensure the service record is created before deployment and to quickly map the services once they are moved into the production environment.
      • Engage with project managers or business analysts to define the process to include security and technical reviews early.
      • Engage with the security and technical reviewers to start documenting the service as soon as it is approved.
      • Determine which practices will be involved in the creation and approval of new services and formalize the process to streamline entry of the new service, onboarding corresponding CIs and mapping dependencies.

      an example of the review and approval process for new service or products is shown.

      3.1.1 Define processes to bring new services into the CMDB

      Start with the most frequent intake methods, and if needed, use this opportunity to streamline the process.

      1. Discuss the methods for new services to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of services in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete the Configuration Management Standard Operating Procedures, section 8.1: Introduce New Service and Data Model.

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Identify scenarios where CIs are added and removed in the configuration management database

      New CIs may be introduced with new services or may be introduced and removed as part of asset refreshes or through service restoration in incident management. Updates may be done by your own services team or a managed services provider.
      Determine the various ways the CIs may be changed and test with various CI types.
      Review attributes such as SLAs, availability requirements, and product, technical, and business owners to determine if changes are required.

      • Identify what will be updated automatically or manually. Automation could include discovery and dependency mapping or synchronization with AMDB or AIOps tools.
      • Engage with relevant program managers to define and validate processes.
      • Identify control points and review audit requirements.

      An example of New or refresh CI from Procurement.

      Info-Tech Insight

      Data deemed no longer current may be archived or deleted. Retained data may be used for tracing lifecycle changes when troubleshooting or meeting audit obligations. Determine what types of CIs and use cases require archived data to meet data retention policies. If none do, deletion of old data may be appropriate.

      3.1.2 Identify when each type of CI will be created in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for new CIs to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete Configuration Management Standard Operating Procedures, section 8.2: Introduce New Configuration Items to the CMDB

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Retirement processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      3.1.3 Identify when each type of CI will be retired in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for CIs to be removed from the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the retirement of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Discuss data retention. How long will retired information need to be archived? What are the potential scenarios where legacy information may be needed for analysis?
      7. Complete the Configuration Management Standard Operating Procedures, section 8.4: Retire and Archive Configuration Records.

      Possible retirement scenarios:

      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Determine appropriate actions for detecting new or changed CIs through discovery

      Automated detection will provide the most efficient way of recording planned changes to CIs as well as detected unplanned changes. Check with the tool to determine what reports or notifications are available for the configuration management process and define what actions will be appropriate.

      As new CIs are detected, identify the process by which they should have been introduced into configuration management and compare against those records. If your CMDB can automatically check for documentation, this may be easier. Weekly reporting will allow you to catch changes quickly, and alerts on critical CIs could enable faster remediation, if the tool allows for alerting. AIOps could identify, notify of, and process many changes in a highly dynamic environment.

      Type of Change

      Impacted Process

      Validation

      Findings

      Actions

      Configuration change to networking equipment or software

      Change management

      Check for request for change

      No RFC

      Add to CAB agenda, notify technical owner

      Configuration change to end-user device or software

      Asset management

      Check for service ticket

      No ticket

      Escalate to asset agenda, notify service manager

      New assets coming into service

      Security incident and event management

      Check for SIEM integration

      No SIEM integration

      Notify security operations team to investigate

      The configuration manager may not have authority to act but can inform the process owners of unauthorized changes for further action. Once the notifications are forwarded to the appropriate process owner, the configuration manager will note the escalation and follow up on data corrections as deemed appropriate by the associated process owner.

      3.1.4 Record when and how attributes will change

      These lists will help with configuration control plans and your implementation roadmap.

      1. List each attribute that will change in that CI type's life.
      2. Write all the times that each attribute will change. Identify:
        1. The name of the workflow, service request, process, or practice that modifies the attribute.
        2. Whether the update is made automatically or manually.
        3. The role or tool that updates the CMDB.
      1. Update the relevant process or procedure documentation. Explicitly identify when the configuration records are updated.

      Document these tables in Configuration Management Standard Operation Procedures, Section 8.7: Practices That Modify CIs.

      Network Equipment
      Attributes

      Practices That Modify This Attribute

      Status
      • Infra Deployment (updated manually by Network Engineering)
      • Change Enablement (updated manually by CAB or Network Engineering)
      Assigned User
      • IT Employee Offboarding or Role Change (updated manually by Network Engineering)
      Version
      • Patch Deployment (updated automatically by SolarWinds)
      End-User Computers
      Attributes
      Practices That Modify This Attribute
      Status
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Assigned User
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Version
      • Patch Deployment (updated automatically by ConfigMgr)

      Institute configuration control and configuration baselines where appropriate

      A baseline enables an assessment of one or more systems against the desired state and is useful for troubleshooting incidents or problems and validating changes and security settings.

      Baselines may be used by enterprise architects and system engineers for planning purposes, by developers to test their solution against production copies, by technicians to assess configuration drift that may be causing performance issues, and by change managers to assess and verify the configuration meets the target design.

      Configuration baselines are a snapshot of configuration records, displaying attributes and first-level relationships of the CIs. Standard configurations may be integral to the success of automated workflows, deployments, upgrades, and integrations, as well as prevention of security events. Comparing current CIs against their baselines will identify configuration drift, which could cause a variety of incidents. Configuration baselines are updated through change management processes.
      Configuration baselines can be used for a variety of use cases:

      • Version control – Management of software and hardware versions, https://dj5l3kginpy6f.cloudfront.net/blueprints/harness-configuration-management-superpowers-phases-1-4/builds, and releases.
      • Access control – Management of access to facilities, storage areas, and the CMS.
      • Deployment control – Take a baseline of CIs before performing a release so you can use this to check against actual deployment.
      • Identify accidental changes Everyone makes mistakes. If someone installs software on the wrong server or accidentally drops a table in a database, the CMS can alert IT of the unauthorized change (if the CI is included in configuration control).

      Info-Tech Insight

      Determine the appropriate method for evaluating and approving changes to baselines. Delegating this to the CCB every time may reduce agility, depending on volume. Discuss in CCB meetings.

      A decision tree for deploying requested changes.

      3.1.5 Institute configuration control and configuration baselines where appropriate

      Only baseline CIs and relationships that you want to control through change enablement.

      1. Determine criteria for capturing configuration baselines, including CI type, event, or processes.
      2. Identify who will use baselines and how they will use the data. Identify their needs.
      3. Identify CIs that will be out of scope and not have baselines created.
      4. Document requirements in the SOP.
      5. Ensure appropriate team members have training on how to create and capture baselines in the CMDB.
      6. Document in the Configuration Management Standard Operating Procedures, section 8.5: Establish and Maintain Configuration Baselines.
      Process Criteria Systems
      Change Enablement & Deployment All high-risk changes must have the baseline captured with version number to revert to stable version in the event of an unsuccessful change
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Security Identify when configuration drift may impact risk mitigation strategies
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Step 3.2

      Validate data within the CMDB

      Activities

      3.2.1 Build an audit plan and checklist

      This step will walk you through the following aspects of a configuration management system:

      • Data validation and audit

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager
      • IT audit

      Outcomes of this step

      • Updates to processes for data validation
      • Plan for auditing and validating the data in the CMDB

      Audit and validate the CMDB

      Review the performance of the supporting technologies and processes to validate the accuracy of the CMDB.

      A screenshot of the CM Audit Plan.

      CM Audit Plan

      • CM policies
      • CM processes and procedures
      • Interfacing processes
      • Content within the CMDB

      "If the data in your CMDB isn't accurate, then it's worthless. If it's wrong or inaccurate, it's going to drive the wrong decisions. It's going to make IT worse, not better."
      – Valence Howden, Research Director, Info-Tech Research Group

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      Build auditing and validation of processes whenever possible

      When technicians and analysts are working on a system, they should check to make sure the data about that system is correct. When they're working in the CMDB, they should check that the data they're working with is correct.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Identify where processes break down and data is incorrect

      Once process stops working, data becomes less accurate and people find workarounds to solve their own data needs.

      Data within the CMDB often becomes incorrect or incomplete where human work breaks down

      • Investigate processes that are performed manually, including data entry.
      • Investigate if the process executors are performing these processes uniformly.
      • Determine if there are opportunities to automate or provide additional training.
      • Select a sample of the corresponding data in the CMS. Verify if the data is correct.

      Non-CCB personnel may not be completing processes fully or consistently

      • Identify where data in the CMS needs to be updated.
      • Identify whether the process practitioners are uniformly updating the CMS.
      • Discuss options for improving the process and driving consistency for data that will benefit the whole organization.

      Ensure that the data entered in the CMDB is correct

      • Confirm that there is no data duplication. Data duplication is very common when there are multiple discovery tools in your environment. Confirm that you have set up your tools properly to avoid duplication.
      • Build a process to respond to baseline divergence when people make changes without following change processes and when updates alter settings.
      • Audit the system for accuracy and completeness.

      3.2.1 Build an audit plan and checklist

      Use the audit to identify areas where processes are breaking down.

      Audits present you with the ability to address these pain points before they have greater negative impact.

      1. Identify which regulatory requirements and/or auditing bodies will be relevant to audit processes or findings.
      2. Determine frequency of practice audits and how they relate to internal audits or external audits.
      3. Determine audit scope, including requirements for data spot checks.
      4. Determine who will be responsible for conducting audits and validate this is consistent with the RACI chart.
      5. Record audit procedures in the Configuration Management Standard Operating Procedures section 8.6: Verify and Review the Quality of Information Through Auditing.
      6. Review the Configuration Management Audit and Validation Checklist and modify to suit your needs.

      Download the Configuration Management Audit and Validation Checklist

      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Phase 4

      Service Configuration Roadmap

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspect of a configuration management system:
      Roadmap
      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Harness Service Configuration Management Superpowers

      Step 4.1

      Define measures of success

      Activities

      4.1.1 Identify key metrics to define configuration management success
      4.1.2 Brainstorm and record desired reports, dashboards, and analytics
      4.1.3 Build a configuration management policy

      This phase will walk you through the following aspects of a configuration management system:

      • Metrics
      • Policy

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      The value of metrics can be found in IT efficiency increases

      When determining metrics for configuration management, be sure to separate metrics needed to gauge configuration management success and those that will use data from the CMDB to provide metrics on the success of other practices.

      • Metrics provide accurate indicators for IT and business decisions.
      • Metrics help you identify IT efficiencies and problems and solve issues before they become more serious.
      • Active metrics tracking makes root cause analysis of issues much easier.
      • Proper application of metrics helps IT services identification and prioritization.
      • Operational risks can be prevented by identifying and implementing metrics.
      • Metrics analysis increases the confidence of the executive team and ensures that IT is working well.

      A funnel is shown. The output is IT Performance. The inputs are: Service Desk Metrics; Incident Metrics; Asset Mgmt. Metrics; Release Mgmt. Metrics; Change Mgmt. Metrics; Infra. Metrics

      4.1.1 Identify key metrics to define configuration management success

      Determine what metrics are specifically related to the practice and how and when metrics will be accessed.

      Success factors

      Key metrics

      Source

      Product and service configuration data is relevant

      • Stakeholder satisfaction with data access, accuracy, and usability
      • Stakeholder satisfaction with service configuration management interface, procedures, and reports

      Stakeholder discussions

      • Number of bad decisions made due to incorrect or insufficient data
      • Impact of bad decisions made due to incorrect or insufficient data

      Process owner discussions

      • Number and impact of data identified as incorrect
      • % of CMDB data verified over the period

      CMDB

      Cost and effort are continually optimized

      • Effort devoted to service configuration management
      • Cost of tools directly related to the process

      Resource management or scheduling

      ERP

      Progress reporting

      • Communication execution
      • Process
      • Communications and feedback

      Communications team and stakeholder discussions

      Data – How many products are in the CMDB and are fully and accurately discovered and mapped?

      CMDB

      Ability to meet milestones on time and with appropriate quality

      Project team

      Document metrics in the Configuration Management Standard Operating Procedures, section 7: Success Metrics

      Use performance metrics to identify areas to improve service management processes using CMDB data

      Metrics can indicate a problem with service management processes but cannot provide a clear path to a solution on their own.

      • The biggest challenge is defining and measuring the process and people side of the equation.
      • Expected performance may also need to be compared to actual performance in planning, budgeting, and improvements.
      • The analysis will need to include critical success factors (CSFs), data collection procedures, office routines, engineering practices, and flow diagrams including workflows and key relationships.
      • External benchmarking may also prove useful in identifying how similar organizations are managing aspects of their infrastructure, processing transactions/requests, or staffing. If using external benchmarking for actual process comparisons, clearly defining your internal processes first will make the data collection process smoother and more informative.

      Info-Tech Insight

      Using a service framework such as ITIL, COBIT, or ISO 20000 may make this job easier, and subscribing to benchmarking partners will provide some of the external data needed for comparison.

      4.1.2 Brainstorm and record desired reports, dashboards, and analytics with related practices

      The project team will use this list as a starting point

      Allot 45 minutes for this discussion.

      1. Create a table for each service or business capability.
        1. Have one column for each way of consuming data: reports, dashboards, and ad hoc analytics.
        2. Have one row for each stakeholder group that will consume the information.
      2. Use the challenges and use cases to brainstorm reports, dashboards, and ad hoc analytic capabilities that each stakeholder group will find useful.
      3. Record these results in your Configuration Management Standard Operating Procedures, section 7: Aligned Processes' Desired Analytical Capabilities.
      Stakeholder Groups Reports Dashboards
      Change Management
      • CI changes executed without an RFC
      • RFCs grouped by service
      • Potential collisions in upcoming changes
      Security
      • Configuration changes that no longer match the baseline
      • New configuration items discovered
      Finance
      • Service-based costs
      • Service consumption by department

      Download the blueprint Take Control of Infrastructure and Operations Metrics to create a complete metrics program.

      Create a configuration management policy and communicate it

      Policies are important documents to provide definitive guidelines and clarity around data collection and use, process adherence, and controls.

      • A configuration management policy will apply to IT as the audience, and participants in the program will largely be technical.
      • Business users will benefit from a great configuration management program but will not participate directly.
      • The policy will include objectives and scope, use of data, security and integrity of data, data models and criteria, and baseline configurations.
      • Several governing regulations and practices may intersect with configuration management, such as ITIL, COBIT, and NIST frameworks, as well as change enablement, quality management, asset management, and more.
      • As the policy is written, review processes to ensure policies and processes are aligned. The policy should enable processes, and it may require modifications if it hinders the collection, security, or use of data required to meet proposed use cases.
      • Once the policy is written and approved, ensure all stakeholders understand the importance, context, and repercussions of the policy.

      The approvals process is about appropriate oversight of the drafted policies. For example:

      • Do the policies satisfy compliance and regulatory requirements?
      • Do the policies work with the corporate culture?
      • Do the policies address the underlying need?

      If the draft is approved:

      • Set the effective date and a review date.
      • Begin communication, training, and implementation.

      Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.

      Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.

      Employees must be informed on where to get help or ask questions and who to request policy exceptions from.

      If the draft is rejected:

      • Acquire feedback and make revisions.
      • Resubmit for approval.

      4.1.3 Build a configuration management policy

      This policy provides the foundation for configuration control.

      Use this template as a starting point.

      The Configuration Management Policy provides the foundation for a configuration control board and the use of configuration baselines.
      Instructions:

      1. Review and modify the policy statements. Ensure that the policy statements reflect your organization and the expectations you wish to set.
      2. If you don't have a CCB: The specified responsibilities can usually be assigned to either the configuration manager or the governing body for change enablement.
      3. Determine if you should apply this policy beyond SCM. As written, this policy may provide a good starting point for practices such as:
        • Secure baseline configuration management
        • Software configuration management

      Two screenshots from the Configuration Management Policy template

      Download the Configuration Management Policy template

      Step 4.2

      Build communications and a roadmap

      Activities

      4.2.1 Build a communications plan
      4.2.2 Identify milestones

      This phase will walk you through the following aspects of a configuration management system:

      • Communications plan
      • Roadmap

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Outcomes of this step

      • Documented expectations around configuration control
      • Roadmap and action items for the SCM project

      Do not discount the benefits of a great communications plan as part of change management

      Many configuration management projects have failed due to lack of organizational commitment and inadequate communications.

      • Start at the top to ensure stakeholder buy-in by verifying alignment and use cases. Without a committed project sponsor who believes in the value of configuration management, it will be difficult to draw the IT team into the vision.
      • Clearly articulate the vision, strategy, and goals to all stakeholders. Ensure the team understands why these changes are happening, why they are happening now, and what outcomes you hope to achieve.
      • Gain support from technical teams by clearly expressing organizational and departmental benefits – they need to know "what's in it for me."
      • Clearly communicate new responsibilities and obligations and put a feedback process in place to hear concerns, mitigate risk, and act on opportunities for improvement. Be prepared to answer questions as this practice is rolled out.
      • Be consistent in your messaging. Mixed messages can easily derail progress.
      • Communicate to the business how these efforts will benefit the organization.
      • Share documents built in this blueprint or workshop with your technical teams to ensure they have a clear picture of the entire configuration management practice.
      • Share your measures and view of success and communicate wins throughout building the practice.

      30%

      When people are truly invested in change, it is 30% more likely to stick.
      McKinsey

      82%

      of CEOs identify organizational change management as a priority.
      D&B Consulting

      6X

      Initiatives with excellent change management are six times more likely to meet objectives than those with poor change management.
      Prosci

      For a more detailed program, see Drive Technology Adoption

      Formulate a communications plan to ensure all stakeholders and impacted staff will be aware of the plan

      Communication is key to success in process adoption and in identifying potential risks and issues with integration with other processes. Engage as often as needed to get the information you need for the project and for adoption.

      Identify Messages

      Distinct information that needs to be sent at various times. Think about:

      • Who will be impacted and how.
      • What the goals are for the project/new process.
      • What the audience needs to know about the new process and how they will interface with each business unit.
      • How people can request configuration data.

      Identify Audiences

      Any person or group who will be the target of the communication. This may include:

      • Project sponsors and stakeholders.
      • IT staff who will be involved in the project.
      • IT staff who will be impacted by the project (i.e. who will benefit from it or have obligations to fulfill because of it).
      • Business sponsors and product owners.

      Document and Track

      Document messaging, medium, and responsibility, working with the communications team to refine messages before executing.

      • Identify where people can send questions and feedback to ensure they have the information they need to make or accept the changes.
      • Document Q&A and share in a central location.

      Determine Timing

      Successful communications plans consider timing of various messages:

      • Advanced high-level notice of improvements for those who need to see action.
      • Advanced detailed notice for those who will be impacted by workload.
      • Advanced notice for who will be impacted (i.e. who will benefit from it or have obligations to fulfill because of it) once the project is ready to be transitioned to daily life.

      Determine Delivery

      Work with your communications team, if you have one, to determine the best medium, such as:

      • Meeting announcement for stakeholders and IT.
      • Newsletter for those less impacted.
      • Intranet announcements: "coming soon!"
      • Demonstrations with vendors or project team.

      4.2.1 Build a communications plan

      The communications team will use this list as a starting point.

      Allot 45 minutes for this discussion.

      Identify stakeholders.

      1. Identify everyone who will be affected by the project and by configuration management.

      Craft key messages tailored to each stakeholder group.

      1. Identify the key messages that must be communicated to each group.

      Finalize the communication plan.

      1. Determine the most appropriate timing for communications with each group to maximize receptivity.
      2. Identify any communication challenges you anticipate and incorporate steps to address them into your communication plan.
      3. Identify multiple methods for getting the messages out (e.g. newsletters, emails, meetings).
      1. Identify how feedback will be collected (i.e. through interviews or surveys) to measure whether the changes were communicated well.
      Audience Message Medium Timing Feedback Mechanism
      Configuration Management Team Communicate all key processes, procedures, policies, roles, and responsibilities In-person meetings and email communications Weekly meetings Informal feedback during weekly meetings
      Input

      Output

      • Discussion
      • Rough draft of messaging for communications team
      MaterialsParticipants
      • Project plan
      • Configuration manager
      • Project sponsor
      • IT director
      • Communications team

      Build a realistic, high-level roadmap including milestones

      Break the work into manageable pieces

      1. Plan to have multiple phases with short-, medium-, and long-term goals/timeframes. Building a CMDB is not easy and should be broken into manageable sections.
      2. Set reasonable milestones. For each phase, document goals to define "done" and ensure they're reasonable for the resources you have available. If working with a vendor, include them in your discussions of what's realistic.
      3. Treat the first phase as a pilot. Focus on items you understand well:
        1. Well-understood user-facing and IT services
        2. High-maturity management and governance practices
        3. Trusted data sources
      4. Capture high-value, high-criticality services early. Depending on the complexity of your systems, you may need to split this phase into multiple phases.

      Document this table in the Configuration Management Project Charter, section 3.0: Milestones

      Timeline/Owner Milestone/Deliverable Details
      First four weeks Milestone: Plan defined and validated with ITSM installation vendor Define processes for intake, maintenance, and retirement.
      Rebecca Roberts Process documentation written, approved, and ready to communicate Review CI categories

      4.2.2 Identify milestones

      Build out a high-level view to inform the project plan

      Open the Configuration Management Project Charter, section 3: Milestones.
      Instructions:

      1. Identify high-level milestones for the implementation of the configuration management program. This may include tool evaluation and implementation, assignment of roles, etc.
      2. Add details to fill out the milestone, keeping to a reasonable level of detail. This may inform vendor discussion or further development of the project plan.
      3. Add target dates to the milestones. Validate they are realistic with the team.
      4. Add notes to the assumptions and constraints section.
      5. Identify risks to the plan.

      Two Screenshots from the Configuration Management Project Charter

      Download the Configuration Management Project Charter

      Workshop Participants

      R = Recommended
      O = Optional

      Participants Day 1 Day 2 Day 3 Day 4
      Configuration Management Strategy CMDB Data Structure Processes Communications & Roadmap
      Morning Afternoon Morning Afternoon Morning Afternoon Morning Afternoon
      Head of IT R O
      Project Sponsor R R O O O O O O
      Infrastructure, Enterprise Apps Leaders R R O O O O O O
      Service Manager R R O O O O O O
      Configuration Manager R R R R R R R R
      Project Manager R R R R R R R R
      Representatives From Network, Compute, Storage, Desktop R R R R R R R R
      Enterprise Architecture R R R R O O O O
      Owner of Change Management/Change Control/Change Enablement R R R R R R R R
      Owner of In-Scope Apps, Use Cases R R R R R R R R
      Asset Manager R R R R R R R R

      Related Info-Tech Research

      Research Contributors and Experts

      Thank you to everyone who contributed to this publication

      Brett Johnson, Senior Consultant, VMware

      Yev Khovrenkov, Senior Consultant, Solvera Solutions

      Larry Marks, Reviewer, ISACA New Jersey

      Darin Ohde, Director of Service Delivery, GreatAmerica Financial Services

      Jim Slick, President/CEO, Slick Cyber Systems

      Emily Walker, Sr. Digital Solution Consultant, ServiceNow

      Valence Howden, Principal Research Director, Info-Tech Research Group

      Allison Kinnaird, Practice Lead, IT Operations, Info-Tech Research Group

      Robert Dang, Principal Research Advisor, Security, Info-Tech Research Group

      Monica Braun, Research Director, IT Finance, Info-Tech Research Group

      Jennifer Perrier, Principal Research Director, IT Finance, Info-Tech Research Group

      Plus 13 anonymous contributors

      Bibliography

      An Introduction to Change Management, Prosci, Nov. 2019.
      BAI10 Manage Configuration Audit Program. ISACA, 2014.
      Bizo, Daniel, et al, "Uptime Institute Global Data Center Survey 2021." Uptime Institute, 1 Sept. 2021.
      Brown, Deborah. "Change Management: Some Statistics." D&B Consulting Inc. May 15, 2014. Accessed June 14, 2016.
      Cabinet Office. ITIL Service Transition. The Stationery Office, 2011.
      "COBIT 2019: Management and Governance Objectives. ISACA, 2018.
      "Configuration Management Assessment." CMStat, n.d. Accessed 5 Oct. 2022.
      "Configuration Management Database Foundation." DMTF, 2018. Accessed 1 Feb. 2021.
      Configuration Management Using COBIT 5. ISACA, 2013.
      "Configuring Service Manager." Product Documentation, Ivanti, 2021. Accessed 9 Feb. 2021.
      "Challenges of Implementing configuration management." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 1." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 2." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 3." CMStat, n.d. Accessed 5 Oct. 2022.
      "CSDM: The Recipe for Success." Data Content Manager, Qualdatrix Ltd. 2022. Web.
      Drogseth, Dennis, et al., 2015, CMDB Systems: Making Change Work in the Age of Cloud and Agile. Morgan Kaufman.
      Ewenstein, B, et al. "Changing Change Management." McKinsey & Company, 1 July 2015. Web.
      Farrell, Karen. "VIEWPOINT: Focus on CMDB Leadership." BMC Software, 1 May 2006. Web.
      "How to Eliminate the No. 1 Cause of Network Downtime." SolarWinds, 4 April 2014. Accessed 9 Feb. 2021.
      "ISO 10007:2017: Quality Management -- Guidelines for Configuration Management." International Organization for Standardization, 2019.
      "IT Operations Management." Product Documentation, ServiceNow, version Quebec, 2021. Accessed 9 Feb. 2021.
      Johnson, Elsbeth. "How to Communicate Clearly During Organizational Change." Harvard Business Review, 13 June 2017. Web.
      Kloeckner, K. et al. Transforming the IT Services Lifecycle with AI Technologies. Springer, 2018.
      Klosterboer, L. Implementing ITIL Configuration Management. IBM Press, 2008.
      Norfolk, D., and S. Lacy. Configuration Management: Expert Guidance for IT Service Managers and Practitioners. BCS Learning & Development Limited, revised ed., Jan. 2014.
      Painarkar, Mandaar. "Overview of the Common Data Model." BMC Documentation, 2015. Accessed 1 Feb. 2021.
      Powers, Larry, and Ketil Been. "The Value of Organizational Change Management." Boxley Group, 2014. Accessed June 14, 2016.
      "Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives." PMI, March 2014. Accessed June 14, 2016.
      "Service Configuration Management, ITIL 4 Practice Guide." AXELOS Global Best Practice, 2020
      "The Guide to Managing Configuration Drift." UpGuard, 2017.

      The Small Enterprise Guide to People and Resource Management

      • Buy Link or Shortcode: {j2store}602|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Train & Develop
      • Parent Category Link: /train-and-develop
      • 52% of small business owners agree that labor quality is their most important problem, and 76% of executives expect the talent market to get even more challenging.
      • The problem? You can't compete on salary, training budgets are slim, you need people skilled in all areas, and even one resignation represents a large part of your workforce.

      Our Advice

      Critical Insight

      • The usual, reactive approach to workforce management is risky:
        • Optimizing tactics helps you hire faster, train more, and negotiate better contracts.
        • But fulfilling needs as they arise costs more, has greater risk of failure, and leaves you unprepared for future needs.
      • In a small enterprise where every resource counts, in which one hire represents 10% of your workforce, it is essential to get it right.

      Impact and Result

      • Workforce planning helps you anticipate future needs.
      • More lead time means better decisions at lower cost.
      • Small Enterprises benefit most, since every resource counts.

      The Small Enterprise Guide to People and Resource Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The Small Enterprise Guide to People and Resource Management Deck – Find out why workforce planning is critical for small enterprises.

      Use this storyboard to lay the foundation of people and resources management practices in your small enterprise IT department.

      • The Small Enterprise Guide to People and Resource Management – Phases 1-3

      2. Workforce Planning Workbook – Use the tool to successfully complete all of the activities required to define and estimate your workforce needs for the future.

      Use these concise exercises to analyze your department’s talent current and future needs and create a skill sourcing strategy to fill the gaps.

      • Workforce Planning Workbook for Small Enterprises

      3. Knowledge Transfer Tools – Use these templates to identify knowledge to be transferred.

      Work through an activity to discover key knowledge held by an employee and create a plan to transfer that knowledge to a successor.

      • IT Knowledge Identification Interview Guide Template
      • IT Knowledge Transfer Plan Template

      4. Development Planning Tools – Use these tools to determine priority development competencies.

      Assess employees’ development needs and draft a development plan that fits with key organizational priorities.

      • IT Competency Library
      • Leadership Competencies Workbook
      • IT Employee Career Development Workbook
      • Individual Competency Development Plan
      • Learning Methods Catalog for IT Employees

      Infographic

      Workshop: The Small Enterprise Guide to People and Resource Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Your Foundations

      The Purpose

      Set project direction and analyze workforce needs.

      Key Benefits Achieved

      Planful needs analysis ensures future workforce supports organizational goals.

      Activities

      1.1 Set workforce planning goals and success metrics.

      1.2 Identify key roles and competency gaps.

      1.3 Conduct a risk analysis to identify future needs.

      1.4 Determine readiness of internal successors.

      Outputs

      Work with the leadership team to:

      Extract key business priorities.

      Set your goals.

      Assess workforce needs.

      2 Create Your Workforce Plan

      The Purpose

      Conduct a skill sourcing analysis, and determine competencies to develop internally.

      Key Benefits Achieved

      A careful analysis ensures skills are being sourced in the most efficient way, and internal development is highly aligned with organizational objectives.

      Activities

      2.1 Determine your skill sourcing route.

      2.2 Determine priority competencies for development.

      Outputs

      Create a workforce plan.

      2.Determine guidelines for employee development.

      3 Plan Knowledge Transfer

      The Purpose

      Discover knowledge to be transferred, and build a transfer plan.

      Key Benefits Achieved

      Ensure key knowledge is not lost in the event of a departure.

      Activities

      3.1 Discover knowledge to be transferred.

      3.2 Identify the optimal knowledge transfer methods.

      3.3 Create a knowledge transfer plan.

      Outputs

      Discover tacit and explicit knowledge.

      Create a knowledge transfer roadmap.

      4 Plan Employee Development

      The Purpose

      Create a development plan for all staff.

      Key Benefits Achieved

      A well-structured development plan helps engage and retain employees while driving organizational objectives.

      Activities

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins.

      4.3 Build manager coaching skills.

      Outputs

      Assess employees.

      Prioritize development objectives.

      Plan development activities.

      Build management skills.

      Further reading

      The Small Enterprise Guide to People and Resource Management

      Quickly start getting the right people, with the right skills, at the right time

      Is this research right for you?

      Research Navigation

      Managing the people in your department is essential, whether you have three employees or 300. Depending on your available time, resources, and current workforce management maturity, you may choose to focus on the overall essentials, or dive deep into particular areas of talent management. Use the questions below to help guide you to the right Info-Tech resources that best align with your current needs.

      Question If you answered "no" If you answered "yes"

      Does your IT department have fewer than 15 employees, and is your organization's revenue less than $25 million (USD)?

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Follow the guidance in this blueprint.

      Does your organization require a more rigorous and customizable approach to workforce management?

      Follow the guidance in this blueprint.

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Analyst Perspective

      Workforce planning is even more important for small enterprises than large organizations.

      It can be tempting to think of workforce planning as a bureaucratic exercise reserved for the largest and most formal of organizations. But workforce planning is never more important than in small enterprises, where every individual accounts for a significant portion of your overall productivity.

      Without workforce planning, organizations find themselves in reactive mode, hiring new staff as the need arises. They often pay a premium for having to fill a position quickly or suffer productivity losses when a critical role goes unexpectedly vacant.

      A workforce plan helps you anticipate these challenges, come up with solutions to mitigate them, and allocate resources for the most impact, which means a greater return on your workforce investment in the long run.

      This blueprint will help you accomplish this quickly and efficiently. It will also provide you with the essential development and knowledge transfer tools to put your plan into action.

      This is a picture of Jane Kouptsova

      Jane Kouptsova
      Senior Research Analyst, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      52% of small business owners agree that labor quality is their most important problem.1

      Almost half of all small businesses face difficulty due to staff turnover.

      76% of executives expect the talent market to get even more challenging.2

      Common Obstacles

      76% of executives expect workforce planning to become a top strategic priority for their organization.2

      But…

      30% of small businesses do not have a formal HR function.3

      Small business leaders are often left at a disadvantage for hiring and retaining the best talent, and they face even more difficulty due to a lack of support from HR.

      Small enterprises must solve the strategic workforce planning problem, but they cannot invest the same time or resources that large enterprises have at their disposal.

      Info-Tech's Approach

      A modular, lightweight approach to workforce planning and talent management, tailored to small enterprises

      Clear activities that guide your team to decisive action

      Founded on your IT strategy, ensuring you have not just good people, but the right people

      Concise yet comprehensive, covering the entire workforce lifecycle from competency planning to development to succession planning and reskilling

      Info-Tech Insight

      Every resource counts. When one hire represents 10% of your workforce, it is essential to get it right.

      1CNBC & SurveyMonkey. 2ADP. 3Clutch.

      Labor quality is small enterprise's biggest challenge

      The key to solving it is strategic workforce planning

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in today's workforce, including pinpointing the human capital needs of the future.

      Linking workforce planning with strategic planning ensures that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      52%

      of small business owners agree that labor quality is their most important problem.1

      30%

      30% of small businesses have no formal HR function.2

      76%

      of senior leaders expect workforce planning to become the top strategic challenge for their organization.3

      1CNBC & SurveyMonkey. 2Clutch. 3ADP.

      Workforce planning matters more for small enterprises

      You know that staffing mistakes can cost your department dearly. But did you know the costs are greater for small enterprises?

      The price of losing an individual goes beyond the cost of hiring a replacement, which can range from 0.5 to 2 times that employee's salary (Gallup, 2019). Additional costs include loss of productivity, business knowledge, and team morale.

      This is a major challenge for large organizations, but the threat is even greater for small enterprises, where a single individual accounts for a large proportion of IT's productivity. Losing one of a team of 10 means 10% of your total output. If that individual was solely responsible for a critical function, your department now faces a significant gap in its capabilities. And the effect on morale is much greater when everyone is on the same close-knit team.

      And the threat continues when the staffing error causes you not to lose a valuable employee, but to hire the wrong one instead. When a single individual makes up a large percentage of your workforce, as happens on small teams, the effects of talent management errors are magnified.

      A group of 100 triangles is shown above a group of 10 triangles. In each group, one triangle is colored orange, and the rest are colored blue.

      Info-Tech Insight

      One bad hire on a team of 100 is a problem. One bad hire on a team of 10 is a disaster.

      This is an image of Info-Tech's small enterprise guide o people and resource management.

      Blueprint pre-step: Determine your starting point

      People and Resource management is essential for any organization. But depending on your needs, you may want to start at different stages of the process. Use this slide as a quick reference for how the activities in this blueprint fit together, how they relate to other workforce management resources, and the best starting point for you.

      Your IT strategy is an essential input to your workforce plan. It defines your destination, while your workforce is the vessel that carries you there. Ensure you have at least an informal strategy for your department before making major workforce changes, or review Info-Tech's guidance on IT strategy.

      This blueprint covers the parts of workforce management that occur to some extent in every organization:

      • Workforce planning
      • Knowledge transfer
      • Development planning

      You may additionally want to seek guidance on contract and vendor management, if you outsource some part of your workload outside your core IT staff.

      Track metrics

      Consider these example metrics for tracking people and resource management success

      Project Outcome Metric Baseline Target
      Reduced training costs Average cost of training (including facilitation, materials, facilities, equipment, etc.) per IT employee
      Reduced number of overtime hours worked Average hours billed at overtime rate per IT employee
      Reduced length of hiring period Average number of days between job ad posting and new hire start date
      Reduced number of project cancellations due to lack of capacity Total of number of projects cancelled per year
      Increased number of projects completed per year (project throughput) Total number of project completions per year
      Greater net recruitment rate Number of new recruits/Number of terminations and departures
      Reduced turnover and replacement costs Total costs associated with replacing an employee, including position coverage cost, training costs, and productivity loss
      Reduced voluntary turnover rate Number of voluntary departures/Total number of employees
      Reduced productivity loss following a departure or termination Team or role performance metrics (varies by role) vs. one year ago

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1:

      Scope requirements, objectives, and your specific challenges.

      Call #2: Assess current workforce needs.

      Call #4: Determine skill sourcing route.

      Call #6:

      Identify knowledge to be transferred.

      Call #8: Draft development goals and select activities.

      Call #3: Explore internal successor readiness.

      Call #5:Set priority development competencies.

      Call #7: Create a knowledge transfer plan.

      Call #9: Build managers' coaching & feedback skills.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 4 to 6 calls over the course of 3 to 4 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      1.Lay Your Foundations 2. Create Your Workforce Plan 3. Plan Knowledge Transfer 3. Plan Employee Development Next Steps and Wrap-Up (offsite)
      Activities

      1.1 Set workforce planning goals and success metrics

      1.2 Identify key roles and competency gaps

      1.3 Conduct a risk analysis to identify future needs

      1.4 Determine readiness of internal successors

      1.5 Determine your skill sourcing route

      1.6 Determine priority competencies for development

      3.1 Discover knowledge to be transferred

      3.2 Identify the optimal knowledge transfer methods

      3.3 Create a knowledge transfer plan

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins

      4.3 Build manager coaching skills

      Outcomes

      Work with the leadership team to:

      1. Extract key business priorities
      2. Set your goals
      3. Assess workforce needs

      Work with the leadership team to:

      1. Create a workforce plan
      2. Determine guidelines for employee development

      Work with staff and managers to:

      1. Discover tacit and explicit knowledge
      2. Create a knowledge transfer roadmap

      Work with staff and managers to:

      1. Assess employees
      2. Prioritize development objectives
      3. Plan development activities
      4. Build management skills

      Info-Tech analysts complete:

      1. Workshop report
      2. Workforce plan record
      3. Action plan

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Each onsite day is structured with group working sessions from 9-11 a.m. and 1:30-3:30 p.m. and includes Open Analyst Timeslots, where our facilitators are available to expand on scheduled activities, capture and compile workshop results, or review additional components from our comprehensive approach.

      This is a calendar showing days 1-4, and times from 8am-5pm

      Phase 1

      Workforce Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Human resource partner (if applicable)

      Additional Resources

      Workforce Planning Workbook for Small Enterprises

      Phase pre-step: Gather resources and participants

      1. Ensure you have an up-to-date IT strategy. If you don't have a formal strategy in place, ensure you are aware of the main organizational objectives for the next 3-5 years. Connect with executive stakeholders if necessary to confirm this information.
        If you are not sure of the organizational direction for this time frame, we recommend you consult Info-Tech's material on IT strategy first, to ensure your workforce plan is fully positioned to deliver value to the organization.
      2. Consult with your IT team and gather any documentation pertaining to current roles and skills. Examples include an org chart, job descriptions, a list of current tasks performed/required, a list of company competencies, and a list of outsourced projects.
      3. Gather the right participants. Most of the decisions in this section will be made by senior leadership, but you will also need input from front-line managers. Ensure they are available on an as-needed basis. If your organization has an HR partner, it can also be helpful to involve them in your workforce planning process.

      Formal workforce planning benefits even small teams

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in your workforce today and plan for the human capital needs of the future.

      Your workforce plan is an extension of your IT strategy, ensuring that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      The smaller the business, the more impact each individual's performance has on the overall success of the organization. When a given role is occupied by a single individual, the organization's performance in that function is determined wholly by one employee. Creating a workforce plan for a small team may seem excessive, but it ensures your organization is not unexpectedly hit with a critical competency gap.

      Right-size your workforce planning process to the size of your enterprise

      Small organizations are 2.2 times more likely to have effective workforce planning processes.1 Be mindful of the opportunities and risks for organizations of your size as you execute the project. How you build your workforce plan will not change drastically based on the size of your organization; however, the scope of your initiative, the size of your team, and the tactics you employ may vary.

      Small Organization

      Medium Organization

      Large Organization

      Project Opportunities

      • Project scope is much more manageable.
      • Communication and planning can be more manageable.
      • Fewer roles can clarify prioritization needs and promotability.
      • Project scope is more manageable.
      • Moderate budget for workforce planning initiatives is needed.
      • Communication and enforcement is easier.
      • Larger candidate pool to pull from.
      • Greater career path options for staff.
      • In-house expertise may be available

      Project Risks

      • Limited resources and time to execute the project.
      • In-house expertise is unlikely.
      • Competencies may be informal and not documented.
      • Limited overlap in responsibilities, resulting in fewer redundancies.
      • Limited staff with experience for the project.
      • Workforce planning may be a lower priority and difficult to generate buy-in for.
      • Requires more staff to manage workforce plan and execute initiatives.
      • Less collective knowledge on staff strengths may make career planning difficult.
      • Geographically dispersed business units make collaboration and communication difficult.

      1 McLean & Company Trends Report 2014

      1.1 Set project outcomes and success metrics

      1-3 hours

      1. As a group, brainstorm key pain points that the IT department experiences due to the lack of a workforce plan. Ask them to consider turnover, retention, training, and talent acquisition.
      2. Discuss any key themes that arise and brainstorm your desired project outcomes. Keep a record of these for future reference and to aid in stakeholder communication.
      3. Break into smaller groups (or if too small, continue as a single group):
        1. For each desired outcome, consider what metrics you could use to track progress. Keep your initial list of pain points in mind as you brainstorm metrics.
        2. Write each of the metric suggestions on a whiteboard and agree to track 3-5 metrics. Set targets for each metric. Consider the effort required to obtain and track the metric, as well as its reliability.
        3. Assign one individual for tracking the selected metrics. Following the meeting, that individual will be responsible for identifying the baseline and targets, and reporting on metrics progress.

      Input

      Output

      • List of workforce data available
      • List of workforce metrics to track the workforce plan's impact

      Materials

      Participants

      • Whiteboard/flip charts
      • Leadership team
      • Human resource partner (if applicable)

      1.2 Identify key roles and competency gaps

      1-3 hours

      1. As a group, identify all strategic, core, and supporting roles by reviewing the organizational chart:
        1. Strategic: What are the roles that must be filled by top performers and cannot be left vacant in order to meet strategic objectives?
        2. Core: What roles are important to drive operational excellence?
        3. Supporting: What roles are required for day-to-day work, but are low risk if the role is vacant for a period of time?
      2. Working individually or in small groups, have managers for each identified role define the level of competence required for the job. Consider factors such as:
        1. The difficulty or criticality of the tasks being performed
        2. The impact on job outcomes
        3. The impact on the performance of other employees
        4. The consequence of errors if the competency is not present
        5. How frequently the competency is used on the job
        6. Whether the competency is required when the job starts or can be learned or acquired on the job within the first six months
      3. Continue working individually and rate the level of proficiency of the current incumbent.
      4. As a group, review the assessment and make any adjustments.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Download the Workforce Planning Workbook for Small Enterprises

      1.2 Identify key roles and competency gaps

      Input Output
      • Org chart, job descriptions, list of current tasks performed/required, list of company competencies
      • List of competency gaps for key roles
      Materials Participants
      • Leadership team
      • Managers

      Conduct a risk-of-departure analysis

      A risk-of-departure analysis helps you plan for future talent needs by identifying which employees are most likely to leave the organization (or their current role).

      A risk analysis takes into account two factors: an employee's risk for departure and the impact of departure:

      Employees are high risk for departure if they:

      • Have specialized or in-demand skills (tenured employees are more likely to have this than recent hires)
      • Are nearing retirement
      • Have expressed career aspirations that extend outside your organization
      • Have hit a career development ceiling at your organization
      • Are disengaged
      • Are actively job searching
      • Are facing performance issues or dismissal OR promotion into a new role

      Employees are low risk for departure if they:

      • Are a new hire or new to their role
      • Are highly engaged
      • Have high potential
      • Are 5-10 years out from retirement

      If you are not sure where an employee stands with respect to leaving the organization, consider having a development conversation with them. In the meantime, consider them at medium risk for departure.

      To estimate the impact of departure, consider:

      • The effect of losing the employee in the near- and medium-term, including:
        • Impact on the organization, department, unit/team and projects
        • The cost (in time, resources, and productivity loss) to replace the individual
        • The readiness of internal successors for the role

      1.3 Conduct a risk analysis to identify future needs

      1-3 hours

      Preparation: Your estimation of whether key employees are at risk of leaving the organization will depend on what you know of them objectively (skills, age), as well as what you learn from development conversations. Ensure you collect all relevant information prior to conducting this activity. You may need to speak with employees' direct managers beforehand or include them in the discussion.

      • As a group, list all your current employees, and using the previous slide for guidance, rank them on two parameters: risk of departure and impact of departure, on a scale of low to high. Record your conclusions in a chart like the one on the right. (For a more in-depth risk assessment, use the "Risk Assessment Results" tab of the Key Roles Succession Planning Tool.)
      • Employees that fall in the "Mitigate" quadrant represent key at-risk roles with at least moderate risk and moderate impact. These are your succession planning priorities. Add these roles to your list of key roles and competency gaps, and include them in your workforce planning analysis.
      • Employees that fall in the "Manage" quadrants represent secondary priorities, which should be looked at if there is capacity after considering the "Mitigate" roles.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      This is an image of the Risk analysis for risk of departure to importance of departure.

      Info-Tech Insight

      Don't be afraid to rank most or all your staff as "high impact of departure." In a small enterprise, every player counts, and you must plan accordingly.

      1.3 Conduct a risk analysis to identify future needs

      Input Output
      • Employee data on competencies, skills, certifications, and performance. Input from managers from informal development conversations.
      • A list of first- and second-priority at-risk roles to carry forward into a succession planning analysis
      Materials Participants
      • Leadership team
      • Managers

      Determine your skill sourcing route

      The characteristics of need steer hiring managers to a preferred choice, while the marketplace analysis will tell you the feasibility of each option.

      Sourcing Options

      Preferred Options

      Final Choice

      four blue circles

      A right facing arrow

      Two blue circles A right facing arrow One blue circle
      State of the Marketplace

      State of the Marketplace

      Urgency: How soon do we need this skill? What is the required time-to-value?

      Criticality: How critical, i.e. core to business goals, are the services or systems that this skill will support?

      Novelty: Is this skill brand new to our workforce?

      Availability: How often, and at what hours, will the skill be needed?

      Durability: For how long will this skill be needed? Just once, or indefinitely for regular operations?

      Scarcity: How popular or desirable is this skill? Do we have a large enough talent pool to draw from? What competition are we facing for top talent?

      Cost: How much will it cost to hire vs. contract vs. outsource vs. train this skill?

      Preparedness: Do we have internal resources available to cultivate this skill in house?

      1.4 Determine your skill sourcing route

      1-3 hours

      1. Identify the preferred sourcing method as a group, starting with the most critical or urgent skill need on your list. Use the characteristics of need to guide your discussion. If more than one option seems adequate, carry several over to the next step.
      2. Consider the marketplace factors applicable to the skill in question and use these to narrow down to one final sourcing decision.
        1. If it is not clear whether a suitable internal candidate is available or ready, refer to the next activity for a readiness assessment.
      3. Be sure to document the rationale supporting your decision. This will ensure the decision can be clearly communicated to any stakeholders, and that you can review on your decision-making process down the line.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Info-Tech Insight

      Consider developing a pool of successors instead of pinning your hopes on just one person. A single pool of successors can be developed for either one key role that has specialized requirements or even multiple key roles that have generic requirements.

      Input

      Output

      • List of current and upcoming skill gaps
      • A sourcing decision for each skill

      Materials

      Participants

      • Leadership team
      • Human resource partner (if applicable)

      1.5 Determine readiness of internal successors

      1-3 hours

      1. As a group, and ensuring you include the candidates' direct managers, identify potential successors for the first role on your list.
      2. Ask how effectively the potential successor would serve in the role today. Review the competencies for the key role in terms of:
        1. Relationship-building skills
        2. Business skills
        3. Technical skills
        4. Industry-specific skills or knowledge
      3. Determine what competencies the succession candidate currently has and what must be learned. Be sure you know whether the candidate is open to a career change. Don't assume – if this is not clear, have a development conversation to ensure everyone is on the same page.
      4. Finally, determine how difficult it will be for the successor to acquire missing skills or knowledge, whether the resources are available to provide the required development, and how long it will take to provide it.
      5. As a group, decide whether training an internal successor is a viable option for the role in question, considering the successor's readiness and the characteristics of need for the role. If a clear successor is not readily apparent, consider:
        1. If the development of the successor can be fast-tracked, or if some requirements can be deprioritized and the successor provided with temporary support from other employees.
        2. If the role in question is being discussed because the current incumbent is preparing to leave, consider negotiating an arrangement that extends the incumbent's employment tenure.
      6. Record the decision and repeat for the next role on your list.

      Info-Tech Insight

      A readiness assessment helps to define not just development needs, but also any risks around the organization's ability to fill a key role.

      Input

      Output

      • List of roles for which you are considering training internally
      • Job descriptions and competency requirements for the roles
      • List of roles for which internal successors are a viable option

      Materials

      Participants

      • Leadership team
      • Candidates' direct managers, if applicable

      Use alternative work arrangements to gain time to prepare successors

      Alternative work arrangements are critical tools that employers can use to achieve a mutually beneficial solution that mitigates the risk of loss associated with key roles.

      Alternative work arrangements not only support employees who want to keep working, but more importantly, they allow the business to retain employees that are needed in key roles who are departure risks due to retirement.

      Viewing retirement as a gradual process can help you slow down skill loss in your organization and ensure you have sufficient time to train successors. Retiring workers are becoming increasingly open to alternative work arrangements. Among employed workers aged 50-75, more than half planned to continue working part-time after retirement.
      Source: Statistics Canada.

      Flexible work options are the most used form of alternative work arrangement

      A bar graph showing the percent of organizations who implemented alternate work arrangement, for Flexible work options; Contract based work; Part time roles; Graduated retirement programs; Part year jobs or job sharing; Increased PTO for employees over a certain age.

      Source: McLean & Company, N=44

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Flexible work options Employees work the same number of hours but have flexibility in when and where they work (e.g. from home, evenings). Employees who work fairly independently with no or few direct reports. Employee may become isolated or disconnected, impeding knowledge transfer methods that require interaction or one-on-one time.
      Contract-based work Working for a defined period of time on a specific project on a non-salaried or non-wage basis. Project-oriented work that requires specialized knowledge or skills. Available work may be sporadic or specific projects more intensive than the employee wants. Knowledge transfer must be built into the contractual arrangement.
      Part-time roles Half days or a certain number of days per week; indefinite with no end date in mind. Employees whose roles can be readily narrowed and upon whom people and critical processes are not dependent. It may be difficult to break a traditionally full-time job down into a part-time role given the size and nature of associated tasks.
      Graduated retirement Retiring employee has a set retirement date, gradually reducing hours worked per week over time. Roles where a successor has been identified and is available to work alongside the incumbent in an overlapping capacity while he or she learns. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Part-year jobs or job sharing Working part of the year and having the rest of the year off, unpaid. Project-oriented work where ongoing external relationships do not need to be maintained. The employee is unavailable for knowledge transfer activities for a large portion of the year. Another risk is that the employee may opt not to return at the end of the extended time off with little notice.
      Increased paid time off Additional vacation days upon reaching a certain age. Best used as recognition or reward for long-term service. This may be a particularly useful retention incentive in organizations that do not offer pension plans. The company may not be able to financially afford to pay for such extensive time off. If the role incumbent is the only one in the role, this may mean crucial work is not being done.
      Altered roles Concentration of a job description on fewer tasks that allows the employee to focus on his or her specific expertise. Roles where a successor has been identified and is available to work alongside the incumbent, with the incumbent's new role highly focused on mentoring. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Phase 2

      Knowledge Transfer

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership/management team
      • Incumbent & successor

      Additional Resources

      IT Knowledge Identification Interview Guide Template

      Knowledge Transfer Plan Template

      Determine your skill sourcing route

      Knowledge transfer plans have three key components that you need to complete for each knowledge source:

      Define what knowledge needs to be transferred

      Each knowledge source has unique information which needs to be transferred. Chances are you don't know what you don't know. The first step is therefore to interview knowledge sources to find out.

      Identify the knowledge receiver

      Depending on who the information is going to, the knowledge transfer tactic you employ will differ. Before deciding on the knowledge receiver and tactic, consider three key factors:

      • How will this knowledge be used in the future?
      • What is the next career step for the knowledge receiver?
      • Are the receiver and the source going to be in the same location?

      Identify which knowledge transfer tactics you will use for each knowledge asset

      Not all tactics are good in every situation. Always keep the "knowledge type" (information, process, skills, and expertise), knowledge sources' engagement level, and the knowledge receiver in mind as you select tactics.

      Don't miss tacit knowledge

      There are two basic types of knowledge: "explicit" and "tacit." Ensure you capture both to get a well-rounded overview of the role.

      Explicit Tacit
      • "What knowledge" – knowledge can be articulated, codified, and easily communicated.
      • Easily explained and captured – documents, memos, speeches, books, manuals, process diagrams, facts, etc.
      • Learn through reading or being told.
      • "How knowledge" – intangible knowledge from an individual's experience that is more from the process of learning, understanding, and applying information (insights, judgments, and intuition).
      • Hard to verbalize, and difficult to capture and quantify.
      • Learn through observation, imitation, and practice.

      Types of explicit knowledge

      Types of tacit knowledge

      Information Process Skills Expertise

      Specialized technical knowledge.

      Unique design capabilities/methods/models.

      Legacy systems, details, passwords.

      Special formulas/algorithms/ techniques/contacts.

      • Specialized research & development processes.
      • Proprietary production processes.
      • Decision-making processes.
      • Legacy systems.
      • Variations from documented processes.
      • Techniques for executing on processes.
      • Relationship management.
      • Competencies built through deliberate practice enabling someone to act effectively.
      • Company history and values.
      • Relationships with key stakeholders.
      • Tips and tricks.
      • Competitor history and differentiators.

      e.g. Knowing the lyrics to a song, building a bike, knowing the alphabet, watching a YouTube video on karate.

      e.g. Playing the piano, riding a bike, reading or speaking a language, earning a black belt in karate.

      Embed your knowledge transfer methods into day-to-day practice

      Multiple methods should be used to transfer as much of a person's knowledge as possible, and mentoring should always be one of them. Select your method according to the following criteria:

      Info-Tech Insight

      The more integrated knowledge transfer is in day-to-day activities, the more likely it is to be successful, and the lower the time cost. This is because real learning is happening at the same time real work is being accomplished.

      Type of Knowledge

      • Tacit knowledge transfer methods are often informal and interactive:
        • Mentoring
        • Multi-generational work teams
        • Networks and communities
        • Job shadowing
      • Explicit knowledge transfer methods tend to be more formal and one way:
        • Formal documentation of processes and best practices
        • Self-published knowledge bases
        • Formal training sessions
        • Formal interviews

      Incumbent's Preference/Successor's Preference

      Ensure you consult the employees, and their direct manager, on the way they are best prepared to teach and learn. Some examples of preferences include:

      1. Prefer traditional classroom learning, augmented with participation, critical reflection, and feedback.
      2. May get bored during formal training sessions and retain more during job shadowing.
      3. Prefer to be self-directed or self-paced, and highly receptive to e-learning and media.
      4. Prefer informal, incidental learning, tend to go immediately to technology or direct access to people. May have a short attention span and be motivated by instant results.
      5. May be uncomfortable with blogs and wikis, but comfortable with SharePoint.

      Cost

      Consider costs beyond the monetary. Some methods require an investment in time (e.g. mentoring), while others require an investment in technology (e.g. knowledge bases).

      The good news is that many supporting technologies may already exist in your organization or can be acquired for free.

      Methods that cost time may be difficult to get underway since employees may feel they don't have the time or must change the way they work.

      2.1 Create a knowledge transfer plan

      1-3 hours

      1. Working together with the current incumbent, brainstorm the key information pertaining to the role that you want to pass on to the successor. Use the IT Knowledge Identification Interview Guide Template to ensure you don't miss anything.
        • Consider key knowledge areas, including:
          • Specialized technical knowledge.
          • Specialized research and development processes.
          • Unique design capabilities/methods/models.
          • Special formulas/algorithms/techniques.
          • Proprietary production processes.
          • Decision-making criteria.
          • Innovative sales methods.
          • Knowledge about key customers.
          • Relationships with key stakeholders.
          • Company history and values.
        • Ask questions of both sources and receivers of knowledge to help determine the best knowledge transfer methods to use.
          • What is the nature of the knowledge? Explicit or tacit?
          • Why is it important to transfer?
          • How will the knowledge be used?
          • What knowledge is critical for success?
          • How will the users find and access it?
          • How will it be maintained and remain relevant and usable?
          • What are the existing knowledge pathways or networks connecting sources to recipients?
      2. Once the knowledge has been identified, use the information on the following slides to decide on the most appropriate methods. Be sure to consult the incumbent and successor on their preferences.
      3. Prioritize your list of knowledge transfer activities. It's important not to try to do too much too quickly. Focus on some quick wins and leverage the success of these initiatives to drive the project forward. Follow these steps as a guide:
        1. Take an inventory of all the tactics and techniques which you plan to employ. Eliminate redundancies where possible.
        2. Start your implementation with your highest risk role or knowledge item, using explicit knowledge transfer tactics. Interviews, use cases, and process mapping will give you some quick wins and will help gain momentum for the project.
        3. Then move forward to other tactics, the majority of which will require training and process design. Pick 1-2 other key tactics you would like to employ and build those out. For tactics that require resources or monetary investment, start with those that can be reused for multiple roles.

      Record your plan in the IT Knowledge Transfer Plan Template.

      Download the IT Knowledge Identification Interview Guide Template

      Download the Knowledge Transfer Plan Template

      Info-Tech Insight

      Wherever possible, ask employees about their personal learning styles. It's likely that a collaborative compromise will have to be struck for knowledge transfer to work well.

      2.1 Create a knowledge transfer plan

      Input

      Output

      • List of roles for which you need to transfer knowledge
      • Prioritized list of knowledge items and chosen transfer method

      Materials

      Participants

      • Leadership team
      • Incumbent
      • Successor

      Not every transfer method is effective for every type of knowledge

      Knowledge Type
      Tactic Explicit Tacit
      Information Process Skills Expertise
      Interviews Very Strong Strong Strong Strong
      Process Mapping Medium Very Strong Very Weak Very Weak
      Use Cases Medium Very Strong Very Weak Very Weak
      Job Shadow Very Weak Medium Very Strong Very Strong
      Peer Assist Strong Medium Very Strong Very Strong
      Action Review Medium Medium Strong Strong
      Mentoring Weak Weak Strong Very Strong
      Transition Workshop Strong Strong Strong Weak
      Storytelling Weak Weak Strong Very Strong
      Job Share Weak Weak Very Strong Very Strong
      Communities of Practice Strong Weak Very Strong Very Strong

      This table shows the relative strengths and weaknesses of each knowledge transfer tactic compared against four different knowledge types.

      Not all techniques are effective for all types of knowledge; it is important to use a healthy mixture of techniques to optimize effectiveness.

      Employees' engagement can impact knowledge transfer effectiveness

      Level of Engagement
      Tactic Disengaged/ Indifferent Almost Engaged - Engaged
      Interviews Yes Yes
      Process Mapping Yes Yes
      Use Cases Yes Yes
      Job Shadow No Yes
      Peer Assist Yes Yes
      Action Review Yes Yes
      Mentoring No Yes
      Transition Workshop Yes Yes
      Storytelling No Yes
      Job Share Maybe Yes
      Communities of Practice Maybe Yes

      When considering which tactics to employ, it's important to consider the knowledge holder's level of engagement. Employees who you would identify as being disengaged may not make good candidates for job shadowing, mentoring, or other tactics where they are required to do additional work or are asked to influence others.

      Knowledge transfer can be controversial for all employees as it can cause feelings of job insecurity. It's essential that motivations for knowledge transfer are communicated effectively.

      Pay particular attention to your communication style with disengaged and indifferent employees, communicate frequently, and tie communication back to what's in it for them.

      Putting disengaged employees in a position where they are mentoring others can be a risk, as their negativity could influence others not to participate, or it could negate the work you're doing to create a positive knowledge sharing culture.

      Employees' engagement can impact knowledge transfer effectiveness

      Effort by Stakeholder

      Tactic

      Business Analyst

      IT Manager

      Knowledge Holder

      Knowledge Receiver

      Interviews

      These tactics require the least amount of effort, especially for organizations that are already using these tactics for a traditional requirements gathering process.

      Medium

      N/A

      Low

      Low

      Process Mapping

      Medium

      N/A

      Low

      Low

      Use Cases

      Medium

      N/A

      Low

      Low

      Job Shadow

      Medium

      Medium

      Medium

      Medium

      Peer Assist

      Medium

      Medium

      Medium

      Medium

      Action Review

      These tactics generally require more involvement from IT management and the BA in tandem for preparation. They will also require ongoing effort for all stakeholders. It's important to gain stakeholder buy-in as it is key for success.

      Low

      Medium

      Medium

      Low

      Mentoring

      Medium

      High

      High

      Medium

      Transition Workshop

      Medium

      Low

      Medium

      Low

      Storytelling

      Medium

      Medium

      Low

      Low

      Job Share

      Medium

      High

      Medium

      Medium

      Communities of Practice

      High

      Medium

      Medium

      Medium

      Phase 3

      Development Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Employees

      Additional Resources

      Effective development planning hinges on robust performance management

      Your performance management framework is rooted in organizational goals and defines what it means to do any given role well.

      Your organization's priority competencies are the knowledge, skills and attributes that enable an employee to do the job well.

      Each individual's development goals are then aimed at building these priority competencies.

      Mission Statement

      To be the world's leading manufacturer and distributor of widgets.

      Business Goal

      To increase annual revenue by 10%.

      IT Department Objective

      To ensure reliable communications infrastructure and efficient support for our sales and development teams.

      Individual Role Objective

      To decrease time to resolution of support requests by 10% while maintaining quality.

      Info-Tech Insight

      Without a performance management framework, your employees cannot align their development with the organization's goals. For detailed guidance, see Info-Tech's blueprint Setting Meaningful Employee Performance Measures.

      What is a competency?

      The term "competency" refers to the collection of knowledge, skills, and attributes an employee requires to do a job well.

      Often organizations have competency frameworks that consist of core, leadership, and functional competencies.

      Core competencies apply to every role in the organization. Typically, they are tied to organizational values and business mission and/or vision.

      Functional competencies are at the department, work group, or job role levels. They are a direct reflection of the function or type of work carried out.

      Leadership competencies generally apply only to people managers in the organization. Typically, they are tied to strategic goals in the short to medium term

      Generic Functional
      • Core
      • Leadership
      • IT
      • Finance
      • Sales
      • HR

      Use the SMART model to make sure goals are reasonable and attainable

      S

      Specific: Be specific about what you want to accomplish. Think about who needs to be involved, what you're trying to accomplish, and when the goal should be met.

      M

      Measurable: Set metrics that will help to determine whether the goal has been reached.

      A

      Achievable: Ensure that you have both the organizational resources and employee capability to accomplish the goal.

      R

      Relevant: Goals must align with broader business, department, and development goals in order to be meaningful.

      T

      Time-bound: Provide a target date to ensure the goal is achievable and provide motivation.

      Example goal:

      "Learn Excel this summer."

      Problems:

      Not specific enough, not measurable enough, nor time bound.

      Alternate SMART goal:

      "Consult with our Excel expert and take the lead on creating an Excel tool in August."

      3.2 Identify target competencies & draft development goals

      1 hour

      Pre-work: Employees should come to the career conversation having done some self-reflection. Use Info-Tech's IT Employee Career Development Workbook to help employees identify their career goals.

      1. Pre-work: Managers should gather any data they have on the employee's current proficiency at key competencies. Potential sources include task-based assessments, performance ratings, supervisor or peer feedback, and informal conversation.

        Prioritize competencies. Using your list of priority organizational competencies, work with your employees to help them identify two to four competencies to focus on developing now and in the future. Use the Individual Competency Development Plan template to document your assessment and prioritize competencies for development. Consider the following questions for guidance:
        1. Which competencies are needed in my current role that I do not have full proficiency in?
        2. Which competencies are related to both my career interests and the organization's priorities?
        3. Which competencies are related to each other and could be developed together or simultaneously?
      2. Draft goals. Ask your employee to create a list of multiple simple goals to develop the competencies they have selected to work on developing over the next year. Identifying multiple goals helps to break development down into manageable chunks. Ensure goals are concrete, for example, if the competency is "communication skills," your development goals could be "presentation skills" and "business writing."
      3. Review goals:
        1. Ask why these areas are important to the employee.
        2. Share your ideas and why it is important that the employee develop in the areas identified.
        3. Ensure that the goals are realistic. They should be stretch goals, but they must be achievable. Use the SMART framework on the previous slide for guidance.

      Info-Tech Insight

      Lack of career development is the top reason employees leave organizations. Development activities need to work for both the organization and the employee's own development, and clearly link to advancing employees' careers either at the organization or beyond.

      Download the IT Employee Career Development Workbook

      Download the Individual Competency Development Plan

      3.2 Identify target competencies & draft development goals

      Input

      Output

      • Employee's career aspirations
      • List of priority organizational competencies
      • Assessment of employee's current proficiency
      • A list of concrete development goals

      Materials

      Participants

      • Employee
      • Direct manager

      Apply a blend of learning methods

      • Info-Tech recommends the 70-20-10 principle for learning and development, which places the greatest emphasis on learning by doing. This experiential learning is then supported by feedback from mentoring, training, and self-reflection.
      • Use the 70-20-10 principle as a guideline – the actual breakdown of your learning methods will need to be tailored to best suit your organization and the employee's goals.

      Spend development time and effort wisely:

      70%

      On providing challenging on-the-job opportunities

      20%

      On establishing opportunities for people to develop learning relationships with others, such as coaching and mentoring

      10%

      On formal learning and training programs

      Internal initiatives are a cost-effective development aid

      Internal Initiative

      What Is It?

      When to Use It

      Special Project

      Assignment outside of the scope of the day-to-day job (e.g. work with another team on a short-term initiative).

      As an opportunity to increase exposure and to expand skills beyond those required for the current job.

      Stretch Assignment

      The same projects that would normally be assigned, but in a shorter time frame or with a more challenging component.

      Employee is consistently meeting targets and you need to see what they're capable of.

      Training Others

      Training new or more junior employees on their position or a specific process.

      Employee wants to expand their role and responsibility and is proficient and positive.

      Team Lead On an Assignment

      Team lead for part of a project or new initiative.

      To prepare an employee for future leadership roles by increasing responsibility and developing basic managerial skills.

      Job Rotation

      A planned placement of employees across various roles in a department or organization for a set period of time.

      Employee is successfully meeting and/or exceeding job expectations in their current role.

      Incorporating a development objective into daily tasks

      What do we mean by incorporating into daily tasks?

      The next time you assign a project to an employee, you should also ask the employee to think about a development goal for the project. Try to link it back to their existing goals or have them document a new goal in their development plan.

      For example: A team of employees always divides their work in the same way. Their goal for their next project could be to change up the division of responsibility so they can learn each other's roles.

      Another example:

      "I'd like you to develop your ability to explain technical terms to a non-technical audience. I'd like you to sit down with the new employee who starts tomorrow and explain how to use all our software, getting them up and running."

      Info-Tech Insight

      Employees often don't realize that they are being developed. They either think they are being recognized for good work or they are resentful of the additional workload.

      You need to tell your employees that the activity you are asking them to do is intended to further their development.

      However, be careful not to sell mundane tasks as development opportunities – this is offensive and detrimental to engagement.

      Establish manager and employee accountability for following up

      Ensure that the employee makes progress in developing prioritized competencies by defining accountabilities:

      Tracking Progress

      Checking In

      Development Meetings

      Coaching & Feedback

      Employee accountability:

      • Employees need to keep track of what they learn.
      • Employees should take the time to reflect on their progress.

      Manager accountability:

      • Managers need to make the time for employees to reflect.

      Employee accountability:

      • Employees need to provide managers with updates and ask for help.

      Manager accountability:

      • Managers need to check in with employees to see if they need additional resources.

      Employee accountability:

      • Employees need to complete assessments again to determine whether they have made progress.

      Manager accountability:

      • Managers should schedule monthly meetings to discuss progress and identify next steps.

      Employee accountability:

      • Employees should ask their manager and colleagues for feedback after development activities.

      Manager accountability:

      • Managers can use both scheduled meetings and informal conversations to provide coaching and feedback to employees.

      3.3 Select development activities and schedule check-ins

      1-3 hours

      Pre-work: Employees should research potential development activities and come prepared with a range of suggestions.

      Pre-work: Managers should investigate options for employee development, such as internal training/practice opportunities for the employee's selected competencies and availability of training budget.

      1. Communicate your findings about internal opportunities and external training allowance to the employee. This can also be done prior to the meeting, to help guide the employee's own research. Address any questions or concerns.
      2. Review the employee's proposed list of activities, and identify priority ones based on:
        1. How effectively they support the development of priority competencies.
        2. How closely they match the employee's original goals.
        3. The learning methods they employ, and whether the chosen activities support a mix of different methods.
        4. The degree to which the employee will have a chance to practice new skills hands-on.
        5. The amount of time the activities require, balanced against the employee's work obligations.
      3. Guide the employee in selecting activities for the short and medium term. Establish an understanding that this list is tentative and subject to ongoing revision during future check-ins.
        1. If in doubt about whether the employee is over-committing, err on the side of fewer activities to start.
      4. Schedule a check-in for one month out to review progress and roadblocks, and to reaffirm priorities.
      5. Check-ins should be repeated regularly, typically once a month.

      Download the Learning Methods Catalog

      Info-Tech Insight

      Adopt a blended learning approach using a variety of techniques to effectively develop competencies. This will reinforce learning and accommodate different learning styles. See Info-Tech's Learning Methods Catalog for a description of popular experiential, relational, and formal learning methods.

      3.3 Select development activities and schedule check-ins

      Input

      Output

      • List of potential development activities (from employee)
      • List of organizational resources (from manager)
      • A selection of feasible development activities
      • Next check-in scheduled

      Materials

      Participants

      • Employee
      • Direct manager

      Tips for tricky conversations about development

      What to do if…

      Employees aren't interested in development:

      • They may have low aspiration for advancement.
      • Remind them about the importance of staying current in their role given increasing job requirements.
      • Explain that skill development will make their job easier and make them more successful at it; sell development as a quick and effective way to learn the skill.
      • Indicate your support and respond to concerns.

      Employees have greater aspiration than capability:

      • Explain that there are a number of skills and capabilities that they need to improve in order to move to the next level. If the specific skills were not discussed during the performance appraisal, do not hesitate to explain the improvements that you require.
      • Inform the employee that you want them to succeed and that by pushing too far and too fast they risk failure, which would not be beneficial to anyone.
      • Reinforce that they need to do their current job well before they can be considered for promotion.

      Employees are offended by your suggestions:

      • Try to understand why they are offended. Before moving forward, clarify whether they disagree with the need for development or the method by which you are recommending they be developed.
      • If it is because you told them they had development needs, then reiterate that this is about helping them to become better and that everyone has areas to develop.
      • If it is about the development method, discuss the different options, including the pros and cons of each.

      Coaching and feedback skills help managers guide employee development

      Coaching and providing feedback are often confused. Managers often believe they are coaching when they are just giving feedback. Learn the difference and apply the right approach for the right situation.

      What is coaching?

      A conversation in which a manager asks questions to guide employees to solve problems themselves.

      Coaching is:

      • Future-focused
      • Collaborative
      • Geared toward growth and development

      What is feedback?

      Information conveyed from the manager to the employee about their performance.

      Feedback is:

      • Past-focused
      • Prescriptive
      • Geared toward behavior and performance

      Info-Tech Insight

      Don't forget to develop your managers! Ensure coaching, feedback, and management skills are part of your management team's development plan.

      Understand the foundations of coaching to provide effective development coaching:

      Knowledge Mindset Relationship
      • Understand what coaching is and how to apply it:
      • Identify when to use coaching, feedback, or other people management practices, and how to switch between them.
      • Know what coaching can and cannot accomplish.
      • When focusing on performance, guide an employee to solve problems related to their work. When focusing on development, guide an employee to reach their own development goals.
      • Adopt a coaching mindset by subscribing to the following beliefs:
      • Employees want to achieve higher performance and have the potential to do so.
      • Employees have a unique and valuable perspective to share of the challenges they face as well as the possible solutions.
      • Employees should be empowered to realize solutions themselves to motivate them in achieving goals.
      • Develop a relationship of trust between managers and employees:
      • Create an environment of psychological safety where employees feel safe to be open and honest.
      • Involve employees in decision making and inform employees often.
      • Invest in employees' success.
      • Give and expect candor.
      • Embrace failure.

      Apply the "4A" behavior-focused coaching model

      Using a model allows every manager, even those with little experience, to apply coaching best practices effectively.

      Actively Listen

      Ask

      Action Plan

      Adapt

      Engage with employees and their message, rather than just hearing their message.

      Key active listening behaviors:

      • Provide your undivided attention.
      • Observe both spoken words and body language.
      • Genuinely try to understand what the employee is saying.
      • Listen to what is being said, then paraphrase back what you heard.

      Ask thoughtful, powerful questions to learn more information and guide employees to uncover opportunities and/or solutions.

      Key asking behaviors:

      • Ask open-ended questions.
      • Ask questions to learn something you didn't already know.
      • Ask for reasoning (the why).
      • Ask "what else?"

      Hold employees and managers accountable for progress and results.

      During check-ins, review each development goal to ensure employees are meeting their targets.

      Key action planning behaviors:

      Adapt to individual employees and situations.

      Key adapting behaviors:

      • Recognize employees' unique characteristics.
      • Appreciate the situation at hand and change your behavior and communication in order to best support the individual employee.

      Use the following questions to have meaningful coaching conversations

      Opening Questions

      • What's on your mind?
      • Do you feel you've had a good week/month?
      • What is the ideal situation?
      • What else?

      Problem-Identifying Questions

      • What is most important here?
      • What is the challenge here for you?
      • What is the real challenge here for you?
      • What is getting in the way of you achieving your goal?

      Problem-Solving Questions

      • What are some of the options available?
      • What have you already tried to solve this problem? What worked? What didn't work?
      • Have you considered all the possibilities?
      • How can I help?

      Next-Steps Questions

      • What do you need to do, and when, to achieve your goal?
      • What resources are there to help you achieve your goal? This includes people, tools, or even resources outside our organization.
      • How will you know when you have achieved your goal? What does success look like?

      The purpose of asking questions is to guide the conversation and learn something you didn't already know. Choose the questions you ask based on the flow of the conversation and on what information you would like to uncover. Approach the answers you get with an open mind.

      Info-Tech Insight

      Avoid the trap of "hidden agenda" questions, whose real purpose is to offer your own advice.

      Use the following approach to give effective feedback

      Provide the feedback in a timely manner

      • Plan the message you want to convey.
      • Provide feedback "just-in-time."
      • Ensure recipient is not preoccupied.
      • Try to balance the feedback; refer to successful as well as unsuccessful behavior.

      Communicate clearly, using specific examples and alternative behaviors

      • Feedback must be honest and helpful.
      • Be specific and give a recent example.
      • Be descriptive, not evaluative.
      • Relate feedback to behaviors that can be changed.
      • Give an alternative positive behavior.

      Confirm their agreement and understanding

      • Solicit their thoughts on the feedback.
      • Clarify if not understood; try another example.
      • Confirm recipient understands and accepts the feedback.

      Manager skill is crucial to employee development

      Development is a two-way street. This means that while employees are responsible for putting in the work, managers must enable their development with support and guidance. The latter is a skill, which managers must consciously cultivate.

      For more in-depth management skills development, see the Info-Tech "Build a Better Manager" training resources:

      Bibliography

      Anderson, Kelsie. "Is Your IT Department Prepared for the 4 Biggest Challenges of 2017?" 14 June 2017.
      Atkinson, Carol, and Peter Sandiford. "An Exploration of Older Worker Flexible Working Arrangements in Smaller Firms." Human Resource Management Journal, vol. 26, no. 1, 2016, pp. 12–28. Wiley Online Library.
      BasuMallick, Chiradeep. "Top 8 Best Practices for Employee Cross-Training." Spiceworks, 15 June 2020.
      Birol, Andy. "4 Ways You Can Succeed With a Staff That 'Wears Multiple Hats.'" The Business Journals, 26 Nov. 2013.
      Bleich, Corey. "6 Major Benefits To Cross-Training Employees." EdgePoint Learning, 5 Dec. 2018.
      Cancialosi, Chris. "Cross-Training: Your Best Defense Against Indispensable Employees." Forbes, 15 Sept. 2014.
      Cappelli, Peter, and Anna Tavis. "HR Goes Agile." Harvard Business Review, Mar. 2018.
      Chung, Kai Li, and Norma D'Annunzio-Green. "Talent Management Practices of SMEs in the Hospitality Sector: An Entrepreneurial Owner-Manager Perspective." Worldwide Hospitality and Tourism Themes, vol. 10, no. 4, Jan. 2018.
      Clarkson, Mary. Developing IT Staff: A Practical Approach. Springer Science & Business Media, 2012.
      "CNBC and SurveyMonkey Release Latest Small Business Survey Results." Momentive, 2019. Press Release. Accessed 6 Aug. 2020.
      Cselényi, Noémi. "Why Is It Important for Small Business Owners to Focus on Talent Management?" Jumpstart:HR | HR Outsourcing and Consulting for Small Businesses and Startups, 25 Mar. 2013.
      dsparks. "Top 10 IT Concerns for Small Businesses." Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support, 16 May 2017.
      Duff, Jimi. "Why Small to Mid-Sized Businesses Need a System for Talent Management | Talent Management Blog | Saba Software." Saba, 17 Dec. 2018.
      Employment and Social Development Canada. "Age-Friendly Workplaces: Promoting Older Worker Participation." Government of Canada, 3 Oct. 2016.
      Exploring Workforce Planning. Accenture, 23 May 2017.
      "Five Major IT Challenges Facing Small and Medium-Sized Businesses." Advanced Network Systems. Accessed 25 June 2020.
      Harris, Evan. "IT Problems That Small Businesses Face." InhouseIT, 17 Aug. 2016.
      Heathfield, Susan. "What Every Manager Needs to Know About Succession Planning." Liveabout, 8 June 2020.
      ---. "Why Talent Management Is an Important Business Strategy." Liveabout, 29 Dec. 2019.
      Herbert, Chris. "The Top 5 Challenges Facing IT Departments in Mid-Sized Companies." ExpertIP, 25 June 2012.
      How Smaller Organizations Can Use Talent Management to Accelerate Growth. Avilar. Accessed 25 June 2020.
      Krishnan, TN, and Hugh Scullion. "Talent Management and Dynamic View of Talent in Small and Medium Enterprises." Human Resource Management Review, vol. 27, no. 3, Sept. 2017, pp. 431–41.
      Mann Jackson, Nancy. "Strategic Workforce Planning for Midsized Businesses." ADP, 6 Feb. 2017.
      McCandless, Karen. "A Beginner's Guide to Strategic Talent Management (2020)." The Blueprint, 26 Feb. 2020.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup.com, 13 Mar. 2019.
      Mihelič, Katarina Katja. Global Talent Management Best Practices for SMEs. Jan. 2020.
      Mohsin, Maryam. 10 Small Business Statistics You Need to Know in 2020 [May 2020]. 4 May 2020.
      Ramadan, Wael H., and B. Eng. The Influence of Talent Management on Sustainable Competitive Advantage of Small and Medium Sized Establishments. 2012, p. 15.
      Ready, Douglas A., et al. "Building a Game-Changing Talent Strategy." Harvard Business Review, no. January–February 2014, Jan. 2014.
      Reh, John. "Cross-Training Employees Strengthens Engagement and Performance." Liveabout, May 2019.
      Rennie, Michael, et al. McKinsey on Organization: Agility and Organization Design. McKinsey, May 2016.
      Roddy, Seamus. "The State of Small Business Employee Benefits in 2019." Clutch, 18 Apr. 2019.
      SHRM. "Developing Employee Career Paths and Ladders." SHRM, 28 Feb. 2020.
      Strandberg, Coro. Sustainability Talent Management: The New Business Imperative. Strandberg Consulting, Apr. 2015.
      Talent Management for Small & Medium-Size Businesses. Success Factors. Accessed 25 June 2020.
      "Top 10 IT Challenges Facing Small Business in 2019." Your IT Department, 8 Jan. 2019.
      "Why You Need Workforce Planning." Workforce.com, 24 Oct. 2022.

      CIO Priorities 2022

      • Buy Link or Shortcode: {j2store}328|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $31,499 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Understand how to respond to trends affecting your organization.
      • Determine your priorities based on current state and relevant internal factors.
      • Assign the right amount of resources to accomplish your vision.
      • Consider what new challenges outside of your control will demand a response.

      Our Advice

      Critical Insight

      A priority is created when external factors hold strong synergy with internal goals and an organization responds by committing resources to either avert risk or seize opportunity. These are the priorities identified in the report:

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Impact and Result

      Update your strategic roadmap to include priorities that are critical and relevant for your organization based on a balance of external and internal factors.

      CIO Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. CIO Priorities 2022 – A report on the key priorities for competing in the digital economy.

      Discover Info-Tech’s five priorities for CIOs in 2022.

      • CIO Priorities Report for 2022

      2. Listen to the podcast series

      Hear directly from our contributing experts as they discuss their case studies with Brian Jackson.

      • Frictionless hybrid working: How the Harvard Business School did it
      • Close call with ransomware: A CIO recounts a near security nightmare
      • How a financial services company dodged "The Great Resignation"
      • How Allianz took a blockchain platform from pilot to 1 million transactions
      • CVS Health chairman David Dorman on healthcare's hybrid future

      Infographic

      Further reading

      CIO Priorities 2022

      A jumble of business-related words. Info-Tech’s 2022 Tech Trends survey asked CIOs for their top three priorities. Cluster analysis of their open-ended responses shows four key themes:
      1. Business process improvements
      2. Digital transformation or modernization
      3. Security
      4. Supporting revenue growth or recovery

      Info-Tech’s annual CIO priorities are formed from proprietary primary data and consultation with our internal experts with CIO stature

      2022 Tech Trends Survey CIO Demographic N=123

      Info-Tech’s Tech Trends 2022 survey was conducted between August and September 2021 and collected a total of 475 responses from IT decision makers, 123 of which were at the C-level. Fourteen countries and 16 industries are represented in the survey.

      2022 IT Talent Trends Survey CIO Demographic N=44

      Info-Tech’s IT Talent Trends 2022 survey was conducted between September and October 2021 and collected a total of 245 responses from IT decision makers, 44 of which were at the C-level. A broad range of countries from around the world are represented in the survey.

      Internal CIO Panels’ 125 Years Of Combined C-Level IT Experience

      Panels of former CIOs at Info-Tech focused on interpreting tech trends data and relating it to client experiences. Panels were conducted between November 2021 and January 2022.

      CEO-CIO Alignment Survey Benchmark Completed By 107 Different Organizations

      Info-Tech’s CEO-CIO Alignment program helps CIOs align with their supervisors by asking the right questions to ensure that IT stays on the right path. It determines how IT can best support the business’ top priorities and address the gaps in your strategy. In 2021, the benchmark was formed by 107 different organizations.

      Build IT alignment

      IT Management & Governance Diagnostic Benchmark Completed By 320 Different Organizations

      Info-Tech’s Management and Governance Diagnostic helps IT departments assess their strengths and weaknesses, prioritize their processes and build an improvement roadmap, and establish clear ownership of IT processes. In 2021, the benchmark was formed by data from 320 different organizations.

      Assess your IT processes

      The CIO priorities are informed by Info-Tech’s trends research reports and surveys

      Priority: “The fact or condition of being regarded or treated as more important than others.” (Lexico/Oxford)

      Trend: “A general direction in which something is developing or changing.” (Lexico/Oxford)

      A sequence of processes beginning with 'Sensing', 'Hypothesis', 'Validation', and ending with 'Trends, 'Priorities'. Under Sensing is Technology Research, Interviews & Insights, Gathering, and PESTLE. Under Hypothesis is Near-Future Probabilities, Identify Patterns, Identify Uncertainties, and Identify Human Benefits. Under Validation is Test Hypothesis, Case Studies, and Data-Driven Insights. Under Trends is Technology, Talent, and Industry. Under Priorities is CIO, Applications, Infrastructure, and Security.

      Visit Info-Tech’s Trends & Priorities Research Center

      Image called 'Defining the CIO Priorities for 2022'. Image shows 4 columns, Implications, Resource Investment, Amplifiers, and Actions and Outcomes, with 2 dotted lines, labeled External Context and Internal Context, running through all 4 columns and leading to bottom-right label called CIO Priorities Formed

      The Five Priorities

      Priorities to compete in the digital economy

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Reduce friction in the hybrid operating model

      Priority 01 | APO07 Human Resources Management

      Deliver solutions that create equity between remote workers and office workers and make collaboration a joy.

      Hybrid work is here to stay

      CIOs must deal with new pain points related to friction of collaboration

      In 2020, CIOs adapted to the pandemic’s disruption to offices by investing in capabilities to enable remote work. With restrictions on gathering in offices, even digital laggards had to shift to an all-remote work model for non-essential workers.

      Most popular technologies already invested in to facilitate better collaboration

      • 24% Web Conferencing
      • 23% Instant Messaging
      • 20% Document Collaboration

      In 2022, the focus shifts to solving problems created by the new hybrid operating model where some employees are in the office and some are working remotely. Without the ease of collaborating in a central hub, technology can play a role in reducing friction in several areas:

      • Foster more connections between employees. Remote workers are less likely to collaborate with people outside of their department and less likely to spontaneously collaborate with their peers. CIOs should provide a digital employee experience that fosters collaboration habits and keeps workers engaged.
      • Prevent employee attrition. With more workers reevaluating their careers and leaving their jobs, CIOs can help employees feel connected to the overall purpose of the organization. Finding a way to maintain culture in the new context will require new solutions. While conference room technology can be a bane to IT departments, making hybrid meetings effortless to facilitate will be more important.
      • Provide new standards for mediated collaboration. Meeting isn’t as easy as simply gathering around the same table anymore. CIOs need to provide structure around how hybrid meetings are conducted to create equity between all participants. Business continuity processes must also consider potential outages for collaboration services so employees can continue the work despite a major outage.

      Three in four organizations have a “hybrid” approach to work. (Tech Trends 2022 Survey)

      In most organizations, a hybrid model is being implemented. Only 14.9% of organizations are planning for almost everyone to return to the office, and only 9.9% for almost everyone to work remotely.

      Elizabeth Clark

      CIO, Harvard Business School

      "I want to create experiences that are sticky. That keep people coming back and engaging with their colleagues."

      Photo of Elizabeth Clark, CIO, Harvard Business School.

      Listen to the Tech Insights podcast:
      Frictionless hybrid working: How the Harvard Business School did it

      Internal interpretation: Harvard Business School

      • March 2020
        The pandemic disrupts in-class education at Harvard Business School. Their case study method of instruction that depends on in-person, high-quality student engagement is at risk. While students and faculty completed the winter semester remotely, the Dean and administration make the goal to restore the integrity of the classroom experience with equity for both remote and in-person students.
      • May 2020
        A cross-functional task force of about 100 people work intensively, conducting seven formal experiments, 80 smaller tests, and hundreds of polling data points, and a technology and facilities solution is designed: two 4K video cameras capturing both the faculty and the in-class students, new ceiling mics, three 85-inch TV screens, and students joining the videoconference from their laptops. A custom Zoom room, combining three separate rooms, integrated all the elements in one place and integrated with the lecture capture system and learning management system.
      • October 2020
        Sixteen classrooms are renovated to install the new solution. Students return to the classroom but in lower numbers due to limits on in-room capacity, but students rotate between the in-person and remote experience.
      • September 2021
        Renovations for the hybrid solution are complete in 26 classrooms and HBS has determined this will be its standard model for the classroom. The case method of teaching is kept alive and faculty and students are thrilled with the results.
      • November 2021
        HBS is adapting its solution for the classroom to its conference rooms and has built out eight different rooms for a hybrid experience. The 4K cameras and TV screens capture all participants in high fidelity as well as the blackboard.

      Photo of a renovated classroom with Zoom participants integrated with the in-person students.
      The renovated classrooms integrate all students, whether they are participating remotely or in person. (Image courtesy of Harvard Business School.)

      Implications: Organization, Process, Technology

      External

      • Organization – About half of IT practitioners in the Tech Trends 2022 survey feel that IT leaders, infrastructure and operations teams, and security teams were “very busy” in 2021. Capacity to adapt to hybrid work could be constrained by these factors.
      • Process – Organizations that want employees to benefit from being back in the office will have to rethink how workers can get more value out of in-person meetings that also require videoconference participation with remote workers.
      • Technology – Fifty-four percent of surveyed IT practitioners say the pandemic raised IT spending compared to the projections they made in 2020. Much of that investment went into adapting to a remote work environment.

      Internal

      • Organization – HBS added 30 people to its IT staff on term appointments to develop and implement its hybrid classroom solutions. Hires included instructional designers, support technicians, coordinators, and project managers.
      • Process – Only 25 students out of the full capacity of 95 could be in the classroom due to COVID-19 regulations. On-campus students rotated through the classroom seats. An app was created to post last-minute seat availability to keep the class full.
      • Technology – A Zoom room was created that combines three rooms to provide the full classroom experience: a view of the instructor, a clear view of each student that enlarges when they are speaking, and a view of the blackboard.

      Resources Applied

      Appetite for Technology

      CIOs and their direct supervisors both ranked internal collaboration tools as being a “critical need to adopt” in 2021, according to Info-Tech’s CEO-CIO Alignment Benchmark Report.

      Intent to Invest

      Ninety-seven percent of IT practitioners plan to invest in technology to facilitate better collaboration between employees in the office and outside the office by the end of 2022, according to Info-Tech’s 2022 Tech Trends survey.

      “We got so many nice compliments, which you don’t get in IT all the time. You get all the complaints, but it’s a rare case when people are enthusiastic about something that was delivered.” (Elizabeth Clark, CIO, Harvard Business School)

      Harvard Business School

      • IT staff were reassigned from other projects to prioritize building a hybrid classroom solution. A cloud migration and other portfolio projects were put on pause.
      • The annual capital A/V investment was doubled. The amount of spend on conference rooms was tripled.
      • Employees were hired to the media services team at a time when other areas of the organization were frozen.

      Outcomes at Harvard Business School

      The new normal at Harvard Business School

      New normal: HBS has found its new default operating model for the classroom and is extending its solution to its operating environment.

      Improved CX: The high-quality experience for students has helped avoid attrition despite the challenges of the pandemic.

      Engaged employees: The IT team is also engaged and feels connected to the mission of the school.

      Photo of a custom Zoom room bringing together multiple view of the classroom as well as all remote students.
      A custom Zoom room brings together multiple different views of the classroom into one single experience for remote students. (Image courtesy of Harvard Business School.)

      From Priorities to Action

      Make hybrid collaboration a joy

      Align with your organization’s goals for collaboration and customer interaction, with the target of high satisfaction for both customers and employees. Invest in capital projects to improve the fidelity of conference rooms, develop and test a new way of working, and increase IT capacity to alleviate pressure points.

      Foster both asynchronous and synchronous collaboration approaches to avoid calendars filling up with videoconference meetings to get things done and to accommodate workers contributing from across different time zones.

      “We’ll always have hybrid now. It’s opened people’s eyes and now we’re thinking about the future state. What new markets could we explore?” (Elizabeth Clark, CIO, Harvard Business School)

      Take the next step

      Run Better Meetings
      Hybrid, virtual, or in person – set meeting best practices that support your desired meeting norms.

      Prepare People Leaders for the Hybrid Work Environment
      Set hybrid work up for success by providing people leaders with the tools they need to lead within the new model.

      Hoteling and Hot-Desking: A Primer
      What you need to know regarding facilities, IT infrastructure, maintenance, security, and vendor solutions for desk hoteling and hot-desking.

      “Human Resources Management” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the Human Resources Management gap between importance and effectiveness. The difference is marked as Delta 2.3.

      Improve your ransomware readiness

      Priority 02 | APO13 Security Strategy

      Mitigate the damage of successful ransomware intrusions and make recovery as painless as possible.

      The ransomware crisis threatens every organization

      Prevention alone won’t be enough against the forces behind ransomware.

      Cybersecurity is always top of mind for CIOs but tends to be deprioritized due to other demands related to digital transformation or due to cost pressures. That’s the case when we examine our data for this report.

      Cybersecurity ranked as the fourth-most important priority by CIOs in Info-Tech’s 2022 Tech Trends survey, behind business process improvement, digital transformation, and modernization. Popular ways to prepare for a successful attack include creating offline backups, purchasing insurance, and deploying new solutions to eradicate ransomware.

      CIOs and their direct supervisors ranked “Manage IT-Related Security” as the third-most important top IT priority on Info-Tech’s CEO-CIO Alignment Benchmark for 2021, in support of business goals to manage risk, comply with external regulation, and ensure service continuity.

      Most popular ways for organizations to prepare for the event of a successful ransomware attack:

      • 25% Created offline backups
      • 18% Purchased cyberinsurance
      • 19% New tech to eradicate ransomware

      Whatever priority an organization places on cybersecurity, when ransomware strikes, it quickly becomes a red alert scenario that disrupts normal operations and requires all hands on deck to respond. Sophisticated attacks executed at wide scale demonstrate that security can be bypassed without creating an alert. After that’s accomplished, the perpetrators build their leverage by exfiltrating data and encrypting critical systems.

      CIOs can plan to mitigate ransomware attacks in several constructive ways:

      • Business impact analysis. Determine the costs of an outage for specific periods and the system and data recovery points in time.
      • Engage a partner for 24/7 monitoring. Gain real-time awareness of your critical systems.
      • Review your identity access management (IAM) policies. Use of multi-factor authentication and limiting access to only the roles that need it reduces ransomware risk.

      50% of all organizations spent time and money specifically to prevent ransomware in the past year. (Info-Tech Tech Trends 2022 Survey)

      John Doe

      CIO, mid-sized manufacturing firm in the US

      "I want to create experiences that are sticky. That keep people coming back and engaging with their colleagues."

      Blank photo.

      Listen to the Tech Insights podcast:
      Close call with ransomware: a CIO recounts a near security nightmare

      Internal interpretation: US-based, mid-sized manufacturing firm

      • May 1, 2021
        A mid-sized manufacturing firm (“The Firm”) CIO gets a call from his head of security about odd things happening on the network. A call is made to Microsoft for support. Later that night, the report is that an unwanted crypto-mining application is the culprit. But a couple of hours later, that assessment is proven wrong when it’s realized that hundreds of systems are staged for a ransomware attack. All the attacker has to do is push the button.
      • May 2, 2021
        The Firm disconnects all its global sites to cut off new pathways for the malware to infect. All normal operations cease for 24 hours. It launches its cybersecurity insurance process. The CIO engages a new security vendor, CrowdStrike, to help respond. Employees begin working from home if they can so they can make use of their own internet service. The Firm has cut off its public internet connectivity and is severed from cloud services such as Azure storage and collaboration software.
      • May 4, 2021
        The hackers behind the attack are revealed by security forensics experts. A state-sponsored agency in Russia set up the ransomware and left it ready to execute. It sold the staged attack to a cybercriminal group, Doppel Spider. According to CrowdStrike, the group uses malware to run “big game hunting operations” and targets 18 different countries including the US and multiple industries, including manufacturing.
      • May 10, 2021
        The Firm has totally recovered from the ransomware incident and avoided any serious breach or paying a ransom. The CIO worked more hours than at any other point in his career, logging an estimated 130 hours over the two weeks.
      • November 2021
        The Firm never previously considered itself a ransomware target but has now reevaluated that stance. It has hired a service provider to run a security operations center on a 24/7 basis. It's implemented a more sophisticated detection and response model and implemented multi-factor authentication. It’s doubled its security spend in 2021 and will invest more in 2022.

      “Now we take the approach that if someone does get in, we're going to find them out.” (John Doe, CIO, “The Firm”)

      Implications: Organization, Process, Technology

      External

      • Organization – Organizations must consider how their employees play a role in preventing ransomware and plan for training to recognize phishing and other common traps. They must make plans for employees to continue their work if systems are disrupted by ransomware.
      • Process – Backup processes across multiple systems should be harmonized to have both recent and common points to recover from. Work with the understanding IT will have to take systems offline if ransomware is discovered and there is no time to ask for permission.
      • Technology – Organizations can benefit from security services provided by a forensics-focused vendor. Putting cybersecurity insurance in place not only provides financial protection but also guidance in what to do and which vendors to work with to prevent and recover from ransomware.

      Internal

      • Organization – The Firm was prepared with a business continuity plan to allow many of its employees to work remotely, which was necessary because the office network was incapacitated for ten days during recovery.
      • Process – Executives didn’t seek to assign blame for the security incident but took it as a signal there were some new costs involved to stay in business. It initiated new outsource relationships and hired one more full-time employee to shore up security resources.
      • Technology – New ransomware eradication software was deployed to 2,000 computers. Scripted processes automated much of the work, but in some cases full system rebuilds were required. Backup systems were disconnected from the network as soon as the malware was discovered.

      Resources Applied

      Consider the Alternative

      Organizations should consider how much a ransomware attack on critical systems would cost them if they were down for a minimum of 24-48 hours. Plan to invest an amount at least equal to the costs of that downtime.

      Ask for ID

      Implementing across-the-board multi-factor authentication reduces chances of infection and is cheap, with enterprise solutions ranging from $2 to $5 per user on average. Be strict and deny access when connections don’t authenticate.

      “You'll never stop everything from getting into the network. You can still focus on stopping the bad actors, but then if they do make it in, make sure they don't get far.” (John Doe, CIO, “The Firm”)

      “The Firm” (Mid-Sized Manufacturer)

      • During the crisis, The Firm paused all activities and focused solely on isolating and eliminating the ransomware threat.
      • New outsourcing relationship with a vendor provides a 24/7 Security Operations Center.
      • One more full-time employee on the security team.
      • Doubled investment in security in 2021 and will spend more in 2022.

      Outcomes at “The Firm” (Mid-Sized Manufacturer)

      The new cost of doing business

      Real-time security: While The Firm is still investing in prevention-based security, it is also developing its real-time detection and response capabilities. When ransomware makes it through the cracks, it wants to know as soon as possible and stop it.

      Leadership commitment: The C-suite is taking the experience as a wake-up call that more investment is required in today’s threat landscape. The Firm rates security more highly as an overall organizational goal, not just something for IT to worry about.

      Stock photo of someone using their phone while sitting at a computer, implying multi-factor authentication.
      The Firm now uses multi-factor authentication as part of its employee sign-on process. For employees, authenticating is commonly achieved by using a mobile app that receives a secret code from the issuer.

      From Priorities to Action

      Cybersecurity is everyone’s responsibility

      In Info-Tech’s CEO-CIO Alignment Benchmark for 2021, the business goal of “Manage Risk” was the single biggest point of disagreement between CIOs and their direct supervisors. CIOs rank it as the second-most important business goal, while CEOs rank it as sixth-most important.

      Organizations should align on managing risk as a top priority given the severity of the ransomware threat. The threat actors and nature of the attacks are such that top leadership must prepare for when ransomware hits. This includes halting operations quickly to contain damage, engaging third-party security forensics experts, and coordinating with government regulators.

      Cybersecurity strategies may be challenged to be effective without creating some friction for users. Organizations should look beyond multi-layer prevention strategies and lean toward quick detection and response, spending evenly across prevention, detection, and response solutions.

      Take the next step

      Create a Ransomware Incident Response Plan
      Don’t be the next headline. Determine your current readiness, response plan, and projects to close gaps.

      Simplify Identity and Access Management
      Select and implement IAM and produce vendor RFPs that will contain the capabilities you need, including multi-factor authentication.

      Cybersecurity Series Featuring Sandy Silk
      More from Info-Tech’s Senior Workshop Director Sandy Silk in this video series created while she was still at Harvard University.

      Gap between CIOs and CEOs in points allocated to “Manage risk” as a top business goal

      A bar chart illustrating the gap between CIOs and CEOs in points allocated to 'Manage risk' as a top business goal. The difference is marked as Delta 1.5.

      Support an employee-centric retention strategy

      Priority 03 | ITRG02 Leadership, Culture & Values

      Avoid being a victim of “The Great Resignation” by putting employees at the center of an experience that will engage them with clear career path development, purposeful work, and transparent feedback.

      Defining an employee-first culture that improves retention

      The Great resignation isn’t good for firms

      In 2021, many workers decided to leave their jobs. Working contexts were disrupted by the pandemic and that saw non-essential workers sent home to work, while essential workers were asked to continue to come into work despite the risks of COVID-19. These disruptions may have contributed to many workers reevaluating their professional goals and weighing their values differently. At the same time, 2021 saw a surging economy and many new job opportunities to create a talent-hungry market. Many workers could have been motivated to take a new opportunity to increase their salary or receive other benefits such as more flexibility.

      Annual turnover rate for all us employees on the rise

      • 20% – Jan.-Aug. 2020, Dipped from 22% in 2019
      • 25% Jan.-Aug. 2021, New record high
      • Data from Visier Inc.

      When you can’t pay them, develop them

      IT may be less affected than other departments by this trend. Info-Tech’s 2022 IT Talent Trends Report shows that on average, estimated turnover rate in IT is lower than the rest of the organization. Almost half of respondents estimated their organization’s voluntary turnover rate was 10% or higher. Only 30% of respondents estimate that IT’s voluntary turnover rate is in the same range. However, CIOs working in industries with the highest turnover rates will have to work to keep their workers engaged and satisfied, as IT skills are easily transferred to other industries.

      49% ranked “enabling learning & development within IT” as high priority, more than any other single challenge. (IT Talent Trends 2022 Survey, N=227)

      A bar chart of 'Industries with highest turnover rates (%)' with 'Leisure and Hospitality' at 6.4%, 'Trade, Transportation & Utilities' at 3.6%, 'Professional and Business' at 3.3%, and 'Other Services' at 3.1%. U.S. Bureau of Labor Statistics, 2022.

      Jeff Previte

      Executive Vice-President of IT, CrossCountry Mortgage

      “We have to get to know the individual at a personal level … Not just talking about the business, but getting to know the person."

      Photo of Jeff Previte, Executive Vice-President of IT, CrossCountry Mortgage.

      Listen to the Tech Insights podcast:
      How a financial services company dodged ‘The Great Resignation’

      Internal interpretation: CrossCountry Mortgage

      • May 2019
        Jeff Previte joins Cleveland, Ohio-based CrossCountry Mortgage in the CIO role. The company faces a challenge with employee turnover, particularly in IT. The firm is a sales-focused organization and saw its turnover rate reach as high as 60%. Yet Previte recognized that IT had some meaningful goals to achieve and would need to attract – and retain – some higher caliber talent. His first objective in his new role was to meet with IT employees and business leadership to set priorities.
      • July 2019
        Previte takes a “people-first” approach to leadership and meets his staff face-to-face to understand their personal situations. He sets to work on defining roles and responsibilities in the organization, spending about a fifth of his time on defining the strategy.
      • June 2020
        Previte assigned his leadership team to McLean & Company’s Design an Impactful Employee Development Program. From there, the team developed a Salesforce tool called the Career Development Workbook. “We had some very passionate developers and admins that wanted to build a home-grown tool,” he says. It turns McLean & Company’s process into a digital tool employees can use to reflect on their careers and explore their next steps. It helps facilitate development conversations with managers.
      • January 2021
        CrossCountry Mortgage changes its approach to career development activities. Going to external conferences and training courses is reduced to just 30% of that effort. The rest is by doing hands-on work at the company. Previte aligned with his executives and road-mapped IT projects annually. Based on employee’s interests, opportunities are found to carve out time from usual day-to-day activities to spend time on a project in a new area. When there’s a business need, someone internally can be ready to transition roles.
      • June 2021
        In the two years since joining the company, Previte has reduced the turnover rate to just 12%. The IT department has grown to more adequately meet the needs of the business and employees are engaged with more opportunities to develop their careers. Instead of focusing on compensation, Previte focused more on engaging employees with a developmentally dedicated environment and continuous hands-on learning.

      “It’s come down to a culture shift. Folks have an idea of where we’re headed as an organization, where we’re headed as an IT team, and how their role contributes to that.” (Jeff Previte, EVP of IT, CrossCountry Mortgage)

      Implications: Organization, Process, Technology

      External

      • Organization – A high priority is being placed on improving IT’s maturity through its talent. Enabling learning and development in IT, enabling departmental innovation, and recruiting are the top three highest priorities according to IT Talent Trends 2022 survey responses.
      • Process – Recruiting is more challenging for industries that operate primarily onsite, according to McLean & Company's 2022 HR Trends Report. They face more challenges attracting applications, more rejected offers, and more candidate ghosting compared to remote-capable industries.
      • Technology – Providing a great employee experience through digital tools is more important as many organizations see a mix of workers in the office and at home. These tools can help connect colleagues, foster professional development, and improve the candidate experience.

      Internal

      • Organization – CrossCountry Mortgage faced a situation where IT employees did not have clarity on their roles and responsibilities. In terms of salary, it wasn’t offering at the high end compared to other employers in Cleveland.
      • Process – To foster a culture of growth and development, CrossCountry Mortgage put in place a performance assessment system that encouraged reflection and goal setting, aided by collaboration with a manager.
      • Technology – The high turnover rate was limiting CrossCountry Mortgage from achieving the level of maturity it needed to support the company’s goals. It ingrained its new PA process with a custom build of a Salesforce tool.

      Resources Applied

      Show me the money

      Almost six in ten Talent Trends survey respondents identified salary and compensation as the reason that employees resigned in the past year. Organizations looking to engage employees must first pay a fair salary according to market and industry conditions.

      Build me up

      Professional development and opportunity for innovative work are the next two most common reasons for resignations. Organizations must ensure they create enough capacity to allow workers time to spend on development.

      “Building our own solution created an element of engagement. There was a sense of ownership that the team had in thinking through this.” (Jeff Previte, CrossCountry Mortgage)

      CrossCountry Mortgage

      • Executive time: CIO spends 10-20% of his time on activities related to designing the approach.
      • Leveraged memberships with Info-Tech Research Group and McLean & Company to define professional development process.
      • Internal IT develops automated workflow in Salesforce.
      • Hired additional IT staff to build out overall capacity and create time for development activities.

      Outcomes at CrossCountry Mortgage

      Engaged IT workforce

      The Great Maturation: IT staff turnover rate dropped to 10-12% and IT talent is developing on the job to improve the department’s overall skill level. More IT staff on hand and more engaged workers mean IT can deliver higher maturity level results.

      Alignment achieved: Connecting IT’s initiatives to the vision of the C-suite creates a clear purpose for IT in its initiatives. Staff understand what they need to achieve to progress their careers and can grow while they work.

      Photo of employees from CrossCountry Mortgage assisting with a distribution event.
      Employees from CrossCountry Mortgage headquarters assist with a drive-thru distribution event for the Cleveland Food Bank on Dec. 17, 2021. (Image courtesy of CrossCountry Mortgage.)

      From Priorities to Action

      Staff retention is a leadership priority

      The Great Resignation trend is bringing attention to employee engagement and staff retention. IT departments are busier than ever during the pandemic as they work overtime to keep up with a remote workforce and new security threats. At the same time, IT talent is among the most coveted on the market.

      CIOs need to develop a people-first approach to improve the employee experience. Beyond compensation, IT workers need clarity in terms of their career paths, a direct connection between their work and the goals of the organization, and time set aside for professional development.

      Info-Tech’s 2021 benchmark for “Leadership, Culture & Values” shows that most organizations rate this capability very highly (9) but see room to improve on their effectiveness (6.9).

      Take the next step

      IT Talent Trends 2022
      See how IT talent trends are shifting through the pandemic and understand how themes like The Great Resignation has impacted IT.

      McLean & Company’s Modernize Performance Management
      Customize the building blocks of performance management to best fit organizational needs to impact individual and organizational performance, productivity, and engagement.

      Redesign Your IT Organizational Structure
      Define future-state work units, roles, and responsibilities that will enable the IT organization to complete the work that needs to be done.

      “Leadership, Culture & Values” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'Leadership, Culture & Values' gap between importance and effectiveness. The difference is marked as Delta 2.1.

      Design an automation platform

      Priority 04 | APO04 Innovation

      Position yourself to buy or build a platform that will enable new automation opportunities through seamless integration.

      Build it or buy it, but platform integration can yield great benefits

      Necessity is the mother of innovation

      When it’s said that digital transformation accelerated during the pandemic, what’s really meant is that processes that were formerly done manually became automated through software. In responses to the Tech Trends survey, CIOs say digital transformation was more of a focus during the pandemic, and eight in ten CIOs also say they shifted more than 20% of their organization’s processes to digital during the pandemic. Automating tasks through software can be called digitalization.

      Most organizations became more digitalized during the pandemic. But how they pursued it depends on their IT maturity. For digital laggards, partnering with a technology services platform is the path of least resistance. For sophisticated innovators, they can consider building a platform to address the specific needs of their business process. Doing so requires the foundation of an existing “digital factory” or innovation arm where new technologies can be tested, proofs of concept developed, and external partnerships formed. Patience is key with these efforts, as not every investment will yield immediate returns and some will fail outright.

      Build it or buy it, platform participants integrate with their existing systems through application programming interfaces (APIs). Organizations should determine their platform strategies based on maturity, then look to integrate the business processes that will yield the most gains.

      What role should you play in the platform ecosystem?

      A table with levels on the maturity ladder laid out as a sprint. Column headers are maturity levels 'Struggle', 'Support', 'Optimize', 'Expand', and 'Transform', row headers are 'Maturity' and 'Role'. Roles are assigned to one or many levels. 'Improve' is solely under Struggle. 'Integrate' spans from Support to Transform. 'Buy' spans Support to Expand. 'Build' begins midway through Expand and all of Transform. 'Partner' spans from Optimize to halfway through Transform.

      68% of CIOs say digital transformation became much more of a focus for their organization during the pandemic (Info-Tech Tech Trends 2022 Survey)

      Bob Crozier

      Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE

      "Smart contracts are really just workflows between counterparties."

      Photo of Bob Crozier, Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE.

      Listen to the Tech Insights podcast:
      How Allianz took a blockchain platform from pilot to 1 million transactions

      Internal interpretation: Allianz Technology

      • 2015
        After smart contracts are demonstrated on the Ethereum blockchain, Allianz and other insurers recognize the business value. There is potential to use the capability to administer a complex, multi-party contract where the presence of the reinsurer in the risk transfer ecosystem is required. Manual contracts could be turned into code and automated. Allianz organized an early proof of concept around a theoretical pandemic excessive loss contract.
      • 2018
        Allianz Chief Architect Bob Crozier is leading the Global Blockchain Center of Competence for Allianz. They educate Allianz on the value of blockchain for business. They also partner with a joint venture between the Technology University of Munich and the state of Bavaria. A cohort of Masters students is looking for real business problems to solve with open-source distributed ledger technology. Allianz puts its problem statement in front of the group. A student team presents a proof of concept for an international motor insurance claims settlement and it comes in second place at a pitch day competition.
      • 2019
        Allianz brings the concept back in-house, and its business leaders return to the concept. Startup Luther Systems is engaged to build a minimum-viable product for the solution, with the goal being a pilot involving three or four subsidiaries in different countries. The Blockchain Center begins communicating with 25 Allianz subsidiaries that will eventually deploy the platform.
      • 2020
        Allianz is in build mode on its international motor insurance claims platform. It leverages its internal Dev/SecOps teams based in Munich and in India.
      • May 2021
        Allianz goes live with its new platform on May 17, decommissioning its old system and migrating all live claims data onto the new blockchain platform. It sees 400 concurrent users go live across Europe.
      • January 2022
        Allianz mines its one-millionth block to its ledger on Jan. 19, with each block representing a peer-to-peer transaction across its 25 subsidiaries in different countries. The platform has settled hundreds of millions of dollars.

      Stock photo of two people arguing over a car crash.

      Implications: Organization, Process, Technology

      External

      • Organization – To explore emerging technologies like blockchain, organizations need staff that are accountable for innovation and have leeway to develop proofs of concept. External partners are often required to bring in fresh ideas and move quickly towards an MVP.
      • Process – According to the Tech Trends 2022 survey, 84% of CIOs consider automation a high-value digital capability, and 77% say identity verification is a high-value capability. A blockchain platform using smart contracts can deliver those.
      • Technology – The Linux Foundation’s Hyperledger Fabric is an open-source blockchain technology that’s become popular in the financial industry for its method of forming consensus and its modular architecture. It’s been adopted by USAA, MasterCard, and PayPal. It also underpins the IBM Blockchain Platform and is supported by Azure Blockchain.

      Internal

      • Organization – Allianz is a holding company that owns Allianz Technology and 25 operating entities across Europe. It uses the technology arm to innovate on the business process and creates shared platforms that its entities can integrate with to automate across the value chain.
      • Process – Initial interest in smart contracts on blockchain were funneled into a student competition, where a proof of concept was developed. Allianz partnered with a startup to develop an MVP, then developed the platform while aligning with its business units ahead of launch.
      • Technology – Allianz built its blockchain platform on Hyperledger Fabric because it was a permissioned system, unlike other public permissionless blockchains such as Ethereum, and because its mining mechanism was much more energy efficient compared to other blockchains using Proof of Work consensus models.

      Resources Applied

      Time to innovate

      Exploring emerging technology for potential use cases is difficult for staff tasked with running day-to-day operations. Organizations serious about innovation create a separate team that can focus on “moonshot” projects and connect with external partners.

      Long-term ROI

      Automation of new business processes often requires a high upfront initial investment for a long-term efficiency gain. A proof of concept should demonstrate clear business value that can be repeated often and for a long period.

      “My next project has to deliver in the tens of millions of value in return. The bar is high and that’s what it should be for a business of our size.” (Bob Crozier, Allianz)

      Allianz

      • Several operating entities from different countries supplied subject matter expertise and helped with the testing process.
      • Allianz Technology team has eight staff members. It is augmented by Luther Systems and the team at industry group B3i.
      • Funding of less than $5 million to develop. Dev team continues to add improvements.
      • Operating requires just one full-time employee plus infrastructure costs, mostly for public cloud hosting.

      Outcomes at Allianz

      From insurer to platform provider

      Deliver your own SaaS: Allianz Technology built its blockchain-based claims settlement platform and its subsidiaries consume it as software as a service. The platform runs on a distributed architecture across Europe, with each node running the same version of the software. Operating entities can also integrate their own systems to the platform via APIs and further automate business processes such as billing.

      Ready to scale: After processing one million transactions, the international claims settlement platform is proven and ready to add more participants. Crozier sees auto repair shops and auto manufacturers as the next logical users.

      Stock photo of Blockchain.
      Allianz is a shareholder of the Blockchain Insurance Industry Initiative (B3i). It is providing a platform used by a group of insurance companies in the commercial and reinsurance space.

      When should we use blockchain? THREE key criteria:

      • Redundant processes
        Different entities follow the same process to achieve the desired outcome.
      • Audit trail
        Accountability in the decision making must be documented.
      • Reconciliation
        Parties need to be able to resolve disputes by tracing back to the truth.

      From Priorities to Action

      It’s a build vs. buy question for platforms

      Allianz was able to build a platform for its group of European subsidiaries because of its established digital factory and commitment to innovation. Allianz Technology is at the “innovate” level of IT maturity, allowing it to create a platform that subsidiaries can integrate with via APIs. For firms that are lower on the IT maturity scale, buying a platform solution is the better path to automation. These firms will be concerned with integrating their legacy systems to platforms that can reduce the friction of their operating environments and introduce modern new capabilities.

      From Info-Tech’s Build a Winning Business Process Automation Playbook

      An infographic comparing pros and cons of Build versus Buy. On the 'Build: High Delivery Capacity & Capability' side is 'Custom Development', 'Data Integration', 'AI/ML', 'Configuration', 'Native Workflow', and 'Low & No Code'. On the 'Buy: Low Delivery Capacity & Capability' side is 'Outsource Development', 'iPaaS', 'Chatbots', 'iBPMS & Rules Engines', 'RPA', and 'Point Solutions'.

      Take the next step

      Accelerate Your Automation Processes
      Integrate automation solutions and take the first steps to building an automation suite.

      Build Effective Enterprise Integration on the Back of Business Process
      From the backend to the frontlines – let enterprise integration help your business processes fly.

      Evolve Your Business Through Innovation
      Innovation teams are tasked with the responsibility of ensuring that their organizations are in the best position to succeed while the world is in a period of turmoil, chaos, and uncertainty.

      “Innovation” gap between importance and effectiveness Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'Innovation' gap between importance and effectiveness. The difference is marked as Delta 2.1.

      Prepare to report on new environmental, social, and governance (ESG) metrics

      Priority 05 | ITRG06 Business Intelligence and Reporting

      Be ready to either lead or support initiatives to meet the criteria of new ESG reporting mandates and work toward disclosure reporting solutions.

      Time to get serious about ESG

      What does CSR or ESG mean to a CIO?

      Humans are putting increasing pressure on the planet’s natural environment and creating catastrophic risks as a result. Efforts to mitigate these risks have been underway for the past 30 years, but in the decade ahead regulators are likely to impose more strict requirements that will be linked to the financial value of an organization. Various voluntary frameworks exist for reporting on environmental, social, and governance (ESG) or corporate social responsibility (CSR) metrics. But now there are efforts underway to unify and clarify those standards.

      The most advanced effort toward a global set of standards is in the environmental area. At the United Nations’ COP26 summit in Scotland last November, the International Sustainability Standards Board (ISSB) announced its headquarters (Frankfurt) and three other international office locations (Montreal, San Francisco, and London) and its roadmap for public consultations. It is working with an array of voluntary standards groups toward a consensus.

      In Info-Tech’s 2022 Tech Trends survey, two-thirds of CIOs say their organization is committed to reducing greenhouse gas emissions, yet only 40% say their organizational leadership is very concerned with reducing those emissions. CIOs will need to consider how to align organizational concern with internal commitments and new regulatory pressures. They may investigate new real-time reporting solutions that could serve as a competitive differentiator on ESG.

      Standards informing the ISSB’s global set of climate standards

      A row of logos of organizations that inform ISSB's global set of climate standards.

      67% of CIOs say their organization is committed to reducing greenhouse gases, with one-third saying that commitment is public. (Info-Tech Tech Trends 2022 Survey)

      40% of CIOs say their organizational leadership is very concerned with reducing greenhouse gas emissions.

      David W. Dorman

      Chairman of the board, CVS Health

      “ESG is a question of what you do in the microcosm of your company to make sure there is a clear, level playing field – that there is a color-blind, gender-blind meritocracy available – that you are aware that not in every case can you achieve that without really focusing on it. It’s not going to happen on its own. That’s why our commitments have real dollars behind them and real focus behind them because we want to be the very best at doing them.”

      Photo of David W. Dorman, Chairman of the Board, CVS Health.

      Listen to the Tech Insights podcast:
      CVS Health chairman David Dorman on healthcare's hybrid future

      Internal interpretation: CVS Health

      CVS Health established a new steering committee of senior leaders in 2020 to oversee ESG commitments. It designs its corporate social responsibility strategy, Transform Health 2030, by aligning company activities in four key areas: healthy people, healthy business, healthy planet, and healthy community. The strategy aligns with the United Nations’ Sustainable Development Goals. In alignment with these goals, CVS identifies material topics where the company has the most ability to make an impact. In 2020, its top three topics were:

      1. Access to quality health care
      2. Patient and customer safety
      3. Data protection and privacy
      Material Topic
      Access to quality health care
      Material Topic
      Patient and customer safety
      Material Topic
      Data protection and privacy
      Technology Initiative
      MinuteClinic’s Virtual Collaboration for Nurses

      CVS provided Apple iPads compliant with the Health Insurance Portability and Accountability Act (HIPAA) to clinics in a phased approach, providing training to more than 700 providers in 26 states by February 2021. Nurses could use the iPads to attend virtual morning huddles and access clinical education. Nurses could connect virtually with other healthcare experts to collaborate on delivering patient care in real-time. The project was able to scale across the country through a $50,000 American Nurses Credentialing Center Pathway Award. (Wolters Kluwer Health, Inc.)

      Technology Initiative
      MinuteClinic’s E-Clinic

      MinuteClinics launched this telehealth solution in response to the pandemic, rolling it out in three weeks. The solution complemented video visits delivered in partnership with the Teladoc platform. Visits cost $59 and are covered by Aetna insurance plans, a subsidiary of CVS Health. It hosted more than 20,000 E-Clinic visits through the end of 2020. CVS connected its HealthHUBs to the solution to increase capacity in place of walk-in appointments and managed patients via phone for medication adherence and care plans. CVS also helped behavioral health providers transition patients to virtual visits. (CVS Health)

      Technology Initiative
      Next Generation Authentication Platform

      CVS patented this solution to authenticate customers accessing digital channels. It makes use of the available biometrics data and contextual information to validate identity without the need for a password. CVS planned to extend the platform to voice channels as well, using voiceprint technology. The solution prevents unauthorized access to sensitive health data while providing seamless access for customers. (LinkedIn)

      Implications: Organization, Process, Technology

      External

      • Organization – Since the mid-2010s, younger investors have demonstrated reliance on ESG data when making investment decisions, resulting in the creation of voluntary standards that offered varied approaches. Organizations in ESG exchange-traded funds are outperforming the overall S&P 500 (S&P Global Market Intelligence).
      • Process – Organizations are issuing ESG reports today despite the absence of clear rules to follow for reporting results. With regulators expected to step in to establish more rigid guidelines, many organizations will need to revisit their approach to ESG reports.
      • Technology – Real-time reporting of ESG metrics will become a competitive advantage before 2030. Engineering a solution that can alert organizations to poor performance on ESG measures and allow them to respond could avert losing market value.

      Internal

      • Organization – CVS Health established an ESG Steering Committee in 2020 composed of senior leaders including its chief governance officers, chief sustainability officer, chief risk officer, and controller and SVP of investor relations. It is supported by the ESG Operating Committee.
      • Process – CVS conducts a materiality assessment in accordance with Global Reporting Initiative standards to determine the most significant ESG impacts it can make and what topics most influence the decisions of stakeholders. It engages with various stakeholder groups on CSR topics.
      • Technology – CVS technology initiatives during the pandemic focused on supporting patients and employees in collaborating on health care delivery using virtual solutions, providing rich digital experiences that are easily accessible while upholding high security and privacy standards.

      Resources Applied

      Lack of commitment

      While 83% of businesses state support for the Sustainable Development Goals outlined by the Global Reporting Initiative (GRI), only 40% make measurable commitments to their goals.

      Show your work

      The GRI recommends organizations not only align their activities with sustainable development goals but also demonstrate contributions to specific targets in reporting on the positive actions they carry out. (GRI, “State of Progress: Business Contributions to the SDGS.”)

      “We end up with a longstanding commitment to diversity because that’s what our customer base looks like.” (David Dorman, CVS Health)

      CVS Health

      • The MinuteClinic Virtual Collaboration solution was piloted in Houston, demonstrated success, and won additional $50,000 funding from the Pathway to Excellence Award to scale the program across the country (Wolters Kluwer Health, Inc.).
      • The Next-Gen Authentication solution is provided by the vendor HYPR. It is deployed to ten million users and looking to scale to 30 million more. Pricing for enterprises is quoted at $1 per user, but volume pricing would apply to CVS (HYPR).

      Outcomes at CVS Health

      Delivering on hybrid healthcare solutions

      iPads for collaboration: Healthcare practitioners in the MinuteClinic Virtual Collaboration initiative agreed that it improved the use of interprofessional teams, working well virtually with others, and improved access to professional resources (Wolters Kluwer Health, Inc.)

      Remote healthcare: Saw a 400% increase in MinuteClinic virtual visits in 2020 (CVS Health).

      Verified ID: The Next Generation Authentication platform allowed customers to register for a COVID-19 vaccination appointment. CVS has delivered more than 50 million vaccines (LinkedIn).

      Stock photo of a doctor with an iPad.
      CVS Health is making use of digital channels to connect its customers and health practitioners to a services platform that can supplement visits to a retail or clinic location to receive diagnostics and first-hand care.

      From Priorities to Action

      Become your organization’s ESG Expert

      The risks posed to organizations and wider society are becoming more severe, driving a transition from voluntary frameworks for ESG goals to a mandatory one that’s enforced by investors and governments. Organizations will be expected to tie their core activities to a defined set of ESG goals and maintain a balance sheet of their positive and negative impacts. CIOs should become experts in ESG disclosure requirements and recommend the steps needed to meet or exceed competitors’ efforts. If a leadership vacuum for ESG accountability exists, CIOs can either seek to support their peers that are likely to become accountable or take a leadership role in overseeing the area. CIOs should start working toward solutions that deliver real-time reporting on ESG goals to make reporting frictionless.

      “If you don’t have ESG oversight at the highest levels of the company, it won’t wind up getting the focus. That’s why we review it at the Board multiple times per year. We have an annual report, we compare how we did, what we intended to do, where did we fall short, where did we exceed, and where we can run for daylight to do more.” (David Dorman, CVS Health)

      Take the next step

      ESG Disclosures: How Will We Record Status Updates on the World We Are Creating?
      Prepare for the era of mandated environmental, social, and governance disclosures.

      Private Equity and Venture Capital Growing Impact of ESG Report
      Learn about how the growing impact of ESG affects both your organization and IT specifically, including challenges and opportunities, with expert assistance.

      “Business Intelligence and Reporting” gap between importance and effectiveness
      Info-Tech Research Group Management and Governance Diagnostic Benchmark 2021

      A bar chart illustrating the 'BI and Reporting' gap between importance and effectiveness. The difference is marked as Delta 2.4.

      The Five Priorities

      Priorities to compete in the digital economy

      1. Reduce Friction in the Hybrid Operating Model
      2. Improve Your Ransomware Readiness
      3. Support an Employee-Centric Retention Strategy
      4. Design an Automation Platform
      5. Prepare to Report on New Environmental, Social, and Governance Metrics

      Contributing Experts

      Elizabeth Clark

      CIO, Harvard Business School
      Photo of Elizabeth Clark, CIO, Harvard Business School.

      Jeff Previte

      Executive Vice-President of IT, CrossCountry Mortgage
      Photo of Jeff Previte, Executive Vice-President of IT, CrossCountry Mortgage.

      Bob Crozier

      Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE
      Photo of Bob Crozier, Chief Architect, Allianz Technology & Global Head of Blockchain, Allianz Technology SE.

      David W. Dorman

      Chairman of the Board, CVS Health
      Photo of David W. Dorman, Chairman of the Board, CVS Health.

      Info-Tech’s internal CIO panel contributors

      • Bryan Tutor
      • John Kemp
      • Mike Schembri
      • Janice Clatterbuck
      • Sandy Silk
      • Sallie Wright
      • David Wallace
      • Ken McGee
      • Mike Tweedie
      • Cole Cioran
      • Kevin Tucker
      • Angelina Atkins
      • Yakov Kofner
      Photo of an internal CIO panel contributor. Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.
      Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.
      Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.Photo of an internal CIO panel contributor.

      Thank you for your support

      Logo for the Blockchain Research Institute.
      Blockchain Research Institute

      Bibliography – CIO Priorities 2022

      “2020 Corporate Social Responsibility Report.” CVS Health, 2020, p. 127. Web.

      “Adversary: Doppel Spider - Threat Actor.” Crowdstrike Adversary Universe, 2021. Accessed 29 Dec. 2021.

      “Aetna CVS Health Success Story.” HYPR, n.d. Accessed 6 Feb. 2022.

      Baig, Aamer. “The CIO agenda for the next 12 months: Six make-or-break priorities.” McKinsey Digital, 1 Nov. 2021. Web.

      Ball, Sarah, Kristene Diggins, Nairobi Martindale, Angela Patterson, Anne M. Pohnert, Jacinta Thomas, Tammy Todd, and Melissa Bates. “2020 ANCC Pathway Award® winner.” Wolters Kluwer Health, Inc., 2021. Accessed 6 Feb. 2022.

      “Canadian Universities Propose Designs for a Central Bank Digital Currency.” Bank of Canada, 11 Feb. 2021. Accessed 14 Dec. 2021.

      “Carbon Sequestration in Wetlands.” MN Board of Water and Soil Resources, n.d. Accessed 15 Nov. 2021.

      “CCM Honored as a NorthCoast 99 Award Winner.” CrossCountry Mortgage, 1 Dec. 2021. Web.

      Cheek, Catherine. “Four Things We Learned About the Resignation Wave–and What to Do Next.” Visier Inc. (blog), 5 Oct. 2021. Web.

      “Companies Using Hyperledger Fabric, Market Share, Customers and Competitors.” HG Insights, 2022. Accessed 25 Jan. 2022.

      “IFRS Foundation Announces International Sustainability Standards Board, Consolidation with CDSB and VRF, and Publication of Prototype Disclosure Requirements.” IFRS, 3 Nov. 2021. Web.

      “IT Priorities for 2022: A CIO Report.” Mindsight, 28 Oct. 2021. Web.

      “Job Openings and Labor Turnover Survey.” Databases, Tables & Calculators by Subject, U.S. Bureau of Labor Statistics, 2022. Accessed 9 Feb. 2022.

      Kumar, Rashmi, and Michael Krigsman. “CIO Planning and Investment Strategy 2022.” CXOTalk, 13 Sept. 2021. Web.

      Leonhardt, Megan. “The Great Resignation Is Hitting These Industries Hardest.” Fortune, 16 Nov. 2021. Accessed 7 Jan. 2022.

      “Most companies align with SDGs – but more to do on assessing progress.” Global Reporting Initiative (GRI), 17 Jan. 2022. Web.

      Navagamuwa, Roshan. “Beyond Passwords: Enhancing Data Protection and Consumer Experience.” LinkedIn, 15 Dec. 2020.

      Ojo, Oluwaseyi. “Achieving Digital Business Transformation Using COBIT 2019.” ISACA, 19 Aug. 2019. Web.

      “Priority.” Lexico.com, Oxford University Press, 2021. Web.

      Riebold, Jan, and Yannick Bartens. “Reinventing the Digital IT Operating Model for the ‘New Normal.’” Capgemini Worldwide, 3 Nov. 2020. Web.

      Samuels, Mark. “The CIO’s next priority: Using the tech budget for growth.” ZDNet, 1 Sept. 2021. Accessed 1 Nov. 2021.

      Sayer, Peter. “Exclusive Survey: CIOs Outline Tech Priorities for 2021-22.” CIO, 5 Oct. 2021. Web.

      Shacklett, Mary E. “Where IT Leaders Are Likely to Spend Budget in 2022.” InformationWeek, 10 Aug. 2021. Web.

      “Table 4. Quits Levels and Rates by Industry and Region, Seasonally Adjusted - 2021 M11 Results.” U.S. Bureau of Labor Statistics, Economic News Release, 1 Jan. 2022. Accessed 7 Jan. 2022.

      “Technology Priorities CIOs Must Address in 2022.” Gartner, 19 Oct. 2021. Accessed 1 Nov. 2021.

      Thomson, Joel. Technology, Talent, and the Future Workplace: Canadian CIO Outlook 2021. The Conference Board of Canada, 7 Dec. 2021. Web.

      “Trend.” Lexico.com, Oxford University Press, 2021. Web.

      Vellante, Dave. “CIOs signal hybrid work will power tech spending through 2022.” SiliconANGLE, 25 Sept. 2021. Web.

      Whieldon, Esther, and Robert Clark. “ESG funds beat out S&P 500 in 1st year of COVID-19; how 1 fund shot to the top.” S&P Global Market Intelligence, April 2021. Accessed Dec. 2021.

      Adapt Your Customer Experience Strategy to Successfully Weather COVID-19

      • Buy Link or Shortcode: {j2store}536|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • COVID-19 is an unprecedented global pandemic. It’s creating significant challenges across every sector.
      • Collapse of financial markets and a steep decline in consumer confidence has most firms nervous about revenue shortfalls and cash burn rates.
      • The economic impact of COVID-19 is freezing IT budgets and sharply changing IT priorities.
      • The human impact of COVID-19 is likely to lead to staffing shortfalls and knowledge gaps.
      • COVID-19 may be in play for up to two years.

      Our Advice

      Critical Insight

      The challenges posed by the virus are compounded by the fact that consumer expectations for strong service delivery remain high:

      • Customers still expect timely, on-demand service from the businesses they engage with.
      • There is uncertainty about how to maintain strong, revenue-driving experiences when faced with the operational challenges posed by the virus.
      • COVID-19 is changing how organizations prioritize spending priorities within their CXM strategies.

      Impact and Result

      • Info-Tech recommends rapidly updating your strategy for customer experience management to ensure it can rise to the occasion.
      • Start by assessing the risk COVID-19 poses to your CXM approach and how it’ll impact marketing, sales, and customer service functions.
      • Implement actionable measures to blunt the threat of COVID-19 while protecting revenue, maintaining consistent product and service delivery, and improving the integrity of your brand. We’ll dive into five proven techniques in this brief!

      Adapt Your Customer Experience Strategy to Successfully Weather COVID-19 Research & Tools

      Start here

      Read our concise Executive Brief to find out why you should examine the impact of COVID-19 on customer experience strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Adapt Your Customer Experience Strategy to Successfully Weather COVID-19 Storyboard

      1. Assess the impact of COVID-19 on your CXM strategy

      Create a consolidated, updated view of your current customer experience management strategy and identify which elements can be capitalized on to dampen the impact of COVID-19 and which elements are vulnerabilities that the pandemic may threaten to exacerbate.

      2. Blunt the damage of COVID-19 with new CXM tactics

      Create a roadmap of business and technology initiatives through the lens of customer experience management that can be used to help your organization protect its revenue, maintain customer engagement, and enhance its brand integrity.

      [infographic]