Strategy and Tactics to Achieve Effective IT Governance

Size: px
Start display at page:

Download "Strategy and Tactics to Achieve Effective IT Governance"

Transcription

1 Strategy and Tactics to Achieve Effective IT Governance By Kerry Litten BT Senior Principal BT Compute Services that adapt

2 Introduction IT governance is currently a hot topic and has been for some time. A consensus has formed that it should be an important area of focus for any organization interested in increasing the business value derived from their investment in IT. But what is meant by the term IT governance? Is it a process, and if so, who performs it? In the book entitled IT Governance by Peter Weill and Jeanne W. Ross, IT governance is initially defined as Specifying the decision rights and accountability framework to encourage desirable behavior in the use of IT. However, as the book goes on to acknowledge, IT governance is more than this: Decisionmaking structures are the first step in designing IT governance. But effective governance is as much actions as decisions. A number of components to IT governance are needed, including: A process aspect that takes into account the need for decision- making and decision-support activities to be done in a structured and consistent way Clearly defined criteria for making decisions Well defined responsibilities and accountability assigned to the groups and individuals who are involved in making the decisions All organizations that use IT to support their businesses perform some form of IT governance. The purpose of this white paper is to provide a step-by-step guide to achieving effective IT governance by improving existing mechanisms, which are often informal, not clearly defined and lacking in transparency (i.e., the basis for decisions taken is not always clear). The first section provides a simple definition of what IT governance is, why it s important, its scope and who is responsible. The following sections present the three strategic steps and supporting tactical actions that will achieve effective IT governance. The What, Why and Who of IT Governance What it is IT governance can be simply defined as: The process of identifying what IT should do in terms of new initiatives (e.g., new/amended services or applications) improving/maintaining current performance (e.g., improving security, increasing capacity or improving resilience) Allocating resources (primarily money and staff time, but also assets and facilities) to achieve the selected goals IT governance is separate from the day-to-day management of IT services and projects in that IT management decisions are made and activities are performed in order to carry out the IT strategy defined by IT governance. These activities must adhere to the budget set by IT governance, or if they do not, they must be escalated as a request for exception to secure additional resources using the IT governance process. Why it is important Effective IT governance is needed to ensure that IT is aligned with the business strategy and that appropriate investments are being made in IT. It is not just a one-time or occasional activity. A key part of IT governance is to continually monitor the performance of IT from a business standpoint and to adjust priorities or investment as often as necessary to maximize its contribution to the achievement of business goals. There are three interrelated IT decision areas that IT governance needs to address : IT Principles, e.g. Info Security, Regulatory Compliance or Outsourcing Selected IT Functions IT Architecture (organizing logic for data, applications and infrastructure) Prioritization of requirements and investment in new or changed: IT Infrastructure (includes physical infrastructure and staff and services provided by third parties) Business Applications The way that these decision areas influence one another is depicted in Figure 1. Who should participate? Involving business managers with IT management in the IT governance process is absolutely crucial since IT is funded and exists to provide services to the business. The level of involvement will vary depending on the IT governance decision area. Business managers are likely to be more interested in decisions about IT principles (which shape the way that IT services and supports business processes) than those about IT Architecture (which require technical input, but should nevertheless be driven by business applications and access requirements). Organizations choose different decision-making structures and ways of assigning responsibility and accountability between IT and business managers. This is discussed further inthe following section.

3 Strategy for Effective IT Governance Step 1: Define the decision criteria In the preceding section, we described IT governance as the process of making high-level decisions about IT and allocating the resources needed to implement these decisions. The first step in an implementation strategy consists of defining the criteria by which these decisions should be made. The IT Governance Institute defines the following five focus areas for IT governance: Strategic Alignment Value Delivery Risk Management Resource Management Performance Measurement The first three focus areas address the purpose of IT governance, which is to 1) optimize the alignment between business strategy and IT, 2) maximize the business value delivered by IT and 3) ensure that IT-related risks, including compliance requirements, are fully understood and effectively managed. These three therefore provide the generic criteria for IT governance decisions. Resource management addresses the allocation of resources to implement decisions, and performance measurement provides essential feedback on the outcome of IT governance decisions. Before each decision is made, it is necessary to ask to what extent that decision improves alignment, value delivery or risk management. Metrics need to be identified that can be used to assess the likely effect of IT governance decisions and then measure their outcome against these goals in a consistent and clear manner. The process of identifying suitable metrics is a valuable exercise as it addresses fundamental questions about the use of IT within the organization and the way its performance will be measured in business terms. Metric identification should be conducted jointly by representatives from IT and the business, which can improve mutual understanding and trust. Let us briefly consider each of the goals in turn. (More detail on metrics is available in a separate white paper from which some of the following information is drawn.) Strategic alignment IT policies and standards, particularly those that are derived from IT principles, play a key role in ensuring that the activities of the IT organization are aligned with the business strategy. Therefore, compliance with these policies and standards is an important means of maintaining that alignment. Metrics that specifically measure compliance with IT policies and standards are required. New alignment initiatives require a different approach in that their value must be evaluated by looking at the effect of both proceeding and not proceeding; these initiatives should be assessed as having a high, medium or low impact in enabling the achievement of strategic business goals. Value delivery In most organizations, IT services do not directly generate revenue. However, they enable the organization to create business value by generating revenue through business processes that enable development of new products, acquisition of new customers, etc. Therefore, the business value of IT services is the way that the services support the business processes. Some of the metrics that can be used to measure this business value include service availability and reliability, effectiveness in meeting business requirements [measured using Key Goal Indicators (KGIs) for IT services and processes], process efficiency and efficiency in the use of resources (cost control). Business processes still need to evolve and change, however. IT can add significant value by responding to and enabling these changes and in some circumstances actually driving them. Metrics that can be used to measure the capability of IT to deliver this value include: Speed at which IT projects can be designed and costed in response to new requirements Completion of projects on-time and within budget How quickly service levels can be changed and stabilized at these new levels How frequently IT proposes new or enhanced business Processes Risk management It is not practical to measure the effectiveness of risk management by looking at the frequency at which risks actually cause significant events that affect IT services, simply because such events are (one hopes) very infrequent. However, the level of compliance with risk management activities within operational IT Information Library (ITIL) processes such as Security, Availability and IT Service Continuity Management provides a good indication of how well risk management is being applied. In addition, it is possible to make an assessment of the effectiveness of the risk management controls, even if it cannot be directly measured. This is best accomplished by assessing these controls against a standard such as ISO (actually a series of standards concerning information security) or an industry-standard IT management framework such as Control Objectives for IT (COBIT).

4 Step 2: Decide who will make the decisions The purpose of this step is to formalize IT governance decisionmaking rights and associated organizational structures. In the first section we said that both IT and business management should be involved. There is no single best way to achieve this outcome. The way in which this is done needs to match the culture of the organization as well as the way in which IT is used in the business. In the book IT Governance, Peter Weill and Jeanne Ross identify five different styles (they call them archetypes) of sharing (or not) decision-making power as shown in Table 1. Table 1: IT Governance Styles Step 3: Define the IT governance process Having defined how IT governance decisions should be made and who should make them, the final strategic step is to bring these together as a process. What should this process look like? First of all it should be responsive to changes in business requirements and external factors (such as changes in compliance regulations). Good communication between IT and the business and the willingness for IT to be driven by business needs rather than internal priorities is paramount. Secondly, the IT governance process must monitor the performance of IT in business terms and drive performance improvement where it is needed. IT governance needs to be both reactive and proactive. The reactive role is to analyze and respond to inputs such as: New initiatives or changes in strategy from business units Changes to compliance regulations from external bodies Proposals for new or changed business applications Proposed changes to the IT infrastructure The proactive role measures IT performance and identifies ways in which it can be improved, including: Different styles are often used for the various IT governance decision areas (IT Principles, IT Architecture, etc.). Each organization should identify the style that suits it best for each decision area. Once this has been done, decisionmaking structures can be created, matching the representation in each structure to the chosen style and scope of decision-making responsibility. Examples include: Deploying new technology that offers better price/performance or new features that either better support business processes or enable completely new ones to be developed Improving efficiency by increasing the utilization of IT resources (without adversely affecting service levels) Modifying roles, responsibilties or organizational structures within the IT function An example process is shown in Figure 2. IT Service Management Governance Committee Project Portfolio Management Office (PPMO) IT Architecture Committee InfoSec Council In addition to defining the responsibility and accountability of each decision-making structure, it is also important to specify this for the individual roles that comprise it.

5 This example shows an IT governance process that consists of six sub-processes labeled GOV.1 GOV.6. The IT service management processes that interface with IT governance are shown at the bottom of the diagram together with the primary entities with which it interfaces (regulatory authorities and business units). GOV.1 Communication & Interfacing is the sub-process concerned with ensuring good communication between IT, the business units and other sources of information needed by IT governance. GOV.2 GOV.4 are sub-processes that are used to analyze new initiatives and performance data. This analysis provides crucial input to the decision-making process. If it is not done or not done effectively, decisions may be either delayed or based on gut feel rather than analysis of their merits. Therefore, it is important to ensure that appropriately skilled staff are assigned to this activity, and that they are allocated sufficient time to perform the analysis. GOV.5 Manage Resources is the sub-process in which the decisionmaking, consisting of prioritization, acceptance or rejection of initiatives and allocation of resources to these takes place. GOV.6 Performance Measurement is concerned with monitoring the performance of IT including compliance with processes, assessment of controls and the status of projects.

6 Tactics to Achieve Strategy Step 1: Create/Review and implement principles IT principles play an important role in ensuring that an organization has the kind of IT services needed to support its business activities or, to put it another way, to ensure that the Information Technology provided is aligned with the business strategy. Principles should be defined and documented using the IT governance process, for example: Application development is out-tasked to a small number of trusted third parties The IT architecture should enable rapid scaling up or down of IT services capacity Procedures must demonstrably minimize risk of noncompliance with external regulations In order to be effective, however, principles need to be implemented, which is done through policies and standards. A familiar example of this is provided by security policies and standards. Each principle should be reviewed to identify the specific policies and standards needed to enforce it. For example, a policy derived from the first principle in the above list might state: Application development contracts may only be placed with companies on the approved list. A standard might be defined for the specific criteria that a company would need to satisfy in order to gain approval. Step 2: Define/Review IT architecture and enforce it As illustrated in Figure 1, IT architecture is influenced by IT principles and application requirements. If no architecture exists, one should be defined using the IT governance process. If there is an existing architecture, it should be reviewed regularly using the same process in order to ensure that it still supports IT services that are aligned with the business strategy. In a similar fashion to IT principles, compliance with the chosen IT architecture should be enforced through the use of appropriate policies and standards, which should be published so that anyone who may need to use them will be aware of their existence. Many organizations have chosen to create an IT Architecture Committee that has the responsibility to ensure that policies and standards are properly integrated and are regularly updated to reflect changes in technology. This committee is also responsible for deciding whether and when exceptions to policies or standards are acceptable. Examples of policies include: All customer-facing applications will be hosted in both the live and backup data centers Wireless networks will be deployed within all locations for end user access to applications Application firewalls will be used to protect against the inclusion of confidential data in Instant Messenger conversations Step 3: Ensure that IT services and processes are governable As we have discussed, IT governance is about making decisions, and to ensure that good decisions are made, good data is needed on which to base them. Analysis of the performance of IT in business terms relies on the ability to measure the key metrics identified in Step 1 in Strategy. This information enables resources (funding and staff time) to be focused on the services and processes that need them the most. Proposed changes to the infrastructure must be accompanied by information about why they are needed and what their effect will be. For example, a proposal in the Capacity Plan to increase the bandwidth of a network link should be based on an analysis of current utilization, the anticipated change in network traffic and the way in which additional bandwidth would accommodate this change. Therefore, an important step in implementing effective IT governance is ensuring that the IT environment is actually governable. This means that the performance of IT services is measured and reported upon and that the resources used to deliver these are deployed via consistent operational service delivery and service management processes. Although some organizations still choose to design their own IT processes, the quickest and most effective way to achieve consistent processes and measurements is to deploy a standard IT service management framework such as ITIL. The ITIL process architecture developed by BT from the official ITIL reference material published by the UK s OGC (Office of Government Commerce) is shown in Figure 3. An approach for rapidly implementing ITIL best practices is described in the white paper Five Steps to Implementing ITIL.

7 Step 4: Set targets The measurement of IT performance is a key part of the IT governance process. The final tactical step is to set targets for the performance of IT service management processes and the metrics defined in Step 1 of Strategy. These targets set performance objectives in terms of improvements in alignment, value and the effectiveness of IT-related risk management. Achievement against them enables IT management to determine whether they are meeting business expectations. However, it is important to recognize that the introduction and use of targets is not something that can be done without the support and agreement of everyone involved in the provision of IT services. IT performance measurement and the introduction of a formal IT governance process require a cultural change within the IT organization as well as the business units that use IT services. This means placing more focus on the effect that IT has on the business so that everyone involved is keen to strive for achievement of the targets rather than seeing them as some kind of mechanism designed to control their behavior. The role of IT governance is an enabling one, and for it to be effective, IT staff must see it in this light and value it for what it enables them to collectively achieve. Failure to meet process targets is initially something to be investigated by the IT staff involved in performing the process and the process owner. If it is discovered that there is an issue with process compliance or a problem with the process itself, the group should identify and implement suitable corrective action. However, if the reason for the failure is identified as a shortage of resources, the issue should be escalated to IT governance. Questions, such as what additional resources would be required to meet the target(s) and whether the target(s) have been set too high, should be discussed and a decision made as to how to resolve the gap either by adding resources or gaining agreement to lower targets. Investigation into the failure to meet overall targets set for alignment, business value or risk management should be driven by the IT governance process itself. If a project or initiative approved by IT governance is failing to deliver the expected benefits, its priority and use of resources should be carefully reviewed and adjustments made where necessary.

8 Conclusion This white paper attempts to dispel some of the mystery surrounding IT governance. BT believes that implementing effective IT governance is not such a daunting task as it might first appear when reduced to the strategic and tactical steps described. By following these steps, any organization large or small can make steady progress toward a governance process that continuously works to optimize the value that IT delivers to the business. Our experience and success in using this methodology allows us to provide guidance and practical help to clients wishing to achieve truly effective IT governance. About BT BT is one of the world s leading providers of communications solutions and services operating in 170 countries. Its principal activities include networked IT services, local national and international telecommunications services and higher-value broadband and Internet products and services. BT consists principally of four lines of business: BT Global Services, Openreach, BT Retail and BT Wholesale. British Telecommunications (BT) is a wholly owned subsidiary of BT Group and encompasses virtually all business and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York. For More Information Visit Offices worldwide The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc s respective standard conditions of contract. Nothing in this publication forms any part of any contract. British Telecommunications plc Registered office: 81 Newgate Street, London EC1A 7AJ Registered in England No:

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions

More information

Based on 2008 Survey of 255 Non-IT CEOs/Executives

Based on 2008 Survey of 255 Non-IT CEOs/Executives Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is

More information

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in

More information

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management

More information

Moving to a new dimension of networks. Connect IQ: evaluator

Moving to a new dimension of networks. Connect IQ: evaluator Moving to a new dimension of networks Connect IQ: evaluator Welcome to Connect IQ evaluator We begin the journey into the new network dimension with the BT Connect IQ evaluator. This is a complimentary

More information

An IT executive with over 25 years in the field A few companies I have worked for:

An IT executive with over 25 years in the field A few companies I have worked for: Jerry Gitlitz An IT executive with over 25 years in the field A few companies I have worked for: Chase Manhattan Bank IBM Goldman Sachs Bank of America I am ITIL, Six Sigma and CMM certified. Currently

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction

More information

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013 Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities

More information

Applying ITIL v3 Best Practices

Applying ITIL v3 Best Practices white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version

More information

An ITIL Perspective for Storage Resource Management

An ITIL Perspective for Storage Resource Management An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage

More information

ITIL Service Lifecycles and the Project Manager

ITIL Service Lifecycles and the Project Manager 1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure A risky business Why you can t afford to gamble on the resilience of business-critical infrastructure Banking on a computer system that never fails? Recent failures in the retail banking system show how

More information

Storage Management Within the NEW ITIL Version 3 Context. Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy

Storage Management Within the NEW ITIL Version 3 Context. Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy Storage Management Within the NEW ITIL Version 3 Context Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy Why ITIL? Total dependence on Information Technology Need to deal with complexity

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

BT BUSINESS PARTNER SALES.

BT BUSINESS PARTNER SALES. BT BUSINESS PARTNER SALES. INTERESTED IN BECOMING A BT BUSINESS PARTNER? PARTNER SALES PROPOSITION 2014/15. ADDING VALUE EXTENDING REACH. Look at this great proposition. CONTENTS. 1. BT BUSINESS PARTNER

More information

White Paper. Business Analysis meets Business Information Management

White Paper. Business Analysis meets Business Information Management White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Capacity Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.

More information

Practical Approaches to Achieving Sustainable IT Governance

Practical Approaches to Achieving Sustainable IT Governance Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions

More information

HOSTED CONTACT CENTRES

HOSTED CONTACT CENTRES 1 WE MAKE IT POSSIBLE Easy access to cloud contact centre technology With cutting-edge cloud technology, BT Wholesale is committed to providing innovation. 2 Overcoming contact centre challenges Contact

More information

IT Governance isn t one thing, it s everything. Steve Romero PMP, CISSP, CCP

IT Governance isn t one thing, it s everything. Steve Romero PMP, CISSP, CCP IT Governance isn t one thing, it s everything. Steve Romero PMP, CISSP, CCP 1 An executive view of governance Based on 2009 Survey of 255 Non-IT CEOs/Executives 50% Ranked ITG as very important 75% of

More information

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise BT Advise Connect Delivering intelligent network capability around the globe BT Connect IQ Quick Start BT Advise BT Connect IQ Quick Start In today s complex market, the network and delivery of network

More information

Trustworthy Computing Spring 2006

Trustworthy Computing Spring 2006 Trustworthy Computing Spring 2006 Project Topic: Risk Management of Information Technology Outsourcing under ITIL ITSM framework By: (Mina) Szu-Chia Cheng 1 pages of 19 Table of Content Abstract...3 Why

More information

WHOLESALE SIP TRUNKING

WHOLESALE SIP TRUNKING 1 WE MAKE IT POSSIBLE The dawn of a new era of communications BT Wholesale s how new technology can bring new opportunities. 2 The dawn of a new era of communications The world of communications is changing,

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended. Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide

More information

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS WE MAKE IT POSSIBLE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS UNIQUE WHOLESALE HOSTED CENTREX TAKING COMMUNICATION INTO THE CLOUD

More information

Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan

Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan CBI s Biopharmaceutical Forum on Clinical and Commercial Global Supply Chain Excellence Sandy Onorato

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

BT Managed Mobile Service. Increased mobility, greater control

BT Managed Mobile Service. Increased mobility, greater control BT Managed Mobile Service Increased mobility, greater control Increased mobility should mean greater opportunities, not a bigger headache. More flexible working practices can boost efficiency, increase

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

EXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE

EXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE 1 WE MAKE IT POSSIBLE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND EXPERTISE TO STIMULATE REVENUE Join with BT Wholesale and Cisco to go Beyond Connectivity with the BTW

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

GO BEYOND BROADBAND WITH BTNET. THE INTERNET CONNECTION THAT DELIVERS AN UNBEATABLE PERFORMANCE.

GO BEYOND BROADBAND WITH BTNET. THE INTERNET CONNECTION THAT DELIVERS AN UNBEATABLE PERFORMANCE. GO BEYOND BROADBAND WITH BTNET. THE INTERNET CONNECTION THAT DELIVERS AN UNBEATABLE PERFORMANCE. I've just sent it. Wow, I've already got it. Rock solid reliability we aim for 100% uptime. Unlimited use

More information

Managing relationship equilibrium in outsourcing

Managing relationship equilibrium in outsourcing Managing relationship equilibrium in outsourcing HP s relationship governance model and methodology Executive summary... 2 The governance balance... 3 HP s unique governance model... 5 Partner-based, collaborative

More information

ITIL and Outsourcing Engagements

ITIL and Outsourcing Engagements ITIL and Outsourcing Engagements A Trestle Group Research Publication TABLE OF CONTENTS Executive Summary About the Author About Trestle Group Research What is ITIL? The Relationship between ITIL and Outsourcing

More information

Feature. Developing an Information Security and Risk Management Strategy

Feature. Developing an Information Security and Risk Management Strategy Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide

More information

IT Service Management. The Role of Service Request Management

IT Service Management. The Role of Service Request Management RL Consulting IT Service Management The Role of Service Request Management Prepared by: Rick Leopoldi June 1, 2007 Copyright 2001-2007. All rights reserved. Duplication of this document or extraction of

More information

Data Gathering Instrument Service Portfolio Management

Data Gathering Instrument Service Portfolio Management Data Gathering Instrument Service Portfolio Management Information Technology Services Strategy Case studies in Nicaraguan municipal governments ALP (provisionally hidden) PhD Student National University

More information

Implementation of ITIL in a Moroccan company: the case of incident management process

Implementation of ITIL in a Moroccan company: the case of incident management process www.ijcsi.org 30 of ITIL in a Moroccan company: the case of incident management process Said Sebaaoui 1, Mohamed Lamrini 2 1 Quality Statistic Computing Laboratory, Faculty of Science Dhar el Mahraz, Fes,

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Release Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

ISSA Guidelines on Master Data Management in Social Security

ISSA Guidelines on Master Data Management in Social Security ISSA GUIDELINES ON INFORMATION AND COMMUNICATION TECHNOLOGY ISSA Guidelines on Master Data Management in Social Security Dr af t ve rsi on v1 Draft version v1 The ISSA Guidelines for Social Security Administration

More information

COMPREHENSIVE ASSET MANAGEMENT STRATEGY

COMPREHENSIVE ASSET MANAGEMENT STRATEGY COMPREHENSIVE ASSET MANAGEMENT STRATEGY APPROVED BY SENIOR MANAGEMENT COMMITTEE ON AUGUST 23, 2012 (TO BE FINALIZED AFTER APPROVAL OF CAM POLICY BY COUNCIL) August 2012 Contents CONTENTS EXECUTIVE SUMMARY

More information

BMC and ITIL: Continuing IT Service Evolution. Why adopting ITIL processes today can save your tomorrow

BMC and ITIL: Continuing IT Service Evolution. Why adopting ITIL processes today can save your tomorrow BMC and ITIL: Continuing IT Service Evolution Why adopting ITIL processes today can save your tomorrow What does it mean to adopt ITIL? Implementing ITIL? Don t. That s outdated thinking. Today s successful

More information

LCS Quick Start Service

LCS Quick Start Service BT s Quick Start service is a set of engagements that will enable you to deploy Microsoft Office Live Communications Server 2005 (LCS) into your network, providing an enterprise-grade, real-time communication

More information

How to Improve Service Quality through Service Desk Consolidation

How to Improve Service Quality through Service Desk Consolidation BEST PRACTICES WHITE PAPER How to Improve Quality through Desk Consolidation By Gerry Roy, Director of Solutions Management for Support, BMC Software, and Frederieke Winkler Prins, Senior IT Management

More information

The butterfly effect. How smart technology is set to completely transform utilities

The butterfly effect. How smart technology is set to completely transform utilities How smart technology is set to completely transform utilities An era of unprecedented change Utility companies operate in one of the most complex, high profile, regulated and politically charged sectors.

More information

BT Managed Services. Taking care of business, so you can take care of business

BT Managed Services. Taking care of business, so you can take care of business BT Managed Services Taking care of business, so you can take care of business If there s an issue, regardless of whether it s software, hardware or network, the stores have one number to call. BT Expedite

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Ann Geyer Tunitas Group. CGEIT Domains

Ann Geyer Tunitas Group. CGEIT Domains 1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%

More information

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005 The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the

More information

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL EGI Technical Forum 2011, Lyon (France) September 22, 2011 Dr. Thomas Schaaf www.gslm.eu EMERGENCE TECH LTD. The

More information

IT Service Management

IT Service Management IT Service Management Contents 1 Executive overview 3 2 Heightened customer expectations 4 3 An effective response to the 21st Century customer 6 4 BT and the customer-centric approach 8 5 Conclusion 10

More information

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

5 Signs You Might Need a Service Management Framework (SMF) Assessment

5 Signs You Might Need a Service Management Framework (SMF) Assessment 5 Signs You Might Need a Service Management Framework (SMF) Assessment White Paper Terry Daffin Visionary Integration Professionals (1) To say running a large IT shop is challenging is an understatement.

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

IT Service Management

IT Service Management IT Service Management Policy Based IT Service Management White Paper Prepared by: Rick Leopoldi March 23, 2004 Copyright 2001. All rights reserved. Duplication of this document or extraction of content

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

Release Management: Effective practices for IT delivery

Release Management: Effective practices for IT delivery Release Management: Effective practices for IT delivery Introduction Today s health plans face a unique combination of technology challenges due to their complex IT environments. These environments serve

More information

Employing ITSM in Value Added Service Provisioning

Employing ITSM in Value Added Service Provisioning RL Consulting People Process Technology Organization Integration Employing ITSM in Value Added Service Provisioning Prepared by: Rick Leopoldi January 31, 2015 BACKGROUND Service provisioning can oftentimes

More information

WHITE PAPER December, 2008

WHITE PAPER December, 2008 INTRODUCTION Key to most IT organization s ongoing success is the leadership team s ability to anticipate, plan for, and adapt to change. With ever changing business/mission requirements, customer/user

More information

Critical Success Factors in Selecting an IT Infrastructure Provider

Critical Success Factors in Selecting an IT Infrastructure Provider white paper: IT solutions Critical Success Factors in Selecting an IT Infrastructure Provider Start by Doing Your Homework....................................... 2 One Last Thing to Consider...................................................

More information

Application Support Solution

Application Support Solution Application Support Solution White Paper This document provides background and administration information on CAI s Legacy Application Support solution. PRO00001-MNGMAINT 080904 Table of Contents 01 INTRODUCTION

More information

What s your next move?

What s your next move? What s your next move? If you are thinking of moving premises let us know as soon as possible. Whether you are moving altogether, opening up additional premises or refurbishing existing premises, a move

More information

In the launch of this series, Information Security Management

In the launch of this series, Information Security Management Information Security Management Programs: Operational Assessments Lessons Learned and Best Practices Revealed JUSTIN SOMAINI AND ALAN HAZLETON As the authors explain, a comprehensive assessment process

More information

How To Use Risk It

How To Use Risk It Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision

More information

Connect Intelligence. Performance intelligence for your application delivery chain. BT Connect Networks that think

Connect Intelligence. Performance intelligence for your application delivery chain. BT Connect Networks that think Connect Intelligence Performance intelligence for your application delivery chain BT Connect Networks that think Connect Intelligence is a managed service from BT based upon Compuware Technology that provides

More information

IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA

IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA Things we hear! You are making it much too complex. It is an IT problem! We do not know where to start! We do this already!

More information

Managing cloud services risk throughout a supplier lifecycle relationship

Managing cloud services risk throughout a supplier lifecycle relationship Managing cloud services risk throughout a supplier lifecycle relationship By Mark Becker, Senior security consultant, BT and Bryan Fite, Security portfolio manager, BT Introduction Cloud services have

More information

EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam

EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus

More information

Creating and Maturing a Service Catalog

Creating and Maturing a Service Catalog Creating and Maturing a Service Catalog By Wendy Kuhn and Pam Erskine Third Sky, Inc. Introduction Developing a service catalog can seem like a simple marketing and communications activity or a daunting

More information

Introduction: ITIL Version 3 and the ITIL Process Map V3

Introduction: ITIL Version 3 and the ITIL Process Map V3 Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...

More information

The ITIL Story White Paper

The ITIL Story White Paper The ITIL Story White Paper Produced By: Pink Elephant Version: 3.3 Date of Publication: September, 2004 Table of Contents 1. ITIL Defined... 3 2. Non-Proprietary... 4 3. Concepts Behind The Library...

More information

Practitioner Certificate Software Asset Management Syllabus. Version 2.0

Practitioner Certificate Software Asset Management Syllabus. Version 2.0 Practitioner Certificate Software Asset Management Syllabus Version 2.0 June 2010 Practitioner Certificate in Software Asset Management The ISEB Practitioner Certificate in Software Asset Management (SAM)

More information

WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services

WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services

More information

I.T. Service Management

I.T. Service Management I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased

More information

OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY

OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY AMDOCS CUSTOMER success story OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY We wanted a partner that would talk straight with us, and that s exactly the Amdocs approach.

More information

Business strength broadband at our best ever price.

Business strength broadband at our best ever price. BT Business Business strength broadband at our best ever price. BT Business Total Broadband offers outstanding speed, service, support and value for money. BT Business Total Broadband is designed for the

More information

White Paper. An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit

White Paper. An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit White Paper An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit This document contains Confidential, Proprietary and Trade Secret Information (

More information

CHArTECH BOOkS MANAgEMENT SErIES INTrODuCINg ITSM AND ITIL A guide TO IT SErvICE MANAgEMENT www.icaew.com/itfac

CHArTECH BOOkS MANAgEMENT SErIES INTrODuCINg ITSM AND ITIL A guide TO IT SErvICE MANAgEMENT www.icaew.com/itfac Chartech Books Management Series Introducing ITSM and ITIL A Guide to IT Service Management www.icaew.com/itfac Introducing ITSM and ITIL A Guide to IT Service Management by Colin Rudd This report is published

More information

BT Business One Plan Traditional Inclusive.

BT Business One Plan Traditional Inclusive. Unlimited calls for 22.50 a month BT Business BT Business One Plan Traditional Inclusive. All your communications. One Plan. One Bill. One Great Price. One Plan for everything. BT Business One Plan Traditional

More information

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

TOGAF TOGAF & Major IT Frameworks, Architecting the Family

TOGAF TOGAF & Major IT Frameworks, Architecting the Family Fall 08 TOGAF TOGAF & Major IT Frameworks, Architecting the Family Date: February 2013 Prepared by: Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. TOGAF

More information

BT One for Communications. Mobile Roam. A unified roaming service offering your customers enhanced mobile connection around the world.

BT One for Communications. Mobile Roam. A unified roaming service offering your customers enhanced mobile connection around the world. BT One for Communications Mobile Roam A unified roaming service offering your customers enhanced mobile connection around the world. As the world shrinks, your mobile services must expand Your customers

More information

BT Unified Trading communication. The Future Delivered

BT Unified Trading communication. The Future Delivered BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

More information

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework

More information

Enterprise Risk Management: COSO, New COSO, ISO 31000. Review of ERM

Enterprise Risk Management: COSO, New COSO, ISO 31000. Review of ERM Enterprise Risk Management: COSO, New COSO, Dr. Hugh Van Seaton, Ed. D., CSSGB, CGMA, CPA Review of ERM COSO a process, effected by an entity's board of directors, management and other personnel, applied

More information

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.

More information

Aligning Quality Management Processes to Compliance Goals

Aligning Quality Management Processes to Compliance Goals Aligning Quality Management Processes to Compliance Goals MetricStream.com Smart Consulting Group Joint Webinar February 23 rd 2012 Nigel J. Smart, Ph.D. Smart Consulting Group 20 E. Market Street West

More information

The ITIL Story. Pink Elephant. The contents of this document are protected by copyright and cannot be reproduced in any manner.

The ITIL Story. Pink Elephant. The contents of this document are protected by copyright and cannot be reproduced in any manner. 1. ITIL Defined The Information Technology Infrastructure Library (ITIL) is a set of guidance developed by the United Kingdom s Office Of Government Commerce (OGC). The guidance, documented in a set of

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: E-Guide Network Management Fundamentals Network management is a complex topic. In today's diverse networking infrastructure, the network has to handle more instances of unified communications, video, and

More information

Integrate Big Data into Business Processes and Enterprise Systems. solution white paper

Integrate Big Data into Business Processes and Enterprise Systems. solution white paper Integrate Big Data into Business Processes and Enterprise Systems solution white paper THOUGHT LEADERSHIP FROM BMC TO HELP YOU: Understand what Big Data means Effectively implement your company s Big Data

More information

BT for Retail. Supply chain solutions for omni-channel success

BT for Retail. Supply chain solutions for omni-channel success BT for Retail Supply chain solutions for omni-channel success While customer experience rightly gets a lot of attention, the forgotten front of omni-channel retailing is the supply chain. It is here that

More information

1 WE MAKE IT POSSIBLE BT LOCATION SERVICES. Protection, advice, care. Professional services and assistance to boost efficiency.

1 WE MAKE IT POSSIBLE BT LOCATION SERVICES. Protection, advice, care. Professional services and assistance to boost efficiency. 1 WE MAKE IT POSSIBLE SERVICES Protection, advice, care Professional services and assistance to boost efficiency. 2 SERVICES What is BT Location Services? BT Location Services is a portfolio of products,

More information