Strategy and Tactics to Achieve Effective IT Governance
|
|
- Maude Townsend
- 8 years ago
- Views:
Transcription
1 Strategy and Tactics to Achieve Effective IT Governance By Kerry Litten BT Senior Principal BT Compute Services that adapt
2 Introduction IT governance is currently a hot topic and has been for some time. A consensus has formed that it should be an important area of focus for any organization interested in increasing the business value derived from their investment in IT. But what is meant by the term IT governance? Is it a process, and if so, who performs it? In the book entitled IT Governance by Peter Weill and Jeanne W. Ross, IT governance is initially defined as Specifying the decision rights and accountability framework to encourage desirable behavior in the use of IT. However, as the book goes on to acknowledge, IT governance is more than this: Decisionmaking structures are the first step in designing IT governance. But effective governance is as much actions as decisions. A number of components to IT governance are needed, including: A process aspect that takes into account the need for decision- making and decision-support activities to be done in a structured and consistent way Clearly defined criteria for making decisions Well defined responsibilities and accountability assigned to the groups and individuals who are involved in making the decisions All organizations that use IT to support their businesses perform some form of IT governance. The purpose of this white paper is to provide a step-by-step guide to achieving effective IT governance by improving existing mechanisms, which are often informal, not clearly defined and lacking in transparency (i.e., the basis for decisions taken is not always clear). The first section provides a simple definition of what IT governance is, why it s important, its scope and who is responsible. The following sections present the three strategic steps and supporting tactical actions that will achieve effective IT governance. The What, Why and Who of IT Governance What it is IT governance can be simply defined as: The process of identifying what IT should do in terms of new initiatives (e.g., new/amended services or applications) improving/maintaining current performance (e.g., improving security, increasing capacity or improving resilience) Allocating resources (primarily money and staff time, but also assets and facilities) to achieve the selected goals IT governance is separate from the day-to-day management of IT services and projects in that IT management decisions are made and activities are performed in order to carry out the IT strategy defined by IT governance. These activities must adhere to the budget set by IT governance, or if they do not, they must be escalated as a request for exception to secure additional resources using the IT governance process. Why it is important Effective IT governance is needed to ensure that IT is aligned with the business strategy and that appropriate investments are being made in IT. It is not just a one-time or occasional activity. A key part of IT governance is to continually monitor the performance of IT from a business standpoint and to adjust priorities or investment as often as necessary to maximize its contribution to the achievement of business goals. There are three interrelated IT decision areas that IT governance needs to address : IT Principles, e.g. Info Security, Regulatory Compliance or Outsourcing Selected IT Functions IT Architecture (organizing logic for data, applications and infrastructure) Prioritization of requirements and investment in new or changed: IT Infrastructure (includes physical infrastructure and staff and services provided by third parties) Business Applications The way that these decision areas influence one another is depicted in Figure 1. Who should participate? Involving business managers with IT management in the IT governance process is absolutely crucial since IT is funded and exists to provide services to the business. The level of involvement will vary depending on the IT governance decision area. Business managers are likely to be more interested in decisions about IT principles (which shape the way that IT services and supports business processes) than those about IT Architecture (which require technical input, but should nevertheless be driven by business applications and access requirements). Organizations choose different decision-making structures and ways of assigning responsibility and accountability between IT and business managers. This is discussed further inthe following section.
3 Strategy for Effective IT Governance Step 1: Define the decision criteria In the preceding section, we described IT governance as the process of making high-level decisions about IT and allocating the resources needed to implement these decisions. The first step in an implementation strategy consists of defining the criteria by which these decisions should be made. The IT Governance Institute defines the following five focus areas for IT governance: Strategic Alignment Value Delivery Risk Management Resource Management Performance Measurement The first three focus areas address the purpose of IT governance, which is to 1) optimize the alignment between business strategy and IT, 2) maximize the business value delivered by IT and 3) ensure that IT-related risks, including compliance requirements, are fully understood and effectively managed. These three therefore provide the generic criteria for IT governance decisions. Resource management addresses the allocation of resources to implement decisions, and performance measurement provides essential feedback on the outcome of IT governance decisions. Before each decision is made, it is necessary to ask to what extent that decision improves alignment, value delivery or risk management. Metrics need to be identified that can be used to assess the likely effect of IT governance decisions and then measure their outcome against these goals in a consistent and clear manner. The process of identifying suitable metrics is a valuable exercise as it addresses fundamental questions about the use of IT within the organization and the way its performance will be measured in business terms. Metric identification should be conducted jointly by representatives from IT and the business, which can improve mutual understanding and trust. Let us briefly consider each of the goals in turn. (More detail on metrics is available in a separate white paper from which some of the following information is drawn.) Strategic alignment IT policies and standards, particularly those that are derived from IT principles, play a key role in ensuring that the activities of the IT organization are aligned with the business strategy. Therefore, compliance with these policies and standards is an important means of maintaining that alignment. Metrics that specifically measure compliance with IT policies and standards are required. New alignment initiatives require a different approach in that their value must be evaluated by looking at the effect of both proceeding and not proceeding; these initiatives should be assessed as having a high, medium or low impact in enabling the achievement of strategic business goals. Value delivery In most organizations, IT services do not directly generate revenue. However, they enable the organization to create business value by generating revenue through business processes that enable development of new products, acquisition of new customers, etc. Therefore, the business value of IT services is the way that the services support the business processes. Some of the metrics that can be used to measure this business value include service availability and reliability, effectiveness in meeting business requirements [measured using Key Goal Indicators (KGIs) for IT services and processes], process efficiency and efficiency in the use of resources (cost control). Business processes still need to evolve and change, however. IT can add significant value by responding to and enabling these changes and in some circumstances actually driving them. Metrics that can be used to measure the capability of IT to deliver this value include: Speed at which IT projects can be designed and costed in response to new requirements Completion of projects on-time and within budget How quickly service levels can be changed and stabilized at these new levels How frequently IT proposes new or enhanced business Processes Risk management It is not practical to measure the effectiveness of risk management by looking at the frequency at which risks actually cause significant events that affect IT services, simply because such events are (one hopes) very infrequent. However, the level of compliance with risk management activities within operational IT Information Library (ITIL) processes such as Security, Availability and IT Service Continuity Management provides a good indication of how well risk management is being applied. In addition, it is possible to make an assessment of the effectiveness of the risk management controls, even if it cannot be directly measured. This is best accomplished by assessing these controls against a standard such as ISO (actually a series of standards concerning information security) or an industry-standard IT management framework such as Control Objectives for IT (COBIT).
4 Step 2: Decide who will make the decisions The purpose of this step is to formalize IT governance decisionmaking rights and associated organizational structures. In the first section we said that both IT and business management should be involved. There is no single best way to achieve this outcome. The way in which this is done needs to match the culture of the organization as well as the way in which IT is used in the business. In the book IT Governance, Peter Weill and Jeanne Ross identify five different styles (they call them archetypes) of sharing (or not) decision-making power as shown in Table 1. Table 1: IT Governance Styles Step 3: Define the IT governance process Having defined how IT governance decisions should be made and who should make them, the final strategic step is to bring these together as a process. What should this process look like? First of all it should be responsive to changes in business requirements and external factors (such as changes in compliance regulations). Good communication between IT and the business and the willingness for IT to be driven by business needs rather than internal priorities is paramount. Secondly, the IT governance process must monitor the performance of IT in business terms and drive performance improvement where it is needed. IT governance needs to be both reactive and proactive. The reactive role is to analyze and respond to inputs such as: New initiatives or changes in strategy from business units Changes to compliance regulations from external bodies Proposals for new or changed business applications Proposed changes to the IT infrastructure The proactive role measures IT performance and identifies ways in which it can be improved, including: Different styles are often used for the various IT governance decision areas (IT Principles, IT Architecture, etc.). Each organization should identify the style that suits it best for each decision area. Once this has been done, decisionmaking structures can be created, matching the representation in each structure to the chosen style and scope of decision-making responsibility. Examples include: Deploying new technology that offers better price/performance or new features that either better support business processes or enable completely new ones to be developed Improving efficiency by increasing the utilization of IT resources (without adversely affecting service levels) Modifying roles, responsibilties or organizational structures within the IT function An example process is shown in Figure 2. IT Service Management Governance Committee Project Portfolio Management Office (PPMO) IT Architecture Committee InfoSec Council In addition to defining the responsibility and accountability of each decision-making structure, it is also important to specify this for the individual roles that comprise it.
5 This example shows an IT governance process that consists of six sub-processes labeled GOV.1 GOV.6. The IT service management processes that interface with IT governance are shown at the bottom of the diagram together with the primary entities with which it interfaces (regulatory authorities and business units). GOV.1 Communication & Interfacing is the sub-process concerned with ensuring good communication between IT, the business units and other sources of information needed by IT governance. GOV.2 GOV.4 are sub-processes that are used to analyze new initiatives and performance data. This analysis provides crucial input to the decision-making process. If it is not done or not done effectively, decisions may be either delayed or based on gut feel rather than analysis of their merits. Therefore, it is important to ensure that appropriately skilled staff are assigned to this activity, and that they are allocated sufficient time to perform the analysis. GOV.5 Manage Resources is the sub-process in which the decisionmaking, consisting of prioritization, acceptance or rejection of initiatives and allocation of resources to these takes place. GOV.6 Performance Measurement is concerned with monitoring the performance of IT including compliance with processes, assessment of controls and the status of projects.
6 Tactics to Achieve Strategy Step 1: Create/Review and implement principles IT principles play an important role in ensuring that an organization has the kind of IT services needed to support its business activities or, to put it another way, to ensure that the Information Technology provided is aligned with the business strategy. Principles should be defined and documented using the IT governance process, for example: Application development is out-tasked to a small number of trusted third parties The IT architecture should enable rapid scaling up or down of IT services capacity Procedures must demonstrably minimize risk of noncompliance with external regulations In order to be effective, however, principles need to be implemented, which is done through policies and standards. A familiar example of this is provided by security policies and standards. Each principle should be reviewed to identify the specific policies and standards needed to enforce it. For example, a policy derived from the first principle in the above list might state: Application development contracts may only be placed with companies on the approved list. A standard might be defined for the specific criteria that a company would need to satisfy in order to gain approval. Step 2: Define/Review IT architecture and enforce it As illustrated in Figure 1, IT architecture is influenced by IT principles and application requirements. If no architecture exists, one should be defined using the IT governance process. If there is an existing architecture, it should be reviewed regularly using the same process in order to ensure that it still supports IT services that are aligned with the business strategy. In a similar fashion to IT principles, compliance with the chosen IT architecture should be enforced through the use of appropriate policies and standards, which should be published so that anyone who may need to use them will be aware of their existence. Many organizations have chosen to create an IT Architecture Committee that has the responsibility to ensure that policies and standards are properly integrated and are regularly updated to reflect changes in technology. This committee is also responsible for deciding whether and when exceptions to policies or standards are acceptable. Examples of policies include: All customer-facing applications will be hosted in both the live and backup data centers Wireless networks will be deployed within all locations for end user access to applications Application firewalls will be used to protect against the inclusion of confidential data in Instant Messenger conversations Step 3: Ensure that IT services and processes are governable As we have discussed, IT governance is about making decisions, and to ensure that good decisions are made, good data is needed on which to base them. Analysis of the performance of IT in business terms relies on the ability to measure the key metrics identified in Step 1 in Strategy. This information enables resources (funding and staff time) to be focused on the services and processes that need them the most. Proposed changes to the infrastructure must be accompanied by information about why they are needed and what their effect will be. For example, a proposal in the Capacity Plan to increase the bandwidth of a network link should be based on an analysis of current utilization, the anticipated change in network traffic and the way in which additional bandwidth would accommodate this change. Therefore, an important step in implementing effective IT governance is ensuring that the IT environment is actually governable. This means that the performance of IT services is measured and reported upon and that the resources used to deliver these are deployed via consistent operational service delivery and service management processes. Although some organizations still choose to design their own IT processes, the quickest and most effective way to achieve consistent processes and measurements is to deploy a standard IT service management framework such as ITIL. The ITIL process architecture developed by BT from the official ITIL reference material published by the UK s OGC (Office of Government Commerce) is shown in Figure 3. An approach for rapidly implementing ITIL best practices is described in the white paper Five Steps to Implementing ITIL.
7 Step 4: Set targets The measurement of IT performance is a key part of the IT governance process. The final tactical step is to set targets for the performance of IT service management processes and the metrics defined in Step 1 of Strategy. These targets set performance objectives in terms of improvements in alignment, value and the effectiveness of IT-related risk management. Achievement against them enables IT management to determine whether they are meeting business expectations. However, it is important to recognize that the introduction and use of targets is not something that can be done without the support and agreement of everyone involved in the provision of IT services. IT performance measurement and the introduction of a formal IT governance process require a cultural change within the IT organization as well as the business units that use IT services. This means placing more focus on the effect that IT has on the business so that everyone involved is keen to strive for achievement of the targets rather than seeing them as some kind of mechanism designed to control their behavior. The role of IT governance is an enabling one, and for it to be effective, IT staff must see it in this light and value it for what it enables them to collectively achieve. Failure to meet process targets is initially something to be investigated by the IT staff involved in performing the process and the process owner. If it is discovered that there is an issue with process compliance or a problem with the process itself, the group should identify and implement suitable corrective action. However, if the reason for the failure is identified as a shortage of resources, the issue should be escalated to IT governance. Questions, such as what additional resources would be required to meet the target(s) and whether the target(s) have been set too high, should be discussed and a decision made as to how to resolve the gap either by adding resources or gaining agreement to lower targets. Investigation into the failure to meet overall targets set for alignment, business value or risk management should be driven by the IT governance process itself. If a project or initiative approved by IT governance is failing to deliver the expected benefits, its priority and use of resources should be carefully reviewed and adjustments made where necessary.
8 Conclusion This white paper attempts to dispel some of the mystery surrounding IT governance. BT believes that implementing effective IT governance is not such a daunting task as it might first appear when reduced to the strategic and tactical steps described. By following these steps, any organization large or small can make steady progress toward a governance process that continuously works to optimize the value that IT delivers to the business. Our experience and success in using this methodology allows us to provide guidance and practical help to clients wishing to achieve truly effective IT governance. About BT BT is one of the world s leading providers of communications solutions and services operating in 170 countries. Its principal activities include networked IT services, local national and international telecommunications services and higher-value broadband and Internet products and services. BT consists principally of four lines of business: BT Global Services, Openreach, BT Retail and BT Wholesale. British Telecommunications (BT) is a wholly owned subsidiary of BT Group and encompasses virtually all business and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York. For More Information Visit Offices worldwide The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc s respective standard conditions of contract. Nothing in this publication forms any part of any contract. British Telecommunications plc Registered office: 81 Newgate Street, London EC1A 7AJ Registered in England No:
Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist
Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions
More informationBased on 2008 Survey of 255 Non-IT CEOs/Executives
Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is
More informationWhite Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
More informationContents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.
iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management
More informationMoving to a new dimension of networks. Connect IQ: evaluator
Moving to a new dimension of networks Connect IQ: evaluator Welcome to Connect IQ evaluator We begin the journey into the new network dimension with the BT Connect IQ evaluator. This is a complimentary
More informationAn IT executive with over 25 years in the field A few companies I have worked for:
Jerry Gitlitz An IT executive with over 25 years in the field A few companies I have worked for: Chase Manhattan Bank IBM Goldman Sachs Bank of America I am ITIL, Six Sigma and CMM certified. Currently
More informationIT Services Management Service Brief
IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
More informationEnabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
More informationApplying ITIL v3 Best Practices
white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version
More informationAn ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
More informationITIL Service Lifecycles and the Project Manager
1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction
More informationStepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
More informationA risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure
A risky business Why you can t afford to gamble on the resilience of business-critical infrastructure Banking on a computer system that never fails? Recent failures in the retail banking system show how
More informationStorage Management Within the NEW ITIL Version 3 Context. Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy
Storage Management Within the NEW ITIL Version 3 Context Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy Why ITIL? Total dependence on Information Technology Need to deal with complexity
More informationProcurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
More informationBT BUSINESS PARTNER SALES.
BT BUSINESS PARTNER SALES. INTERESTED IN BECOMING A BT BUSINESS PARTNER? PARTNER SALES PROPOSITION 2014/15. ADDING VALUE EXTENDING REACH. Look at this great proposition. CONTENTS. 1. BT BUSINESS PARTNER
More informationWhite Paper. Business Analysis meets Business Information Management
White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute
More informationHP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
More informationIT Services Management Service Brief
IT Services Management Service Brief Capacity Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.
More informationPractical Approaches to Achieving Sustainable IT Governance
Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions
More informationHOSTED CONTACT CENTRES
1 WE MAKE IT POSSIBLE Easy access to cloud contact centre technology With cutting-edge cloud technology, BT Wholesale is committed to providing innovation. 2 Overcoming contact centre challenges Contact
More informationIT Governance isn t one thing, it s everything. Steve Romero PMP, CISSP, CCP
IT Governance isn t one thing, it s everything. Steve Romero PMP, CISSP, CCP 1 An executive view of governance Based on 2009 Survey of 255 Non-IT CEOs/Executives 50% Ranked ITG as very important 75% of
More informationBT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise
BT Advise Connect Delivering intelligent network capability around the globe BT Connect IQ Quick Start BT Advise BT Connect IQ Quick Start In today s complex market, the network and delivery of network
More informationTrustworthy Computing Spring 2006
Trustworthy Computing Spring 2006 Project Topic: Risk Management of Information Technology Outsourcing under ITIL ITSM framework By: (Mina) Szu-Chia Cheng 1 pages of 19 Table of Content Abstract...3 Why
More informationWHOLESALE SIP TRUNKING
1 WE MAKE IT POSSIBLE The dawn of a new era of communications BT Wholesale s how new technology can bring new opportunities. 2 The dawn of a new era of communications The world of communications is changing,
More informationCISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
More informationTDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide
More informationUNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS
WE MAKE IT POSSIBLE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS UNIQUE WHOLESALE HOSTED CENTREX TAKING COMMUNICATION INTO THE CLOUD
More informationEstablish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan
Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan CBI s Biopharmaceutical Forum on Clinical and Commercial Global Supply Chain Excellence Sandy Onorato
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationBT Managed Mobile Service. Increased mobility, greater control
BT Managed Mobile Service Increased mobility, greater control Increased mobility should mean greater opportunities, not a bigger headache. More flexible working practices can boost efficiency, increase
More informationEMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
More informationEXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE
1 WE MAKE IT POSSIBLE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND EXPERTISE TO STIMULATE REVENUE Join with BT Wholesale and Cisco to go Beyond Connectivity with the BTW
More informationP3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
More informationGO BEYOND BROADBAND WITH BTNET. THE INTERNET CONNECTION THAT DELIVERS AN UNBEATABLE PERFORMANCE.
GO BEYOND BROADBAND WITH BTNET. THE INTERNET CONNECTION THAT DELIVERS AN UNBEATABLE PERFORMANCE. I've just sent it. Wow, I've already got it. Rock solid reliability we aim for 100% uptime. Unlimited use
More informationManaging relationship equilibrium in outsourcing
Managing relationship equilibrium in outsourcing HP s relationship governance model and methodology Executive summary... 2 The governance balance... 3 HP s unique governance model... 5 Partner-based, collaborative
More informationITIL and Outsourcing Engagements
ITIL and Outsourcing Engagements A Trestle Group Research Publication TABLE OF CONTENTS Executive Summary About the Author About Trestle Group Research What is ITIL? The Relationship between ITIL and Outsourcing
More informationFeature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
More informationIT Service Management. The Role of Service Request Management
RL Consulting IT Service Management The Role of Service Request Management Prepared by: Rick Leopoldi June 1, 2007 Copyright 2001-2007. All rights reserved. Duplication of this document or extraction of
More informationData Gathering Instrument Service Portfolio Management
Data Gathering Instrument Service Portfolio Management Information Technology Services Strategy Case studies in Nicaraguan municipal governments ALP (provisionally hidden) PhD Student National University
More informationImplementation of ITIL in a Moroccan company: the case of incident management process
www.ijcsi.org 30 of ITIL in a Moroccan company: the case of incident management process Said Sebaaoui 1, Mohamed Lamrini 2 1 Quality Statistic Computing Laboratory, Faculty of Science Dhar el Mahraz, Fes,
More informationIT Services Management Service Brief
IT Services Management Service Brief Release Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.
More informationImplement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
More informationISSA Guidelines on Master Data Management in Social Security
ISSA GUIDELINES ON INFORMATION AND COMMUNICATION TECHNOLOGY ISSA Guidelines on Master Data Management in Social Security Dr af t ve rsi on v1 Draft version v1 The ISSA Guidelines for Social Security Administration
More informationCOMPREHENSIVE ASSET MANAGEMENT STRATEGY
COMPREHENSIVE ASSET MANAGEMENT STRATEGY APPROVED BY SENIOR MANAGEMENT COMMITTEE ON AUGUST 23, 2012 (TO BE FINALIZED AFTER APPROVAL OF CAM POLICY BY COUNCIL) August 2012 Contents CONTENTS EXECUTIVE SUMMARY
More informationBMC and ITIL: Continuing IT Service Evolution. Why adopting ITIL processes today can save your tomorrow
BMC and ITIL: Continuing IT Service Evolution Why adopting ITIL processes today can save your tomorrow What does it mean to adopt ITIL? Implementing ITIL? Don t. That s outdated thinking. Today s successful
More informationLCS Quick Start Service
BT s Quick Start service is a set of engagements that will enable you to deploy Microsoft Office Live Communications Server 2005 (LCS) into your network, providing an enterprise-grade, real-time communication
More informationHow to Improve Service Quality through Service Desk Consolidation
BEST PRACTICES WHITE PAPER How to Improve Quality through Desk Consolidation By Gerry Roy, Director of Solutions Management for Support, BMC Software, and Frederieke Winkler Prins, Senior IT Management
More informationThe butterfly effect. How smart technology is set to completely transform utilities
How smart technology is set to completely transform utilities An era of unprecedented change Utility companies operate in one of the most complex, high profile, regulated and politically charged sectors.
More informationBT Managed Services. Taking care of business, so you can take care of business
BT Managed Services Taking care of business, so you can take care of business If there s an issue, regardless of whether it s software, hardware or network, the stores have one number to call. BT Expedite
More informationHP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
More informationDevelopment, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
More informationAnn Geyer Tunitas Group. CGEIT Domains
1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%
More informationThe Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005
The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the
More informationTutorial: Towards better managed Grids. IT Service Management best practices based on ITIL
Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL EGI Technical Forum 2011, Lyon (France) September 22, 2011 Dr. Thomas Schaaf www.gslm.eu EMERGENCE TECH LTD. The
More informationIT Service Management
IT Service Management Contents 1 Executive overview 3 2 Heightened customer expectations 4 3 An effective response to the 21st Century customer 6 4 BT and the customer-centric approach 8 5 Conclusion 10
More informationOPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More information5 Signs You Might Need a Service Management Framework (SMF) Assessment
5 Signs You Might Need a Service Management Framework (SMF) Assessment White Paper Terry Daffin Visionary Integration Professionals (1) To say running a large IT shop is challenging is an understatement.
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationIT Service Management
IT Service Management Policy Based IT Service Management White Paper Prepared by: Rick Leopoldi March 23, 2004 Copyright 2001. All rights reserved. Duplication of this document or extraction of content
More informationASAE s Job Task Analysis Strategic Level Competencies
ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management
More informationRelease Management: Effective practices for IT delivery
Release Management: Effective practices for IT delivery Introduction Today s health plans face a unique combination of technology challenges due to their complex IT environments. These environments serve
More informationEmploying ITSM in Value Added Service Provisioning
RL Consulting People Process Technology Organization Integration Employing ITSM in Value Added Service Provisioning Prepared by: Rick Leopoldi January 31, 2015 BACKGROUND Service provisioning can oftentimes
More informationWHITE PAPER December, 2008
INTRODUCTION Key to most IT organization s ongoing success is the leadership team s ability to anticipate, plan for, and adapt to change. With ever changing business/mission requirements, customer/user
More informationCritical Success Factors in Selecting an IT Infrastructure Provider
white paper: IT solutions Critical Success Factors in Selecting an IT Infrastructure Provider Start by Doing Your Homework....................................... 2 One Last Thing to Consider...................................................
More informationApplication Support Solution
Application Support Solution White Paper This document provides background and administration information on CAI s Legacy Application Support solution. PRO00001-MNGMAINT 080904 Table of Contents 01 INTRODUCTION
More informationWhat s your next move?
What s your next move? If you are thinking of moving premises let us know as soon as possible. Whether you are moving altogether, opening up additional premises or refurbishing existing premises, a move
More informationIn the launch of this series, Information Security Management
Information Security Management Programs: Operational Assessments Lessons Learned and Best Practices Revealed JUSTIN SOMAINI AND ALAN HAZLETON As the authors explain, a comprehensive assessment process
More informationHow To Use Risk It
Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision
More informationConnect Intelligence. Performance intelligence for your application delivery chain. BT Connect Networks that think
Connect Intelligence Performance intelligence for your application delivery chain BT Connect Networks that think Connect Intelligence is a managed service from BT based upon Compuware Technology that provides
More informationIT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA
IT Governance (Worthwhile Exercise?) January 10, 2013 Presented by Chad Murphy, CISA Things we hear! You are making it much too complex. It is an IT problem! We do not know where to start! We do this already!
More informationManaging cloud services risk throughout a supplier lifecycle relationship
Managing cloud services risk throughout a supplier lifecycle relationship By Mark Becker, Senior security consultant, BT and Bryan Fite, Security portfolio manager, BT Introduction Cloud services have
More informationEXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus
More informationCreating and Maturing a Service Catalog
Creating and Maturing a Service Catalog By Wendy Kuhn and Pam Erskine Third Sky, Inc. Introduction Developing a service catalog can seem like a simple marketing and communications activity or a daunting
More informationIntroduction: ITIL Version 3 and the ITIL Process Map V3
Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...
More informationThe ITIL Story White Paper
The ITIL Story White Paper Produced By: Pink Elephant Version: 3.3 Date of Publication: September, 2004 Table of Contents 1. ITIL Defined... 3 2. Non-Proprietary... 4 3. Concepts Behind The Library...
More informationPractitioner Certificate Software Asset Management Syllabus. Version 2.0
Practitioner Certificate Software Asset Management Syllabus Version 2.0 June 2010 Practitioner Certificate in Software Asset Management The ISEB Practitioner Certificate in Software Asset Management (SAM)
More informationWHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
More informationI.T. Service Management
I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased
More informationOPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY
AMDOCS CUSTOMER success story OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY We wanted a partner that would talk straight with us, and that s exactly the Amdocs approach.
More informationBusiness strength broadband at our best ever price.
BT Business Business strength broadband at our best ever price. BT Business Total Broadband offers outstanding speed, service, support and value for money. BT Business Total Broadband is designed for the
More informationWhite Paper. An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit
White Paper An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit This document contains Confidential, Proprietary and Trade Secret Information (
More informationCHArTECH BOOkS MANAgEMENT SErIES INTrODuCINg ITSM AND ITIL A guide TO IT SErvICE MANAgEMENT www.icaew.com/itfac
Chartech Books Management Series Introducing ITSM and ITIL A Guide to IT Service Management www.icaew.com/itfac Introducing ITSM and ITIL A Guide to IT Service Management by Colin Rudd This report is published
More informationBT Business One Plan Traditional Inclusive.
Unlimited calls for 22.50 a month BT Business BT Business One Plan Traditional Inclusive. All your communications. One Plan. One Bill. One Great Price. One Plan for everything. BT Business One Plan Traditional
More informationCriticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation
More informationENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
More informationTOGAF TOGAF & Major IT Frameworks, Architecting the Family
Fall 08 TOGAF TOGAF & Major IT Frameworks, Architecting the Family Date: February 2013 Prepared by: Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. TOGAF
More informationBT One for Communications. Mobile Roam. A unified roaming service offering your customers enhanced mobile connection around the world.
BT One for Communications Mobile Roam A unified roaming service offering your customers enhanced mobile connection around the world. As the world shrinks, your mobile services must expand Your customers
More informationBT Unified Trading communication. The Future Delivered
BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based
More informationInformation Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
More informationEnterprise Risk Management: COSO, New COSO, ISO 31000. Review of ERM
Enterprise Risk Management: COSO, New COSO, Dr. Hugh Van Seaton, Ed. D., CSSGB, CGMA, CPA Review of ERM COSO a process, effected by an entity's board of directors, management and other personnel, applied
More informationTOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy
TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.
More informationAligning Quality Management Processes to Compliance Goals
Aligning Quality Management Processes to Compliance Goals MetricStream.com Smart Consulting Group Joint Webinar February 23 rd 2012 Nigel J. Smart, Ph.D. Smart Consulting Group 20 E. Market Street West
More informationThe ITIL Story. Pink Elephant. The contents of this document are protected by copyright and cannot be reproduced in any manner.
1. ITIL Defined The Information Technology Infrastructure Library (ITIL) is a set of guidance developed by the United Kingdom s Office Of Government Commerce (OGC). The guidance, documented in a set of
More informationE-Guide. Sponsored By:
E-Guide Network Management Fundamentals Network management is a complex topic. In today's diverse networking infrastructure, the network has to handle more instances of unified communications, video, and
More informationIntegrate Big Data into Business Processes and Enterprise Systems. solution white paper
Integrate Big Data into Business Processes and Enterprise Systems solution white paper THOUGHT LEADERSHIP FROM BMC TO HELP YOU: Understand what Big Data means Effectively implement your company s Big Data
More informationBT for Retail. Supply chain solutions for omni-channel success
BT for Retail Supply chain solutions for omni-channel success While customer experience rightly gets a lot of attention, the forgotten front of omni-channel retailing is the supply chain. It is here that
More information1 WE MAKE IT POSSIBLE BT LOCATION SERVICES. Protection, advice, care. Professional services and assistance to boost efficiency.
1 WE MAKE IT POSSIBLE SERVICES Protection, advice, care Professional services and assistance to boost efficiency. 2 SERVICES What is BT Location Services? BT Location Services is a portfolio of products,
More information