Building Your Roadmap:  Successful Identity and Access Management (IAM)
What are the CXO’s telling us? “ It’s too expensive and manual to make sure we’re addressing all the necessary regulations...
What are the CXO’s telling us? “ 25% of my  help desk calls are related to resetting forgotten passwords!” Continuous Comp...
What are the CXO’s telling us? “ There is just no budget to hire more IT administrators, but our user population is growin...
What are the CXO’s telling us? “ I still have accounts in my systems for users that are long gone!” Continuous Compliance ...
What are the CXO’s telling us? “ As employees and partners change responsibilities they keep acquiring new system privileg...
What are the CXO’s telling us? “ Internal and external auditors need to see if you have sufficient control over your IT sy...
What are the CXO’s telling us? “ Enterprise  architects hate to see the IT ‘wheel’ continually reinvented. IAM should be e...
What are the CXO’s telling us? “ I don’t  want to see my organization in the news.” Continuous Compliance Escalating Admin...
The Essence of Business Doing More  with Less   is no longer a temporary  economic issue –   it is here to stay. LESS BUDG...
Definition of Identity & Access Management (IAM) <ul><li>Identity & Access Management  is the set of  processes  and the  ...
Before… <ul><li>Average Process 7-10 Days </li></ul><ul><li>Issues to Consider: </li></ul><ul><li>Backlog </li></ul><ul><l...
…And After NEW USER 3. Policy Examination Approval And Execution 2. Manager Request For Access 1. HR Request For Access SA...
Employment Life Cycle What is the Cost of Quarterly Reorganization? ACCESS & TRANSACTIONS MANAGEMENT Hire Promotion Reloca...
IAM Business Drivers –  The Complete Picture Increasing Efficiency Complying With Regulation Increasing Security Enabling ...
Exercise –  Identify Your Business Drivers Move your current provisioning toward “Phase 2” Improve Enterprise Services, SO...
Business Benefits of IAM Functionality <ul><li>Reducing calls to help desk </li></ul><ul><li>Enabling easy access with one...
Business Benefits of IAM Functionality <ul><li>Maintaining security through de-provisioning on termination, user clean-up ...
Business Impact of IAM Functionality ESA  Support Provisioning & Federated Identity User Satisfaction Audit Delegated Admi...
<ul><li>What is the maximum capacity of your current system? </li></ul><ul><li>What is the average growth in application d...
<ul><li>How many users (customers, partners) will be given access? </li></ul><ul><li>What is your annual application manag...
<ul><li>A common perception is that by avoiding IAM strategies, companies save money.  </li></ul><ul><li>In reality, avoid...
<ul><li>“ Many midsized companies won’t consider identity management, because they think it is too difficult to deploy, to...
<ul><li>Each company has its own estimates for these input figures. </li></ul><ul><li>A certain section of Return on Negli...
Return-On-Negligence (RON) on IAM  Avoidance - Overview <ul><li>Annual Potential for Cost Avoidance Related to IAM Solutio...
RON for Typical Identity Management Tool –  Basic Input 1920 Number of Work Hours Per Year  $90,850 Average Fully-Burdened...
RON for Identity Management –  Industry Standard Assumptions 14 Number of Hours From Request Through Resolution for Moves/...
RON for Single Sign-On –  Basic Assumptions 1920 Number of Work Hours Per Year  $69,000 Average Fully-Burden Employee Sala...
RON for Single Sign-On –  Industry Standard Assumptions 10.0 Average Length of Help Desk Call (Minutes) 2 Average Time to ...
RON for Single Sign-On –  Avoidance Impact Results Calculations $485,156 Potential Lost Productivity (Due to Trial & Error...
RON for Web Access –  Basic Input 1920 Number of Work Hours Per Year  $90,850 Annual Fully-Burdened Salary for IT Staff Me...
RON for Web Access –  Industry Standard Assumptions 2 Average Number of Downtime Hours Per Year (Due to Security Breach) $...
RON for Avoidance Impact –  Web Access $20,000 Potential Security Audits Costs Avoidance Related to Web Access Control 50%...
RON for Avoidance Impact –  Web Access   CONTINUED $380,186 Total Potential for Cost Avoidance Related to Web Access Contr...
RON for Identity Management –  Avoidance Impact $290,649 Potential IT Cost Avoidance Related to User Provisioning 90% % IT...
RON for Identity Management –  Avoidance Impact   CONTINUED $510,676 Total Potential for Cost Avoidance Related to Admin $...
Exercise –  Building Your Own Financial Plan Estimates for your organization Where do I get the numbers from? Industry sta...
Tip for Consideration <ul><li>No financial plan or RON analysis will be credible unless it is managed throughout the entir...
Pitfalls to Avoid <ul><li>Don’t set unachievable goals. </li></ul><ul><li>Don’t try to “boil the ocean”. </li></ul><ul><li...
One Last Word … <ul><li>Good luck! </li></ul>The longest journey starts with a single step.
Upcoming SlideShare
Loading in...5
×

Building Your Roadmap Sucessful Identity And Access Management

2,774

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,774
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
225
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Building Your Roadmap Sucessful Identity And Access Management

    1. 1. Building Your Roadmap: Successful Identity and Access Management (IAM)
    2. 2. What are the CXO’s telling us? “ It’s too expensive and manual to make sure we’re addressing all the necessary regulations. And then we have to do it all over again for the next time.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    3. 3. What are the CXO’s telling us? “ 25% of my help desk calls are related to resetting forgotten passwords!” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    4. 4. What are the CXO’s telling us? “ There is just no budget to hire more IT administrators, but our user population is growing, particularly as we bring more customers/partners online.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    5. 5. What are the CXO’s telling us? “ I still have accounts in my systems for users that are long gone!” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    6. 6. What are the CXO’s telling us? “ As employees and partners change responsibilities they keep acquiring new system privileges with us while none are removed. How do I fix that?” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    7. 7. What are the CXO’s telling us? “ Internal and external auditors need to see if you have sufficient control over your IT systems and access to private data. Auditors don’t care generally how much it costs.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors ’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    8. 8. What are the CXO’s telling us? “ Enterprise architects hate to see the IT ‘wheel’ continually reinvented. IAM should be employed and managed as part of enterprise architecture.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    9. 9. What are the CXO’s telling us? “ I don’t want to see my organization in the news.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
    10. 10. The Essence of Business Doing More with Less is no longer a temporary economic issue – it is here to stay. LESS BUDGET LESS STAFF SHORTER SCHEDULE REDUCE COSTS COSTS TIME MORE USERS MORE ACCESS MORE FLEXIBILITY MORE APPS MORE PARTNERS MUCH FASTER USERS TRANSACTIONS COMPETITIVE EDGE CONDUCT BUSINESS
    11. 11. Definition of Identity & Access Management (IAM) <ul><li>Identity & Access Management is the set of processes and the supporting infrastructure and systems for the creation, management and use of digital identities and enforcement of security-related business policies </li></ul>Who’s there? What can they do? What do they need? How do you manage them? <ul><li>Authentication management </li></ul><ul><li>Access control </li></ul><ul><li>User management </li></ul><ul><li>Delegated administration </li></ul><ul><li>Workflow </li></ul><ul><li>Self-service </li></ul><ul><li>Account, resource provisioning </li></ul><ul><li>Account, resource de-provisioning </li></ul><ul><li>It enables you to answer the following: </li></ul>Enterprise IT Management Security Management IAM
    12. 12. Before… <ul><li>Average Process 7-10 Days </li></ul><ul><li>Issues to Consider: </li></ul><ul><li>Backlog </li></ul><ul><li>Errors </li></ul><ul><li>Requests Delays </li></ul><ul><li>Impact on Productivity </li></ul>NEW USER 1. HR Request for Access 2. Manager Request for Access 3. Policy Examination And Approval IT 4. Policy Examination And Approval Administration 5. Return for Corrections 6. Submit Revised Request 7. Revised Policy Examination And IT Approval 8. Revised Policy Examination And Approval Administration 9. Identified Exception 10. Exception Approval Granted 11. Approval Granted UNSATISFIED NEW USER 12. Applications Set Up 13. IT Set Up 14. Keeping Audit Trail
    13. 13. …And After NEW USER 3. Policy Examination Approval And Execution 2. Manager Request For Access 1. HR Request For Access SATISFIED NEW USER <ul><li>Average Process 30 Minutes </li></ul><ul><li>Issues to Consider: </li></ul><ul><li>What would you do with the spare time? </li></ul>
    14. 14. Employment Life Cycle What is the Cost of Quarterly Reorganization? ACCESS & TRANSACTIONS MANAGEMENT Hire Promotion Relocation Team Project Departure
    15. 15. IAM Business Drivers – The Complete Picture Increasing Efficiency Complying With Regulation Increasing Security Enabling Business
    16. 16. Exercise – Identify Your Business Drivers Move your current provisioning toward “Phase 2” Improve Enterprise Services, SOA & IAM integration Manage information risks Integrate enterprise security apps Increase customer and partner satisfaction Manage user life-cycle more effectively Increase IT productivity Secure company data Enable Web services Streamline business processes Reduce cost of IT resources Increase user satisfaction Comply with security regulations Weighted Average (Totaling 100%) Business Driver
    17. 17. Business Benefits of IAM Functionality <ul><li>Reducing calls to help desk </li></ul><ul><li>Enabling easy access with one account and one password </li></ul><ul><li>Reducing account management time </li></ul><ul><li>Improving help desk services </li></ul><ul><li>Delivering a better client web experience </li></ul><ul><li>Increasing user satisfaction </li></ul><ul><li>Reducing account management time </li></ul><ul><li>Streamlining business processes </li></ul><ul><li>Delivering better web services </li></ul><ul><li>Increasing productivity of help desk and IT services </li></ul><ul><li>Increasing satisfaction of both internal and external users </li></ul><ul><li>Securing the company’s reputation </li></ul><ul><li>Attracting prospective customers to do business online </li></ul><ul><li>Securing important corporate data such as branding info </li></ul><ul><li>Complying with regulations such HIPAA, Gramm -Leach-Bliley act, 21 CFR part 11, and the Sarbanes-Oxley act </li></ul><ul><li>Scaling organizational security </li></ul><ul><li>Enabling a comprehensive picture of the entire organizational data </li></ul><ul><li>Facilitating an easy implementation of future applications </li></ul><ul><li>Managing resources more effectively </li></ul><ul><li>Scaling security </li></ul><ul><li>Increasing control </li></ul><ul><li>Eliminating redundancy in data management </li></ul>Single Sign-On Registration & Enrollment Authentication & Authorization Information Consolidation
    18. 18. Business Benefits of IAM Functionality <ul><li>Maintaining security through de-provisioning on termination, user clean-up and robust auditing capabilities </li></ul><ul><li>Managing access rights through centralized user management and delegated administration </li></ul><ul><li>Providing automated workflow </li></ul><ul><li>Addressing ebusiness initiatives promptly and efficiently to gain and maintain market share </li></ul><ul><li>Leveraging the system across the value chain and strengthening commitment </li></ul><ul><li>Complying with regulations </li></ul><ul><li>Increasing control and management of information flow </li></ul><ul><li>Automating auditing and audit trail analysis as much as possible </li></ul><ul><li>Increasing user satisfaction </li></ul><ul><li>Reducing account management time </li></ul><ul><li>Increasing IT & help desk productivity </li></ul><ul><li>Decentralizing organizational control </li></ul><ul><li>Increasing organizational security </li></ul><ul><li>Eliminating calls to help desk regarding password reset </li></ul><ul><li>Closing security gaps </li></ul><ul><li>Reducing account management time </li></ul>Provisioning & Federated Identity Audit Delegated Administration & Self-Services Password Management
    19. 19. Business Impact of IAM Functionality ESA Support Provisioning & Federated Identity User Satisfaction Audit Delegated Administration & Self-Service Password Management Single Sign-On Registration & Enrollment Authentication and Authorization Information Consolidation Regulatory Compliance Risk Management Operational Efficiency Cost Containment Business Facilitation
    20. 20. <ul><li>What is the maximum capacity of your current system? </li></ul><ul><li>What is the average growth in application development? </li></ul><ul><li>What is the average impact of a reorganization? </li></ul><ul><li>How often does a reorganization occur? </li></ul>Key Questions Every Organization Must Consider <ul><li>What is the average turnover? </li></ul><ul><li>What menial tasks you would like to eliminate? </li></ul><ul><li>How long does it take to set up a new user in the current system? </li></ul><ul><li>What is the cost associated with this process? </li></ul>
    21. 21. <ul><li>How many users (customers, partners) will be given access? </li></ul><ul><li>What is your annual application management cost? </li></ul><ul><li>What is the cost of new user management? </li></ul><ul><li>What is the annual cost of existing user management? </li></ul><ul><li>What is the cost by security feature, per application? </li></ul>Key Questions Every Organization Must Consider CONTINUED <ul><li>What is the financial impact of faster access to applications? </li></ul><ul><li>What is the reduced IT management cost of federated provisioning across the extranet? </li></ul><ul><li>What is the financial impact of IAM on supporting Business Processes & Enterprise Architecture? </li></ul>
    22. 22. <ul><li>A common perception is that by avoiding IAM strategies, companies save money. </li></ul><ul><li>In reality, avoiding IAM results in significant costs arising from inefficiencies and loss of productivity. </li></ul><ul><li>There is a price for doing nothing: </li></ul>The Price of Doing Nothing <ul><ul><li>Adding more help desk & IT personnel in the future. </li></ul></ul><ul><ul><li>Wasting more time on integration of future applications. </li></ul></ul><ul><ul><li>Incurring cost of trying to prove compliance to regulations through manual and un-integrated processes. </li></ul></ul><ul><ul><li>Taking the risk of a security breach, which can be tremendously expensive to the organization. </li></ul></ul><ul><ul><li>Incurring potential damage to your reputation. </li></ul></ul><ul><ul><li>Lagging behind other companies. </li></ul></ul>
    23. 23. <ul><li>“ Many midsized companies won’t consider identity management, because they think it is too difficult to deploy, too expensive to purchase and implement, and too complicated to administer and maintain. The problem is that it’s precisely when companies grow to mid-market ($150 million to $1 billion) that user accounts seem to multiply like rabbits…. Postponing an investment in some form of unified account or identity management often proves to be one of the most common — and costly — mistakes in security today.” </li></ul>The Price of Doing Nothing David Piscitello, Network World, 08/28/06
    24. 24. <ul><li>Each company has its own estimates for these input figures. </li></ul><ul><li>A certain section of Return on Negligence can affect one company more than another – it is customizable. </li></ul><ul><li>It is difficult to capture future benefits of an IAM solution. </li></ul><ul><li>Companies tend not to buy into external calculations. </li></ul><ul><li>It is an overwhelming calculation that is difficult to prove. </li></ul>Financial Drivers – Challenges <ul><li>It is the only way to get CFO endorsement. </li></ul><ul><li>Despite the credibility challenges, financial justifications must be developed and managed. </li></ul><ul><li>A critical failure point can be avoided by managing the promised RON past the initial purchase to ensure capturing all the promised financial rewards. </li></ul><ul><li>During project design, a financial manager should join the team to monitor progress and results. </li></ul>
    25. 25. Return-On-Negligence (RON) on IAM Avoidance - Overview <ul><li>Annual Potential for Cost Avoidance Related to IAM Solutions </li></ul><ul><li>Potential IT Cost Avoidance Related to User Provisioning $290,649 </li></ul><ul><li>Potential Lost Productivity Costs Avoidance Related to User Provisioning $220,027 </li></ul><ul><li>Total Potential for Cost Avoidance Related to User Provisioning $510,676 </li></ul><ul><li>Potential Lost Productivity (Due to Multiple Login Sessions) Cost Avoidance Related to SSO $673,828 </li></ul><ul><li>Potential Lost Productivity (Due to Trial & Error) Cost Avoidance Related to SSO $485,156 </li></ul><ul><li>Potential Help Desk Passwords Resets Cost Avoidance Related to SSO $354,883 </li></ul><ul><li>Total Potential for Cost Avoidance Related to SSO $1,513,867 </li></ul><ul><li>Potential Application Development Cost Avoidance Related to Web Access Control $135,000 </li></ul><ul><li>Potential Security Audits Cost Avoidance Related to Web Access Control $20,000 </li></ul><ul><li>Potential Extranets Help Desk Cost Avoidance Related to Web Access Control $195,186 </li></ul><ul><li>Potential Downtime Cost Avoidance Related to Web Access Control $30,000 </li></ul><ul><li>Total Potential for Cost Avoidance Related to Web Access Control $380,186 </li></ul><ul><li>Please note that potential Help Desk Cost Avoidance alone amounts to $550,068 Per Year </li></ul><ul><li>Total Cost of Negligence per Year $2,404,729 </li></ul><ul><li>Total Cost of Negligence for 3 Years $7,214,187 </li></ul>
    26. 26. RON for Typical Identity Management Tool – Basic Input 1920 Number of Work Hours Per Year $90,850 Average Fully-Burdened Employee Salary (Salary + 15%) $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 15% Rate of Moves, Adds and Changes (MACs) 10% Turnover rate per year (% of users) 10% Rate of growth per year (% of users) 10,000 Number of External Users (partners and customers) 3,000 Number of Internal Users (employees) Company Details
    27. 27. RON for Identity Management – Industry Standard Assumptions 14 Number of Hours From Request Through Resolution for Moves/Changes (MACs) 10 Number of Hours From Request Through Resolution (for New Account) 0.75 Number of Hours to Delete Obsolete User 1 Number of Hours to Handle Moves, Changes (MACs) 3 Number of Hours to Set up a New User   Assumptions
    28. 28. RON for Single Sign-On – Basic Assumptions 1920 Number of Work Hours Per Year $69,000 Average Fully-Burden Employee Salary (Salary + 15%) $90,850 Annual Fully-Burden Salary for IT Staff Member (Salary +15%) 4 Average Number of Accounts per Internal User (Employee) 3,000 Number of Internal Users (employees) Company Details
    29. 29. RON for Single Sign-On – Industry Standard Assumptions 10.0 Average Length of Help Desk Call (Minutes) 2 Average Time to Trial and Error Forgotten Password Per User (minutes) 80% Average % of Incorrect Logins to be Solved by Trial and Error 10% Average % of Total Logins that Are Incorrect Out of Total Logins 0.50 Time Spent to Login to a Single Account (Minutes)   Assumptions
    30. 30. RON for Single Sign-On – Avoidance Impact Results Calculations $485,156 Potential Lost Productivity (Due to Trial & Error) Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $646,875 Total Cost of Lost Productivity (Due to Trial & Error of Forgotten Password) 3 Time Spent on Help Desk Calls Per User Per Year (hours) 3 Time Spent on Trial & Error Per User Per Year (hours) 20 Total Number of Incorrect Logins Solved by Help Desk Assistance Per User 80 Total Number of Incorrect Logins Solved by Trial & Error per User 100 Total Number of Incorrect Logins Per User Per Year Lost User Productivity Cost Due to Trial & Error of Forgotten Password $673,828 Potential Lost Productivity Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $898,438 Cost of Lost Productivity (Due to Multiple Login Sessions) $36 Hourly Cost of Typical Employee 8 Number of Hours Spent on Login Sessions Per Internal User Per Year 1,000 Login Sessions Per User Per Year Lost User Productivity Cost Due to Multiple Login Sessions
    31. 31. RON for Web Access – Basic Input 1920 Number of Work Hours Per Year $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 10 Number of Security Audits Per Year 15 Number of New Extranet Applications Per Year 10% Turnover Rate Per Year (% of users) 10% Rate of Growth per Year (% of users) 10,000 Number of External Users (partners and customers) Company Details
    32. 32. RON for Web Access – Industry Standard Assumptions 2 Average Number of Downtime Hours Per Year (Due to Security Breach) $30,000 Average Application Downtime Cost Per Hour (Due to Security Breach) 10.0 Average Length of Help Desk Call (Minutes) 30% Average % Help Desk Activity Related to Passwords 11 Average Number of Help Desk Calls Per User per Year $4,000 Average Cost of Security Audit $12,000 Average Access Control Development Cost Per Extranet/intranet Application   Assumptions
    33. 33. RON for Avoidance Impact – Web Access $20,000 Potential Security Audits Costs Avoidance Related to Web Access Control 50% % Security Audits Cost Savings Provided by Web Access Control $40,000 Cost of Security Audits per Year Cost of Security Audits per Year $135,000 Potential Application Development Costs Avoidance Related to Web Access Control 75% % Application Development Cost Savings Provided by Web Access Control $180,000 Cost of Hard-Coding Access Control Cost of Application Development Time Associated with Access Control Results Calculations
    34. 34. RON for Avoidance Impact – Web Access CONTINUED $380,186 Total Potential for Cost Avoidance Related to Web Access Control $30,000 Potential Downtime Costs Avoidance Related to Web Access Control 50% % Downtime Cost Savings Provided by Web Access Control $60,000 Cost of Downtime Cost of Downtime Due to Attacks Caused by Unauthorized Access $195,186 Potential Extranets Help Desk Costs Avoidance Related to Web Access Control 75% % Extranets Help Desk Cost Savings Provided by Web Access Control $260,247 Cost of Help Desk Related to Extranets $47 Cost of IT Labor Per Hour 5,500 Total Time Spent by Help Desk staff on Passwords Related Calls Per Year (Hours) 33,000 Number of Help Desk Calls Related to Passwords Per Year 110,000 Number of Help Desk Calls Per Year Cost of Help-Desk (not using Self-Registration and Self-Service) Results Calculations
    35. 35. RON for Identity Management – Avoidance Impact $290,649 Potential IT Cost Avoidance Related to User Provisioning 90% % IT Cost Savings Provided by User Provisioning $322,943 Annual Cost of User Account Management by IT $47 Cost of IT Labor Per Hour 6825 Total Time Spent Annually on User Account Management (Hours) 1300 Number of Account Terminations Per Year 1950 Number of MACs per Year 1300 Number of New Users Per Year User Account Management Cost 
    36. 36. RON for Identity Management – Avoidance Impact CONTINUED $510,676 Total Potential for Cost Avoidance Related to Admin $220,027 Potential Lost Productivity Cost Avoidance Related to User Provisioning 50% % Lost User Productivity Cost Savings Provided by User Provisioning $440,055 Total Lost Productivity Costs Per Year (Due to Account Management) $298,102 Cost of Lost Productivity For Existing Employees $141,953 Cost of Lost Productivity For New Employees $47 Hourly Cost of Typical Employee 450 Number of MACs per Year for Internal Users (Existing Employees) 300 Number of New Internal Users/Employees Per Year Lost User Productivity (Due to Account Management) Cost
    37. 37. Exercise – Building Your Own Financial Plan Estimates for your organization Where do I get the numbers from? Industry standard figures Rank financial drivers criteria by organizational importance
    38. 38. Tip for Consideration <ul><li>No financial plan or RON analysis will be credible unless it is managed throughout the entire process to ensure capturing the promised results. </li></ul>
    39. 39. Pitfalls to Avoid <ul><li>Don’t set unachievable goals. </li></ul><ul><li>Don’t try to “boil the ocean”. </li></ul><ul><li>Don’t reduce cost through reducing business workflow analysis. </li></ul><ul><li>Don’t look at IAM as an IT type project. </li></ul><ul><li>Don’t expect to operate IAM without organizational changes and commitments. </li></ul><ul><li>Don’t expect to operate IAM without reengineering some business process. </li></ul><ul><li>Don’t exclude any organizational stakeholder or those with conflicting agendas. </li></ul>
    40. 40. One Last Word … <ul><li>Good luck! </li></ul>The longest journey starts with a single step.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×