What is missing from the strategy?1. No mention of a cloud store2. No detail on readiness or assessment criteria3. No framework for assessment of public Vcommunity4. No indication on mechanics of service provisioning,service management, service ownership5. No mention of reference architectures6. No reference to management of data related issues
Cloud store is a critical piece to supportSME access to government customers?
Legal/Contractual relationships between parties is critical?
To help me know when I am readyAdopted from: Cullen, S., Seddon, P., and Wilcox, L.Managing Outsourcing, The Life Cycle Imperative.MIS Quarterly Executive, Mach 2005, pp.229-256 47
IT-CMF is based on five maturity levels to assess and optimizethe value of IT High • Value-centric IT management Optimizing • State-of-the-art practices and outcomes • Benefits from IT investments quantified and communicated Advanced • Practices and outcomes well above industry average Maturity • IT/business interaction formalized Intermediate for all critical capabilities • Transparent investment decisions • Delivering basic IT services Basic • Some IT/business interactions formalized • No formal processes Initial • Ad hoc management of IT Low IT-CMF offers a concise management roadmap to optimize business value from IT investment 48
Objective maturity assessment of IT management practices,identifying both gaps and potential over investments Example for CIO level assessment showing maturity gaps to industry average Managing IT Managing the Managing the for business Managing IT like a business IT budget IT capability value Risk of competitive 5 Risk of competitive disadvantage due to disadvantage due to over-investment? below-average maturity? Industry Average 4 3 Company’s current maturity level 2 1 ITG BPM BP SP DSM CFP RM AA ODP SRC IM SAI FF BGM PPP BOP EAM TIM PAM ICM RAM RDE SD SRP UTM UED PPM SUM CAM TCO BAR PM Two levels of assessment: “Executive level" across all Critical Capabilities; and deep dive assessment for each CC 49
• Nature of deployment • Application Design• Security • Architecture• Data privacy and protection • Business Continuity and Disaster• System availability Recovery• Network infrastructure • Commercial and Pricing Model/s• Flexibility • Data Location and Retrieval• Data storage and extraction • Legal and Regulatory (incl. data• Capacity Planning protection, governing laws, intellectual• Maturity and adoption property, termination)• Contingency planning • Performance and Conformance• Internal skill-sets and • Privacy governance • Reputation• Commercial considerations Security, Security Standards •• Cloud contracts Service Provision (incl. SLAs, • transitioning) • Staffing and Skills Requirements • Migration and Interoperability • Technology Standards,Value For Money
Digital Architect Gar Mac Críostat: @aspiringarce: email@example.com: www.iasaglobal.org