SlideShare a Scribd company logo
1 of 19
Combining ITIL, SixSigma
and ToC in streamlining IT
Bogdan Dragomir
Bogdan Dragomir
Job Positions
Bogdan Dragomir is a security professional with over 24 years of experience in the IT field over 5 years as a
Regional Security Manager with Savvis Communications currently partner and COO at Vernance LLC responsible
for overseeing GRC and management training and consulting practice
657-200-5506
bdragomir@vernance.com
www.vernance.com
https://www.linkedin.com/in/bogdandrago
Information Technology Infrastructure
Library (ITIL)
• ITIL defines a framework to deliver and support IT services.
• Multiple components of the framework; each component has a
well defined set of recommended practices and procedures
• Can be adopted individually or as a whole.
• Covered processes include
• Design coordination
• Service catalogue management
• Service-level management
• Availability management
• Capacity management
• IT service continuity management
• Security management
• Supplier management
Information Technology
Infrastructure Library (Continued)
• ITIL Goals types and objectives:
• Strategy - Achieve organizational objectives and meet
customer needs
• Design - Define a plan for delivering the business objectives
• Transition - Improved capability for introducing new services
• Operations - Ensure services management in supported
environments.
• Improvement - Ensure dynamic services and adaptability to
large-scale improvements
SixSigma
• Born for and mainly used in manufacturing sector
• Based on empirical and statistical methods and data based
tools.
• Works primarily at the level of a local systems chain link and
considers its interaction with the immediate supplier and
customer processes.
• Aims to identify and remove defects causes and minimize
deliverable (product or business process) quality variations.
• Uses two methodologies DMAIC and DMADV
• Target 3.4 DPMO
Theory of Constraints
• A more flexible approach
• Logic based/uses logic-based tools
• Recognizes variation as an inherent business necessity.
• Focuses on building processes adaptable enough to deal
with current variations
• Uses a five steps process improvement
• identify constraint,
• Exploit constraint,
• subordinate everything else to the constraint,
• elevate the constraint
• Repeat
IT services Criteria
• Agility
• measure the ability of a IT Services chain to respond to
marketplace CHANGES to gain or maintain competitive
advantage
• Adaptability
• measure the maximum quantity of production CHANGE the
organization can achieve and sustain in a fix amount of time.
• Responsiveness
• measure the time to fulfill demand.
• Flexibility
• measure the number of days it takes to respond to a demand
CHANGE,
6δ vs ToC Differences
6δ ToC
Hard Data based Logic based tools
Quality tools for problem solving
(Causal loop Diagrams; Control Charts;
Cause and Effect; etc)
Unique approach to problem solving
considering problem’s reality context (The
more complex a situation, the more
inherent simplicity there is in it. )
Targets minimizing variation Targets to minimize effects of the variation
“Quality is more important than
quantity. One home run is much
better than two doubles.” – Steve
Jobs
Six Sigma & Toc to achieve performant
ITIL compatible processes
• Target performant ITIL process
• Main phases DMAIC – to define and minimize the
variation related to IT services
• Main approach ToC - to determine the bottleneck (the
unique constraint that determine the variation (above),
to eliminate the bottleneck and ensure optimization
sustainability, to determine next constraint in need of
optimization
DMAIC
Define
• Understand the expectations of the customer using voice of the
customer techniques,
• Using ToC identify the process (not the constraint) that need to
be improved.
• Ensure synergy between ITIL and SixSigma goals and alignment to
business strategy.
DMAIC
Measure
• Asses the “as is” process state;
• define defects in the context of IT Services (i.e.
<unacceptable_deviation> from expected results);
• define CtQ parameters.
• Determine objectives in the business context.
DMAIC
Analyze
• Analyze the data gathered during the previous phase;
• determine all trivial “variation” source(s),
• use ToC to determine the main constraint (vital variable)
based on the documented UDE.
• “An UDE should be serious, be a condition not a lack of an activity, not
blame anyone, happen frequently, have a serious negative outcome,
not incorporate the solution within the statement.” - TOCICO3
Thinking Process Committee, Nov 2007
• One would use this phase to run multiple scenario
simulations and prioritize constraints as per their placement
in the critical chain.
DMAIC
Improve
This is the phase where applying ToC will swift SixSigma and
increase its focus tremendously.
Since we moved the SixSigma approach using ToC approach in
the previous phase, during the Improve phase we will use ToC
to Exploit, Subordinate and Elevate the main constraint (main-
constraint was determined in the Analyze phase) to ensure
increased overall performance.
Note: Exploiting the constraint should be done by maximizing its
efficiency up to the point where the constraint is moving to the
next node.
DMAIC
Control
• Ensure that the process around optimized main-constraint
can perform sustainable
• implement controls to prevent the process from reverting
back to its prior state.
• Document lesson learn and use them in the next (D)MAIC
iteration targeting the new constraint.
Note: During the next iteration you could use a shortened
version of D-Phase focusing on checking if the previous
determinations are still valid and relevant.
Conclusion
• Each school of thought has its own benefits and
strengths.
• Results depend on user expertise
• There is no best or better
• Have different approach
• Have the same ultimate target (Solve a problem)
Quality in a product or service is not what the supplier
puts in. It is what the customer gets out and is willing to
pay for. A product is not quality because it is hard to make
and costs a lot of money, as manufacturers typically
believe. This is incompetence. Customers pay only for
what is of use to them and gives them value. Nothing else
constitutes quality.”
~Peter Drucker.
?
QUESTIONS
657-200-5506
bdragomir@vernance.com
www.vernance.com
https://www.linkedin.com/in/bogdandrago
THANK YOU

More Related Content

What's hot

Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineeringrinkimusaddi
 
BUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSISBUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSISAjeng Savitri
 
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing LeanATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing LeanIndia Scrum Enthusiasts Community
 
Tools and Techniques of Quality Planning
Tools and Techniques of Quality PlanningTools and Techniques of Quality Planning
Tools and Techniques of Quality PlanningNicola Mezzetti
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528moris lee
 
BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15Alan Maxwell, CBAP
 
Operations Management
Operations ManagementOperations Management
Operations Management03232007798
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingVinayak Hegde
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringCik Liana Omar
 
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation PerspectiveChanges in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation PerspectiveRajesh Naik
 
Integrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dtIntegrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dtDaniel Thuraiappah
 
Applying Lean Sigma Into Validation
Applying Lean Sigma Into ValidationApplying Lean Sigma Into Validation
Applying Lean Sigma Into Validationtjcornish
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2Boeun Tim
 
Integrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery ProcessIntegrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery ProcessAlan McSweeney
 
Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Skillogic Solutions
 
Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Service Desk Institute
 
Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7Skillogic Solutions
 

What's hot (20)

Business Process Re-engineering
Business Process Re-engineeringBusiness Process Re-engineering
Business Process Re-engineering
 
BUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSISBUSINESS PROCESS ANALYSIS
BUSINESS PROCESS ANALYSIS
 
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing LeanATH2013-Krishnamurty Pammi- Power your business through implementing Lean
ATH2013-Krishnamurty Pammi- Power your business through implementing Lean
 
Tools and Techniques of Quality Planning
Tools and Techniques of Quality PlanningTools and Techniques of Quality Planning
Tools and Techniques of Quality Planning
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Gears agile
Gears agileGears agile
Gears agile
 
BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15BABOK v3 KA Task Summary v0.15
BABOK v3 KA Task Summary v0.15
 
Operations Management
Operations ManagementOperations Management
Operations Management
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem Solving
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation PerspectiveChanges in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
Changes in CMMI-DEV and SCAMPI-A v1.3 - An Implementation Perspective
 
Integrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dtIntegrated project management and solution delivery process 10082017 dt
Integrated project management and solution delivery process 10082017 dt
 
Applying Lean Sigma Into Validation
Applying Lean Sigma Into ValidationApplying Lean Sigma Into Validation
Applying Lean Sigma Into Validation
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2
 
L4 RE Processes
L4 RE ProcessesL4 RE Processes
L4 RE Processes
 
Integrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery ProcessIntegrated Project Management And Solution Delivery Process
Integrated Project Management And Solution Delivery Process
 
Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5
 
DecisionsFirst Modeler and IBM ODM Demonstration
DecisionsFirst Modeler and IBM ODM Demonstration DecisionsFirst Modeler and IBM ODM Demonstration
DecisionsFirst Modeler and IBM ODM Demonstration
 
Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)
 
Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7Six Sigma Green Belt Training Part 7
Six Sigma Green Belt Training Part 7
 

Similar to Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality

OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhhOM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhhrammanoharjharupnaga
 
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1ptulachan
 
Corebanking transformation – a wining formula
Corebanking transformation – a wining formulaCorebanking transformation – a wining formula
Corebanking transformation – a wining formulaSupratik Nag
 
Six sigma control in total quality management copy
Six sigma control in total quality management   copySix sigma control in total quality management   copy
Six sigma control in total quality management copyVijay Vuriti
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfBrion Carroll (II)
 
Agile and Its Impact on Productivity
Agile and Its Impact on ProductivityAgile and Its Impact on Productivity
Agile and Its Impact on ProductivityDCG Software Value
 
CRM Implementations and Upgrades
CRM Implementations and UpgradesCRM Implementations and Upgrades
CRM Implementations and UpgradesPeter Ware PMP
 
The Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaThe Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaDeep Dalsania
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projectsKhalid Kahloot
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementationTerry Bunio
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babuHem Rana
 
Course 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxCourse 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxadikesavulu
 
How to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DHow to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DStefan Kovacs
 
Six sigma it_service_delivery
Six sigma it_service_deliverySix sigma it_service_delivery
Six sigma it_service_deliveryStephen Hightower
 
90 days to make a difference - approach
90 days to make a difference - approach90 days to make a difference - approach
90 days to make a difference - approachStuart Creasey
 
Lean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & BradstreetLean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & BradstreetInstitut Lean France
 
Ibm test data_management_v0.4
Ibm test data_management_v0.4Ibm test data_management_v0.4
Ibm test data_management_v0.4Rosario Cunha
 

Similar to Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality (20)

OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhhOM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
OM2_Lecture 11vvvhhbbjjbjdjjeebjrhvhuuhh
 
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
How Nationwide Insurance Transformed and Accelerated its Small_1.3.1
 
Corebanking transformation – a wining formula
Corebanking transformation – a wining formulaCorebanking transformation – a wining formula
Corebanking transformation – a wining formula
 
Six sigma control in total quality management copy
Six sigma control in total quality management   copySix sigma control in total quality management   copy
Six sigma control in total quality management copy
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
 
Agile and Its Impact on Productivity
Agile and Its Impact on ProductivityAgile and Its Impact on Productivity
Agile and Its Impact on Productivity
 
CRM Implementations and Upgrades
CRM Implementations and UpgradesCRM Implementations and Upgrades
CRM Implementations and Upgrades
 
The Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaThe Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six Sigma
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementation
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
 
Session 5
Session 5Session 5
Session 5
 
Course 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxCourse 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptx
 
How to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DHow to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8D
 
Six sigma it_service_delivery
Six sigma it_service_deliverySix sigma it_service_delivery
Six sigma it_service_delivery
 
90 days to make a difference - approach
90 days to make a difference - approach90 days to make a difference - approach
90 days to make a difference - approach
 
PMI Presentation2
PMI Presentation2PMI Presentation2
PMI Presentation2
 
Lean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & BradstreetLean pilots by Mariya Breyter from Dun & Bradstreet
Lean pilots by Mariya Breyter from Dun & Bradstreet
 
SSCG 8D Problem Solving
SSCG 8D Problem SolvingSSCG 8D Problem Solving
SSCG 8D Problem Solving
 
Ibm test data_management_v0.4
Ibm test data_management_v0.4Ibm test data_management_v0.4
Ibm test data_management_v0.4
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Combining ITIL, Six Sigma and Theory of Constraints in streamlining IT quality

  • 1. Combining ITIL, SixSigma and ToC in streamlining IT Bogdan Dragomir
  • 2. Bogdan Dragomir Job Positions Bogdan Dragomir is a security professional with over 24 years of experience in the IT field over 5 years as a Regional Security Manager with Savvis Communications currently partner and COO at Vernance LLC responsible for overseeing GRC and management training and consulting practice 657-200-5506 bdragomir@vernance.com www.vernance.com https://www.linkedin.com/in/bogdandrago
  • 3. Information Technology Infrastructure Library (ITIL) • ITIL defines a framework to deliver and support IT services. • Multiple components of the framework; each component has a well defined set of recommended practices and procedures • Can be adopted individually or as a whole. • Covered processes include • Design coordination • Service catalogue management • Service-level management • Availability management • Capacity management • IT service continuity management • Security management • Supplier management
  • 4. Information Technology Infrastructure Library (Continued) • ITIL Goals types and objectives: • Strategy - Achieve organizational objectives and meet customer needs • Design - Define a plan for delivering the business objectives • Transition - Improved capability for introducing new services • Operations - Ensure services management in supported environments. • Improvement - Ensure dynamic services and adaptability to large-scale improvements
  • 5. SixSigma • Born for and mainly used in manufacturing sector • Based on empirical and statistical methods and data based tools. • Works primarily at the level of a local systems chain link and considers its interaction with the immediate supplier and customer processes. • Aims to identify and remove defects causes and minimize deliverable (product or business process) quality variations. • Uses two methodologies DMAIC and DMADV • Target 3.4 DPMO
  • 6.
  • 7. Theory of Constraints • A more flexible approach • Logic based/uses logic-based tools • Recognizes variation as an inherent business necessity. • Focuses on building processes adaptable enough to deal with current variations • Uses a five steps process improvement • identify constraint, • Exploit constraint, • subordinate everything else to the constraint, • elevate the constraint • Repeat
  • 8. IT services Criteria • Agility • measure the ability of a IT Services chain to respond to marketplace CHANGES to gain or maintain competitive advantage • Adaptability • measure the maximum quantity of production CHANGE the organization can achieve and sustain in a fix amount of time. • Responsiveness • measure the time to fulfill demand. • Flexibility • measure the number of days it takes to respond to a demand CHANGE,
  • 9. 6δ vs ToC Differences 6δ ToC Hard Data based Logic based tools Quality tools for problem solving (Causal loop Diagrams; Control Charts; Cause and Effect; etc) Unique approach to problem solving considering problem’s reality context (The more complex a situation, the more inherent simplicity there is in it. ) Targets minimizing variation Targets to minimize effects of the variation
  • 10. “Quality is more important than quantity. One home run is much better than two doubles.” – Steve Jobs
  • 11. Six Sigma & Toc to achieve performant ITIL compatible processes • Target performant ITIL process • Main phases DMAIC – to define and minimize the variation related to IT services • Main approach ToC - to determine the bottleneck (the unique constraint that determine the variation (above), to eliminate the bottleneck and ensure optimization sustainability, to determine next constraint in need of optimization
  • 12. DMAIC Define • Understand the expectations of the customer using voice of the customer techniques, • Using ToC identify the process (not the constraint) that need to be improved. • Ensure synergy between ITIL and SixSigma goals and alignment to business strategy.
  • 13. DMAIC Measure • Asses the “as is” process state; • define defects in the context of IT Services (i.e. <unacceptable_deviation> from expected results); • define CtQ parameters. • Determine objectives in the business context.
  • 14. DMAIC Analyze • Analyze the data gathered during the previous phase; • determine all trivial “variation” source(s), • use ToC to determine the main constraint (vital variable) based on the documented UDE. • “An UDE should be serious, be a condition not a lack of an activity, not blame anyone, happen frequently, have a serious negative outcome, not incorporate the solution within the statement.” - TOCICO3 Thinking Process Committee, Nov 2007 • One would use this phase to run multiple scenario simulations and prioritize constraints as per their placement in the critical chain.
  • 15. DMAIC Improve This is the phase where applying ToC will swift SixSigma and increase its focus tremendously. Since we moved the SixSigma approach using ToC approach in the previous phase, during the Improve phase we will use ToC to Exploit, Subordinate and Elevate the main constraint (main- constraint was determined in the Analyze phase) to ensure increased overall performance. Note: Exploiting the constraint should be done by maximizing its efficiency up to the point where the constraint is moving to the next node.
  • 16. DMAIC Control • Ensure that the process around optimized main-constraint can perform sustainable • implement controls to prevent the process from reverting back to its prior state. • Document lesson learn and use them in the next (D)MAIC iteration targeting the new constraint. Note: During the next iteration you could use a shortened version of D-Phase focusing on checking if the previous determinations are still valid and relevant.
  • 17. Conclusion • Each school of thought has its own benefits and strengths. • Results depend on user expertise • There is no best or better • Have different approach • Have the same ultimate target (Solve a problem)
  • 18. Quality in a product or service is not what the supplier puts in. It is what the customer gets out and is willing to pay for. A product is not quality because it is hard to make and costs a lot of money, as manufacturers typically believe. This is incompetence. Customers pay only for what is of use to them and gives them value. Nothing else constitutes quality.” ~Peter Drucker.