SlideShare a Scribd company logo
Building an Effective
Nonprofit IT Department
Community IT Innovators Webinar Series
July 21, 2016
Webinar
Tips
• Interact
Ask questions via chat.
• Focus
Avoid multitasking. You may just miss the best
part of the presentation.
• Webinar Slides & Recording
PowerPoint and recording links will be shared
after the webinar.
About Community
IT
Advancing mission
through the effective
of technology.
• Invested
Work exclusively with nonprofit
organizations, serving over 900 since
1993.
• Strategic
Help our clients make IT decisions
that support mission.
• Collaborative
Team of over 30 staff who empower
you to make informed IT choices.
Johan Hammerstrom
President & CEO
jhammerstrom@communityit.com
@hammerstromj
IT Success
depends on…
organizational
maturity.
How do you
build
maturity
around IT?
Services
Orientation
Services Oriented Approach
IT Service
An IT service is one or
more IT systems that
enable a business process
or function.
Services Oriented Approach
IT Department
Services Oriented Approach
IT Department/Function
Group that creates value for the rest of the
organization through the implementation and
maintenance of IT services.
Services Oriented Approach
IT Department Objective
Increase the value created for the rest of the
organization through increasing maturity.
0-Survival
1-
Awareness
2-
Committed
3-Proactive
4-Service
Aligned
5-Business
Partnership
Gartner Maturity Model
0-Survival
1-
Awareness
2-
Committed
3-Proactive
4-Service
Aligned
5-Business
Partnership
Gartner Maturity Model
Management Capability
BusinessAlignment
Managed
Aligned
Create Value
Dysfunction Cost Center
Non-aligned
Unmanaged
Maturity
Structure
IT Department
Management
Governance
Hold the IT Department accountable
for creating business value
for the rest of the organization
through IT services.
Governance
• Approve strategy
• Own the outcomes
• Make key decisions
• Approve the budget
Governance
Who?
• CIO
• COO, VP Finance, CFO
• Executive / Senior Team
Governance
Ensure that the IT department creates value
for the rest of the organization through the
implementation and maintenance of IT
services.
Management
• Coordinate
• Organize
• Planning
• Budgeting
Management
• Communicate!
• Collaborate
• Present
• Dialogue
Management
Who?
• IT Manager, Director of IT
• Director of Operations
• Administrative Assistant
Signs
• CFO/COO owns their role
• Board makes IT a priority
• Regular meetings & planning
• Reporting & key metrics
Good Governance
• Understands business needs
• Understands value of IT and investments
• Can communicate/advocate value, ROI
• Basic management skills…not necessarily
technical skills
Good Management
IT Department
Management
Governance
IT Department
Management
Governance
IT Department
Structure
CIO PMO
Engineer
Help
Desk
IT Department
4 Roles of IT Department
CIO
• Technical planning
• Business analysis and requirements
gathering
• Solutions evaluation
• Architecture and design
PMO
• Project management
• Change management
• User adoption
Engineer
• Network architecture maintenance
• Advanced technical support
• Systems integration
• Information security
Help
Desk
• End user support
• Incident response
• Access management
• Basic technical issues
Staffing
NTEN Staffing Report
• Mid to Large Size Organizations
budget: $1 million – $10 million
• 1 IT staff person for every 20-25 staff
• IT Budget: $100,000 - $250,000
Management
Governance
CIO PMO
Engineer
Help
Desk
How to Allocate?
Allocation
• Ongoing vs Occasional
• Time Requirement
• Knowledge of organization
• Specialized, technical knowledge
Management
Governance
CIO PMO
Engineer
Help
Desk
• Ongoing?
• Technical know?
• Org knowledge?
• Time required?
Management
Governance
CIO PMO
Engineer
Help
Desk
Outsource
IT Governance
cannot
be outsourced
Upcoming Webinar
Planning and IT Project Management
for Nonprofits
Thursday August 25
4:00 – 5:00 PM EST
Johan Hammerstrom &
Steve Longenecker
Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
Missed anything?
Link to slides & recording will be emailed to you.
Connect with us
Building an Effective Nonprofit IT Department

More Related Content

What's hot

Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
AbDul ThaYyal
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
Abdelrahman Almassry
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
Subhasish Pati
 
ArchiMate technology layer - Simplify the models
ArchiMate technology layer - Simplify the modelsArchiMate technology layer - Simplify the models
ArchiMate technology layer - Simplify the models
COMPETENSIS
 
Change Management Readiness for New Supervisors
Change Management Readiness for New SupervisorsChange Management Readiness for New Supervisors
Change Management Readiness for New Supervisors
Robin Weldon-Cope
 
Enterprise architecture 101.36205348
Enterprise architecture 101.36205348Enterprise architecture 101.36205348
Enterprise architecture 101.36205348
jamesoni1
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Symbol table management and error handling in compiler design
Symbol table management and error handling in compiler designSymbol table management and error handling in compiler design
Symbol table management and error handling in compiler design
Swati Chauhan
 
Amortized analysis
Amortized analysisAmortized analysis
Amortized analysis
ajmalcs
 
Change Management Implementation Checklist PowerPoint Presentation Slides
Change Management Implementation Checklist PowerPoint Presentation SlidesChange Management Implementation Checklist PowerPoint Presentation Slides
Change Management Implementation Checklist PowerPoint Presentation Slides
SlideTeam
 
Pipeline processing and space time diagram
Pipeline processing and space time diagramPipeline processing and space time diagram
Pipeline processing and space time diagram
Rahul Sharma
 
Timestamp protocols
Timestamp protocolsTimestamp protocols
Timestamp protocols
Prashant Saini
 
ArchiMate introduction
ArchiMate introductionArchiMate introduction
ArchiMate introduction
Ashraf Fouad
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
Dilum Bandara
 
Concurrency Conrol
Concurrency ConrolConcurrency Conrol
Concurrency Conrol
lubna19
 
Unit07 dbms
Unit07 dbmsUnit07 dbms
Unit07 dbms
arnold 7490
 
PBFT
PBFTPBFT
Telephone call-simulation
Telephone call-simulationTelephone call-simulation
Telephone call-simulation
Prakash Poudel
 
What is an nft the informative guide for beginners in 2022
What is an nft  the informative guide for beginners in 2022What is an nft  the informative guide for beginners in 2022
What is an nft the informative guide for beginners in 2022
Moon Technolabs Pvt. Ltd.
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
Sakshi Tiwari
 

What's hot (20)

Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
ArchiMate technology layer - Simplify the models
ArchiMate technology layer - Simplify the modelsArchiMate technology layer - Simplify the models
ArchiMate technology layer - Simplify the models
 
Change Management Readiness for New Supervisors
Change Management Readiness for New SupervisorsChange Management Readiness for New Supervisors
Change Management Readiness for New Supervisors
 
Enterprise architecture 101.36205348
Enterprise architecture 101.36205348Enterprise architecture 101.36205348
Enterprise architecture 101.36205348
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Symbol table management and error handling in compiler design
Symbol table management and error handling in compiler designSymbol table management and error handling in compiler design
Symbol table management and error handling in compiler design
 
Amortized analysis
Amortized analysisAmortized analysis
Amortized analysis
 
Change Management Implementation Checklist PowerPoint Presentation Slides
Change Management Implementation Checklist PowerPoint Presentation SlidesChange Management Implementation Checklist PowerPoint Presentation Slides
Change Management Implementation Checklist PowerPoint Presentation Slides
 
Pipeline processing and space time diagram
Pipeline processing and space time diagramPipeline processing and space time diagram
Pipeline processing and space time diagram
 
Timestamp protocols
Timestamp protocolsTimestamp protocols
Timestamp protocols
 
ArchiMate introduction
ArchiMate introductionArchiMate introduction
ArchiMate introduction
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
 
Concurrency Conrol
Concurrency ConrolConcurrency Conrol
Concurrency Conrol
 
Unit07 dbms
Unit07 dbmsUnit07 dbms
Unit07 dbms
 
PBFT
PBFTPBFT
PBFT
 
Telephone call-simulation
Telephone call-simulationTelephone call-simulation
Telephone call-simulation
 
What is an nft the informative guide for beginners in 2022
What is an nft  the informative guide for beginners in 2022What is an nft  the informative guide for beginners in 2022
What is an nft the informative guide for beginners in 2022
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 

Viewers also liked

Planning and IT Project Management for Nonprofits
Planning and IT Project Management for NonprofitsPlanning and IT Project Management for Nonprofits
Planning and IT Project Management for Nonprofits
Community IT Innovators
 
My Practicum: Pictures
My Practicum: PicturesMy Practicum: Pictures
My Practicum: Pictures
Camila Roldán
 
DeVry University Health Information Technology Practicum Internship Presentation
DeVry University Health Information Technology Practicum Internship PresentationDeVry University Health Information Technology Practicum Internship Presentation
DeVry University Health Information Technology Practicum Internship Presentation
Maika Lê
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
VogelDenise
 
RESUME SAMI RASSAS
RESUME SAMI RASSASRESUME SAMI RASSAS
RESUME SAMI RASSAS
Rouma Dupeuple
 
Obama read my lips -obama fraudgate (polish)
Obama   read my lips -obama fraudgate (polish)Obama   read my lips -obama fraudgate (polish)
Obama read my lips -obama fraudgate (polish)VogelDenise
 
Community IT Webinar - Planning for an Office Move
Community IT Webinar - Planning for an Office MoveCommunity IT Webinar - Planning for an Office Move
Community IT Webinar - Planning for an Office Move
Community IT Innovators
 
Obama read my lips -obama fraudgate (hebrew)
Obama   read my lips -obama fraudgate (hebrew)Obama   read my lips -obama fraudgate (hebrew)
Obama read my lips -obama fraudgate (hebrew)
VogelDenise
 
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galician
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galicianMALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galician
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galicianVogelDenise
 
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
VogelDenise
 
Terminos de referencia muro jivia
Terminos de referencia muro   jiviaTerminos de referencia muro   jivia
Terminos de referencia muro jivia
elias basualdo garcia
 
Presentatie1
Presentatie1Presentatie1
Presentatie1xjoyce1
 
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
VogelDenise
 
Nervous system
Nervous systemNervous system
Nervous system
smarsh10
 
092716 - A REJECTED STONE BUILDING A NATION
092716 - A REJECTED STONE BUILDING A NATION092716 - A REJECTED STONE BUILDING A NATION
092716 - A REJECTED STONE BUILDING A NATION
VogelDenise
 
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
VogelDenise
 

Viewers also liked (20)

Planning and IT Project Management for Nonprofits
Planning and IT Project Management for NonprofitsPlanning and IT Project Management for Nonprofits
Planning and IT Project Management for Nonprofits
 
My Practicum: Pictures
My Practicum: PicturesMy Practicum: Pictures
My Practicum: Pictures
 
DeVry University Health Information Technology Practicum Internship Presentation
DeVry University Health Information Technology Practicum Internship PresentationDeVry University Health Information Technology Practicum Internship Presentation
DeVry University Health Information Technology Practicum Internship Presentation
 
Icelandic
IcelandicIcelandic
Icelandic
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
 
Japanese
JapaneseJapanese
Japanese
 
RESUME SAMI RASSAS
RESUME SAMI RASSASRESUME SAMI RASSAS
RESUME SAMI RASSAS
 
Obama read my lips -obama fraudgate (polish)
Obama   read my lips -obama fraudgate (polish)Obama   read my lips -obama fraudgate (polish)
Obama read my lips -obama fraudgate (polish)
 
Community IT Webinar - Planning for an Office Move
Community IT Webinar - Planning for an Office MoveCommunity IT Webinar - Planning for an Office Move
Community IT Webinar - Planning for an Office Move
 
Obama read my lips -obama fraudgate (hebrew)
Obama   read my lips -obama fraudgate (hebrew)Obama   read my lips -obama fraudgate (hebrew)
Obama read my lips -obama fraudgate (hebrew)
 
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galician
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galicianMALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galician
MALCOLM X (BUILDING BRIDGES-Getting The DEVIL OFF YOUR BACK)-galician
 
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
LIST OF JEWISH AMERICAN BUSINESSPEOPLE - Wikipedia As Of 07/17/16
 
Terminos de referencia muro jivia
Terminos de referencia muro   jiviaTerminos de referencia muro   jivia
Terminos de referencia muro jivia
 
Presentatie1
Presentatie1Presentatie1
Presentatie1
 
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)
09/29/09 - EMAIL TO OLYMPIC COMMITTEE (ALBANIAN)
 
Latin
LatinLatin
Latin
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
 
Nervous system
Nervous systemNervous system
Nervous system
 
092716 - A REJECTED STONE BUILDING A NATION
092716 - A REJECTED STONE BUILDING A NATION092716 - A REJECTED STONE BUILDING A NATION
092716 - A REJECTED STONE BUILDING A NATION
 
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
032215 - EMAIL CONFIRMATION TO TEMPSTAFF (Pam Quick) & MS Congressman Bennie ...
 

Similar to Building an Effective Nonprofit IT Department

Community IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for SuccessCommunity IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for Success
Community IT Innovators
 
IT Business & Management Consultant
IT Business & Management ConsultantIT Business & Management Consultant
IT Business & Management Consultant
Imran Fiaz
 
IT Business & Management Consultant | Senior IT Manager
IT Business & Management Consultant | Senior IT ManagerIT Business & Management Consultant | Senior IT Manager
IT Business & Management Consultant | Senior IT Manager
Imran Fiaz
 
Uncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT ServicesUncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT Services
Net at Work
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
How to Speak "Manager"
How to Speak "Manager"How to Speak "Manager"
How to Speak "Manager"
Nicole Forsgren
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
Robert Sheesley, CBA, CPHIMS
 
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
Software Guru
 
16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity
Community IT Innovators
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010
Richard Pleasants
 
VCIO - VOL
VCIO - VOLVCIO - VOL
VCIO - VOL
cio tech
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
John Halliday
 
Oracle IT Financial Management
Oracle IT Financial ManagementOracle IT Financial Management
Oracle IT Financial Management
Joseph Alaimo Jr
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
Eryk Budi Pratama
 
Attention Deficit Survey Summary 15 June 2010
Attention Deficit Survey Summary 15 June 2010Attention Deficit Survey Summary 15 June 2010
Attention Deficit Survey Summary 15 June 2010
Lead & Transform
 
Max IT4IT webinar powerpoint
Max IT4IT webinar powerpointMax IT4IT webinar powerpoint
Max IT4IT webinar powerpoint
MAX Technical Training
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
Waterstons Ltd
 
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
Steve Heye
 
Controlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM GovernanceControlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM Governance
Cherwell Software
 
Service management time to fly, time to die it sm-fbe 2012
Service management   time to fly, time to die it sm-fbe 2012Service management   time to fly, time to die it sm-fbe 2012
Service management time to fly, time to die it sm-fbe 2012
John M Walsh
 

Similar to Building an Effective Nonprofit IT Department (20)

Community IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for SuccessCommunity IT Webinar Leveraging IT for Success
Community IT Webinar Leveraging IT for Success
 
IT Business & Management Consultant
IT Business & Management ConsultantIT Business & Management Consultant
IT Business & Management Consultant
 
IT Business & Management Consultant | Senior IT Manager
IT Business & Management Consultant | Senior IT ManagerIT Business & Management Consultant | Senior IT Manager
IT Business & Management Consultant | Senior IT Manager
 
Uncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT ServicesUncovering the Business Value of Managed IT Services
Uncovering the Business Value of Managed IT Services
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
How to Speak "Manager"
How to Speak "Manager"How to Speak "Manager"
How to Speak "Manager"
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
Cinco consejos de los expertos Cutter (Cuitláhuac Osorio)
 
16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010
 
VCIO - VOL
VCIO - VOLVCIO - VOL
VCIO - VOL
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
 
Oracle IT Financial Management
Oracle IT Financial ManagementOracle IT Financial Management
Oracle IT Financial Management
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
Attention Deficit Survey Summary 15 June 2010
Attention Deficit Survey Summary 15 June 2010Attention Deficit Survey Summary 15 June 2010
Attention Deficit Survey Summary 15 June 2010
 
Max IT4IT webinar powerpoint
Max IT4IT webinar powerpointMax IT4IT webinar powerpoint
Max IT4IT webinar powerpoint
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
#15NTC NTEN Help Desk or Service Desk? (Align Nonprofit Technology)
 
Controlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM GovernanceControlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM Governance
 
Service management time to fly, time to die it sm-fbe 2012
Service management   time to fly, time to die it sm-fbe 2012Service management   time to fly, time to die it sm-fbe 2012
Service management time to fly, time to die it sm-fbe 2012
 

More from Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
Community IT Innovators
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
Community IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
Community IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
Community IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Community IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
Community IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Community IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
Community IT Innovators
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
Community IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
Community IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
Community IT Innovators
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
Community IT Innovators
 

More from Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Building an Effective Nonprofit IT Department

Editor's Notes

  1. Matt’s
  2. Matt’s
  3. Johan.
  4. Johan
  5. Johan
  6. Johan.