SlideShare a Scribd company logo
1 of 44
PROPRIETARY & CONFIDENTIAL
Building the Framework for Successful IT
05.03.2017
Create an Enterprise
Architecture Strategy in 3 Steps
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2
The information and materials provided and referenced to herein are not intended
to constitute legal, regulatory, accounting, medical or financial advice and do not
create an attorney-client or other fiduciary relationship between Change
Healthcare or its representatives and any third party. Additionally, Change
Healthcare does not guarantee the accuracy of the information contained herein.
The interpretations, extrapolations, views and opinions of each individual
presenter are not necessarily the views of Change Healthcare. Change
Healthcare disclaims any and all liability for any reliance you may place on the
information contained herein.
Disclaimer
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3
 Bob Hoover
716-225-3262
bhoover@changehealthcare.com
 Mauricio ‘MJ’ Jimenez
305-215-2156
mj@changehealthcare.com
Introductions
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
4
CHANGE. Business needs
and Technology are
constantly changing
Why Do Healthcare
Organizations Need an
Enterprise Architecture
Strategy?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 5
 Exchange Government Markets Growth and
Privatization
 Changing Demographics
 Retail Transformation
 Digitization of Healthcare IT
The healthcare industry is
facing a DYNAMIC MARKET,
creating both challenges and
opportunities
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 6
 Social networking connecting patients to providers, patients to
patients, etc.
 Agile Development and Implementation
 Cloud technologies and solutions
 Recent large investments by providers (for EMR’s and meaningful use)
 Big Data and the use of data in healthcare – a long way to catch up to
other industries
 Tele-Health allowing for consultations with clinicians in more
convenient locations than the medical office or hospital
 Using smartphones to deliver care management services to high-risk
patients daily, securely and with personal communications
 Technology allowing patients to learn more about their personal health
issues and treatments and the quality of their providers
 Health data transmitted to caregivers via mobile devices or in-home
monitors
CHANGE in Technology
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
7
Establish an ENTERPRISE
ARCHITECTURE STRATEGY
How do to manage
so much change?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
8
What is
Enterprise Architecture?
EA is CONCEPTUAL BLUEPRINT
that defines the structure and
operation of an organization
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Enterprise Architecture Defined
9
 Framework which guides investment and design decisions and
specifies standards, interfaces and common services for the
deployment and management of IT assets, in support of business
objectives.
 Defines an environment that is adaptable to unforeseen requirements
and future system changes.
 EA is the link between the Business Strategy, the IT strategy and IT
implementation.
 It is an integral part of the strategic planning process and provides
guidance to those implementing and managing IT resources (data,
applications and technology).
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
EA Methodologies Available
10
GOVERNMENT
 The Federal Enterprise Architecture
PROPRIETARY
 The Zachman Framework for Enterprise Architectures
 The Gartner Methodology
GROUP DEVELOPED
 The Open Group Architectural Framework (TOGAF)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
TOGAF
11
TECHNOLOGYBUSINESS APPLICATION INFORMATION
 The Open Group is a global consortium that enables the achievement
of business objectives through IT standards.
 Open Group Standard, is a proven enterprise architecture
methodology and framework used to improve business efficiency.
 It is the most prominent and reliable enterprise architecture standard.
DOMAINS
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 12
TOGAF Four Domain Areas
• Hardware
• Software
• Network Infrastructure
• Logical Data Models
• Physical Data Models
• Data Management
Resources
• Application Blueprint
• Component Interactions
• Service Definitions
• Relationship to Business
Processes
• Business Strategy
• Governance
• Organization
• Key Business Processes
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
FINANCIALS
(AR/AP)
GENERAL
LEDGER
CUSTOMER
SERVICE
BENEFITS
PROVIDER
PROFILING
DATA
WAREHOUSE
DATA
ACCESS
REPORTING
PROVIDER
CREDENTIALING
UNDERWRITING/
ACTUARIAL
AUTH/REFERRAL (UM)
CONTENT VENDOR
CM/DM
PREDICTIVE
MODELING
REIMBURSEMENT
CAPITATION
APPEALS &
GRIEVANCES
13
The Application Architecture of a Health Plan
CLAIMS
AUDIT
FRAUD &
ABUSE
CLAIMS/
ENCOUNTER
PROCESSING
OTHER
CLAIMS
PROVIDER
CONTRACTS
LEGEND
Core Applications
Non-Core Applications
Auto MBR Acquisition
Care Management
Provider Systems
PRACTICE
MGMT
MEDICAL
RECORDS
AGENT/ BROKER
MANAGEMENT
MEMBERSHIP,
INDIVIDUAL, GROUP
BILLING
MARKETING
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
14
What is the intent of
Enterprise Architecture
Strategy?
The intent of an EA strategy is to
determine how an organization can
MOST EFFECTIVELY ACHIEVE ITS
IT’S CURRENT AND FUTURE
OBJECTIVES
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
15
How do we apply EA
to make a difference?
Develop a Change Framework with
CONSTANT CHANGE AS THE FIRST
PRINCIPLE and understand that healthcare
organizations need the latitude to develop or
procure their own solutions.
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 16
Three Steps to an
Enterprise Architecture
3
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 17
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
1
Business Alignment
18
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 19
DEFINITION: ”We define Alignment among Business, Systems and
Information as a way to quantify the coherency level in relation to the
business necessity, the systems offer and information management”
Enterprise Architecture: Business and IT Alignment – C. Pereira, P. Sausa - ACM Symposium of Applied Computing
Where do we see these misalignments?
 Business Process and Information
 Business Process and Applications
 Applications and Information
 IT and Information
 Applications and IT
1 Business Alignment
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 20
BUSINESS
ARCHITECTURE
APPLICATION
ARCHITECTURE
TECHNOLOGY
ARCHITECTURE
INFORMATION
ARCHITECTURE
1 Business Alignment – Visual Representation
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 21
Business
Architecture
Application
Architecture
IT
Architecture
Information
Architecture
1 Business Alignment - Examples
Business Architecture and Information
Architecture
 Information entities must have a business
definition, description and a set of attributes
 Attributes are related to business processes
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 22
1 Business Alignment - Examples
Business
Architecture
Application
Architecture
IT
Architecture
Data
Architecture
Business Architecture and Application
Architecture
 Application properties are classified as
availability (up time), scalability (ability to scale
up performance), profile based accesses
(ability to identify who does each task).
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 23
a) Each business process should be supported by the minimum number of applications.
b) Business activities should be supported by a single application.
c) Critical business processes should be supported by scalable and highly available
applications.
d) Critical business processes/activities should be supported by different applications than
the noncritical business processes/activities.
e) Each application's functionality should support at least one business process activity.
Otherwise, it plays no role in supporting the business.
f) Information required for critical processes should be also supported by scalable and
highly available systems.
g) Business processes activities requiring on-line/batch support should be supported by
applications running on different infrastructures, making easier the tuning of the systems
for operating window.
C. Pereira, P. Sausa , J. Marquez - Enterprise Architecture Alignment Heuristics – MS Development Network
1 Business Alignment Heuristics
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 24
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
2
Establish a
Change Framework
25
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
??
?
26
Change Management?
Or
Change Framework?
Change Framework speaks to
CHANGES TO THE ARCHITECURE
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 27
Change Framework will determine:
 The circumstances under which the enterprise architecture, or
parts of it, will be permitted to change after deployment, and
the process by which that will happen
 The circumstances under which the architecture development
cycle will be initiated again to develop a new architecture
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 28
“There are many valid approaches to change management, and various
management techniques and methodologies that can be used to manage
change; for example, project management methods such as PRINCE2,
service management methods such as ITIL, management consultancy
methods such as Catalyst, and many others. An enterprise that already
has a change management process in place in a field other than
architecture (for example, in systems development or project
management) may well be able to adapt it for use in relation to
architecture.”
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 29
 The goal of the change framework is ensure that the EA strategy
achieves its original business value. Including managing changes to
the EA in a coordinated, strategic manner.
 The change framework will continually monitor:
 governance requests,
 changes in technology,
 changes in the business environment (i.e. growth / decline),
 capacity and performance
 CRITICAL The governance body establish criteria to judge whether a
Change Request warrants just an architecture update or whether it
warrants starting a new architecture evolution cycle.
 IMPORTANT Avoid "creeping elegance", and the governance body
must continue to look for changes that relate directly to business
value.
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 30
Types of Changes
 Simplification Change: A simplification change can normally be
handled via change management techniques.
 Incremental Change: An incremental change may be capable of
being handled via change management techniques, or it may
require partial re-architecting, depending on the nature of the
change
 Re-architecting Change: A re-architecting change requires putting
the whole architecture through the architecture development cycle
again.
Architecture Change Management – ADM - TOGAF® 9.1
2 Establish a Change Framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 31
Three Steps to an Enterprise Architecture
Establish a Change
Framework2
Communication &
Transparency3
Business Alignment
1
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
3
Communication
& Transparency
32
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 33
3 Communication & Transparency
COMMUNICATE,
COMMUNICATE,
COMMUNICATE!
COMMUNICATION
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 34
3 Communication & Transparency
 Organizations often fail to realize the full potential of EA due to a lack
of communication.
 Key to communication is to start with “the end” in mind. This is how you
manage expectations.
 Meeting with stakeholders to get their “buy-in”. Ask them:
 What does the EA strategy mean to you?
 Why are you doing the EA strategy?
 What are their expectation for the
end-result of the EA strategy?
COMMUNICATION
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 35
3 Communication & Transparency
 Transparency is information as a basis for decision making and control.
 Management of business requires transparency and that every
implementation of strategy depends on clearly defined goals and
access to all relevant information.
 Complete openness creates a trusted strong foundation to build upon.
 EA creates transparency by establishing a foundation for the
identification and control of measures that enable IT efficiency,
effectiveness and reliability.
TRANSPARENCY
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #1
It’s not always about the Core
36
 In the past, a common IT strategy was the single vendor approach
 Get everything you can from a single vendor to minimize the complexity
of integration
 The core was the master and all other systems were downstream
 Replacing the core was and is all encompassing and limited the Plans
ability to address any other business needs
 Today – we use architecture to:
 Address integration needs across all platforms
 Build on common a information architecture to ensure data consistency and
availability
 Leverage common technologies to delver efficiencies and minimize
complexity
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 37
 ACA
 Defined requirements
 Determined they focused on:
 Enrollment
 Financial (billing and AR)
 Layer capabilities around core as opposed to replacing
Case Study #1
It’s not always about the Core (continued)
Business
Architecture
Application
Architecture
Technology
Architecture
Information
Architecture
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #2
The enterprise has landed?
38
 Today technology is mobile which presents several complications
including:
 Security
 Connectivity
 We can’t just select a “cool” application (app), we need to understand:
 The business case
 What technology utilizes and how if fits with our architecture
 How the data aligns with our information architecture
 What standards are utilized
 Integration with other enterprise application
 Security framework
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 39
 Health Risk Assessment
 Determine requirements including:
 Data requirements and fit with current HRA
 Integration from architecture and current HRA application
 Security
 Existing mobile devices supported
Case Study #2
The enterprise has landed? (continued)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Case Study #3
Information is the Key
40
 From our perspective, key to the long-term future of Health Plans is
their ability to use information to add value to programs such as:
 Value-based programs
 Population health
 Risk analysis
 Care Coordination
 Etc....
 Health Plans have historically under invested in both people and
technology to support this need
 Information Architecture must be defined
 Governance must be established
 There is no end as this is an ongoing journey
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 41
 Data model – what is your DNA
 Logical Model
 Where reporting occurs at what levels within your architecture
 What tools in your architecture support reporting
 Database
 ETL
 Tools
Case Study #3
Information is the Key (continued)
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
IN SUMMARY
42
 Establish Governance
 Business and IT owning the architecture process
 Business driving the use of technology (Business Architecture)
1 Business Alignment
2 Create a Change Framework
3 Communication and Transparency
 Communicate, communicate, communicate.
 Will only gain buy-in when the rationale behind the decision is
understood.


 Maintain Established EA
 Allow for change
 Managing the change
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL
Q&A
??
?
PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 44
Thank You
 Bob Hoover
716-225-3262
bhoover@changehealthcare.com
 Mauricio ‘MJ’ Jimenez
305-215-2156
mj@changehealthcare.com

More Related Content

What's hot

Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for DummiesSebastien Juras
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
 
Enterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationEnterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationRiaz A. Khan, OpenCA, TOGAF
 
IT Strategy Assessment & Optimization - Catallysts Approach
IT Strategy Assessment & Optimization - Catallysts ApproachIT Strategy Assessment & Optimization - Catallysts Approach
IT Strategy Assessment & Optimization - Catallysts ApproachRajanish Dass
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Alan McSweeney
 
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...johnpolgreen
 
Simple and Effective Enterprise Architecture with Tools you Already Own
Simple and Effective Enterprise Architecture with Tools you Already OwnSimple and Effective Enterprise Architecture with Tools you Already Own
Simple and Effective Enterprise Architecture with Tools you Already OwnChandra Knabel
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture GovernanceRakesh Sharan
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
Architecture Governance in Brief
Architecture Governance in BriefArchitecture Governance in Brief
Architecture Governance in BriefAnthony Dehnashi
 
Introduction to business architecture
Introduction to business architectureIntroduction to business architecture
Introduction to business architectureAniekan Okono
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
Creating Enterprise Value from Business Architecture
Creating Enterprise Value from Business ArchitectureCreating Enterprise Value from Business Architecture
Creating Enterprise Value from Business Architectureiasaglobal
 
Introduction to Business Architecture - Part 2
Introduction to Business Architecture - Part 2Introduction to Business Architecture - Part 2
Introduction to Business Architecture - Part 2Alan McSweeney
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureAlan McSweeney
 
Using Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyUsing Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyCraig Martin
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Alan McSweeney
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture FrameworksStephen Lahanas
 

What's hot (20)

Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT Architecture
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).
 
Enterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital TransformationEnterprise Architecture, Project Management & Digital Transformation
Enterprise Architecture, Project Management & Digital Transformation
 
IT Strategy Assessment & Optimization - Catallysts Approach
IT Strategy Assessment & Optimization - Catallysts ApproachIT Strategy Assessment & Optimization - Catallysts Approach
IT Strategy Assessment & Optimization - Catallysts Approach
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...
Using togaf™ in government_enterprise_architecture_to_describe_the_it_archite...
 
Simple and Effective Enterprise Architecture with Tools you Already Own
Simple and Effective Enterprise Architecture with Tools you Already OwnSimple and Effective Enterprise Architecture with Tools you Already Own
Simple and Effective Enterprise Architecture with Tools you Already Own
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture Governance
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
Architecture Governance in Brief
Architecture Governance in BriefArchitecture Governance in Brief
Architecture Governance in Brief
 
Introduction to business architecture
Introduction to business architectureIntroduction to business architecture
Introduction to business architecture
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
Creating Enterprise Value from Business Architecture
Creating Enterprise Value from Business ArchitectureCreating Enterprise Value from Business Architecture
Creating Enterprise Value from Business Architecture
 
Introduction to Business Architecture - Part 2
Introduction to Business Architecture - Part 2Introduction to Business Architecture - Part 2
Introduction to Business Architecture - Part 2
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution Architecture
 
Using Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyUsing Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategy
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1
 
Architecture governance
Architecture governanceArchitecture governance
Architecture governance
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 

Similar to Create an Enterprise Architecture Strategy in 3 Steps

Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Wicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEWicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEPaul Wicker
 
ESI International - Healthcare
ESI International - HealthcareESI International - Healthcare
ESI International - HealthcareBeckie Palmer
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure managementShoaib Patel
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadlineaccenture
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Adaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsAdaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsWorkday, Inc.
 
Successful Change Management with ERM
Successful Change Management with ERMSuccessful Change Management with ERM
Successful Change Management with ERMAggregage
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data IntegrationAnalytiX DS
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...AnalytixDataServices
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assuranceMaveric Systems
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence ProductionizationDavid Moore
 

Similar to Create an Enterprise Architecture Strategy in 3 Steps (20)

Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Wicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUMEWicker, Paul EXPANDED RESUME
Wicker, Paul EXPANDED RESUME
 
ESI International - Healthcare
ESI International - HealthcareESI International - Healthcare
ESI International - Healthcare
 
Bb capabilities
Bb capabilitiesBb capabilities
Bb capabilities
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Adaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business ModelsAdaptable Architecture – the Backbone of Digital Business Models
Adaptable Architecture – the Backbone of Digital Business Models
 
Successful Change Management with ERM
Successful Change Management with ERMSuccessful Change Management with ERM
Successful Change Management with ERM
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
The prominence of it lifecycle assurance
The prominence of it lifecycle assuranceThe prominence of it lifecycle assurance
The prominence of it lifecycle assurance
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence Productionization
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 

Recently uploaded

College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsCall Girls Noida
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949ps5894268
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareRommie Duckworth
 
Call Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any TimeCall Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any Timedelhimodelshub1
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarCareLineLive
 
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment BookingModels Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy GirlsRussian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girlsddev2574
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Timedelhimodelshub1
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed RuleShelby Lewis
 
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...delhimodelshub1
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls Lucknow
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 

Recently uploaded (20)

College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical Care
 
Call Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any TimeCall Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any Time
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So Far
 
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment BookingModels Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
 
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy GirlsRussian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Time
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
 
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 

Create an Enterprise Architecture Strategy in 3 Steps

  • 1. PROPRIETARY & CONFIDENTIAL Building the Framework for Successful IT 05.03.2017 Create an Enterprise Architecture Strategy in 3 Steps
  • 2. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2 The information and materials provided and referenced to herein are not intended to constitute legal, regulatory, accounting, medical or financial advice and do not create an attorney-client or other fiduciary relationship between Change Healthcare or its representatives and any third party. Additionally, Change Healthcare does not guarantee the accuracy of the information contained herein. The interpretations, extrapolations, views and opinions of each individual presenter are not necessarily the views of Change Healthcare. Change Healthcare disclaims any and all liability for any reliance you may place on the information contained herein. Disclaimer
  • 3. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3  Bob Hoover 716-225-3262 bhoover@changehealthcare.com  Mauricio ‘MJ’ Jimenez 305-215-2156 mj@changehealthcare.com Introductions
  • 4. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 4 CHANGE. Business needs and Technology are constantly changing Why Do Healthcare Organizations Need an Enterprise Architecture Strategy?
  • 5. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 5  Exchange Government Markets Growth and Privatization  Changing Demographics  Retail Transformation  Digitization of Healthcare IT The healthcare industry is facing a DYNAMIC MARKET, creating both challenges and opportunities
  • 6. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 6  Social networking connecting patients to providers, patients to patients, etc.  Agile Development and Implementation  Cloud technologies and solutions  Recent large investments by providers (for EMR’s and meaningful use)  Big Data and the use of data in healthcare – a long way to catch up to other industries  Tele-Health allowing for consultations with clinicians in more convenient locations than the medical office or hospital  Using smartphones to deliver care management services to high-risk patients daily, securely and with personal communications  Technology allowing patients to learn more about their personal health issues and treatments and the quality of their providers  Health data transmitted to caregivers via mobile devices or in-home monitors CHANGE in Technology
  • 7. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 7 Establish an ENTERPRISE ARCHITECTURE STRATEGY How do to manage so much change?
  • 8. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 8 What is Enterprise Architecture? EA is CONCEPTUAL BLUEPRINT that defines the structure and operation of an organization
  • 9. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Enterprise Architecture Defined 9  Framework which guides investment and design decisions and specifies standards, interfaces and common services for the deployment and management of IT assets, in support of business objectives.  Defines an environment that is adaptable to unforeseen requirements and future system changes.  EA is the link between the Business Strategy, the IT strategy and IT implementation.  It is an integral part of the strategic planning process and provides guidance to those implementing and managing IT resources (data, applications and technology).
  • 10. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL EA Methodologies Available 10 GOVERNMENT  The Federal Enterprise Architecture PROPRIETARY  The Zachman Framework for Enterprise Architectures  The Gartner Methodology GROUP DEVELOPED  The Open Group Architectural Framework (TOGAF)
  • 11. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL TOGAF 11 TECHNOLOGYBUSINESS APPLICATION INFORMATION  The Open Group is a global consortium that enables the achievement of business objectives through IT standards.  Open Group Standard, is a proven enterprise architecture methodology and framework used to improve business efficiency.  It is the most prominent and reliable enterprise architecture standard. DOMAINS
  • 12. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 12 TOGAF Four Domain Areas • Hardware • Software • Network Infrastructure • Logical Data Models • Physical Data Models • Data Management Resources • Application Blueprint • Component Interactions • Service Definitions • Relationship to Business Processes • Business Strategy • Governance • Organization • Key Business Processes Business Architecture Application Architecture Technology Architecture Information Architecture
  • 13. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL FINANCIALS (AR/AP) GENERAL LEDGER CUSTOMER SERVICE BENEFITS PROVIDER PROFILING DATA WAREHOUSE DATA ACCESS REPORTING PROVIDER CREDENTIALING UNDERWRITING/ ACTUARIAL AUTH/REFERRAL (UM) CONTENT VENDOR CM/DM PREDICTIVE MODELING REIMBURSEMENT CAPITATION APPEALS & GRIEVANCES 13 The Application Architecture of a Health Plan CLAIMS AUDIT FRAUD & ABUSE CLAIMS/ ENCOUNTER PROCESSING OTHER CLAIMS PROVIDER CONTRACTS LEGEND Core Applications Non-Core Applications Auto MBR Acquisition Care Management Provider Systems PRACTICE MGMT MEDICAL RECORDS AGENT/ BROKER MANAGEMENT MEMBERSHIP, INDIVIDUAL, GROUP BILLING MARKETING
  • 14. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 14 What is the intent of Enterprise Architecture Strategy? The intent of an EA strategy is to determine how an organization can MOST EFFECTIVELY ACHIEVE ITS IT’S CURRENT AND FUTURE OBJECTIVES
  • 15. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 15 How do we apply EA to make a difference? Develop a Change Framework with CONSTANT CHANGE AS THE FIRST PRINCIPLE and understand that healthcare organizations need the latitude to develop or procure their own solutions.
  • 16. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 16 Three Steps to an Enterprise Architecture 3
  • 17. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 17 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 18. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 1 Business Alignment 18
  • 19. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 19 DEFINITION: ”We define Alignment among Business, Systems and Information as a way to quantify the coherency level in relation to the business necessity, the systems offer and information management” Enterprise Architecture: Business and IT Alignment – C. Pereira, P. Sausa - ACM Symposium of Applied Computing Where do we see these misalignments?  Business Process and Information  Business Process and Applications  Applications and Information  IT and Information  Applications and IT 1 Business Alignment Business Architecture Application Architecture Technology Architecture Information Architecture
  • 20. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 20 BUSINESS ARCHITECTURE APPLICATION ARCHITECTURE TECHNOLOGY ARCHITECTURE INFORMATION ARCHITECTURE 1 Business Alignment – Visual Representation
  • 21. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 21 Business Architecture Application Architecture IT Architecture Information Architecture 1 Business Alignment - Examples Business Architecture and Information Architecture  Information entities must have a business definition, description and a set of attributes  Attributes are related to business processes
  • 22. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 22 1 Business Alignment - Examples Business Architecture Application Architecture IT Architecture Data Architecture Business Architecture and Application Architecture  Application properties are classified as availability (up time), scalability (ability to scale up performance), profile based accesses (ability to identify who does each task).
  • 23. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 23 a) Each business process should be supported by the minimum number of applications. b) Business activities should be supported by a single application. c) Critical business processes should be supported by scalable and highly available applications. d) Critical business processes/activities should be supported by different applications than the noncritical business processes/activities. e) Each application's functionality should support at least one business process activity. Otherwise, it plays no role in supporting the business. f) Information required for critical processes should be also supported by scalable and highly available systems. g) Business processes activities requiring on-line/batch support should be supported by applications running on different infrastructures, making easier the tuning of the systems for operating window. C. Pereira, P. Sausa , J. Marquez - Enterprise Architecture Alignment Heuristics – MS Development Network 1 Business Alignment Heuristics
  • 24. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 24 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 25. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 2 Establish a Change Framework 25
  • 26. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL ?? ? 26 Change Management? Or Change Framework? Change Framework speaks to CHANGES TO THE ARCHITECURE 2 Establish a Change Framework
  • 27. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 27 Change Framework will determine:  The circumstances under which the enterprise architecture, or parts of it, will be permitted to change after deployment, and the process by which that will happen  The circumstances under which the architecture development cycle will be initiated again to develop a new architecture 2 Establish a Change Framework
  • 28. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 28 “There are many valid approaches to change management, and various management techniques and methodologies that can be used to manage change; for example, project management methods such as PRINCE2, service management methods such as ITIL, management consultancy methods such as Catalyst, and many others. An enterprise that already has a change management process in place in a field other than architecture (for example, in systems development or project management) may well be able to adapt it for use in relation to architecture.” Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 29. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 29  The goal of the change framework is ensure that the EA strategy achieves its original business value. Including managing changes to the EA in a coordinated, strategic manner.  The change framework will continually monitor:  governance requests,  changes in technology,  changes in the business environment (i.e. growth / decline),  capacity and performance  CRITICAL The governance body establish criteria to judge whether a Change Request warrants just an architecture update or whether it warrants starting a new architecture evolution cycle.  IMPORTANT Avoid "creeping elegance", and the governance body must continue to look for changes that relate directly to business value. Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 30. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 30 Types of Changes  Simplification Change: A simplification change can normally be handled via change management techniques.  Incremental Change: An incremental change may be capable of being handled via change management techniques, or it may require partial re-architecting, depending on the nature of the change  Re-architecting Change: A re-architecting change requires putting the whole architecture through the architecture development cycle again. Architecture Change Management – ADM - TOGAF® 9.1 2 Establish a Change Framework
  • 31. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 31 Three Steps to an Enterprise Architecture Establish a Change Framework2 Communication & Transparency3 Business Alignment 1
  • 32. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 3 Communication & Transparency 32
  • 33. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 33 3 Communication & Transparency COMMUNICATE, COMMUNICATE, COMMUNICATE! COMMUNICATION
  • 34. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 34 3 Communication & Transparency  Organizations often fail to realize the full potential of EA due to a lack of communication.  Key to communication is to start with “the end” in mind. This is how you manage expectations.  Meeting with stakeholders to get their “buy-in”. Ask them:  What does the EA strategy mean to you?  Why are you doing the EA strategy?  What are their expectation for the end-result of the EA strategy? COMMUNICATION
  • 35. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 35 3 Communication & Transparency  Transparency is information as a basis for decision making and control.  Management of business requires transparency and that every implementation of strategy depends on clearly defined goals and access to all relevant information.  Complete openness creates a trusted strong foundation to build upon.  EA creates transparency by establishing a foundation for the identification and control of measures that enable IT efficiency, effectiveness and reliability. TRANSPARENCY
  • 36. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #1 It’s not always about the Core 36  In the past, a common IT strategy was the single vendor approach  Get everything you can from a single vendor to minimize the complexity of integration  The core was the master and all other systems were downstream  Replacing the core was and is all encompassing and limited the Plans ability to address any other business needs  Today – we use architecture to:  Address integration needs across all platforms  Build on common a information architecture to ensure data consistency and availability  Leverage common technologies to delver efficiencies and minimize complexity
  • 37. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 37  ACA  Defined requirements  Determined they focused on:  Enrollment  Financial (billing and AR)  Layer capabilities around core as opposed to replacing Case Study #1 It’s not always about the Core (continued) Business Architecture Application Architecture Technology Architecture Information Architecture
  • 38. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #2 The enterprise has landed? 38  Today technology is mobile which presents several complications including:  Security  Connectivity  We can’t just select a “cool” application (app), we need to understand:  The business case  What technology utilizes and how if fits with our architecture  How the data aligns with our information architecture  What standards are utilized  Integration with other enterprise application  Security framework
  • 39. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 39  Health Risk Assessment  Determine requirements including:  Data requirements and fit with current HRA  Integration from architecture and current HRA application  Security  Existing mobile devices supported Case Study #2 The enterprise has landed? (continued)
  • 40. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Case Study #3 Information is the Key 40  From our perspective, key to the long-term future of Health Plans is their ability to use information to add value to programs such as:  Value-based programs  Population health  Risk analysis  Care Coordination  Etc....  Health Plans have historically under invested in both people and technology to support this need  Information Architecture must be defined  Governance must be established  There is no end as this is an ongoing journey
  • 41. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 41  Data model – what is your DNA  Logical Model  Where reporting occurs at what levels within your architecture  What tools in your architecture support reporting  Database  ETL  Tools Case Study #3 Information is the Key (continued)
  • 42. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL IN SUMMARY 42  Establish Governance  Business and IT owning the architecture process  Business driving the use of technology (Business Architecture) 1 Business Alignment 2 Create a Change Framework 3 Communication and Transparency  Communicate, communicate, communicate.  Will only gain buy-in when the rationale behind the decision is understood.    Maintain Established EA  Allow for change  Managing the change
  • 43. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL Q&A ?? ?
  • 44. PROPRIETARY & CONFIDENTIALCHANGE HEALTHCARE PROPRIETARY & CONFIDENTIAL 44 Thank You  Bob Hoover 716-225-3262 bhoover@changehealthcare.com  Mauricio ‘MJ’ Jimenez 305-215-2156 mj@changehealthcare.com